Subramanian, CA
Ajit Subramanian, Berkeley, CA US
Patent application number | Description | Published |
---|---|---|
20080286850 | MDCK CELL LINES SUPPORTING VIRAL GROWTH TO HIGH TITERS AND BIOREACTOR PROCESS USING THE SAME - The present invention relates to novel MDCK cells which can be to grow viruses, e.g., influenza viruses, in cell culture to higher titer than previously possible. The MDCK cells can be adapted to serum-free culture medium. The present invention further relates to cell culture compositions comprising the MDCK cells and cultivation methods for growing the MDCK cells. The present invention further relates to methods for producing influenza viruses in cell culture using the MDCK cells of the invention. | 11-20-2008 |
20100112000 | NON-TUMORIGENIC MDCK CELL LINE FOR PROPAGATING VIRUSES - The present invention provides novel MDCK-derived adherent non-tumorigenic cell lines that can be grown in the presence or absence of serum. The cell lines of the present invention are useful for the production of vaccine material (e.g., viruses). More specifically, the cell lines of the present invention are useful for the production of influenza viruses in general and ca/ts influenza viruses in particular. The invention further provides methods and media formulations for the adaptation and cultivation of MDCK cells such that they remain non-tumorigenic. Additionally, the present invention provides methods for the production of vaccine material (e.g., influenza virus) in the novel cell lines of the invention. | 05-06-2010 |
20130052717 | MDCK CELL LINES SUPPORTING VIRAL GROWTH TO HIGH TITERS AND BIOREACTOR PROCESS USING THE SAME - The present invention relates to novel MDCK cells which can be to grow viruses, e.g., influenza viruses, in cell culture to higher titer than previously possible. The MDCK cells can be adapted to serum-free culture medium. The present invention further relates to cell culture compositions comprising the MDCK cells and cultivation methods for growing the MDCK cells. The present invention further relates to methods for producing influenza viruses in cell culture using the MDCK cells of the invention. | 02-28-2013 |
Ajit Subramanian, Berkely, CA US
Patent application number | Description | Published |
---|---|---|
20120115206 | NON-TUMORIGENIC MDCK CELL LINE FOR PROPAGATING VIRUSES - The present invention provides novel MDCK-derived adherent non-tumorigenic cell lines that can be grown in the presence or absence of serum. The cell lines of the present invention are useful for the production of vaccine material (e.g., viruses). More specifically, the cell lines of the present invention are useful for the production of influenza viruses in general and ca/ts influenza viruses in particular. The invention further provides methods and media formulations for the adaptation and cultivation of MDCK cells such that they remain non-tumorigenic. Additionally, the present invention provides methods for the production of vaccine material (e.g., influenza virus) in the novel cell lines of the invention. | 05-10-2012 |
Ajit Subramanian, Berkley, CA US
Patent application number | Description | Published |
---|---|---|
20100112669 | MDCK CELLS LINES SUPPORTING VIRAL GROWTH TO HIGH TITERS AND BIOREACTOR PROCESS USING THE SAME - The present invention relates to novel MDCK cells which can be to grow viruses, e.g., influenza viruses, in cell culture to higher titer than previously possible. The MDCK cells can be adapted to serum-free culture medium. The present invention further relates to cell culture compositions comprising the MDCK cells and cultivation methods for growing the MDCK cells. The present invention further relates to methods for producing influenza viruses in cell culture using the MDCK cells of the invention. | 05-06-2010 |
Amirthaganesh Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20120125126 | FLUIDICS WITH THERMAL COMPENSATION FOR A FLOW-TYPE PARTICLE ANALYZER - The present invention provides an improved fluidic system for a flow-type particle analyzer, such as a flow cytometer or hematology analyzer, that enables adjustment of the system to compensate for changes in fluid viscosity resulting from changes in temperature. | 05-24-2012 |
20140290341 | Detection of a Compromised Flow Line in a Laboratory Instrument - Provided herein are systems and methods for detecting a compromised flow line in a laboratory instrument. In one embodiment, for example, the system includes: (1) a wash station in fluid communication with a sample probe; (2) a fluid line coupled to the wash station to withdraw fluid from the wash station and deliver the fluid to a waste tank; and (3) a vacuum transducer, coupled to the fluid line, to measure vacuum pressure per unit time within the fluid line. The vacuum pressure per unit time is then used to detect a compromised flow line (e.g., a clog, occlusion, opening, etc. in the flow line). | 10-02-2014 |
Ananthan Subramanian, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20090055646 | DISTRIBUTED MANAGEMENT OF CRYPTO MODULE WHITE LISTS - An apparatus and method for managing the distribution and expansion of public keys held by a group or array of systems in white lists. The addition of a new system to the array entails a manual input to authorize the introduction of the new system to one trusted system in the array. After the introduction the new system is trusted by the one member and the white list of the one member is loaded into the white list of the new system. The new system then requests joining each of the other systems in the array. For each system in the array asked by the new system, the systems in the array ask if any other systems in the array already trust the new member. In response, a system of the array that trusts the new system responds by sending its white list (containing the public key of the new system) to the requesting system. Eventually the public key of the new system is in the white lists of all the systems in the array. In practice this trusts expansion occurs in the background with respect to running applications. | 02-26-2009 |
20090268903 | NETWORK STORAGE SERVER WITH INTEGRATED ENCRYPTION, COMPRESSION AND DEDUPLICATION CAPABILITY - A network storage server receives multiple write requests from a set of clients via a network and internally buffers multiple data blocks written by the write requests. At a consistency point, the storage server commits the data blocks to a nonvolatile mass storage facility. The consistency point process includes using a storage operating system in the network storage server to compress the data blocks, encrypt selected data blocks, and store the compressed and (possibly) encrypted data blocks in the nonvolatile mass storage facility. Data blocks can also be fingerprinted in parallel with compression and/or encryption, to facilitate subsequent deduplication. Data blocks can be indexed and classified according to content or attributes of the data. Encryption can be applied at different levels of logical container granularity, where a separate, unique cryptographic key is used for each encrypted data container. | 10-29-2009 |
20090276514 | DISCARDING SENSITIVE DATA FROM PERSISTENT POINT-IN-TIME IMAGE - A network storage server implements a method to discard sensitive data from a Persistent Point-In-Time Image (PPI). The server first efficiently identifies a dataset containing the sensitive data from a plurality of datasets managed by the PPI. Each of the plurality of datasets is read-only and encrypted with a first encryption key. The server then decrypts each of the plurality of datasets, except the dataset containing the sensitive data, with the first encryption key. The decrypted datasets are re-encrypted with a second encryption key, and copied to a storage structure. Afterward, the first encryption key is shredded. | 11-05-2009 |
20090319772 | IN-LINE CONTENT BASED SECURITY FOR DATA AT REST IN A NETWORK STORAGE SYSTEM - A network storage server receives multiple write requests from a set of clients via a network and internally buffers multiple data blocks written by the write requests. At a consistency point, the storage server commits the data blocks to a nonvolatile mass storage facility. The consistency point process includes using a storage operating system in the network storage server to compress the data blocks, encrypt selected data blocks, and store the compressed and (possibly) encrypted data blocks in the nonvolatile mass storage facility. Data blocks can also be fingerprinted in parallel with compression and/or encryption, to facilitate subsequent deduplication. Data blocks can be indexed and classified according to content or attributes of the data. Encryption can be applied at different levels of logical container granularity, where a separate, unique cryptographic key is used for each encrypted logical container. | 12-24-2009 |
20120330903 | DEDUPLICATION IN AN EXTENT-BASED ARCHITECTURE - A request is received to remove duplicate data. A log data container associated with a storage volume in a storage server is accessed. The log data container includes a plurality of entries. Each entry is identified by an extent identifier in a data structures stored in a volume associated with the storage server. For each entry in the log data container, a determination is made if the entry matches another entry in the log data container. If the entry matches another entry in the log data container, a determination is made of a donor extent and a recipient extent. If an external reference count associated with the recipient extent equals a first predetermined value, block sharing is performed for the donor extent and the recipient extent. A determination is made if the reference count of the donor extent equals a second predetermined value. If the reference count of the donor extent equals the second predetermined value, the donor extent is freed. | 12-27-2012 |
20130159257 | Systems, Method, and Computer Program Products Providing Sparse Snapshots - A method performed in a computer-based storage system includes creating a copy of an active file system at a first point in time, where the active file system includes user data, metadata describing a structure of the active file system and the user data, and a first data structure describing storage locations of the user data and the metadata, in which creating a copy of the active file system includes selectively omitting a portion of the user data and a portion of the metadata from the copy. | 06-20-2013 |
20140025963 | DISCARDING SENSITIVE DATA FROM PERSISTENT POINT-IN-TIME IMAGE - A network storage server implements a method to discard sensitive data from a Persistent Point-In-Time Image (PPI). The server first efficiently identifies a dataset containing the sensitive data from a plurality of datasets managed by the PPI. Each of the plurality of datasets is read-only and encrypted with a first encryption key. The server then decrypts each of the plurality of datasets, except the dataset containing the sensitive data, with the first encryption key. The decrypted datasets are re-encrypted with a second encryption key, and copied to a storage structure. Afterward, the first encryption key is shredded. | 01-23-2014 |
20140201168 | DEDUPLICATION IN AN EXTENT-BASED ARCHITECTURE - A request is received to remove duplicate data. A log data container associated with a storage volume in a storage server is accessed. The log data container includes a plurality of entries. Each entry is identified by an extent identifier in a data structures stored in a volume associated with the storage server. For each entry in the log data container, a determination is made if the entry matches another entry in the log data container. If the entry matches another entry in the log data container, a determination is made of a donor extent and a recipient extent. If an external reference count associated with the recipient extent equals a first predetermined value, block sharing is performed for the donor extent and the recipient extent. A determination is made if the reference count of the donor extent equals a second predetermined value. If the reference count of the donor extent equals the second predetermined value, the donor extent is freed. | 07-17-2014 |
Bala Subramanian, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20110083122 | METHOD AND SYSTEM FOR MASSIVE LARGE SCALE TEST INFRASTRUCTURE - An automated system is provided to support massive scale grid of machines in a rapid, multi-developer coding environment. The system has virtual testing environments that are created from template machines, supporting various software versions for various code branches. The grid is built by having a small subset of template machines (e.g. with Oracle 9g, 10g, and application server installations), images of the template machines, virtual machine instances created by applying one or more of the image templates, which then are used by the virtual testing environment. Upon receipt of code changes, changes are checked-out, compiled, tested on various test feeds on a virtual testing environment, which is destroyed and re-created after every test run. Any software version upgrades or bug fixes need to be applied only to the template machines. The number of virtual machines associated with any particular template machine is dynamically configurable to provision for optimal use of testing machines. | 04-07-2011 |
20130031245 | GENERATING A CONFIGURATION FILE BASED UPON AN APPLICATION REGISTRY - A system and method are provided for generating a configuration file based upon an application registry. The method, for example, includes, but is not limited to, determining, by a processor, which users are logged into the server that are associated with a predetermined group, determining, by the processor, for each user logged into the server associated with the predetermined group, which applications each user is running, and generating, by the processor, the configuration file based upon which applications each user is running and storing the registry file in a memory. | 01-31-2013 |
Balakrishnan Subramanian, Union City, CA US
Patent application number | Description | Published |
---|---|---|
20140278713 | ASSET FORECASTING IN ASSET INTENSIVE ENTERPRISES - A method, system, and computer program product for asset service and maintenance lifecycle management and supply chain planning. Some embodiments commence upon receiving a database record corresponding to an individually identified asset to be individually tracked through a corresponding asset lifecycle. Each individually identified asset has an asset-specific scheduled maintenance plan. During the performance of activities pertaining to the asset-specific scheduled maintenance plan, observations are made and events are recorded to generate a series of observations that are in turn collected into a learning model. The learning model and a predictor based on the learning model is used to predict a future demand or a forecast for items in quantities that are not given in the asset-specific scheduled maintenance plan. In exemplary cases, the forecast comprises items and/or quantities that are not given in the scheduled maintenance plan. | 09-18-2014 |
Baskaran Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130054755 | IMAGE SHARING - A method, apparatus, and system for performing image sharing. A first computer is coupled to an external device capable of acquiring data. A second computer is coupled to the first computer. A direct access to data acquired by the external device is provided to the second computer. | 02-28-2013 |
G. Mani Subramanian, Los Altos Hills, CA US
Patent application number | Description | Published |
---|---|---|
20140357595 | METHODS OF PREVENTING AND TREATING RECURRENCE OF A HEPATITIS C VIRUS INFECTION IN A SUBJECT AFTER THE SUBJECT HAS RECEIVED A LIVER TRANSPLANT - This application describes methods of preventing, treating or reducing the risk of recurrence of a hepatitis C virus infection in a subject after the subject has received a liver transplant. Disclosed herein are methods of preventing or reducing the risk of recurrence of a hepatitis C virus infection in a subject after the subject has received a liver transplant, the methods comprising administering to the subject an effective amount of Compound 1. | 12-04-2014 |
Gopalakrishnan Subramanian, Moorpark, CA US
Patent application number | Description | Published |
---|---|---|
20090265815 | Sequence-determined DNA fragments and corresponding polypeptides encoded therapy - The present invention provides DNA molecules that constitute fragments of the genome of a plant, and polypeptides encoded thereby. The DNA molecules are useful for specifying a gene product in cells, either as a promoter or as a protein coding sequence or as an UTR or as a 3′ termination sequence, and are also useful in controlling the behavior of a gene in the chromosome, in controlling the expression of a gene or as tools for genetic mapping, recognizing or isolating identical or related DNA fragments, or identification of a particular individual organism, or for clustering of a group of organisms with a common trait. One of ordinary skill in the art, having this data, can obtain cloned DNA fragments, synthetic DNA fragments or polypeptides constituting desired sequences by recombinant methodology known in the art or described herein | 10-22-2009 |
Harish K.k. Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20090006263 | TECHNIQUE FOR SECURELY COMMUNICATING INFORMATION - A system that communicates information is described. During operation, this system receives an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication. Then, the system communicates a document through a second wireless communication technique, where the document is associated with a financial transaction being conducted with a commercial establishment. Next, the system receives encrypted information through the second wireless communication technique, where the encrypted information is, at least in part, encrypted using the encryption key, and where the second wireless communication technique includes a technique other than near field communication. | 01-01-2009 |
