Patent application number | Description | Published |
20120150885 | CHANGE NOTIFICATIONS FROM AN UPDATED DATA REPRESENTATION - An original representation of an original set of data in a data source can be provided, and an updated representation of an updated set of data in the data source can be received. A change notification set that includes change notifications can be generated by comparing the updated representation with the original representation. The change notification set can represent a possible set of changes that yield the updated representation when starting with the original representation. The change notification set can be sent to a client of the data source. One or more requests from the client for data from the data source may be processed while obtaining the updated representation of the updated set of data. This processing can include adding one or more placeholders and matching the placeholder(s) with one or more items in the updated set of data. | 06-14-2012 |
20120150886 | PLACEHOLDERS RETURNED FOR DATA REPRESENTATION ITEMS - One or more requests from a client for data representation items can be received by an items manager. The data representation items can represent data items in a data source. In response, the items manager can perform the following: generating placeholders corresponding to the data representation items; returning the placeholders to the client; fetching the data items from the data source; providing the data representation items to the client; and informing the client that the placeholders are to be replaced with the data representation items. The items manager may determine whether each data representation item can be synchronously returned to the client. If so, the items manager may return that data representation item synchronously, and may forego providing the client with a placeholder for that data representation item. This may allow a client to interact with a single interface for both synchronous and asynchronous data sources. | 06-14-2012 |
20120191747 | DATA ITEMS MANAGER - An items manager can request and receive data items from a data source via a data source adapter. The items manager can also maintain a list of data representation items representing data items. The data representation items can include user interface elements. Also, maintaining the list can include invoking a renderer to render the data representation items from the data items received from the data source, and including the data representation items in the list. The items manager can provide a client with an enumeration through the list of data representation items. The items manager may also provide other features, such as providing the client with notifications of changes to the list of data representation items. | 07-26-2012 |
20120296875 | OPTIMISTIC APPLICATION OF DATA EDITS - A data representation that represents source data at a data source can be maintained. A request to perform an edit can be received from a client, and a request to make the edit to the source data can be sent to the data source. The edit can be optimistically applied to the data representation. Additionally, a change notification can be sent to the client. The change notification can indicate one or more changes to the data representation, where the change(s) resulted from the application of the edit to the data representation. A notification can be received from the data source after applying the edit to the data representation and after sending the change notification. The notification from the data source can indicate whether the edit to the source data succeeded. | 11-22-2012 |
Patent application number | Description | Published |
20100191860 | PERSONAL MEDIA BROADCASTING SYSTEM WITH OUTPUT BUFFER - A personal media broadcasting system enables video distribution over a computer network and allows a user to view and control media sources over a computer network from a remote location. A personal broadcaster receives an input from one or more types of media sources, digitizes and compresses the content, and streams the compressed media over a computer network to a media player running on any of a wide range of client devices for viewing the media. The system may allow the user to issue control commands (e.g., “channel up”) from the media player to the broadcaster, causing the source device to execute the commands. The broadcaster and the media player may employ several techniques for buffering, transmitting, and viewing the content to improve the user's experience. | 07-29-2010 |
20120011269 | PERSONAL MEDIA BROADCASTING SYSTEM WITH OUTPUT BUFFER - A personal media broadcasting system enables video distribution over a computer network and allows a user to view and control media sources over a computer network from a remote location. A personal broadcaster receives an input from one or more types of media sources, digitizes and compresses the content, and streams the compressed media over a computer network to a media player running on any of a wide range of client devices for viewing the media. The system may allow the user to issue control commands (e.g., “channel up”) from the media player to the broadcaster, causing the source device to execute the commands. The broadcaster and the media player may employ several techniques for buffering, transmitting, and viewing the content to improve the user's experience. | 01-12-2012 |
20130007816 | PERSONAL MEDIA BROADCASTING SYSTEM WITH OUTPUT BUFFER - A personal media broadcasting system enables video distribution over a computer network and allows a user to view and control media sources over a computer network from a remote location. A personal broadcaster receives an input from one or more types of media sources, digitizes and compresses the content, and streams the compressed media over a computer network to a media player running on any of a wide range of client devices for viewing the media. The system may allow the user to issue control commands (e.g., “channel up”) from the media player to the broadcaster, causing the source device to execute the commands. The broadcaster and the media player may employ several techniques for buffering, transmitting, and viewing the content to improve the user's experience. | 01-03-2013 |
Patent application number | Description | Published |
20100163199 | READILY DEFIBERED PULP PRODUCT - A wet-laid wood pulp product containing cellulose pulp fibers and elongate precipitated calcium carbonate having a diameter of 0.015 to 0.6 microns at its maximum diameter and a length of 1 to 10 microns and the calcium carbonate being incorporated within the sheet and a method for making the product. | 07-01-2010 |
