Patent application number | Description | Published |
20080313318 | PROVIDING ENHANCED DATA RETRIEVAL FROM REMOTE LOCATIONS - Techniques are described for providing client computing nodes with enhanced access to data from remote locations, such as by providing and using local capabilities specific to the remote locations. In at least some situations, the access of a client computing node to data from a remote location may be enhanced by automatically performing activities local to the client computing node that improve the efficiency of communications sent between the client computing node and the remote location. As one example, access to data from a remote service may be enhanced by locally performing activities specific to the remote service, such as by using information about the remote service's internal mechanisms to cause the desired data to be provided from internal storage devices of the remote service without passing through front-end or other intermediate devices of the remote service while traveling to the client computing node. | 12-18-2008 |
20090307106 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20090307107 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20090307134 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20090307135 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20100174731 | Distributed Storage System With Web Services Client Interface - A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node. | 07-08-2010 |
20100312871 | Executing Programs Based on User-Specified Constraints - Techniques are described for managing execution of programs on multiple computing systems, such as based at least in part of user-specified constraints. For example, constraints related to execution of a program may be based on a desired relative location of a host computing system to execute a copy of the program with respect to an indicated target (e.g., computing systems executing other copies of the program or copies of another indicated program), on particular geographic locations, and/or on factors not based on location (e.g., cost of use of a particular computing system, capabilities available from a particular computing system, etc.). Some or all of the multiple computing systems may be part of a program execution service for executing multiple programs on behalf of multiple users, and each may provide multiple virtual machines that are each capable of executing one or more programs for one or more users. | 12-09-2010 |
20110161293 | DISTRIBUTED STORAGE SYSTEM WITH WEB SERVICES CLIENT INTERFACE - A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node. | 06-30-2011 |
20120226712 | Distributed Storage System With Web Services Client Interface - A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node. | 09-06-2012 |
20120296827 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 11-22-2012 |
20130013571 | MANAGEMENT OF OBJECT MAPPING INFORMATION CORRESPONDING TO A DISTRIBUTED STORAGE SYSTEM - Systems and methods for managing mapping information for objects maintained in a distributed storage system are provided. The distributed storage system can include a keymap subsystem that manages the mapping information according to object keys. Requests for specific object mapping information are directed to specific keymap coordinators within the keymap subsystem. Each keymap coordinator can maintain a cache for caching mapping information maintained at various information sources. To manage the cache, the keymap system can utilize information placeholders that replace previously cached keymap information while a request to modify keymap information is being processed by the information sources. Each keymap coordinator can process subsequently received keymap information read requests in the event an information placeholder is cached as the current cached keymap information. | 01-10-2013 |
20130212165 | DISTRIBUTED STORAGE SYSTEM WITH WEB SERVICES CLIENT INTERFACE - A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node. | 08-15-2013 |
20130238504 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 09-12-2013 |
20150067111 | PROVIDING ENHANCED DATA RETRIEVAL FROM REMOTE LOCATIONS - Techniques are described for providing client computing nodes with enhanced access to data from remote locations, such as by providing and using local capabilities specific to the remote locations. In at least some situations, the access of a client computing node to data from a remote location may be enhanced by automatically performing activities local to the client computing node that improve the efficiency of communications sent between the client computing node and the remote location. As one example, access to data from a remote service may be enhanced by locally performing activities specific to the remote service, such as by using information about the remote service's internal mechanisms to cause the desired data to be provided from internal storage devices of the remote service without passing through front-end or other intermediate devices of the remote service while traveling to the client computing node. | 03-05-2015 |
Patent application number | Description | Published |
20080248474 | AMPLIFICATION METHODS - Methods are provided for amplification and monitoring of oligonucleotide amplification in which a primer has an overlap with one or more bases of a detection probe. | 10-09-2008 |
20100137614 | NEGATIVELY CHARGED MINOR GROOVE BINDERS - The present invention provides a negatively charged minor groove binding compound, oligonucleotide conjugates comprising the same, and methods for using the same. The negatively charged minor groove binding compounds of the present invention comprises an acidic moiety that is capable of being ionized under physiological conditions. In particular, the negatively charged minor groove binding compound of the present invention comprises a binding moiety that binds preferentially into a minor groove of a double, triple or higher stranded DNA, RNA, PNA or hybrids thereof. The binding moiety comprises at least one aryl moiety and an acidic moiety which is covalently attached to a phenyl portion of the aryl moiety or to a heteroatom of a heteroaryl portion of the aryl moiety. | 06-03-2010 |
20100174058 | FLUORESCENT QUENCHING DETECTING REAGENTS AND METHODS - Oligonucleotide probes containing two labels are provided and are useful in hybridization assays. The probes can also contain a minor groove binding group. | 07-08-2010 |
20110027780 | AMPLIFICATION METHODS - Methods are provided for amplification and monitoring of oligonucleotide amplification in which a primer has an overlap with one or more bases of a detection probe. | 02-03-2011 |
20110172289 | MINOR GROOVE BINDER (MGB)-OLIGONUCLEOTIDE MIRNA ANTAGONISTS - Compositions and methods for inhibiting the actions of non-coding RNAs such as miRNAs and piRNAs are provided. The compositions comprise single or double stranded oligonucleotides conjugated with Minor Groove Binders (“MGBs”). The oligonucleotides can vary in length, can contain nucleotides having one or more modifications, and have regions that are substantially complementary to one or more mature miRNAs or piRNAs. | 07-14-2011 |
20120245219 | MINOR GROOVE BINDER (MGB)-OLIGONUCLEOTIDE MIRNA ANTAGONISTS - Compositions and methods for inhibiting the actions of non-coding RNAs such as miRNAs and piRNAs are provided. The compositions comprise single or double stranded oligonucleotides conjugated with Minor Groove Binders (“MGBs”). The oligonucleotides can vary in length, can contain nucleotides having one or more modifications, and have regions that are substantially complementary to one or more mature miRNAs or piRNAs. | 09-27-2012 |