Jagannath Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20100017784 | RELEASE MANAGEMENT SYSTEMS AND METHODS - Progress of a development cycle, such as for the development of a release of a software product, is tracked and managed using a release management system. Such a system allows groups and managers to retain any project planning or status files, in any appropriate structure. A manager can simply upload the file to the system as information is updated, and the system will apply appropriate templates and store the information in such a way that reporting and tracking can be done for any aspect of the development process at any level. For example, a single system can provide a high-level executive overview down to a detail level view of a particular group, using substantially current data for all aspects the process. | 01-21-2010 |
Karthik Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20120213225 | Packet Switching Label Assignment Across Multiple Packet Switching Forwarding Groups - In one embodiment, a packet switching device assigns a same particular packet switching label to each particular route of a plurality of particular routes having the same one or more best paths, wherein the plurality of particular routes includes routes from at least two different forwarding groups. A forwarding group is defined as a specific route, one or more routes associated with a same customer edge router, or one or more routes associated with a single virtual routing and forwarding domain (VRF). The packet switching device advertises to other packet switching device(s) to add this same particular label to packets having one of the plurality of particular routes, which they do. The packet switching device then packet switches packets based on the particular label received in a label field in a header of these packets. | 08-23-2012 |
Kaushik Subramanian, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20080270262 | LOYALTY CARD BASED ALLERGY WARNING PROGRAM - The present application discloses systems and methods for managing nutritional information which in some embodiments comprises a database coupled to a central processor, a storage module configured to store in the database a plurality of records comprising loyalty card data for products purchased with a loyalty card and nutritional information for products available for purchase with the loyalty card, and a plurality of records relating to after sale product information. These systems and methods may further comprise a data processing module configured to compare products purchased with a loyalty card with the after sale product information, and determine if there are conflicts and an output module for transmitting results, wherein the central processor is configured to generate a report based upon the information found in the storage module. | 10-30-2008 |
20110087530 | Systems and Methods to Provide Loyalty Programs - In one aspect, a computing apparatus includes: a transaction handler to process transactions; a portal to receive from users enrollment input identifying account identifiers of the users and respective loyalty programs; and a data warehouse to store data associating the account identifiers with the respective loyalty programs. In response to an authorization request received in the transaction handler for a payment transaction identifying a first account identifier, the computing apparatus is to use the data warehouse to determine whether the first account identifier is enrolled with a loyalty program; and if the first account identifier is enrolled with a first loyalty program, the computing apparatus is to use the transaction handler to request purchase details from the merchant via a response to the authorization request, and determine benefits to be awarded to the user of the first account identifier. | 04-14-2011 |
20110087531 | Systems and Methods to Aggregate Demand - In one aspect, a computing apparatus includes: a data warehouse to store data associating a plurality of account identifiers with an offer having a predefined purchase requirement and an aggregated purchase requirement for a benefit; and a transaction handler configured to process a plurality of transactions. The transaction handler is further configured to determine whether each of the plurality of transactions satisfies a predefined purchase requirement, identify a set of transactions each satisfying the predefined purchase requirement, and determine whether the set of transactions satisfies an aggregated purchase requirement for the benefit. In one example, the transaction handler is configured to provide the benefit via statement credits when the set of transactions satisfies the aggregated purchase requirement. | 04-14-2011 |
20120109749 | Systems and Methods to Provide Recommendations - In one aspect, a computing apparatus stores in a computer readable storage media transaction data related to a plurality of payment card transactions processed at a transaction handler for a group of accounts. Based on the transaction data and user feedback, such as ratings and comments, the computing apparatus computes preference scores to rank merchants and to provide recommendations or suggestions to users of the account group based on the preference scores, such as suggesting hotels or restaurants to business travelers of a company based on spending amount and frequency derived from the transaction data of the corporate credit card accounts of the company. | 05-03-2012 |
20130297501 | SYSTEM AND METHOD FOR LOCAL DATA CONVERSION - Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for processing transactions using conversion or filtering of restricted information. One embodiment of the invention is directed to a method comprising receiving, at a server computer located outside a restricted zone, a transaction request message including an unrestricted account alias, wherein the unrestricted account alias was previously converted from a restricted account identifier into the unrestricted account alias by a server computer located in a restricted zone. The server computer located outside the restricted zone may determine an account associated with the unrestricted account alias and process the transaction request message. Similar methods may be applied to settlement files including an unrestricted account alias that is converted to a restricted account identifier. Other embodiments are directed to filtering restricted information from service requests or other transactions. | 11-07-2013 |
20140310086 | SYSTEMS AND METHODS TO PROVIDE LOYALTY PROGRAMS - A computing apparatus includes: a transaction handler to process transactions; a portal to receive from users enrollment input identifying account identifiers of the users and respective loyalty programs; and a data warehouse to store data associating the account identifiers with the respective loyalty programs. In response to an authorization request received in the transaction handler for a payment transaction identifying a first account identifier, the computing apparatus is to use the data warehouse to determine whether the first account identifier is enrolled with a loyalty program; and if the first account identifier is enrolled with a first loyalty program, the computing apparatus is to use the transaction handler to request purchase details from the merchant via a response to the authorization request, and determine benefits to be awarded to the user of the first account identifier. | 10-16-2014 |
20140344153 | MOBILE TOKENIZATION HUB - Embodiments of the present invention relate to systems and methods for implementing a mobile tokenization hub with a common tokenization capabilities (CTC) module that may provide tokenization for various entities in various contexts. For example, the CTC module can provide and store tokens for mobile payment transactions, transit transactions, digital wallet applications, merchant point of sale (POS) applications, personalization services, and the like. | 11-20-2014 |
20150058108 | SYSTEMS AND METHODS TO AGGREGATE DEMAND - A computing apparatus includes: a data warehouse to store data associating a plurality of account identifiers with an offer having a predefined purchase requirement and an aggregated purchase requirement for a benefit; and a transaction handler configured to process a plurality of transactions. The transaction handler is further configured to determine whether each of the plurality of transactions satisfies a predefined purchase requirement, identify a set of transactions each satisfying the predefined purchase requirement, and determine whether the set of transactions satisfies an aggregated purchase requirement for the benefit. In one example, the transaction handler is configured to provide the benefit via statement credits when the set of transactions satisfies the aggregated purchase requirement. | 02-26-2015 |
Krishna Subramanian, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20110238496 | Systems and Methods for Generating Data from Mobile Applications and Dynamically Delivering Advertising Based on Generated Data - The present invention provides a platform for mobile application developers to optimize their applications based on usage data and user feedback. It also allows advertisement providers to deliver targeted advertisements through applications, on the basis of application usage data. The platform further allows application developers to obtain advertisements that provide the best revenue and are optimized for the application type and bandwidth. | 09-29-2011 |
Krishnamurth Subramanian, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20120201252 | METHOD & APPARATUS FOR THE DISTRIBUTION OF NETWORK TRAFFIC - A packet network system, such as an autonomous system, includes a plurality of packet network devices some of which are edge routers and some of which are core routers. Each of the edge and core routers include functionality that operates to receive network traffic, process the traffic as needed and to forward the traffic to its destination. Additionally, each router includes a traffic distribution function that operates to calculate path bandwidths for all of the paths over which the traffic can be forwarding through the system and to use the volume of traffic ingressing to the system, link utilization information and the calculated path bandwidth to redistribute the traffic in the system such that traffic loss in the system in minimized. | 08-09-2012 |
Krishnamurthy Subramanian, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20090034728 | Multiplexed multilane hybrid scrambled transmission coding - In one embodiment, a hybrid backplane coding scheme transmits data using lengthy sequences of scrambled data, separated by 8b/10b control character sequences that prepare the receiver for the next scrambled sequence and permit realignment if necessary. Several lanes are coded separately in this manner, and then multiplexed on a common channel. Alignment sequences in the control character sequences, as well as scrambler seeds, are set to avoid synchronization of patterns generated among all lanes, which would tend to confuse a receiving serdes and/or phase-locked loop that recovers timing from the multiplexed scrambled signals. | 02-05-2009 |
20110222547 | SYSTEM AND METHOD FOR FLEXIBLE MEMORY SYSTEM CONFIGURATION AND ACCESS - A packet network device includes a packet network processor memory system for storing information used to process and forward packets of information in and through the network device. The information is included in look-up tables whose entries can be mapped either horizontally or vertically into the memory system. In the event that the entries are mapped horizontally, a complete entry can be access at a single memory location and in the event that the entries are mapped vertically, the entries can be accessed at one or more memory locations. | 09-15-2011 |
20110225207 | VIRTUAL NETWORK DEVICE ARCHITECTURE - A network device such as a router or a switch is comprised of a control module and a plurality of physical line cards. The control module includes a control processor virtual machine, a plurality of route processing virtual machines and one or more instances of a line card virtual machine. The line card virtual machine operates to receive routing information base update information, to modify the routing information base according to the update information and to update each instance of a plurality of forwarding information bases included on each of the physical line cards. | 09-15-2011 |
20110235545 | MAC-Address Based Virtual Route Aggregation - An autonomous system includes at least some packet network devices that are capable of operating in a virtual route aggregation environment and some packet network devices that are not capable of operating in a virtual route aggregation environment. The autonomous system includes at least one egress border router, at least one aggregation router and at least one intermediate router. The egress border router uses an interior border gateway protocol to distribute a label message to the other routers in the autonomous system, the label message including a next hop MAC address associated with either an external router or the egress border router. The egress border router and the intermediate router using information included in the label message to contrast layer 2 table entries and the aggregation router using information included in the label message to construct a layer 3 table entry. The aggregation router receives a packet with a virtual prefix that corresponds to a virtual prefix in a list of virtual prefixes stored by the aggregation router, and routes the packet over a virtual path corresponding to one of the virtual prefixes. | 09-29-2011 |
20120002670 | MULTIPLE CHASSIS STACKING USING FRONT END PORTS - A stacked chassis comprising multiple physical switch/router chassis operates without any special stacking hardware or stacking channels. Instead, a stacking LAG is installed between front-end switch ports on the stacked chassis. The chassis controllers negotiate a master, which controls operation of all chassis in the stack. A stacked-chassis-wide port numbering scheme is used to distribute information to all line cards in the system. Each line card processes the information to distill physical-chassis significant information for operation of that chassis in the stack. | 01-05-2012 |
20120020373 | PACKET FORWARDING USING MULTIPLE STACKED CHASSIS - A stacked chassis comprising multiple physical switch/router chassis operates without any special stacking hardware or stacking channels. Instead, a stacking LAG is installed between front-end switch ports on the stacked chassis. The chassis controllers negotiate a master, which controls operation of all chassis in the stack. A stacked-chassis-wide port numbering scheme is used to distribute information to all line cards in the system. Each line card processes the information to distill physical-chassis significant information for operation of that chassis in the stack. | 01-26-2012 |
20120039335 | MULTICAST PACKET FORWARDING USING MULTIPLE STACKED CHASSIS - A stacked chassis comprising multiple physical switch/router chassis operates without any special stacking hardware or stacking channels. Instead, a stacking LAG is installed between front-end switch ports on the stacked chassis. The chassis controllers negotiate a master, which controls operation of all chassis in the stack. A stacked-chassis-wide port numbering scheme is used to distribute information to all line cards in the system. Each line card processes the information to distill physical-chassis significant information for operation of that chassis in the stack. | 02-16-2012 |
20120201169 | METHOD & APPARATUS FOR PROVISIONING A NETWORK SWITCH PORT - A network switch is comprised of a control processor and one or more line cards. The control processor includes functionality to register interest with a hypervisor, operating in conjunction with a network host connected to the switch, in data object attributes maintained on the network host by the hypervisor. The hypervisor associated with the network host sends changes in the host attributes to the switch which the switch maintains in a listing of attributes. The switch traps and copies particular packets to the switch control processor where a provisioning function operates on the attribute information in the list with source information included in the packet header in order to configure a forwarding table on the line card. | 08-09-2012 |
20120201241 | METHOD & APPARATUS FOR THE DISTRIBUTION OF NETWORK TRAFFIC - A packet network device, such as a router or switch, includes functionality that operates to receive network traffic, process the traffic as needed and to forward the traffic to its destination. Additionally, each router includes a weighted equal cost multipath routing function that operates to identify equal cost paths over which to forward the network traffic, to calculate a path weighting that is dependent upon the path bandwidth and to forward the traffic ingressing to it over each of the equal cost paths according to the calculated path weighting. | 08-09-2012 |
20120236859 | METHOD & APPARATUS FOR CONFIGURING A LINK AGGREGATION GROUP ON A STACKED SWITCH - Two network switches are configured in a stacked relationship to each other and include link aggregation sub-layer functionality. Switching tables are programmed on each switch with information used to forward packets ingressing to them over a redundant LAG that is identified in the switching table by a port that is a member of the redundant LAG. | 09-20-2012 |