20100163200 | METHOD FOR MAKING READILY DEFIBERED PULP PRODUCT - A wet-laid wood pulp product containing cellulose pulp fibers and elongate precipitated calcium carbonate having a diameter of 0.015 to 0.6 microns at its maximum diameter and a length of 1 to 10 microns and the calcium carbonate being incorporated within the sheet and a method for making the product. | 07-01-2010 |
20100307702 | Meterable Fiberous Material - A particle or particles of cellulosic wood pulp fibers having a top and bottom face and a hexagonal perimeter, and methods of using it. | 12-09-2010 |
20120208933 | POLYMERIC COMPOSITES - A composition comprising 65 to 90 weight percent kraft chemical wood pulp fibers and a thermoplastic polymer and a method of making the composition. | 08-16-2012 |
20130005859 | Fiber for Fiber Cement and Resulting Product - A fiber-cement product which includes a treated cellulose wood pulp fiber. The fiber is treated with fibrillated carboxymethyl cellulose or a carboxyethyl cellulose and poly (diallyldimethyl ammonium)chloride. The fiber can be bleached or partially bleached, refined or unrefined or a mixture of refined and unrefined fiber. | 01-03-2013 |
20130206035 | Composite Polymer - A composition comprising 10 to 50 weight % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the composition has a brightness of at least 20 as measured by the Brightness Test. The wood pulp fiber can be bleached chemical wood pulp fiber. The brightness may be at least 30 as measured by the Brightness Test. | 08-15-2013 |
20130206036 | Composite Polymer - A composition comprising 10 to 50 wt % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the average dispersion of the fibers within the thermoplastic polymer composition is equal to or greater than 90% as determined by the Dispersion Test. The pulp can be bleached chemical wood pulp fiber. | 08-15-2013 |
20130206037 | Composite Polymer Molded Product - A molded part comprising 10 to 50 weight % wood pulp fiber, 45 to 85 weight % thermoplastic polymer and having an edge extending between two faces wherein the edge has two tactile defects or less per foot or less of edge length. | 08-15-2013 |
20130210965 | Composite Polymer - A composition comprising 10 to 50 wt % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the dilution level for detection in a bag at 40° C. is equal to or less than 450 as determined by ASTM E679. | 08-15-2013 |
20130338269 | FIBER FOR FIBER CEMENT AND RESULTING PRODUCT - A fiber-cement product which includes a treated cellulose wood pulp fiber. The fiber is treated with fibrillated carboxymethyl cellulose or a carboxyethyl cellulose and poly(diallyldimethylammonium chloride). The fiber can be bleached or partially bleached, refined or unrefined or a mixture of refined and unrefined fiber. | 12-19-2013 |
Patent application number | Description | Published |
20110179045 | Template-Based Management and Organization of Events and Projects - A space in which a user may organize data and collaborate with other users is provided. Project data and metadata may be saved into a reusable template and stored in a repository, wherein other users may discover and download the template for use as a resource for a related project type. A template may contain various document types that may expose a breadth of applications and application functionalities that may be utilized for a given task or project. Questions and answers, task templates, and terminology may also be provided. Project templates may allow for collaboration on projects, wherein business and/or social groups may collaborate quickly, easily, and more completely. | 07-21-2011 |
20110179049 | Automatic Aggregation Across Data Stores and Content Types - Project-related data may be aggregated from various data sources, given context, and may be stored in a data repository or organizational knowledge base that may be available to and accessed by others. Documents, emails, contact information, calendar data, social networking data, and any other content that is related to a project may be brought together within a single user interface, irrespective of its data type. A user may organize and understand content, discover relevant information, and act on it without regard to where the information resides or how it was created. | 07-21-2011 |
20110179060 | Automatic Context Discovery - An automatic discovery of content to add to a data store for a project is disclosed. A data item may be parsed for data features that are contextually relevant to a given project or task. Discovered interesting data may be extracted and mapped to various search mechanisms. A search may be built and applied to various data sources to discover data items based on the contextually relevant data features. Search results from various search mechanisms may be displayed in a single user interface and may be presented to a user. | 07-21-2011 |
20110179061 | Extraction and Publication of Reusable Organizational Knowledge - An analysis module, when triggered by a synchronization framework when a new data item is added to a project data store, runs a series of analysis feature extractors on the new content. An analysis may be conducted, and features of interest may be extracted from the data item. The analysis utilizes natural language processing, as well as other technologies, to provide an automatic or semi-automatic extraction of information. The extracted features of interest are saved as metadata within the project data store, and are associated with the data item from which it was extracted. The analysis module may be utilized to discover additional information that may be gleaned from content that is already in the project data store. | 07-21-2011 |
Patent application number | Description | Published |
20120004282 | RNA Interference Mediated Inhibition of the Intercellular Adhesion Molecule 1 (ICAM-1) Gene Expression Using Short Interfering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of ICAM-1 gene expression and/or activity, and/or modulate a ICAM-1 gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsRNA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against ICAM-1 gene expression. | 01-05-2012 |
20120016010 | RNA Interference Mediated Inhibition of BTB and CNC Homology 1, Basic Leucine Zipper Transcription Factor 1 (BACH1) Gene Expression Using Short Interfering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of Bach1 gene expression and/or activity, and/or modulate a Bach1 gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsRNA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against Bach1 gene expression. | 01-19-2012 |
20120029054 | RNA Interference Mediated Inhibition of GATA Binding Protein 3 (GATA3) Gene Expression Using Short Intefering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of GATA3 gene expression and/or activity, and/or modulate a GATA3 gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsR-NA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against GATA3 gene expression. | 02-02-2012 |
20120035247 | RNA Interference Mediated Inhibition of Signal Transducer and Activator of Transcription 6 (STAT6) Gene Expression Using Short Interfering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of STAT6 gene expression and/or activity, and/or modulate a STAT6 gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsR-NA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against STAT6 gene expression. | 02-09-2012 |
Patent application number | Description | Published |
20110073289 | LOW PROFILE BLOWER RADIAL HEATSINK - A cooling device, such as for cooling a chip and socket may have a centrifugal blower outside of a radial heatsink. In addition, supports for coupling the blower to a center motor may comprise overhead fan blades effectively creating a radial fan in series with the blower to maximize airflow and pressure capability and to minimize the noise. The vertical location of blower may further allow to improve motherboard component as well as system cooling all while reducing the vertical profile of the cooling device. | 03-31-2011 |
20120216029 | METHOD, APPARATUS, AND SYSTEM FOR ENERGY EFFICIENCY AND ENERGY CONSERVATION INCLUDING CONFIGURABLE MAXIMUM PROCESSOR CURRENT - An apparatus, method and system is described herein for providing multiple maximum current configuration options including corresponding turbo frequencies for a processing device. Available options for a processor are determined by initialization code. And based on platform electrical capabilities, an optimal one of the multiple current configuration options is selected. Moreover, during runtime another current configuration is dynamically selected based on current configuration considerations to provide high flexibility and best possible performance per part and computing platform. | 08-23-2012 |
20130007440 | METHOD AND APPARATUS FOR CONFIGURABLE THERMAL MANAGEMENT - Embodiments of an apparatus, system and method are described for configurable processor thermal management. An apparatus may comprise, for example, a processor arranged to operate in a plurality of thermal modes comprising a thermal limit down mode, a normal thermal limit mode and a thermal limit up mode, and thermal management logic operative to select a thermal mode based on one or more properties of the apparatus. Other embodiments are described and claimed. | 01-03-2013 |
20130285545 | THERMAL MANAGEMENT FOR LIGHT-EMITTING DIODES - Embodiments of the invention provide lighting systems that employ light-emitting diode (LED) chips as active lighting elements. Heat management components for the LED chips employed in the lighting sources are provided. In embodiments of the invention, LED chips are cooled by one or more heatspreaders and heat sinks attached to a substrate that houses the LED chip and/or the topside of the LED chip. | 10-31-2013 |
Patent application number | Description | Published |
20120092442 | Quality of Service Adjustments to Improve Network Utilization - Devices of a telecommunication network described herein are configured to reduce a service level associated with a quality of service offered by the telecommunication network to a user. The devices may reduce the service level responsive to data consumption by the user exceeding a threshold or responsive to data consumption associated with an application or data type. Also, the devices may be configured to increase a video-conversation-specific service level responsive to determining that a client device of the user is establishing a video conversation. | 04-19-2012 |
20120092990 | Quality of Service Adjustments to Improve Network Utilization - Devices of a telecommunication network described herein are configured to reduce a service level associated with a quality of service offered by the telecommunication network to a user. The devices may reduce the service level responsive to data consumption by the user exceeding a threshold or responsive to data consumption associated with an application or data type. Also, the devices may be configured to increase a video-conversation-specific service level responsive to determining that a client device of the user is establishing a video conversation. | 04-19-2012 |
20120142306 | Priority Communications in a Shared Access Telecommunications Network - Described herein are systems and techniques that can coordinate priority communications for the users of one telecommunications network relative to the users of other such networks. This may be useful in emergency situations where one of the networks comprises a public services entity, which may from time to time demand priority communications in order to efficiently respond to urgent situations. | 06-07-2012 |
20130142043 | QUALITY OF SERVICE APPLICATION CONTROLLER AND USER EQUIPMENT APPLICATION PROFILER - Various topologies of a quality of service application controller and related techniques to optimize the communications performance an application executing on a device participating in a communications environment are disclosed. The communications environment may include a cellular network, an unlicensed spectrum network, or a combination of the two. The quality of service application controller observes one or more key performance indicators of the communications network, and retrieves a policy from a policy store specific to the application. The quality of service application controller then modifies the execution of the application and/or the configurable aspects of the communications environment to optimize the communications performance of the application. For example, the application's data throughput may be increased, the power draw of the application may be minimized, data requested by the application may be minimized, or the apparent response time of the application's response to a web service may be minimized. | 06-06-2013 |
20130258929 | Rule-Based Application Controller for Signaling Reduction - An application controller of a telecommunication device to receive a packet from an application of the telecommunication device and determine a signaling reduction rule associated with the application is described herein. Based at least in part on the signaling reduction rule, the application controller performs a signaling reduction action associated with transmission of the packet. | 10-03-2013 |