20120259761 | Low Latency Financial Data Network Architecture - A financial market data network having a lowered overall latency includes communication interfaces, specialized switches having internal switching fabric, and feed handlers that all facilitate communications between financial exchanges and consumers of financial market data therefrom. A feed handler is situated within or proximate a specialized switch and is arranged to receive raw financial market data directly from financial exchanges without the data first traveling through any switching fabric. The feed handler is adapted to process the received raw financial market data into a normalized format before the normalized financial market data is ever routed through any switching fabric, prior to being sent to consumers. The communication interfaces can include I/O ports located on the specialized switches, and the feed handlers can include one or more computer processors or servers. Additional internal switch components can include packet processors and storage components that store network protocols and/or layer tables. | 10-11-2012 |
20120275297 | Multi-Chassis Link Aggregation on Network Devices - A data communication network includes a client device and multiple aggregation devices coupled to each other and the client via links within a link aggregation group (“LAG”) across the aggregation devices. The aggregation devices appear to the client as a single device coupled thereto, and operate in conjunction with each other by assigning at least one different identifier to each of the plurality of separate aggregation devices and storing information including the identifiers to association tables located on each of the aggregation devices. The multiple aggregation devices can be separate switches, and the LAG can include multiple ports across the switches, with a different identifier being assigned to each of the ports in the LAG. A virtual link trunk interface can couple aggregation devices, which can reconfigure communication paths thereacross with respect to the client device using the identifiers in the stored association tables when a LAG link fails. | 11-01-2012 |
20120320929 | PACKET FORWARDING USING MULTIPLE STACKED CHASSIS - A stacked chassis comprising multiple physical switch/router chassis operates without any special stacking hardware or stacking channels. Instead, a stacking LAG is installed between front-end switch ports on the stacked chassis. The chassis controllers negotiate a master, which controls operation of all chassis in the stack. A stacked-chassis-wide port numbering scheme is used to distribute information to all line cards in the system. Each line card processes the information to distill physical-chassis significant information for operation of that chassis in the stack. | 12-20-2012 |
20130039218 | LIMITING MAC ADDRESS LEARNING ON ACCESS NETWORK SWITCHES - A LAN includes a CORE switch linked to some number of TOR switches, and each of the TOR switches are linked directly to some number of host devices. Each of the switches in the LAN operate to process and transmit data frames they receive from neighboring LAN devices. Each TOR switch in the LAN builds and maintains a layer-2 forwarding table that is comprised of MAC address information learned from frames they receive from neighboring LAN devices. Selected ports/VLANs on some or all of the TOR devices are designated to be CORE/switch facing ports (CFP) or host facing ports (HFP). Each of the CFPs are configured to only learn the MAC address in unicast frames it receives and each of the HFPs can be configured to learn the MAC address of both unicast and multicast data frames provided the destination MAC address included in the unicast frame is known. | 02-14-2013 |
20130044748 | DATA SWITCHING SYSTEM - A data switching system is disclosed that allows for switching of packets through a plurality of top of rack switches utilizing a logical switching fabric that includes a local TOR switching fabric on a TOR switch and a Core switching fabric on a Core switch. A method of processing packets according to some embodiment can include receiving a packet from a source port into a top of rack switch, the source port being one of a plurality of ports on the top of rack switch, processing a packet header of the packet to determine a destination port; and switching the packet through a logical switching fabric that includes a local switch fabric on the top of rack switch and a Core switching fabric on a Core switch. | 02-21-2013 |
20130124750 | NETWORK VIRTUALIZATION WITHOUT GATEWAY FUNCTION - A local network, such as a data center, includes a plurality of servers each of which are linked to a network switch. Some of the plurality of servers are network virtualization capable and some are not. The network virtualization capable servers include functionality that encapsulates a data frame, generated by one network virtualization servers that is to be sent to another network virtualization capable server, with a network virtualization identity. In the event that a network virtualization server generates a data frame for transmission to a server that is not capable of network virtualization, the network virtualization capable server does not encapsulate the data frame with the network virtualization identity. | 05-16-2013 |
20130272165 | METHOD AND APPARATUS FOR PROVISIONING A NETWORK SWITCH PORT - A network switch is comprised of a control processor and one or more line cards. The control processor includes functionality to register interest with a hypervisor, operating in conjunction with a network host connected to the switch, in data object attributes maintained on the network host by the hypervisor. The hypervisor associated with the network host sends changes in the host attributes to the switch which the switch maintains in a listing of attributes. The switch traps and copies particular packets to the switch control processor where a provisioning function operates on the attribute information in the list with source information included in the packet header in order to configure a forwarding table on the line card. | 10-17-2013 |
20130301640 | METHOD & APPARATUS FOR THE DISTRIBUTION OF NETWORK TRAFFIC - A packet network device, such as a router or switch, includes functionality that operates to receive network traffic, process the traffic as needed and to forward the traffic to its destination. Additionally, each router includes a weighted equal cost multipath routing function that operates to identify equal cost paths over which to forward the network traffic, to calculate a path weighting that is dependent upon the path bandwidth and to forward the traffic ingressing to it over each of the equal cost paths according to the calculated path weighting. | 11-14-2013 |
20130336134 | SYSTEM AND METHODS FOR OPEN FABRIC MANAGEMENT - A system for operating a plurality of information handling systems forming a network including a plurality of switches is provided. The switches include physical and virtual switches each having ports coupling information handling systems to one another. The system including a management unit configured to provide commands to the switches and to collect a status information for each of the switches; and an agent unit coupled to each of the switches, the agent configured to receive the commands from the management unit, provide the commands to the switch associated thereto, monitor status of the switch associated thereto, and provide the status information to the management unit. A method for operating a network and a computer program to perform the method for using a system as above is also provided. A network managing device configured to couple to a service provider in a network as above is also provided. | 12-19-2013 |
20140119203 | USE OF TEST PACKETS BY PACKET SWITCHES IN COMPUTER NETWORKS - A packet switch receives a management packet sent for discovery on a data flow's path through a network. The switch creates a test packet ( | 05-01-2014 |
20140119371 | SYSTEMS AND METHODS FOR STACKING FIBRE CHANNEL SWITCHES WITH FIBRE CHANNEL OVER ETHERNET STACKING LINKS - An information handling system is provided. The information handling system includes systems and methods for expanding the port count in a single Fibre Channel domain by adding modular Fibre Channel switches. Such a system includes a system enclosure that contains a plurality of Fibre Channel modules configured to send and receive Fibre Channel packets, the Fibre Channel modules providing a plurality of Fibre Channel ports and a switch processor coupled to the plurality of Fibre Channel ports and to a plurality of Ethernet ports. The switch processor is configured to apply a stacking header to Fibre Channel packets for transmission from one of the plurality of Ethernet ports over a stacking link to another switch processor in another system enclosure. | 05-01-2014 |
20140169365 | SYSTEMS AND METHODS FOR ROUTING INFORMATION IN AN INFORMATION HANDLING SYSTEM USING EXTENDED L3 LOOKUP TABLES - An information handling system is provided. The information handling system includes a plurality of forwarding processors, the plurality of forwarding processors each including a memory having a forwarding host table and a forwarding route table. The information handling system also includes at least one switching device coupled to the plurality of forwarding processors, the at least one switching device including a memory having a destination module and port table, a switching device host table and a switching device route table, wherein the at least one switching device is configured to perform an extended lookup in at least one of the switching device host table and switching device route table based on values included in a fabric header of information routed to the switching device to determine a destination of the information. A method for extending lookup tables is also provided that adds lookup tables in a switching device. | 06-19-2014 |
20140192804 | SYSTEMS AND METHODS FOR PROVIDING MULTICAST ROUTING IN AN OVERLAY NETWORK - An information handling system is provided. The information handling system includes a first hypervisor running on a first host and a second hypervisor running on a second host. The first hypervisor managing a first virtual switch, and the second hypervisor managing a second virtual switch. The information handling system also includes a plurality of virtual machines (VMs), including a first VM, which is part of a first tenant, running on the first host, and a second VM, part of a second tenant, running on the second host. The first virtual switch has a mapping in memory that maps a customer-specific multicast IP address, used by the plurality of VMs to indicate a multicast group that includes VMs on the first and second tenants, to a global multicast IP address used by the first and second hosts. | 07-10-2014 |
20140269710 | PORT EXTENDER - An extended bridge structure that includes a controlling bridge and port extenders is disclosed. A port extender according to some embodiments of the present invention includes a processor that processes receives packets in a way that executes at least one procedure that substitutes for a function of the controlling bridge. A controlling bridge according to the present invention provides data to the port extender that enables it to execute the at least one procedure that substitutes for a function of the controlling bridge. | 09-18-2014 |
20140341225 | SYSTEM AND METHOD FOR FLEXIBLE SWITCHING FABRIC - A system and method for a flexible switching fabric includes a network switching device. The network switching device includes a plurality of connectors configured to couple the network switching device to other network devices, one or more front panel cards, each front panel card including one or more first ports and configured to forward network packets between the first ports, one or more fabric cards, each fabric card including one or more second ports and configured to forward network packets between the second ports, and a port multiplexing unit configured to flexibly couple the plurality of connectors to the one or more first ports and the one or more second ports to the one or more first ports. The flexible coupling between the one or more first ports and the plurality of connectors and the one or more second ports is determined based on a desired configuration for the network switching device. | 11-20-2014 |
20140355563 | SYSTEM AND METHOD FOR EFFICIENT L3 MOBILITY IN A WIRED/WIRELESS NETWORK - A system and method for efficiently handling mobility events includes detecting a mobility event associated with a movement of a mobile unit from a first subnet to a second subnet, forming one or more first flow control messages for updating routing information associated with the mobility event, transmitting the one or more first flow control messages to a core router, forming one or more second flow control messages for disabling layer 2 learning, transmitting the one or more second flow control messages to one or more network switching devices in the first subnet, forming one or more third flow control messages including layer 2 switching instructions for directing network traffic to the mobile unit in the second subnet, and transmitting the one or more third flow control messages. | 12-04-2014 |
Mahesh Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090319570 | CONSOLIDATING DUPLICATE ITEM IMAGES USING AN IMAGE IDENTIFIER - In some example embodiments, a system and method are illustrated to link item images to item listings. The system and method include receiving an item listing and an image for the item listing from a user device. The system and method include assigning an image identifier to the image received from the user device. The image identifier may be identical or substantially identical for the same or similar images and unique for different images. The system and method include comparing the image identifier with one or more existing image identifiers. The system and method further include linking the received item listing to an image according to a result of the comparing. In some example embodiments, the system and method include receiving the image identifier from the user device and determining whether to receive the image for the item listing from the user device according to the result of the comparing. | 12-24-2009 |
20100095226 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - A system and method of pre-fetching data in a network includes displaying first data to a user, the first data being upstream of other data in a data flow. Before receiving a request from the user to view a second data, retrieving the second data and storing the retrieved second data in a memory device. After a request to display the second data is received from the user, using the stored second data for displaying to the user. | 04-15-2010 |
20100281418 | METHOD AND SYSTEM TO TRANSMIT DATA - Methods and systems for transmitting data are disclosed. In one embodiment a user interface module causes a first information field to be presented as part of a graphical user interface, receives information entered in the first information field, and detects that a user has navigated away from the first information field. In response to detecting that the user has navigated away from the information field, a data transmitting module may commence transmitting over a network the information entered in the first information field. | 11-04-2010 |
20110015981 | SYSTEMS AND METHODS TO INCENTIVIZE TRANSACTIONS TO ENHANCE SOCIAL GOODNESS - Systems and methods to incentivize transactions to enhance social goodness are described. The system receives a request for a badge representing social goodness of a user of a first network entity. The request includes a user identifier that identifies the user. The system generates the badge based on a social goodness index for the user. The social goodness index may be based on at least one social goodness criteria that is selected from social goodness criterion by the user and transaction information for transactions of items that are transacted by the user on the first network entity. The social goodness index provides a measurement of the social goodness of the user in relation to other users of the first network entity. The system communicates the badge to the second network entity to enable the second network entity to communicate the badge to a third network entity. | 01-20-2011 |
20110125871 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - A system, a computer readable storage medium including instructions, and a computer-implemented method of pre-fetching in a network. A request is received from a user device for a first web page, the first web page being upstream of other web pages in a page flow. The first web page is transmitted to the user device. At least one web page that is downstream of the first web page in the page flow is transmitted to the user device, the at least one web page being transmitted without receiving a request for the at least one web page. | 05-26-2011 |
20120185565 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - A system, a computer readable storage medium including instructions, and a computer-implemented method of pre-fetching in a network. A request is received from a user device for a first network-accessible data item in a plurality of network-accessible data items. The first network-accessible data item is transmitted to the user device. A determination of the most frequently viewed data items is made and a second network-accessible data item is retrieved from the most frequently viewed items and transmitted to the user device. The second network-accessible data item is transmitted before receiving a request for the second network-accessible data item from the user device. | 07-19-2012 |