20130258966 | Application Controller for Quality-of-Service Configuration of a Telecommunication Device Radio - An application controller of a telecommunication device to determine, for a packet flow of an application, a quality-of-service rule associated with the application is described herein. The application controller then configures a data bearer for a wireless communication stack of the telecommunication device with a quality-of-service specified by the quality-of-service rule and provides a packet of the packet flow for transmission to a remote recipient via the configured data bearer. | 10-03-2013 |
Patent application number | Description | Published |
20100208648 | LOCATION-BASED IMS SERVER SELECTION - A user location is estimated based on an IP address assigned to the user's device/equipment during registration for multimedia application services that are provided over the IP multimedia subsystems (IMS) network. The latitude and longitude information of the user location is obtained based on the IP address assigned to the user device/equipment. Such information is used to determine an appropriate server(s) for establishing an IP multimedia service session. In some embodiments, a closely located IMS server(s) is selected for proxying, interrogating, providing or delivering IP multimedia services. In this manner, each user device/equipment communicates with IMS servers that are located close to the user and thus, the geographically distributed load among the IMS gateway servers can be achieved. | 08-19-2010 |
20100211628 | SELECTION OF ROAMING GATEWAY - A system and method for selecting a proxy gateway server for controlling data traffic initiated by a user device roaming on a visited network is disclosed. The method includes utilizing a mobility anchor server associated with the visited network to receive a request to activate a data traffic session from a user device, identify the user device as a roaming user device, and select a proxy gateway server from one or more servers associated with the visited network for controlling the data traffic initiated by the roaming user device. The selection of a proxy server is accomplished by querying a DNS server associated with the visited network with a pre-defined roaming APN string associated with the visited network and, in response to the query, receiving an Internet Protocol (IP) address of the proxy gateway server from the DNS server. | 08-19-2010 |
20120195294 | MANAGING ACCESS GATEWAYS - Systems and methods for the management of communications related to telecommunications-based devices are provided. Gateway computing devices corresponding to a radio communication network can modify the static provisioning of communication network access gateway to telecommunications-based devices accessing the wireless communication network. The modification of the static provisioning of gateway devices is based on subscription information associated with the requesting telecommunications-based device or based on general network policies that can be dynamically updated. | 08-02-2012 |
20120196588 | COMMUNICATION PROTOCOL PREFERENCES - Systems and methods for the management of communications related to telecommunications-based devices are provided. Telecommunications-based devices initiate requests to gateway computing devices corresponding to a radio communication network to establish data communications. The gateway computing device accepts the communication request and specifies an ordered preference of one or more communication protocols that will be used telecommunications-based devices accessing the wireless communication network. The telecommunications-based device processes the acceptance and selects a communication protocol from the ordered preference provided by the gateway computing device. | 08-02-2012 |
20120198046 | MOBILE DEVICE BANDWIDTH THROTTLING - System and methods for managing communications related to telecommunications-based devices are provided. Gateway computing devices corresponding to a radio communication network can modify the policies associated with telecommunications-based devices as a function of the usage of the radio communication network. The modification of the policies corresponds to monitoring of telecommunications-based device data usage and comparing the monitored data usage with data usage thresholds. The modification of the policies can also correspond to monitoring telecommunications-based device data usage and adjusting data usage quotas. The resulting modification can limit the throughput of data, prevent additional data requests, or modify different aspect of the data communications via the radio communication network. | 08-02-2012 |
20140233455 | COMMUNICATION PROTOCOL PREFERENCES - Systems and methods for the management of communications related to telecommunications-based devices are provided. Telecommunications-based devices initiate requests to gateway computing devices corresponding to a radio communication network to establish data communications. The gateway computing device accepts the communication request and specifies an ordered preference of one or more communication protocols that will be used telecommunications-based devices accessing the wireless communication network. The telecommunications-based device processes the acceptance and selects a communication protocol from the ordered preference provided by the gateway computing device. | 08-21-2014 |
20140242980 | SELECTION OF ROAMING GATEWAY - A system and method for selecting a proxy gateway server for controlling data traffic initiated by a user device roaming on a visited network is disclosed. The method includes utilizing a mobility anchor server associated with the visited network to receive a request to activate a data traffic session from a user device, identify the user device as a roaming user device, and select a proxy gateway server from one or more servers associated with the visited network for controlling the data traffic initiated by the roaming user device. The selection of a proxy server is accomplished by querying a DNS server associated with the visited network with a pre-defined roaming APN string associated with the visited network and, in response to the query, receiving an Internet Protocol (IP) address of the proxy gateway server from the DNS server. | 08-28-2014 |
Patent application number | Description | Published |
20090313684 | USING WINDOWS AUTHENTICATION IN A WORKGROUP TO MANAGE APPLICATION USERS - An system for authenticating users of an application program executing at a front-end computer using the security features built into the operating system of a logon computer is provided. Initially, an administrator establishes user accounts for each user with an operating system executing at the logon computer with access to application resources. When the application program starts executing at the front-end computer, the application program prompts the user for credentials. The application program attempts to access resources managed by the logon computer using the received credentials. When access to a resource is successful, the application program knows that the logon computer has authenticated the user and the user is authorized to access the resource. In this manner, the application program can take advantage of the security features built into the operating system executing at the logon computer to authenticate users of the application program and authorize access to application resources. | 12-17-2009 |
20090319382 | EXTENSIBLE FRAMEWORK FOR SUPPORTING DIFFERENT MODES OF PAYMENTS - A method and system for providing an extensible framework for a POS application is provided. A POS application may be extended using a payment format add-in, a workflow add-in, a financial services provider add-in, or a combination of add-ins. A payment format add-in provides support for a payment format not included in the payment formats built into the POS application. A workflow add-in provides a configurable workflow that can be used to extend a built-in payment format or a payment format add-in. A financial services provider add-in provides support for interacting with a financial services provider for which the POS application does not provide built-in support. Each add-in can implement, for example, logic for processing a payment transaction, a portion of a payment transaction, and configuring steps for processing a payment transaction. | 12-24-2009 |
20100274813 | EXTENSIBLE FRAMEWORK FOR DATA IMPORT AND EXPORT - A modular framework for data import/export in an application that allows modules/components to be independently developed for importing and exporting data related to specific entities, including the handling of dependencies between entities. The framework is metadata driven which allows new entities to be introduced in the application with new modules for importing/exporting data related to those entities, without updating modules for exporting existing entities. Each type of entity is defined with a schema that represents the logical entity such that the entity is agnostic as to how the entity data is stored in database tables. A master configuration file is created for the application that lists each entity that can be imported or exported by the application, and defines how the framework imports or exports the business entity. Additionally, dynamic batching is provided to divide large datasets into multiple batches for suitable consumption by consumers of the exported data. | 10-28-2010 |
20110161186 | EXTENSIBLE FRAMEWORK FOR SUPPORTING DIFFERENT MODES OF PAYMENTS - A method and system for providing an extensible framework for a POS application is provided. A POS application may be extended using a payment format add-in, a workflow add-in, a financial services provider add-in, or a combination of add-ins. A payment format add-in provides support for a payment format not included in the payment formats built into the POS application. A workflow add-in provides a configurable workflow that can be used to extend a built-in payment format or a payment format add-in. A financial services provider add-in provides support for interacting with a financial services provider for which the POS application does not provide built-in support. Each add-in can implement, for example, logic for processing a payment transaction, a portion of a payment transaction, and configuring steps for processing a payment transaction. | 06-30-2011 |
20110320433 | Automated Joining of Disparate Data for Database Queries - Described is associating metadata with different sources of data (e.g., database tables) that allows a single view of data from the sources to be created. An administrator creates baseviews corresponding to database tables and associates metadata with the baseviews, including primary key metadata for the baseviews and meta-tags for one or more of the columns of each baseview. A user selects fields (corresponding to table columns) from a starting baseview, along with fields from any other baseview that has metadata that matches the starting baseview's metadata. A join mechanism automatically creates the view if a metadata match is detected. | 12-29-2011 |
20130006664 | Data Change Tracking and Event Notification - The described implementations relate to updating views in a database system. One implementation can identify an active view that retrieves records from a database and determine one or more physical tables in the database that are referenced by the active view. The implementation can track one or more columns in the physical tables that are used by the active view and identify a change to the physical tables in a transaction log of the database. If the change does not affect the one or more columns, the change can be treated as an ignorable change for the active view. | 01-03-2013 |
20130006963 | DATA CHANGE TRACKING AND EVENT NOTIFICATION - The described implementations relate to updating views in a database system. One implementation can identify an active view that retrieves records from a database and determine one or more physical tables in the database that are referenced by the active view. The implementation can track one or more columns in the physical tables that are used by the active view and identify a change to the physical tables in a transaction log of the database. If the change does not affect the one or more columns, the change can be treated as an ignorable change for the active view. | 01-03-2013 |
20130007069 | Data Change Tracking and Event Notification - The described implementations relate to updating views in a database system. One implementation can identify an active view that retrieves records from a database and determine one or more physical tables in the database that are referenced by the active view. The implementation can track one or more columns in the physical tables that are used by the active view and identify a change to the physical tables in a transaction log of the database. If the change does not affect the one or more columns, the change can be treated as an ignorable change for the active view. | 01-03-2013 |
20130110542 | PATIENT DATA MANAGEMENT | 05-02-2013 |