20120191809 | METHOD AND SYSTEM TO TRANSMIT DATA - Methods and systems for transmitting data are disclosed, In one embodiment a processor-implemented user interface module prompts a user via a graphical user interface to identify or enter data in a first information field and a second information field displayed on the graphical user interface. A processor-implemented data transmitting module automatically commences transmitting data over a network after detecting that the user has completed the identification or entry of data in the first information field and before the user has completed identifying or entering data in the second information field. The user interface module detects that the user has modified the first information field, and the data transmitting module aborts transmitting data over the network in response to detecting that the user has modified the first information field. | 07-26-2012 |
20130042184 | METHOD AND SYSTEM TO TRANSMIT DATA - Methods and systems for transmitting data are disclosed. In one embodiment a portable electronic device comprises a processor-implemented user interface module to cause the presentation of a first information field to a user as part of a graphical user interface in the portable electronic device, and to receive information entered or data identification in the first information field. A data transmitting module commences transmitting the information entered or the data identified over a network in response to the user interface module detecting that the user has navigated away from the first information field. | 02-14-2013 |
20130346490 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - A system, a computer readable storage medium including instructions, and a computer-implemented method of pre-fetching in a network, are provided. In an example embodiment, computer-implemented method of pre-fetching in a network comprises receiving a request from a user device for a first network-accessible data item in the plurality of network-accessible data items; transmitting the first network-accessible data item to the user device; identifying a second network-accessible data item in the plurality of network-accessible data items; and transmitting the second network-accessible data item to the user device, the second network-accessible data item being transmitted before receiving a request for the second network-accessible data item from the user device. Pre-fetch logic may be embedded in the first network-accessible data item. | 12-26-2013 |
20140214928 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - A system, a computer readable storage medium including instructions, and a computer-implemented method of pre-fetching in a network, are provided. In an example embodiment, computer-implemented method of pre-fetching in a network comprises receiving a request from a user device for a first network-accessible data item in the plurality of network-accessible data items; transmitting the first network-accessible data item to the user device; identifying a second network-accessible data item in the plurality of network-accessible data items; and transmitting the second network-accessible data item to the user device, the second network-accessible data item being transmitted before receiving a request for the second network-accessible data item from the user device. Pre-fetch logic may be embedded in the first network-accessible data item. | 07-31-2014 |
20140215013 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - A system, a computer readable storage medium including instructions, and a computer-implemented method of pre-fetching in a network, are provided. In an example embodiment, computer-implemented method of pre-fetching in a network comprises receiving a request from a user device for a first network-accessible data item in the plurality of network-accessible data items; transmitting the first network-accessible data item to the user device; identifying a second network-accessible data item in the plurality of network-accessible data items; and transmitting the second network-accessible data item to the user device, the second network-accessible data item being transmitted before receiving a request for the second network-accessible data item from the user device. Pre-fetch logic may be embedded in the first network-accessible data item. | 07-31-2014 |
20140215014 | METHOD AND SYSTEM TO PRE-FETCH DATA IN A NETWORK - A system, a computer readable storage medium including instructions, and a computer-implemented method of pre-fetching in a network, are provided. In an example embodiment, computer-implemented method of pre-fetching in a network comprises receiving a request from a user device for a first network-accessible data item in the plurality of network-accessible data items; transmitting the first network-accessible data item to the user device; identifying a second network-accessible data item in the plurality of network-accessible data items; and transmitting the second network-accessible data item to the user device, the second network-accessible data item being transmitted before receiving a request for the second network-accessible data item from the user device. Pre-fetch logic may be embedded in the first network-accessible data item. | 07-31-2014 |
20140304368 | METHOD AND SYSTEM TO TRANSMIT DATA - In some embodiments, a publication system comprises at least one module which provides, at a publication platform accessible by users via a network, a posting portal to receive entry of data relating to an item or commentary for posting on the publication system. The posting portal includes an interface having a first user interface element to receive the item data or commentary from a user for inclusion in a posting. The module also provides an upload application associated with the interface of the posting portal. The upload application includes a second user interface element to receive from the user, via the second user interface element, a media file for inclusion in the posting. The module also automatically commences transmission of the media file over the network, for inclusion in the posting, before the user has completed entry of the item data or commentary in the first user interface element. | 10-09-2014 |
20140317282 | TECHNIQUES FOR MEASURING ABOVE-THE-FOLD PAGE RENDERING - Techniques for measuring above-the-fold (ATF) page rendering are provided. Visible objects for an ATF portion of a browser page are identified. A start and end time for each visible object is recorded. Furthermore, a total elapsed time to finish loading each of the visible objects to the ATF portion of a browser is determined. | 10-23-2014 |
20150120884 | METHOD AND SYSTEM TO TRANSMIT DATA - Methods and systems for transmitting data are disclosed. In one embodiment a portable electronic device comprises a processor-implemented user interface module to cause the presentation of a first information field to a user as part of a graphical user interface in the portable electronic device and to receive information entered or data identification in the first information field. A data transmitting module commences transmitting the information entered or the data identified over a network in response to the user interface module detecting that the user has navigated away from the first information field. | 04-30-2015 |
Malathy Subramanian, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20110070231 | STABLE LIQUID PHARMACEUTICAL FORMULATION OF IGG ANTIBODIES - This invention is directed to a stable liquid pharmaceutical formulation comprising a high concentration, e.g. 50 mg/ml or more, of antibody in about 20-60 mM succinate buffer or 30-70 mM histidine buffer, having pH from about pH 5.5 to about pH 6.5, about 0.01-0.1% polysorbate, and a tonicity modifier that contributes to the isotonicity of the formulation. This liquid formulation is stable at refrigerated temperature (2-8° C.) for at least 1 year, and preferably 2 years. This liquid formulation is suitable for subcutaneous injection. The preferred antibodies include Daclizumab, a humanized anti-IL-2 receptor monoclonal antibody; HAIL-12, a humanized anti-IL-12 monoclonal antibody; HuEP5C7, a humanized anti-L selectin monoclonal antibody; and Flintozumab, a humanized anti-gamma interferon monoclonal antibody. | 03-24-2011 |
20110318343 | Stable Liquid Pharmaceutical Formulation Of IgG Antibodies - This invention is directed to a stable liquid pharmaceutical formulation comprising a high concentration, e.g. 50 mg/ml or more, of antibody in about 20-60 mM succinate buffer or 30-70 mM histidine buffer, having pH from about pH 5.5 to about pH 6.5, about 0.01-0.1% polysorbate, and a tonicity modifier that contributes to the isotonicity of the formulation. This liquid formulation is stable at refrigerated temperature (2-8° C.) for at least 1 year, and preferably 2 years. This liquid formulation is suitable for subcutaneous injection. The preferred antibodies include Daclizumab, a humanized anti-IL-2 receptor monoclonal antibody; HAIL-12, a humanized anti-IL-12 monoclonal antibody; HuEP5C7, a humanized anti-L selectin monoclonal antibody; and Flintozumab, a humanized anti-gamma interferon monoclonal antibody. | 12-29-2011 |
Meenakshi Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20090312887 | APPARATUS AND METHOD FOR THERMAL STABILIZATION OF PCB-MOUNTED ELECTRONIC COMPONENTS WITHIN AN ENCLOSED HOUSING - An apparatus comprises a matrix of thermoelectric devices for applying thermal gradients across an electronic component mounted in a PCB substrate within an enclosed housing. A matrix of thermosensitive devices are placed around the perimeter of the electronic component to measure thermal gradients associated with the component. A controller controls the matrix of thermoelectric devices based on the thermal gradients measured by the matrix of thermosensitive devices with a matrix of thermocouple coefficients. | 12-17-2009 |
Meenakshi S. Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20100278055 | Apparatus and Method of Compensating for Clock Frequency and Phase Variations by Processing Packet Delay Values - An apparatus and method are described for compensating for frequency and phase variations of electronic components by processing packet delay values. In one embodiment, a packet delay determination module determines packet delay values based on time values associated with a first and a second electronic component. A packet delay selection module selects a subset of the packet delay values based on the maximum frequency drift of the first electronic component. A statistical parameter determination module evaluates a first and a second parameter based on portions of the subset of packet delay values A validation module validates the parameters when each portion the subset of packet delay values includes a minimum of at least two packet delay values. An adjustment module compensates for at least one of a frequency variation and a phase variation of the first electronic component based on the parameters if the parameters are both validated. | 11-04-2010 |
20110310766 | APPARATUS AND METHOD OF COMPENSATING FOR CLOCK FREQUENCY AND PHASE VARIATIONS BY PROCESSING PACKET DELAY VALUES - An apparatus and method are described for compensating for frequency and phase variations of electronic components by processing packet delay values. In one embodiment, a packet delay determination module determines packet delay values based on time values associated with a first and a second electronic component. A packet delay selection module selects a subset of the packet delay values based on the maximum frequency drift of the first electronic component. A statistical parameter determination module evaluates a first and a second parameter based on portions of the subset of packet delay values. A validation module validates the parameters when each portion the subset of packet delay values includes a minimum of at least two packet delay values. An adjustment module compensates for at least one of a frequency variation and a phase variation of the first electronic component based on the parameters if the parameters are both validated. | 12-22-2011 |
20130010815 | Apparatus and Method of Compensating for Clock Frequency and Phase Variations by Processing Packet Delay Values - An apparatus and method are described for compensating for frequency and phase variations of electronic components by processing packet delay values. In one embodiment, a packet delay determination module determines packet delay values based on time values associated with a first and a second electronic component. A packet delay selection module selects a subset of the packet delay values based on the maximum frequency drift of the first electronic component. A statistical parameter determination module evaluates a first and a second parameter based on portions of the subset of packet delay values. A validation module validates the parameters when each portion the subset of packet delay values includes a minimum of at least two packet delay values. An adjustment module compensates for at least one of a frequency variation and a phase variation of the first electronic component based on the parameters if the parameters are both validated. | 01-10-2013 |
Narayanasamy Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20100275170 | Porting Analog Circuit Designs - A computer-based method of converting an analog integrated circuit design from a source technology to a target technology, by providing a computer readable source schematic file and a computer readable source layout file for the analog integrated circuit design in the source technology, providing a computer readable technology transfer file that includes conversion tables between properties of the source technology and properties of the target technology, converting the source schematic file in the source technology to a target schematic file in the target technology with the computer using the technology transfer file, and converting the source layout file in the source technology to a target layout file in the target technology with the computer using the technology transfer file. | 10-28-2010 |
Navaneetha Subramanian, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20080208605 | SYSTEMS AND METHODS FOR RESPONDING TO THE OCCURRENCE OF AN EVENT - The system and method provide a business continuity application to a portion of a displaced workforce of an organization when an event occurs. The business continuity application, executing on a server within a data center, is used to define a response scenario to the occurrence of an event. The business continuity application allows for notifications to be sent to the workforce using a notification service that interfaces with the server, and further provides remote-access to computing resources via a remote access server that interfaces with the server. A communication gateway installed between the server and a private branch exchange further provides a portion of the business continuity application. Displays of portions of the business continuity application after the occurrence of an event are sent to end-users that can access the computing device. The computing device is further in communication with a portable memory device. | 08-28-2008 |
Peruvemba Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20120209677 | PERSON-2-PERSON SOCIAL NETWORK MARKETING APPARATUSES, METHODS AND SYSTEMS - The PERSON-2-PERSON SOCIAL NETWORK MARKETING APPARATUSES, METHODS AND SYSTEMS (“SNM”) transform requests for on-demand and flexible monetization and related services via SNM components into currency transfers, purchase receipt notifications, social networking communications and transaction analytics reports. In some embodiments, the SNM obtains a product purchase request for a product. In some embodiments, the product purchase request may include an identifier of a user who made a communication about the product. The SNM may parse the product purchase request to extract the identifier of the user who made the communication about the product. Also, the SNM may query a database for an account of the user using the extracted identifier. In response to successful completion of processing of the product purchase request, the SNM may generate a request to provide the account of the user with a credit. | 08-16-2012 |
20120209735 | FEDERATED THIRD-PARTY AUTHENTICATION APPARATUSES, METHODS AND SYSTEMS - The FEDERATED THIRD-PARTY AUTHENTICATION APPARATUSES, METHODS AND SYSTEMS (“FPT”) transform user identity information inputs associated with transactions at a merchant server into a user-profile output that is transferred to other merchant websites for facilitating one or more other transactions without the requisite need for full user re-entry of information. In one embodiment, the method includes establishing a first trust indication associated with a first merchant and receiving first user-transaction-related information from a server of the first merchant. A first user-profile is generated for the user based on the first user-transaction-related information. A second trust indication associated with a second merchant is established. The first user-profile is then sent to the second merchant based on the established first and second trust indications, whereby the first user-profile provides the first user-transaction-related information for facilitating transactions by the user at a server of the second merchant. | 08-16-2012 |