20130298212 | USING WINDOWS AUTHENTICATION IN A WORKGROUP TO MANAGE APPLICATION USERS - An system for authenticating users of an application program executing at a front-end computer using the security features built into the operating system of a logon computer is provided. Initially, an administrator establishes user accounts for each user with an operating system executing at the logon computer with access to application resources. When the application program starts executing at the front-end computer, the application program prompts the user for credentials. The application program attempts to access resources managed by the logon computer using the received credentials. When access to a resource is successful, the application program knows that the logon computer has authenticated the user and the user is authorized to access the resource. In this manner, the application program can take advantage of the security features built into the operating system executing at the logon computer to authenticate users of the application program and authorize access to application resources. | 11-07-2013 |
Patent application number | Description | Published |
20100138639 | SANDBOXED EXECUTION OF PLUG-INS - A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP. Moreover, the architecture is highly scalable, stateless, and low administration architecture for the execution of the plug-ins, which can be scaled by adding/removing additional sandbox servers on-the-fly without prior configuration. | 06-03-2010 |
20140245437 | SANDBOXED EXECUTION OF PLUG-INS - A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP. Moreover, the architecture is highly scalable, stateless, and low administration architecture for the execution of the plug-ins, which can be scaled by adding/removing additional sandbox servers on-the-fly without prior configuration. | 08-28-2014 |
Patent application number | Description | Published |
20100082151 | SYSTEMS AND METHODS FOR RECEIVING SHIPMENT PARCELS - Disclosed are various embodiments of systems and methods for receiving shipment parcels at materials handling facilities. A parcel receiving system has an imaging tunnel through which shipment parcels received at a materials handling facility are passed. While a shipment parcel is passing through the imaging tunnel, a camera captures at least one image of the parcel. The parcel image is electronically analyzed to discover various tracking information and to detect various types of exceptions, such as damage to the parcel or defective tracking information. In addition, the captured image is stored in order to create a visual record of the parcel at the time of reception. This record may be used in a variety of ways, such as resolving or tracking exceptions or providing feedback to the vendor or shipment carrier. In addition, the parcel image may be viewed by a user to enable the user to detect and/or resolve an exception. Thus, the overall process of receiving parcels is facilitated, and the percentage of parcels diverted to an exception bin may be decreased. | 04-01-2010 |
20100082152 | SYSTEMS AND METHODS FOR RECEIVING SHIPMENT PARCELS - Disclosed are various embodiments of systems and methods for receiving shipment parcels at materials handling facilities. A parcel receiving system has an imaging tunnel through which shipment parcels received at a materials handling facility are passed. While a shipment parcel is passing through the imaging tunnel, a camera captures at least one image of the parcel. The parcel image is electronically analyzed to discover various tracking information and to detect various types of exceptions, such as damage to the parcel or defective tracking information. In addition, the captured image is stored in order to create a visual record of the parcel at the time of reception. This record may be used in a variety of ways, such as resolving or tracking exceptions or providing feedback to the vendor or shipment carrier. In addition, the parcel image may be viewed by a user to enable the user to detect and/or resolve an exception. Thus, the overall process of receiving parcels is facilitated, and the percentage of parcels diverted to an exception bin may be decreased. | 04-01-2010 |
20130188039 | SYSTEMS AND METHODS FOR RECEIVING SHIPMENT PARCELS - Disclosed are various embodiments of systems and methods for receiving shipment parcels at materials handling facilities. A system comprises a tunnel and at least one sensor located in the tunnel. The system further comprises logic that obtains data that is correlated with an identifier for a shipment parcel. The logic causes the at least one sensor to collect sensor data for the shipment parcel in the tunnel. The logic further compares the sensor data with the data that is correlated with the identifier to determine whether there is an exception for the shipment parcel. | 07-25-2013 |
20140081447 | SYSTEMS AND METHODS FOR RECEIVING SHIPMENT PARCELS - Disclosed are various embodiments of systems and methods for receiving shipment parcels at, for example, materials handling facilities. In some embodiments, a parcel monitoring system detects an exception for a shipment parcel. The parcel monitoring system identifies a vendor associated with the shipment parcel. In response to the exception being detected, the parcel monitoring system controls a conveyor system in accordance with an action specified by an exception handling rule for the vendor. | 03-20-2014 |
Patent application number | Description | Published |
20100299343 | Identifying Task Groups for Organizing Search Results - Computer-readable media and computerized methods for automatically organizing search results according to task groups are provided. The methods involve aggregating a gallery of entities (e.g., search queries that share a common categorization) into a query class and assigning a dictionary (e.g., list of terms that are drawn from various sources) to the query class. The task groups are identified from the list of terms within the dictionary. The process of identification includes analyzing patterns of user search behavior to select terms from the list of terms, which reflect popular user search intents, and ranking the selected terms based on predetermined parameters to produce an ordering. Based on the ordering, a set of the selected terms that are highest ranked are declared the task groups. The task groups are employed to arrange the search results on a UI display and to provide a consistent and intuitive format for refining a search. | 11-25-2010 |
20120209835 | Identifying Task Groups for Organizing Search Results - Computer-readable media and computerized methods for automatically organizing search results according to task groups are provided. The methods involve aggregating a gallery of entities (e.g., search queries that share a common categorization) into a query class and assigning a dictionary (e.g., list of terms that are drawn from various sources) to the query class. The task groups are identified from the list of terms within the dictionary. The process of identification includes analyzing patterns of user search behavior to select terms from the list of terms, which reflect popular user search intents, and ranking the selected terms based on predetermined parameters to produce an ordering. Based on the ordering, a set of the selected terms that are highest ranked are declared the task groups. The task groups are employed to arrange the search results on a UI display and to provide a consistent and intuitive format for refining a search. | 08-16-2012 |
20140025664 | IDENTIFYING TERMS ASSOCIATED WITH QUERIES - Computer-readable media and computerized methods are provided for identifying terms associated with one or more queries, including aspects directed to manipulating a list of terms associated with a query class by extracting terms, identifying equivalences or relevant terms, and condensing or expanding the list of terms. In embodiments, synonymous terms can be identified. An updated list of terms can be written to a storage location in association with a query or query class. | 01-23-2014 |
Patent application number | Description | Published |
20100317444 | USING A HUMAN COMPUTATION GAME TO IMPROVE SEARCH ENGINE PERFORMANCE - Human computation games are provided wherein a player is shown a page, such as a web page. The player is then asked to provide one or more terms that are intended to cause a search engine to return the page in response to performing a query using the terms. The terms provided by the player during game play are then collected, stored, and utilized to improve the performance of the search engine. | 12-16-2010 |
20120096033 | Disambiguation of Entities - Methods, systems, algorithms, and media are provided for disambiguating entities present in a received search query. Lists of categories from semi-structured data from external sites as well as internal sources are used to detect if ambiguity exists in an entity within the search query. Multiple senses or categories of the ambiguous entity are determined by ascertaining the primary intent of an entity extracted from a main term of a document. The probability of each sense is calculated by computing a total amount of traffic received for each of the senses of the ambiguous entity. The sense with the highest amount of computed traffic is the most probable determined sense. | 04-19-2012 |
20140324826 | TARGETED CONTENT PROVISIONING BASED UPON TAGGED SEARCH RESULTS - One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public sharing of tagged search results, and/or providing targeted content based upon search results tagged by a user. That is, a user may tag a search result (e.g., a website, an image, a social network profile, etc.), such as through a one-click user input, with a tag to create a tagged search result. The tagged search result may be organized into a public tag collection for sharing and/or exploration of tagged search results by other users. The tagged search result may be organized into a personal tag collection for later access by the user from any device. Because the tagged search result may be indicative of an interest of the user, targeted content associated with the tagged search result may be provided to the user. | 10-30-2014 |
20140324827 | SEARCH RESULT ORGANIZING BASED UPON TAGGING - One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public sharing of tagged search results, and/or providing targeted content based upon search results tagged by a user. That is, a user may tag a search result (e.g., a website, an image, a social network profile, etc.), such as through a one-click user input, with a tag to create a tagged search result. The tagged search result may be organized into a public tag collection for sharing and/or exploration of tagged search results by other users. The tagged search result may be organized into a personal tag collection for later access by the user from any device. Because the tagged search result may be indicative of an interest of the user, targeted content associated with the tagged search result may be provided to the user. | 10-30-2014 |
20140324828 | SEARCH RESULT TAGGING - One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public sharing of tagged search results, and/or providing targeted content based upon search results tagged by a user. That is, a user may tag a search result (e.g., a website, an image, a social network profile, etc.), such as through a one-click user input, with a tag to create a tagged search result. The tagged search result may be organized into a public tag collection for sharing and/or exploration of tagged search results by other users. The tagged search result may be organized into a personal tag collection for later access by the user from any device. Because the tagged search result may be indicative of an interest of the user, targeted content associated with the tagged search result may be provided to the user. | 10-30-2014 |
20140324829 | TAGGED SEARCH RESULT MAINTAINANCE - One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public sharing of tagged search results, and/or providing targeted content based upon search results tagged by a user. That is, a user may tag a search result (e.g., a website, an image, a social network profile, etc.), such as through a one-click user input, with a tag to create a tagged search result. The tagged search result may be organized into a public tag collection for sharing and/or exploration of tagged search results by other users. The tagged search result may be organized into a personal tag collection for later access by the user from any device. Because the tagged search result may be indicative of an interest of the user, targeted content associated with the tagged search result may be provided to the user. | 10-30-2014 |
Patent application number | Description | Published |
20100191707 | TECHNIQUES FOR FACILITATING COPY CREATION - Various techniques are disclosed for creating a snapshot of application data. A snapshot is taken by pausing parts of the application over time. Modifications are paused to a first part of data and the first part is copied into a snapshot. After the first part has finished copying, modifications are paused to remaining data, and the remaining data is copied. The application is unpaused. A snapshot can be taken by unpausing parts of the application over time. Modifications to data in an application are paused. A first part of data is copied, and after the first part has finished copying, modifications to the first part are unpaused. The final part of data is copied, and after the final part has finished copying, modifications to the final part are unpaused. Techniques for creating a snapshot of data residing in multiple locations are described. | 07-29-2010 |