20120215701 | FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS - The FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS (“FMS”) transform requests for on-demand and flexible monetization and related services via FMS components into currency transfers, purchase receipt notifications, social networking communications and transaction analytics reports. In some embodiments, the FMS obtains a request from a computing device of a merchant to process a user purchase checkout by a user from a point of sale device. In some embodiments, the request may include a merchant identifier. The FMS may determine that the merchant is authorized to obtain servicing of the request to process the user purchase checkout, by querying a database using the merchant identifier. The FMS may generating a user interface customized to the merchant and the point of sale device, upon determining that the merchant is authorized to obtain the service of the request, and provide the customized user interface to process the user purchase checkout by the user. | 08-23-2012 |
Peruvemba V. Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20090099925 | Apparatus and Method for Virtual World Item Searching - A computer implemented method to characterize virtual goods in a virtual environment includes identifying an item exchange in the virtual environment. The context of the item exchange is recorded to characterize details of the virtual environment at the time of the item exchange. The context of the item exchange is added to a repository of contexts characterizing contexts from a number of item exchanges. A request to search for a virtual item is received. The virtual item is matched to a set of items in the repository. The set of items are presented in response to the request. | 04-16-2009 |
20120101886 | DYNAMICALLY GENERATED TARGETED SUBSCRIPTION PACKAGE - Techniques are provided for dynamically generating a customized subscription package to a user of one or more virtual environments. A computer apparatus analyzes one or more user attributes of a user of one or more virtual environments. The computer apparatus determines a customized subscription package for the user. The customized subscription package comprises one or more virtual assets associated with the one or more virtual environments. The customized subscription package is offered to the user. | 04-26-2012 |
Raghu Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20110134752 | MULTILINK TRAFFIC SHAPING - A method for performing multilink communications may include applying a quality-of-service (QoS) policy to incoming traffic, where the QoS policy operates to identify a first portion and a second portion of the incoming traffic. The method may include fragmenting the first portion of the incoming traffic into a group of fragments. The method may include sequencing the group of fragments and the second portion of the incoming traffic into a sequenced flow, where the sequencing causes the second portion to be interleaved among the group of fragments so that the sequenced flow can be made available to a first link and a second link as multilink traffic, where the first link carries a first portion of the multilink traffic and the second link carries a second portion of the multilink traffic. | 06-09-2011 |
Raju Subramanian, Thousand Oaks, CA US
Patent application number | Description | Published |
---|---|---|
20090149454 | Benzomorpholine derivatives and methods of use - Selected benzomorpholine compounds are effective for prophylaxis and treatment of diseases, such as VEGF mediated diseases. The invention encompasses novel compounds, analogs, prodrugs and pharmaceutically acceptable salts thereof, pharmaceutical compositions and methods for prophylaxis and treatment of diseases and other maladies or conditions involving, cancer and the like. The subject invention also relates to processes for making such compounds as well as to intermediates useful in such processes. | 06-11-2009 |
Ram Subramanian, Saratoga, CA US
Patent application number | Description | Published |
---|---|---|
20150136082 | SYSTEM FOR MANAGING CATALYTIC CONVERTER TEMPERATURE - Various methods and arrangements for controlling catalytic converter temperature are described. In one aspect, an engine controller includes a catalytic monitor and a firing timing determination unit. The catalytic monitor obtains data relating to a temperature of a catalytic converter. Based at least partly on this data, the firing timing determination unit generates a firing sequence for operating the engine in a skip fire manner. Another aspect of the invention relates to an engine exhaust system that can help expedite the heating of a catalytic converter. | 05-21-2015 |
Ramanathan Subramanian, Orange, CA US
Patent application number | Description | Published |
---|---|---|
20100140137 | FUEL CONVERSION SYSTEM, APPARATUS, AND METHOD - A reductant producing apparatus and method is provided, the apparatus includes a catalyst attached to an encasement. The encasement has a first and second intake formed therein that are fluidly coupled to the catalyst. The first intake configured to allow entry of a hydrocarbon fuel into the encasement. The second intake is configured to allow entry of oxygen into the encasement. The catalyst is configured to catalyze an autothermal reaction to convert a mixture into a plurality of reductants comprising a plurality of hydrocarbons having a hydrocarbon chain length that is less than a hydrocarbon chain length of hydrocarbons in the hydrocarbon fuel. The mixture comprises the hydrocarbon fuel and the oxygen, and the mixture has a carbon-to-oxygen ratio that is greater than a one-to-one ratio. | 06-10-2010 |
20100307960 | PLASMA-ASSISTED TREATMENT OF COAL - A process for the plasma-assisted treatment of coal in which coal is directly converted to heavy hydrocarbons. The first step in the process is direct conversion of coal to aliphatic hydrocarbons under plasma conditions in the presence of light hydrocarbons, such as natural gas. In the second process step, the aliphatic hydrocarbons are upgraded to a liquid fuel. The energy for the process can be provided by radio frequency energy, such as microwave energy, that is powered by a renewable energy source. The process has flexibility to adjust aromatic content in the fuel to match fuel specification requirements. | 12-09-2010 |
Ramanathan Subramanian, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20100146856 | MULTIZONE CO-GASIFICATION - A gasifier is provided gasify multiple fuels. The gasifier is configured to include a first gasification zone for gasifying a high-calorific-value feedstock with an oxidant. The gasifier is configured to substantially consume the oxidant within the first gasification zone. The gasifier further includes a second gasification zone for gasifying a low-calorific-value, high-oxygen-content feedstock. The high-calorific-value fuel may be coal and the low-calorific-value fuel may be biomass. | 06-17-2010 |
20100146857 | METHOD OF OPERATING A GASIFIER - A method of operating a gasifier is provided that envisions dividing the gasifier into multiple zones. A high-calorific-value feedstock with an oxidant is injected in the first zone. The gasifier is operated to substantially consume the oxidant within the first gasification zone. The method of operating the gasifier further includes injecting a low-calorific-value, high-oxygen-content feedstock in a second gasification zone. The low-calorific-value, high-oxygen-content feedstock is devolatilized and gasified in second zone. A method of operation provides for a synergistic co-gasification of the high-calorific-value feedstock and the low-calorific-value, high oxidant content feedstock. The method provides for specific control actions that enable operation of multi-fuel, multizone gasifier. | 06-17-2010 |
20100146858 | METHOD OF RETROFITTING A COAL GASIFIER - A coal gasifier is retrofitted to achieve multiple advantages such as reduced oxygen consumption, reduced CO2 and NOx emissions, better H:C ratio, better carbon conversion etc. This is achieved by dividing the coal into at least two zones and modifying the gasifier and operating it as described. The coal is injected into a first zone, configured to devolatilize a substantial portion of the injected coal to produce coal char and volatiles. The operation is tuned to substantially consume the oxidant injected in the first zone. A low-calorific-value, high oxidant feedstock is injected in second zone of the gasifier. The devolatilization of the low-calorific-value, high oxidant content feedstock provides the oxygen containing compounds which gasify at least a portion of the coal char generated in the first zone. | 06-17-2010 |
Ravi Subramanian, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20100184396 | CONFIGURABLE ALL-DIGITAL COHERENT DEMODULATOR SYSTEM FOR SPREAD SPECTRUM APPLICATIONS - A configurable all-digital coherent demodulator system for spread spectrum digital communications is disclosed herein. The demodulator system includes an extended and long code demodulator (ELCD) coupled to a traffic channel demodulator (TCD) and a parameter estimator (PE). The demodulator also includes a pilot assisted correction device (PACD) that is coupled to the PE and the TCD. The ELCD provides a code-demodulated signal to the TCD and the PE. In turn, the TCD provides a demodulated output data signal to the PE. The PACD corrects the phase error of the demodulated output data based on an error estimate that is fed forward from the PE. Accumulation operations in the ELCD, TCD, and PE are all programmable. Similarly, a phase delay in the PACD is also programmable to provide synchronization with the error estimate from the PE. | 07-22-2010 |
20110035475 | EFFICIENT SOFTWARE DOWNLOAD TO CONFIGURABLE COMMUNICATION DEVICE - An efficient software download to a configurable communication device is disclosed herein. The method of efficiently downloading software begins with a step of receiving a request to configure a communication device to run a communication application. The communication device being configured has a plurality of function blocks with a fixed portion of hardware and a flexible portion of hardware, wherein the same plurality of function blocks is capable of operating a plurality of communication applications. In a next step, the capability of the fixed portion and the flexible portion of hardware of the communication device is evaluated for a capability of implementing the communication application. Next, configuration information only for the flexible portion of hardware of the communication device is transmitted to the communication device to enable it to operate the communication application. An identification of the communication application is also transmitted to the communication device for purposes of tracking its implementation. | 02-10-2011 |
20120213251 | CONFIGURABLE ALL-DIGITAL COHERENT DEMODULATOR SYSTEM FOR SPREAD SPECTRUM APPLICATIONS - A configurable all-digital coherent demodulator system for spread spectrum digital communications is disclosed herein. The demodulator system includes an extended and long code demodulator (ELCD) coupled to a traffic channel demodulator (TCD) and a parameter estimator (PE). The demodulator also includes a pilot assisted correction device (PACD) that is coupled to the PE and the TCD. The ELCD provides a code-demodulated signal to the TCD and the PE. In turn, the TCD provides a demodulated output data signal to the PE. The PACD corrects the phase error of the demodulated output data based on an error estimate that is fed forward from the PE. Accumulation operations in the ELCD, TCD, and PE are all programmable. Similarly, a phase delay in the PACD is also programmable to provide synchronization with the error estimate from the PE. | 08-23-2012 |
Revathi Subramanian, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20090192855 | Computer-Implemented Data Storage Systems And Methods For Use With Predictive Model Systems - Systems and methods for performing fraud detection. As an example, a system and method can be configured to contain a raw data repository for storing raw data related to financial transactions. A data store contains rules to indicate how many generations or to indicate a time period within which data items are to be stored in the raw data repository. Data items stored in the raw data repository are then accessed by a predictive model in order to perform fraud detection. | 07-30-2009 |
20090192957 | Computer-Implemented Data Storage Systems And Methods For Use With Predictive Model Systems - Systems and methods for performing fraud detection. As an example, a system and method can be configured to contain a raw data repository for storing raw data related to financial transactions. A data store contains rules to indicate how many generations or to indicate a time period within which data items are to be stored in the raw data repository. Data items stored in the raw data repository are then accessed by a predictive model in order to perform fraud detection. | 07-30-2009 |
20120317008 | Computer-Implemented Systems And Methods For Handling And Scoring Enterprise Data - Systems and methods for storing transaction data associated with transactions of disparate types are provided. Transaction data is received describing a transaction that has occurred, the transaction being performed by an customer of a particular customer type and the transaction being performed using a channel of a particular channel type. Transaction data about the customer is stored in an customer segment according to one of a plurality of customer templates, the one of the plurality of customer templates being selected according to the customer type. Transaction data about the channel is stored in a channel segment according to one of a plurality of channel templates, the one of the plurality of channel templates being selected according to the channel type. Data from the customer segment, the activity segment, and the channel segment for the transaction is extracted and scored by a predictive model. | 12-13-2012 |
20120317013 | Computer-Implemented Systems And Methods For Scoring Stored Enterprise Data - Systems and methods are provided for scoring transaction data representative of transactions of disparate types transaction data describing a transaction that has occurred is received. The transaction data is stored in a plurality of segments, where a segment is formatted according to a template, where the template is selected based on an attribute of the transaction, and where the attribute is a customer attribute, an activity attribute, or a channel attribute. Transaction data associated with a segment is aggregated based on a particular attribute. The aggregate transaction data is provided to a predictive model to generate a fraud score. New transaction data is received describing a new transaction, wherein the new transaction includes the particular attribute. A real-time score is provided indicating a likelihood of fraud for the new transaction, wherein the score is based at least in part on the fraud score generated using the aggregate transaction data. | 12-13-2012 |
20120317027 | Computer-Implemented Systems And Methods For Real-Time Scoring Of Enterprise Data - Systems and methods are provided for providing real-time scoring of received transaction data. Transaction data describing a particular transaction that has occurred is received. The transaction data is stored in an enterprise database, where the enterprise database is configured to store transactions of disparate types, where the transaction data is stored using a plurality of segments, where a segment is formatted according to a template, and where the template is selected based on an attribute of the transaction, wherein the attribute is a customer attribute, an activity attribute, or a channel attribute. A transaction type of the particular transaction is determined. One or more models are selected from a pool of models based on the transaction type, wherein the one or more models are configured based on a plurality of records from the enterprise database, and a score of the received transaction data is generated based on the transaction data. | 12-13-2012 |
20130339218 | Computer-Implemented Data Storage Systems and Methods for Use with Predictive Model Systems - Systems and methods for performing fraud detection. As an example, a system and method can be configured to contain a raw data repository for storing raw data related to financial transactions. A data store contains rules to indicate how many generations or to indicate a time period within which data items are to be stored in the raw data repository. Data items stored in the raw data repository are then accessed by a predictive model in order to perform fraud detection. | 12-19-2013 |
20130346350 | COMPUTER-IMPLEMENTED SEMI-SUPERVISED LEARNING SYSTEMS AND METHODS - Computer-implemented systems and methods for determining a subset of unknown targets to investigate. For example, a method can be configured to receive a target data set, wherein the target data set includes known targets and unknown targets. A supervised model such as a neural network model is generated using the known targets. The unknown targets are used with the neural network model to generate values for the unknown targets. Analysis with an unsupervised model is performed using the target data set in order to determine which of the unknown targets are outliers. A comparison of list of outlier unknown targets is performed with the values for the unknown targets that were generated by the neural network model. The subset of unknown targets to investigate is determined based upon the comparison. | 12-26-2013 |
20140172547 | Scoring Online Data for Advertising Servers - Systems and methods for using online activity data in implementing a marketing strategy are provided. A system and method can include generating, on a computing device, variables using signature data that includes historic clickstream data and current clickstream data associated with an entity. A subset of the variables can be identified using a covariance matrix for the variables. Scores can be generated by applying the subset of the variables to models. Weighted scores can be generated by associating weights with the scores. The weighted scores can be used for selecting online advertisements. Target data can be received that includes online advertisement click data associated with the entity. New scores of the current data can be generated using the models. The weights associated with the new scores can be modified using the target data. | 06-19-2014 |
20140172551 | Using Transaction Data and Platform for Mobile Devices - Systems and methods for using historical and current financial transaction data in implementing a marketing strategy are provided. A system and method can include updating stored signature data using current data associated with an entity. The signature data includes historic data including credit card transactions or debit card transactions associated with the entity. One or more model variables are generated using the updated signature data associated with the entity. A marketing score for the entity is determined by applying one or more model variables to a marketing model. The marketing score indicates a likelihood that the entity will respond to an offer. Whether the marketing score exceeds a predetermined marketing threshold is determined. Based upon determining that the marketing score exceeds the predetermined marketing threshold and determining that the entity is within the geographic area, an indication for triggering transmission of the offer to the entity is generated. | 06-19-2014 |
20140172690 | Systems and Methods For Matching Domain Specific Transactions - Systems and methods for matching domain-specific transactions are provided. Some of the disclosed systems and methods can include receiving, on a computing device, transaction data associated with an entity, retrieving signature data associated with the entity, wherein the signature data includes historic data associated with the entity; updating the signature data to include the transaction data, wherein updating includes using a model, and generating a score for the transaction data using the updated signature data and the model. The disclosed system and method further includes receiving new transaction data associated with the entity; retrieving the updated signature data associated with the entity; determining whether the transaction data and the new transaction data are related, and if so, updating the transaction data with the new transaction data, and generating a score for the updated transaction data using the updated signature data and the model. | 06-19-2014 |
Sakthikumar Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140075505 | SYSTEM AND METHOD FOR ROUTING SELECTED NETWORK TRAFFIC TO A REMOTE NETWORK SECURITY DEVICE IN A NETWORK ENVIRONMENT - A method provided in one example includes receiving a request for configuration information for a host in a first network, determining whether the request was sent over a quarantine virtual local area network (VLAN) in the first network, and providing to the host a network address of a first domain name system (DNS) server if the request was sent over the quarantine VLAN in the first network. In addition, the first DNS server translates a domain name in a query from the host to a network address of a network security device in a second network. In more specific embodiments, the domain name in the query is mapped to a different network address in a second DNS server. The method may also include providing a network address of the second DNS server if the request was sent over a production virtual local area network (VLAN) in the first network. | 03-13-2014 |
20140105119 | SYSTEM AND METHOD FOR CORRELATING SECURITY EVENTS WITH SUBSCRIBER INFORMATION IN A MOBILE NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes receiving a subscriber accounting start packet for a subscriber device in a mobile network environment. The method also includes extracting, from the subscriber accounting start packet, subscriber device information and a network address of the subscriber device. The method further includes mapping the network address to the subscriber device information, and then correlating the subscriber device information and a security event when the security event is detected in subscriber data network traffic associated with the subscriber device. In a specific embodiment, the subscriber device information includes at least one of an International Mobile Equipment Identity (IMEI), an International Mobile Subscriber Identity (IMSI), a Mobile Station International Subscriber Directory Number (MSISDN), and an access point name (APN). In further embodiments, an identification of the security event and one or more items of the subscriber device information are provided to a user. | 04-17-2014 |
20140259140 | USING LEARNED FLOW REPUTATION AS A HEURISTIC TO CONTROL DEEP PACKET INSPECTION UNDER LOAD - A network appliance can adjust the amount of deep packet inspection performed by the network appliance as a function of load. In one example, the network appliance can be configured to utilize load (e.g., of its internal processors) and reputation of data flows to determine when selected trusted flows can bypass inspection performed using deep packet analysis. Reputation of data flows can be determined based on historical information regarding a particular flow in combination with a reputation service determining reputation scores based on properties of the data flow (e.g., source, type of data in flow, destination, Internet Protocol domains, etc.). In general, when the network appliance is under heavy load, the more trusted flows are allowed to pass through without in depth inspection. | 09-11-2014 |
20150101035 | DUPLICATING PACKETS EFFICIENTLY WITHIN A NETWORK SECURITY APPLIANCE - A network security appliance uses a switch to switch packets between cores configured for fast path processing and slow path processing. The switch duplicates packets for delivery to the slow path processing cores, eliminating the need for the fast path processing cores to expend processor resources on packet duplication. The switch can use IEEE 802.1ad Q-in-Q VLAN tags in the packet to perform the switching and packet duplication. Slow path processing cores may also broadcast packets to other slow path processing cores via the switch. | 04-09-2015 |
Sankar Subramanian, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20100017363 | EFFICIENT EVALUATION OF SQL PIVOT OPERATIONS - Techniques are described herein for supporting efficient evaluation of pivot operations. In an embodiment, a pivoting query on a data table is received. The query identifies pivot columns, measure columns, and grouping columns. In response to receiving the query, a staging table that comprises new pivot columns, aggregated columns, and new grouping columns may be created. For each particular unique combination of values of the grouping columns and the pivot columns in the data table, stored values in the measure columns in the data table are aggregated for certain rows in the plurality of rows in the data table. Each row of the certain rows comprises the each particular unique combination of values of the grouping columns and the pivot columns in the data table. Results of aggregating are stored in the staging table. Data that has been populated in the staging table is transposed into a result set. | 01-21-2010 |
20140214754 | Scalable and Adaptive Evaluation of Reporting Window Functions - According to one aspect of the invention, for a database statement that specifies evaluating reporting window functions, a computation-pushdown execution strategy may be used for the database statement. The computation-pushdown execution plan includes producer operators and consolidation operators. Each producer operator computes a respective partial aggregation for each reporting window function based on a subset of rows, and broadcasts the respective partial aggregation. Each consolidation operator fully aggregates all partial aggregations broadcasted from the producer operators. Alternatively, an extended-data-distribution-key execution plan may be used. Each producer operator sends rows based on hash keys to sort operators for computing partial aggregations for at least one reporting window function based on a subset of rows. Each consolidation operator receives and fully aggregates all partial aggregations broadcasted from the sort operators. | 07-31-2014 |
Saravanadas P. Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20110191826 | SYSTEM AND METHOD FOR PROVIDING VIRTUAL USER GROUPS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes communicating an access request to a network element, the access request is associated with network authentication relating to a subscriber. The method also includes receiving an access response that includes a profile associated with the subscriber. The profile can include a group attribute that defines the subscriber as being part of a group of subscribers sharing a network data plan, which defines a data allotment assigned to the group over a specified time interval. In more detailed embodiments, a unique data string sent by an Authentication, Authorization, and Accounting element is received, where the unique data string identifies a full set of subscribers belonging to the group. Data underutilization of a first subscriber is offset by data overutilization of a second subscriber, where a summation of the data underutilization and the data overutilization do not exceed the data allotment assigned. | 08-04-2011 |
Satheesh Subramanian, Glendale, CA US
Patent application number | Description | Published |
---|---|---|
20140267251 | SEARCH-BASED MATCHING FOR MULTIPLE PARAMETER SETS - Search-based matching for multiple parameter sets in computer animation is disclosed. The search-based matching method can include receiving a selection of a first set of joint parameters in a first model to match to a second set of joint parameters in a second model, currently in operation, for an appendage of a computer-generated object. The method can also adjust the selected first set of joint parameters to match the second set of joint parameters. The method can further compare the adjusted first set of joint parameters to the second set of joint parameters. Based on the comparison, the method can switch from the second model to the first model and replace the second set of joint parameters with the adjusted first set of joint parameters. The method can then output the replacement first set of joint parameters for rendering the appendage of the object. | 09-18-2014 |
Senthil Subramanian, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20090152873 | Shock Wave and Power Generation Using on-Chip Nanoenergetic Material - A method of generating power uses a nanoenergetic material. The nanoenergetic material comprising thermite is obtained and deposited on a substrate. An igniter is placed on the nanoenergetic material. When power is desired, the nanoenergetic material is ignited. A transducer receives thermal, sonic, magnetic, optic and/or mechanical energy from combustion of the nanoenergetic material and converts it into electrical energy. Preferably, the transducer is a thermoelectric, piezoelectric or magneto device. Preferably, multiple transducers are integrated in one power generators to maximize the power from nanoenergetic thermites. | 06-18-2009 |
Senthil Subramanian, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20110251878 | SYSTEM FOR PROCESSING LARGE AMOUNTS OF DATA - A system for processing data includes a first data pipeline. The first data pipeline includes a processor to process a first set of data stored in a tangible memory. The system also includes a second data pipeline to process a second set of data. A mapping processor matches the first set of data to the second set of data to produce a third set of data. | 10-13-2011 |
Senthil Subramanian, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20120253951 | SCALABLE INVENTORY PROTECTION AND OPTIMIZATION IN DISPLAY ADVERTISING - Systems and methods for determining the availability of resources, such as Internet advertising opportunities, are described herein. A query may be received to determine eligible resource inventory for a set of attributes and attribute values received in the query. The query may overlap with inventory that protected, and thus is desired to not be covered by the query. Accordingly, the query may be modified to include additional attributes and attribute values, or to include one or more inventory protection tags, to prevent the query from overlapping with the protected inventory. Furthermore, advertisement campaigns may be modified in a similar manner to prevent protected inventory from matching the advertisement campaigns. Still further, individual inventory items may be annotated with tags to prevent the inventory items from being associated with protected inventory defined by tags. | 10-04-2012 |
20140032305 | INVENTORY CONTRIBUTION RULES FOR INVENTORY MANAGEMENT - Systems and methods for managing inventory in an online advertising system are described herein. The inventory may comprise advertisement (“ad”) impressions. In accordance with certain implementations, the systems and methods enable advertisers to target groups of inventory (e.g., “run of” inventory groups) made available by publishers and sold at a non-premium rate, while also enabling the publishers to selectively designate certain inventory within a given inventory group as premium. Inventory so designated is automatically excluded from an inventory group to which it would normally belong both during a booking process as well as during an ad serving process. | 01-30-2014 |
Sitaraman Ganapathy Subramanian, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20100046627 | DECODING SYSTEM AND METHOD - Decoding systems and methods are disclosed. In a particular embodiment, a video decoder system includes a first decoding path and a second decoding path configured to decode at a slower average rate than the first decoding path. The video decoder system includes a dynamic switch configured to provide a first portion of the encoded video signal to the first decoding path or to the second decoding path. The dynamic switch is further configured to provide a subsequent portion of the encoded video signal to the first decoding path or to the second decoding path in response to a value of a decoding metric associated with decode processing of the first portion. | 02-25-2010 |
20120294360 | CHANNEL SWITCH FRAME - Methods and apparatus to process multimedia data enabling faster channel acquisitions, improved error recovery and improved efficiency. An encoder device encodes a first portion of multimedia data using inter-coding to generate a first version, and encodes the first portion of multimedia data using intra-coding to generate a second version. A decoder device receives a first version of a first portion of multimedia data, wherein the first version is inter-coded, receives a second version of the first portion of multimedia data, wherein the second version is intra-coded, and selectively decodes the first and second received versions. | 11-22-2012 |
20130308707 | METHODS AND DEVICE FOR DATA ALIGNMENT WITH TIME DOMAIN BOUNDARY - Apparatus and methods of using content information for encoding multimedia data are described. A method of processing multimedia data includes obtaining content information of multimedia data, and encoding the multimedia data so as to align a data boundary with a frame boundary in a time domain, wherein said encoding is based on the content information. In another aspect, a method of processing multimedia data includes obtaining a content classification of the multimedia data, and encoding blocks in the multimedia data as intra-coded blocks or inter-coded blocks based on the content classification to increase the error resilience of the encoded multimedia data. Apparatus that can process multimedia data described in these methods are also disclosed. | 11-21-2013 |
Sridhar Subramanian, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20140317249 | Accelerating Network Convergence for Layer 3 Roams in a Next Generation Network Closet Campus - Accelerating network convergence may be provided. Consistent with embodiments of the disclosure, a mapping server may be configured to map an interconnection of various network elements comprising at least the following: a wireless host, at least two access switches, a plurality of distribution switches, a core switch, a mobility controller, and a mapping database. The mapping server may then receive an indication from the mobility controller that the wireless host has roamed from a first access switch to a second access switch. In response to the indication, the mapping server may remap the interconnection of network elements in the mapping database to update network routing information associated with the wireless host. | 10-23-2014 |