20110125726 | SMART ALGORITHM FOR READING FROM CRAWL QUEUE - A smart algorithm for processing transaction from a crawl queue. If the crawler has in memory a predetermined number of URLs for a given host, the crawler reads from the crawl queue URLs from other hosts. As a result the crawler processes multiple hosts concurrently, and thus, uses machine resources more effectively and efficiently to process the URLs. The smart algorithm can further consider other criteria in deciding which URLs to read from the queue. These criteria can include the response time for each repository (host) the crawler processes. Additionally, the crawler can allocate its resources according to content groups (e.g., two pools), one group for faster content delivery and the second group one for slower content delivery. Thus, crawler resources can be partitioned or divided across different pools depending on repository response time. Other criteria can be provided and considered as well. | 05-26-2011 |
20110179427 | Web Services Access to Content Items Stored by Collaboration Systems - A computing system receives a web services request to invoke a method of web Application Programming Interface (API). In response to receiving the web services request, the computing system invokes a method of a language-dependent API of a client component in a collaboration system. The client component communicates with a collaboration server component in the collaboration system using a proprietary communications protocol. The method of the language-dependent API is a method to obtain data from the collaboration server component. After invoking the method, the computing system sends a web services response whose contents depend on the data obtained from the collaboration server component. | 07-21-2011 |
20120254118 | RECOVERY OF TENANT DATA ACROSS TENANT MOVES - A history of locations of tenant data is maintained. The tenant data comprises data that is currently being used by the tenant and the corresponding backup data. When a tenant's data is changed from one location to another, a location and a time is stored within the history that may be accessed to determine a location of the tenant's data at a specified time. Different operations trigger a storing of a location/time within the history. Generally, an operation that changes a location of the tenant's data triggers the storing of the location within the history (e.g. upgrade of farm, move of tenant, adding a tenant, load balancing of the data, and the like). When tenant data is needed for an operation (e.g. restore), the history may be accessed to determine the location of the data. | 10-04-2012 |
20120310887 | AUTOMATIC CONFIGURATION OF A RECOVERY SERVICE - A secondary location is configured as a recovery service for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the secondary location is automatically updated to reflect a current state of the primary location that is actively servicing user load. Content changes to the primary location are automatically reflected to the secondary location. System changes applied to the primary location are automatically applied to the secondary location. For example, removing/adding machines, updating machine/role assignments, removing adding/database are automatically applied to the secondary location such that the secondary location substantially mirrors the primary location. After a failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load. | 12-06-2012 |
20120310912 | CRAWL FRESHNESS IN DISASTER DATA CENTER - Content that is stored at a secondary location for a service is crawled before it is placed in operation to assist in maintaining an up to date search index. The content that is crawled at the secondary location includes content that is obtained from the primary location of the service. When a crawler at the secondary location attempts to access content that is stored at the primary location, the crawler is directed to access the corresponding copy of the content that is stored at the secondary location instead of accessing the content at the primary location. The content may be crawled at the secondary location at different times, such as when the information is updated, according to a schedule, and the like. | 12-06-2012 |
20120311375 | REDIRECTING REQUESTS TO SECONDARY LOCATION DURING TEMPORARY OUTAGE - During an outage at a primary location for an online service that is temporary in duration (e.g. a “temporary outage”), requests are temporarily switched from the primary location to a secondary location for the online service. The temporary outage may be caused by many different reasons (e.g. power outage, planned maintenance, and the like). The secondary location may be configured as read only during the temporary outage such that users are still able to access their data during the temporary without causing changes to be made to the data. The requests to the primary location of the online service are automatically redirected to be handled by the secondary location. When the temporary outage ends, the requests are automatically switched back to the primary location. | 12-06-2012 |
20120311376 | RECOVERY SERVICE LOCATION FOR A SERVICE - A secondary location of a network acts as a recovery network for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the primary location actively services user load and performs backups that include full backups, incremental backups and transaction logs that are automatically replicated to the secondary location. Information is stored (e.g. time, retry count) that may be used to assist in determining when the backups are restored correctly at the secondary location. The backups are restored and the transaction logs are replayed at the secondary location to reflect changes (content and administrative) that are made to the primary location. After failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load. | 12-06-2012 |
20120311377 | REPLAYING JOBS AT A SECONDARY LOCATION OF A SERVICE - Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted. | 12-06-2012 |
20140222902 | WEB SERVICES ACCESS TO CONTENT ITEMS STORED BY COLLABORATION SYSTEMS - A computing system receives a web services request to invoke a method of web Application Programming Interface (API). In response to receiving the web services request, the computing system invokes a method of a language-dependent API of a client component in a collaboration system. The client component communicates with a collaboration server component in the collaboration system using a proprietary communications protocol. The method of the language-dependent API is a method to obtain data from the collaboration server component. After invoking the method, the computing system sends a web services response whose contents depend on the data obtained from the collaboration server component. | 08-07-2014 |
20150039931 | REPLAYING JOBS AT A SECONDARY LOCATION OF A SERVICE - Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted. | 02-05-2015 |