20150074741 | METHOD AND SYSTEM FOR EXTENDING NETWORK RESOURCES CAMPUS-WIDE BASED ON USER ROLE AND LOCATION - A method, system, and computer readable medium is disclosed which utilizes the LISP control plane to increase communications and access to enterprise resources in a network with multiple subnetworks, such as a university setting. As a result, the various embodiments of the present invention provide a routing and services dimension to enterprise discovery protocol traffic, such as Apple Bonjour traffic. A LISP instance ID, which is carried in the LISP header, is used to associate one or more end user devices with specific enterprise resources in a particular subnetwork or a service domain, wherein these resources may be accessed by the end user device even if the end user device migrates to another subnetwork. Another embodiment of the invention limits routing services advertisements from enterprise services to a subset of end user devices associated with particular user EIDs by using L2-LISP multicast techniques. | 03-12-2015 |
Sridhar Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140254374 | METHODS AND DEVICES FOR PROVIDING SERVICE CLUSTERING IN A TRILL NETWORK - The methods and devices discussed herein provide service clustering within a TRILL network without relying on an additional service insertion framework. A TRILL network can include one or more flow distribution RBridges for distributing flows to service nodes. Each flow distribution RBridge can have a virtual base identifier and one or more virtual cluster identifiers. An example method can include maintaining N service cluster load balancing structures and receiving a packet that is encapsulated with an inner header (source/destination addresses) and an outer header (ingress/egress RBridge identifiers). The method can include determining whether the egress RBridge identifier is a virtual cluster identifier, and if so, applying a hash function to a predetermined flow tuple and selecting a service node associated with the hash value from one of the N service cluster load balancing structures. The method can include forwarding the packet to the selected service node. | 09-11-2014 |
Sridhar P. Subramanian, Cupertion, CA US
Patent application number | Description | Published |
---|---|---|
20110252165 | Retry Mechanism - An interface unit may comprise a buffer configured to store requests that are to be transmitted on an interconnect and a control unit coupled to the buffer. In one embodiment, the control unit is coupled to receive a retry response from the interconnect during a response phase of a first transaction for a first request stored in the buffer. The control unit is configured to record an identifier supplied on the interconnect with the retry response that identifies a second transaction that is in progress on the interconnect. The control unit is configured to inhibit reinitiation of the first transaction at least until detecting a second transmission of the identifier. In another embodiment, the control unit is configured to assert a retry response during a response phase of a first transaction responsive to a snoop hit of the first transaction on a first request stored in the buffer for which a second transaction is in progress on the interconnect. The control unit is further configured to provide an identifier of the second transaction with the retry response. | 10-13-2011 |
Sri Krishna Subramanian, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20090049046 | Annotation and Publication Framework - A hybrid annotation and publication system is disclosed that can access content in a scalable manner from databases, allow for its editing and publication via wiki-style programs, while at the same time allowing for peer-review of such content via peer-review programs. This system balances the wiki-style programs, the peer-review programs, and any database store accesses in a manner appropriate to the need at hand according to various heuristics. For instance, the system can be accessed via a web browser, and data provided from various databases can be edited. Such data can be stored in the system in a hierarchical manner. Once the content is annotated, it can be reviewed (at various levels, ranging from expert to novice). Upon review, such content can be published using the wiki programs, so that the content is ready for public and/or private consumption. | 02-19-2009 |
Srikrishnan Subramanian, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20100290468 | Negotiated Secure Fast Table Lookups for Protocols with Bidirectional Identifiers - During connection establishments for a protocol with bidirectional identifiers, connection data is allocated, the locally selected identifier is a pointer to the allocated connection data, and a mathematical transformation is applied to the pointer. The pointer and a result of the mathematical transformation are included in a first and second portion of the connection establishment packets respectively. Upon receipt of a data packet for that protocol, a first and second portion of the data packet (which correspond to the first and second portion of the connection establishment packets) are extracted. The same mathematical transformation used during connection establishment is applied to the data extracted from the first portion of the data packet. The result of that mathematical transformation is compared with the data extracted from the second portion of the data packet. If the values match, then the data extracted from the first portion is trusted and dereferenced to access the allocated connection data associated with that data packet. | 11-18-2010 |
20110286460 | Negotiated Secure Fast Table Lookups for Protocols with Bidirectional Identifiers - During connection establishments for a protocol with bidirectional identifiers, connection data is allocated, the locally selected identifier is a pointer to the allocated connection data, and a mathematical transformation is applied to the pointer. The pointer and a result of the mathematical transformation are included in a first and second portion of the connection establishment packets respectively. Upon receipt of a data packet for that protocol, a first and second portion of the data packet (which correspond to the first and second portion of the connection establishment packets) are extracted. The same mathematical transformation used during connection establishment is applied to the data extracted from the first portion of the data packet. The result of that mathematical transformation is compared with the data extracted from the second portion of the data packet. If the values match, then the data extracted from the first portion is trusted and dereferenced to access the allocated connection data associated with that data packet. | 11-24-2011 |
Srinivas Subramanian, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20140301387 | NETWORK DEVICE MOBILITY - According to one example embodiment, an EID-NOTIFY packet is defined for use with the Location/Identifier Separation Protocol (LISP). A first-hop network element may send EID-NOTIFY responsive to decoding a data packet from a previously undetected host on its subnetwork. A site network element may receive EID-NOTIFY, and send a MAP-REGISTER message to a mapping system. EID-NOTIFY may have substantially the same format as MAP-NOTIFY. This may enable the site network element to be removed more than one hop from the subnetwork. | 10-09-2014 |
Srinivasan Subramanian, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20140258860 | SYSTEM AND METHOD FOR PROVIDING FEEDBACK TO THREE-TOUCH STROKE MOTION - A system for providing tactile/audible feedback to three-touch stroke motion. The system includes a multi-touch device operable to produce an event signal by detecting any touch-motion event by one or more user-controlled objects. The touch-motion event includes a three-touch stroke motion characterized by substantially simultaneous three-point touch followed by a stroke motion along the multi-touch device before lifting the user-controlled objects. The system further includes a controller configured to process the event signal and generate a drive signal for an event dispatcher. Additionally, the system includes an event handler being coupled to the event dispatcher to subscribe the drive signal. The event handler is configured to select a graphic object that is enabled with the drive signal specifically associated with the three-touch stroke motion applied to said graphic object on the touch device to provide either a tactile response or an audible response or both. | 09-11-2014 |
Sriram Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090248632 | Remote Printing System Using Federated Identity Web Services - A data processing system comprises a print-enabled identity server. The print-enabled identity server comprises an identity provider operative in a federated identity system that authenticates a user, and stores profile information and payment information. The print-enabled identity server further comprises a Federated Print Search Responder (FPSR) and a discovery service hosted by the identity provider that operate in combination to answer client print-search queries for finding at least one remote printer according to client-designated criteria. An identity-based payment service manages user payment transactions. | 10-01-2009 |
20140281307 | HANDLING SNAPSHOT INFORMATION FOR A STORAGE DEVICE - Techniques are disclosed relating to handling snapshot data for a storage device. In one embodiment, a computing system maintains information that indicates the state of data associated with an application at a particular point in time. In this embodiment, the computing system assigns an epoch number to a current epoch, where the current epoch is an interval between the particular point in time and a future point in time. In this embodiment, the computing system writes, during the current epoch, a block of data to the storage device. In this embodiment, the writing the block of data includes storing the epoch number with the block of data. | 09-18-2014 |
20140310499 | SYSTEMS, METHODS AND INTERFACES FOR DATA VIRTUALIZATION - A data services module performs log storage operations in response to requests by storing data on one or more storage devices, and appending information pertaining to the requests to a separate metadata log. A log order of the metadata log may correspond to an order in which the requests were received, regardless of the order in which data of the requests are written to the storage devices. The requests may correspond to identifiers of a logical address space. The data services module implements an any-to-any translation layer configured to map identifiers of the logical address space to the stored data. The virtualization module may include a metadata management module configured to checkpoint the translation layer metadata by, inter alia, appending aggregate, checkpoint entries to the metadata log. The data services module may leverage the translation layer between the logical identifiers and underlying storage locations to efficiently implement logical manipulation operations. | 10-16-2014 |
20150039577 | SYSTEMS AND METHODS FOR ATOMIC STORAGE OPERATIONS - An atomic storage module may be configured to implement atomic storage operation directed to a first set of identifiers in reference to a second, different set of identifiers. In response to completing the atomic storage operation, the atomic storage module may move the corresponding data to the first, target set of identifiers. The move operation may comprise modifying a logical interface of the data. The move operation may further include storing persistent metadata configured to bind the data to the first set of identifiers. | 02-05-2015 |
Sudhir Subramanian, Foster City, CA US
Patent application number | Description | Published |
---|---|---|
20100241526 | UNIFIED CLASSIFICATION APPROACH FOR DIFFERENT TYPES OF ITEMS IN ENTERPRISE PROCUREMENT CATALOGS - Particular embodiments provide an order procurement application to allow users to search for items in an order procurement catalog. A classification of items in the order procurement catalog is determined. A plurality of different types of items are classified. The different types may be characterized by different methods of ordering that are needed to order an item of the type. During searching, a query for the order procurement catalog may be received. A classification position may be determined based on the query. For example, a node in a hierarchy may be determined. Ancestor and descendant positions in the classification may also be determined, such as ancestor and descendant nodes for the current node. A plurality of items is then determined for the classification position, ancestor position, and descendant position. The plurality of items that are determined may then be displayed to a user in response to the query. | 09-23-2010 |
Sudhir Subramanian, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20130317869 | GUIDED PUNCHOUT CATALOG - Embodiments of the invention provide systems and methods for managing catalog information that can include onsite as well as externally hosted product or service information. Generally speaking, customers can create externally hosted catalogs for each supplier, and set up high level keywords so that a link to the externally hosted catalog information can be returned if requesters execute a search using these keywords. The source of where the product or service comes from does not result in issues for the requesters when trying to locate an item. Rather, the enterprise procurement application can guide the requesters to the items they are looking for regardless of the source. | 11-28-2013 |
20130318089 | CATALOG PERFORMANCE AND INTEGRITY ANALYSIS - Embodiments of the invention provide systems and methods for managing catalog information that can include tracking and reporting search terms used for catalog items searches. According to one embodiment, a procurement application can maintain a log of unique search phrases which returned no search results. For example, the log can maintain records from a specific time period. A count can be maintained to capture how many times a phrase was used for search within the specific time period, and used to rank the frequency of the search phrases. Search phrases that exceed that time period may be purged. The accumulated counts and associated search terms can be provided to the managers periodically and/or upon request in the form of a summary or other graphical and/or textual report or presentation. | 11-28-2013 |
Sumesh Subramanian, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20120185864 | Integrated Environment for Execution Monitoring and Profiling of Applications Running on Multi-Processor System-on-Chip - There is provided a system and method for providing an integrated environment for execution monitoring and profiling of applications running on multi-processor system-on-chips. There is provided a method comprising obtaining task execution data of an application, the task execution data including a plurality of task executions assigned to a plurality of hardware resources, showing a scheduler view of the plurality of task executions on a display, receiving a modification request for a selected task execution from the plurality of task executions, reassigning the plurality of task executions to the plurality of hardware resources based on implementing the modification request, and updating the scheduler view on the display. As a result, the high level results of specific low level optimizations may be tested and retried to discover which optimization routes provide the greatest benefits. | 07-19-2012 |
Sushmita Subramanian, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20120157127 | HANDHELD ELECTRONIC DEVICE USING STATUS AWARENESS - Through status awareness, a handheld communications device may determine the location, activity, and/or physical or emotional state of the user. This information may in turn be used for various purposes, such as 1) determining how to alert the user of an incoming communication, 2) determining what format to use for communicating with the user, and 3) determining how to present the user's status to another person's communication device. | 06-21-2012 |
20120270575 | HANDHELD ELECTRONIC DEVICE USING STATUS AWARENESS - Through status awareness, a handheld communications device may determine the location, activity, and/or physical or emotional state of the user. This information may in turn be used for various purposes, such as 1) determining how to alert the user of an incoming communication, 2) determining what format to use for communicating with the user, and 3) determining how to present the user's status to another person's communication device. | 10-25-2012 |
20120276932 | HANDHELD ELECTRONIC DEVICE USING STATUS AWARENESS - Through status awareness, a handheld communications device may determine the location, activity, and/or physical or emotional state of the user. This information may in turn be used for various purposes, such as 1) determining how to alert the user of an incoming communication, 2) determining what format to use for communicating with the user, and 3) determining how to present the user's status to another person's communication device. | 11-01-2012 |
20130179308 | Methods and Systems Related to Monetization Plug-Ins in Interactive Multimedia Applications - Monetization plug-ins in interactive multimedia applications. At least some of the illustrative embodiments are methods including: accepting an indication of flow of an interactive application configured to selectively implement an in-application purchase, the accepting by way of a graphical user interface (GUI); creating a representation of the flow of the interactive application, the representation at least partially in a declarative format; and executing the interactive application by a first runtime engine, the first runtime engine becomes executable code that implements the in-application purchase. | 07-11-2013 |
20130237287 | ELECTRONIC DEVICE USING STATUS AWARENESS - Through status awareness, a communications device may determine the location, activity, and/or physical or emotional state of the user. This information may in turn be used for various purposes, such as 1) determining how to alert the user of an incoming communication, 2) determining what format to use for communicating with the user, and 3) determining how to present the user's status to another person's communication device. | 09-12-2013 |
Thyagarajan T. Subramanian, Rohnert Park, CA US
Patent application number | Description | Published |
---|---|---|
20110262132 | Daisy Chainable ONU - Embodiments of a scalable optical network unit (ONU) architecture for multi-dwelling units (MDUs) that has a low initial cost (or first port cost) and a low maintenance cost are provided herein. The ONU architecture is scalable in that a growing number of end users can share a single drop fiber that couples the ONU to a passive optical network. The ONU architecture utilizes a multiplexer module to allow the ONU to be daisy chained with one or more additional ONUs. | 10-27-2011 |
Venkitesh Subramanian, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20130262168 | SYSTEMS AND METHODS FOR CUSTOMER RELATIONSHIP MANAGEMENT - According to various exemplary embodiments, a social media message posted on a social media system is accessed. Moreover, an agent listed in an agent directory is classified as an expert of content referred to in the social media message, based on a keyword identified in the social media message. Further, an identifier of the agent may be displayed in an expert finder list of a user interface. | 10-03-2013 |
20130262320 | SYSTEMS AND METHODS FOR CUSTOMER RELATIONSHIP MANAGEMENT - According to various exemplary embodiments, a social media message posted by a user on a social media system is accessed, and a prioritization level is determined based on the social media message. The prioritization level may indicate a measurement of importance of the social media message. Further, the social media message may be inserted into a prioritized message queue, based on the determined prioritization level associated with the social media message. | 10-03-2013 |
20130262598 | SYSTEMS AND METHODS FOR CUSTOMER RELATIONSHIP MANAGEMENT - According to various embodiments, a social media message posted on a social media system is accessed. One or more similar messages determined to be similar to the social media message may be selected from a database of previously posted messages, based on, for example, an author, product, problem, keyword, etc., identified in the social media message. The similar messages may be displayed in a similar message recommendation list of a user interface. One or more relevant knowledgebase articles determined to be relevant to the social media message may be selected from a knowledgebase repository, based on, for example, a product, problem, keyword, etc., identified in the social media message. The relevant knowledgebase articles may be displayed in a knowledgebase article list of a user interface. | 10-03-2013 |
Venkitesh Subramanian, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20150112756 | Automated Software Tools for Improving Sales - A sales application is described that includes multiple automated sales tools that can be combined to help improve sales within a sales team. A deal finder sales tool is described to help identify sales opportunities. A deal playbook sales tool is also described to help structure the sales opportunity into a sales play by recommending products to sale in conjunction and also constructing a sales team. An influencer sales tool is also described to help identify business relationships that can be utilized to influence members of the sales team. | 04-23-2015 |
20150112893 | Predicting Levels of Influence - Systems and method for identifying individuals who may be potentially influential on a particular identified contact for a particular sales opportunity are disclosed. The individuals identified as potential influencers are then ranked according to a predicted level of influence and displayed in a graphic representation. In one embodiment, the ranked potential influencers are displayed as icons in a spiral formation relative to an icon representing the identified contact. The closer an icon representing a particular potential influencer is to the icon representing the identified contact, the greater the level influence is that that influencer might have on the identified contact. | 04-23-2015 |
Venkiteswaran Subramanian, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20120252681 | EVOLUTION OF WHOLE CELLS AND ORGANISMS BY RECURSIVE SEQUENCE RECOMBINATION - The invention provides methods employing iterative cycles of recombination and selection/screening for evolution of whole cells and organisms toward acquisition of desired properties. Examples of such properties include enhanced recombinogenicity, genome copy number, and capacity for expression and/or secretion of proteins and secondary metabolites. | 10-04-2012 |
Venkiteswatan Subramanian, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20110190140 | EVOLUTION OF WHOLE CELLS AND ORGANISMS BY RECURSIVE SEQUENCE RECOMBINATION - The invention provides methods employing iterative cycles of recombination and selection/screening for evolution of whole cells and organisms toward acquisition of desired properties. Examples of such properties include enhanced recombinogenicity, genome copy number, and capacity for expression and/or secretion of proteins and secondary metabolites. | 08-04-2011 |
Vijaynarayanan Subramanian, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20100220592 | LAYERED INTERNET VIDEO ENGINEERING - Embodiments are described herein such as a method for providing media-aware congestion control for the transmission of video streams, the method comprising: estimating congestion price information for one or more network nodes; responding to the congestion price information by calculating optimal rates for one or more end hosts; adapting the sending rates of the one or more end hosts according to the calculated optimal rates; and determining an amount of FEC to be inserted into the video streams based on the congestion price information. | 09-02-2010 |
20110158253 | Increasing Transmission Rate to a Remote Device In Response to Attributing Information Loss as Not Being a Result of Network Congestion - In response to a detected loss of previously transmitted information by an apparatus communicating with a remote device (e.g., using TCP), the rate of transmission of information is increased by the apparatus in response to attributing the detected loss of previously transmitted information as not being caused by congestion. This attribution of the packet loss is typically determined based on roundtrip delays between sent information and received corresponding acknowledgments, which may be used directly or indirectly, such as by estimating network queuing delays based on the measured roundtrip delays. | 06-30-2011 |
20120047279 | Media-Aware and TCP-Compatible Bandwidth Sharing for Video Streaming - Media-aware and TCP-compatible bandwidth sharing may be provided. In various embodiments, a network node may periodically update a virtual congestion level for a transmission stream in a network. The transmission stream may comprise at least one video stream and at least one data stream. The network node may then calculate, based at least in part on the virtual congestion level, a random packet marking probability or a random packet drop probability. In turn, the network node may either drop or mark transmission packets according to the calculated marking and dropping probability. The network node may further calculate an optimal video transmission rate for the at least one video stream and adjust a video transmission rate for the at least one video stream accordingly. Rate-distortions parameters for the at least one video stream may influence the optimal video transmission rate calculation for the at least one video stream. | 02-23-2012 |
20120182935 | SYSTEM AND METHOD FOR PACKET DISTRIBUTION IN A VEHICULAR NETWORK ENVIRONMENT - A method is provided in one example embodiment that includes receiving a request for data from a source device, such as an on-board unit of vehicle or a mobile device coupled to an on-board unit, over a vehicular network. Location data, such as GPS coordinates, speed, and heading associated with the source device may also be received. A travel path for the source device can be predicted based on the location data, and an access point to the network can be located within range of the travel path. Packets associated with the requested data may be sent to the access point and then forwarded to the source device when the source device is in range. | 07-19-2012 |
20140112134 | Increasing Transmission Rate to a Remote Device In Response to Attributing Information Loss as Not Being a Result of Network Congestion - In response to a detected loss of previously transmitted information by an apparatus communicating with a remote device (e.g., using TCP), the rate of transmission of information is increased by the apparatus in response to attributing the detected loss of previously transmitted information as not being caused by congestion. This attribution of the packet loss is typically determined based on roundtrip delays between sent information and received corresponding acknowledgments, which may be used directly or indirectly, such as by estimating network queuing delays based on the measured roundtrip delays. | 04-24-2014 |
20140215491 | SYSTEM AND METHOD FOR INTERNAL NETWORKING, DATA OPTIMIZATION AND DYNAMIC FREQUENCY SELECTION IN A VEHICULAR ENVIRONMENT - A system includes an on-board unit (OBU) in communication with an internal subsystem in a vehicle on at least one Ethernet network and a node on a wireless network. A method in one embodiment includes receiving a message on the Ethernet network in the vehicle, encapsulating the message to facilitate translation to Ethernet protocol if the message is not in Ethernet protocol, and transmitting the message in Ethernet protocol to its destination. Certain embodiments include optimizing data transmission over the wireless network using redundancy caches, dictionaries, object contexts databases, speech templates and protocol header templates, and cross layer optimization of data flow from a receiver to a sender over a TCP connection. Certain embodiments also include dynamically identifying and selecting an operating frequency with least interference for data transmission over the wireless network. | 07-31-2014 |
20140303807 | SYSTEM AND METHOD FOR REAL-TIME SYNTHESIS AND PERFORMANCE ENHANCEMENT OF AUDIO/VIDEO DATA, NOISE CANCELLATION, AND GESTURE BASED USER INTERFACES IN A VEHICULAR ENVIRONMENT - A method includes establishing communication channels between an on-board unit (OBU) of a vehicle and a plurality of nodes, tagging each of a plurality of data from the plurality of nodes with a priority level, storing the plurality of data in a priority queue according to respective priority levels, selecting a medium to present a first data of the plurality of data to a user, and presenting the first data to the user via the medium. In the method, the plurality of nodes includes a remote node and an in-vehicle device. Another method includes receiving a data from a remote node, generating a plurality of data streams from the data and transmitting the plurality of data streams across a plurality of wireless interfaces. Another method includes enhancing audio signals from a plurality of microphones and speakers. Yet another method includes various gesture based user interfaces coupled to the OBU. | 10-09-2014 |
20140328175 | UTILIZING LATENCY CONTROL TO ALLEVIATE BUFFERBLOAT - In one embodiment, a method includes estimating a current queuing latency, the estimated current queuing latency being associated with a queue of packets maintained in a buffer. The method also includes calculating a current drop or mark probability, the current drop or mark probability being associated with a probability that packets associated with the queue of packets will be dropped or marked. A rate at which the packets associated with the queue of packets are dequeued from the buffer is estimated in order to estimate the current queuing latency. The current drop or mark probability is calculated using the current estimated queuing latency. | 11-06-2014 |
Vinita Subramanian, Campbell, CA US
Patent application number | Description | Published |
---|---|---|
20090132518 | Automated re-ordering of columns for alignment trap reduction - An automated method to align column values to proper byte boundaries for rapid scanning in a parallel processing database system. A table definition is received having a logical order of fields. The fields are re-ordered to create a physical order of fields. The physical order of fields has fixed length fields having a same byte alignment requirement positioned adjacent to each other in descending order from largest size to smallest size, and wherein a first fixed length field in the physical order is aligned on a proper byte boundary. Other embodiments, aspects and features are also disclosed. | 05-21-2009 |
Viswanath Subramanian, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20120158712 | Inferring Geographic Locations for Entities Appearing in Search Queries - A server system associates one or more locations with a query by identifying the query, selecting a set of documents responsive to the query, and assigning weights to respective documents in the set of documents based, at least in part, on historical data of user clicks selecting search result links in search results produced for historical queries substantially the same as the identified query. Websites hosting the selected documents are identified, and, for each website, location-specific information for one or more locations is retrieved, including a location-specific score that corresponds to the likelihood that the respective location corresponds to a respective website. For each respective location for which location-specific information was retrieved, aggregating the location-specific scores, as weighted by the document weights, to compute an aggregated likelihood that the respective location is associated with the query. A specific location is assigned to the query when predefined criteria are satisfied. | 06-21-2012 |
Vivek Subramanian, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20090173985 | Dense arrays and charge storage devices - There is provided a monolithic three dimensional array of charge storage devices which includes a plurality of device levels, wherein at least one surface between two successive device levels is planarized by chemical mechanical polishing. | 07-09-2009 |
20110156044 | DENSE ARRAYS AND CHARGE STORAGE DEVICES - There is provided a monolithic three dimensional array of charge storage devices which includes a plurality of device levels, wherein at least one surface between two successive device levels is planarized by chemical mechanical polishing. | 06-30-2011 |
20120223380 | DENSE ARRAYS AND CHARGE STORAGE DEVICES - There is provided a monolithic three dimensional array of charge storage devices which includes a plurality of device levels, wherein at least one surface between two successive device levels is planarized by chemical mechanical polishing. | 09-06-2012 |
20140217491 | DENSE ARRAYS AND CHARGE STORAGE DEVICES - There is provided a monolithic three dimensional array of charge storage devices which includes a plurality of device levels, wherein at least one surface between two successive device levels is planarized by chemical mechanical polishing. | 08-07-2014 |
20150044833 | DENSE ARRAYS AND CHARGE STORAGE DEVICES - There is provided a monolithic three dimensional array of charge storage devices which includes a plurality of device levels, wherein at least one surface between two successive device levels is planarized by chemical mechanical polishing. | 02-12-2015 |
Vivek Subramanian, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20110019467 | VERTICALLY STACKED FIELD PROGRAMMABLE NONVOLATILE MEMORY AND METHOD OF FABRICATION - A memory cell is provided that includes a first conductor, a second conductor, a steering element that is capable of providing substantially unidirectional current flow, and a state change element coupled in series with the steering element. The state change element is capable of retaining a programmed state, and the steering element and state change element are vertically aligned with one another. Other aspects are also provided. | 01-27-2011 |
20120250396 | VERTICALLY STACKED FIELD PROGRAMMABLE NONVOLATILE MEMORY AND METHOD OF FABRICATION - A memory cell is provided that includes a steering element, and a non-volatile state change element coupled in series with the steering element. The steering element and state change element are disposed in a vertically-oriented pillar. Other aspects are also provided. | 10-04-2012 |
20130314970 | PILLAR-SHAPED NONVOLATILE MEMORY AND METHOD OF FABRICATION - A pillar-shaped memory cell is provided that includes a steering element, and a non-volatile state change element coupled in series with the steering element. Other aspects are also provided. | 11-28-2013 |
20140239248 | THREE-DIMENSIONAL NONVOLATILE MEMORY AND METHOD OF FABRICATION - A three-dimensional memory is provided that includes a first memory level and a second memory level monolithically formed above the first memory level. The first memory level includes a first steering element coupled in series with and vertically stacked above or below a first non-volatile state change element. The second memory level includes a second steering element coupled in series with and vertically stacked above or below a second non-volatile state change element. Other aspects are also provided. | 08-28-2014 |