Abstract: A location based assistant is provided on client device. The client device may activate a business-oriented operation system or a personal-oriented operating system based on a location of the apparatus, a time of day, or a user defined setting. Upon activation of the business-oriented operation system or the personal-oriented operating system, client device may interact and communicate with a business or personal calendar of a user, business or personal messages of the user, business or personal activities of the user.
Abstract: Message-based keyword, phrase, and/or object processing and resource allocation may perform functionality related to the message data, such as keywords, phrases, and/or objects (e.g., images, video, etc.). Based on the keywords, phrases, and/or objects, emails may be modified, project plans may be updated, calendar events may be created, and/or various notifications may be sent to allocate and notify human resources accordingly.
Abstract: A system, method, and computer readable medium for hybrid kernel-mode and user-mode checkpointing of multi-process applications. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Abstract: An operation comprising one or more of loading one or more primary applications and including said one or more primary applications in a synchronization point, halting execution of said one or more primary applications upon arriving at said synchronization point, triggering a migration of said one or more primary applications to one or more backup applications, wherein said migration starts when the execution of said one or more primary applications are halted at said synchronization point.
Abstract: A system, method, and computer readable medium for maintaining mappings between resources inside an isolated environment and outside the isolated environment for one or more applications. The system may include a plurality of lists of resources requested by the one or more applications during installation and while executing, and a corresponding lists of resources inside the isolated environment. The system may also include a list of resource exceptions, wherein the mappings between resources as requested by the applications and their corresponding values in the isolated environment are maintained subject to the list of exceptions.
Abstract: A voice encoder/decoder (vocoder) may provide receiving a voice sample and generating zero crossings of the voice sample in response to voice excitation in a first formant and creating a corresponding output signal. Additional operations may include dividing the output signal by two, and sampling the output signal at a predefined frequency such that a resulting combination uses half of a bit rate for an excitation and a remainder for short term spectrum analysis.
Abstract: A method, system and program product for remote scheduling of at least one job to run on a plurality of computers in a computer network. The job scheduler enables selection of a domain that includes at least a subset of the computers on which the job is to run. A list of computers in the selected domain is automatically generated. The computers on which the job is to run can be selected from the generated list of computers. A configuration file is created for storing an identification of the selected domain and the job to be run on the selected computers in the domain.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid touch event on a touch sensitive device. At least two touch events are received from a touch interface. The at least two touch events are combined if a time difference between each of the at least two touch events is less than a time threshold and a proximity between each of the at least two touch events is less than a proximity threshold. A valid touch event is determined if a combined pressure indicator of a combined touch event is greater than a pressure threshold.
Abstract: Code creation and revision requires optimal error detection and correction and collaboration among programmers. One example method of operation may include receiving and processing a comment associated with a first user profile, identifying a software code context of the comment based on a software code data file, identifying a number of other user profiles associated with the software code context of the comment, and transmitting request messages to the other user profiles to provide feedback regarding the software code context of the comment.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid sequence of touch events on a touch sensitive device. A first sequence of touch events is received, a proximity between any two touch events of the first sequence of touch events being greater than a proximity threshold. A second sequence of touch events is received. The touch events from the first and the second sequence are combined if a time difference between the first and the second sequence of touch events is below a time threshold and a proximity between the first and the second sequence of touch events is less than the proximity threshold. A valid sequence of touch events is determined if a combined pressure of the first and the second sequence of touch events is greater than a pressure threshold.
Abstract: The embodiments describe an apparatus for accessing a remote object. The apparatus includes a transceiver. The transceiver is configured to transmit a Domain Name Service request of the remote object to a Domain Name Service server and receive a Domain Name Service response comprising an Internet Protocol of the remote object. The transceiver is further configured to connect to the Internet Protocol of the remote object based on the Domain Name Service response.
Abstract: A method, apparatus and non-transitory computer readable storage medium, in one embodiment, associating at least one autonomous transport and at least one user, determining at least one characteristic of said at least one user based on at least one of at least one user search history and at least one user preference selection, determining at least one user location of said at least one autonomous transport and querying at least one adjacent entity based at least on said determined at least one characteristic within a predetermined range of said at least one user location.
Abstract: A system, method, and computer readable medium for processing short message service terminations in a communication system featuring an IP-based femtocell system are provided. The femtocell system includes a base transceiver station and a Session Initiation Protocol to Internet Operating System adapter. The Session Initiation Protocol to Internet Operating System adapter conveys the depacketized message content to the base transceiver station which transmits the message content to the user equipment.
Abstract: A system includes a multi-process application that runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing at least one of barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing may be incremental using Page Table Entry (PTE) pages and Virtual Memory Areas (VMA) information. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Abstract: To enable tracking of a document's history, each time an electronic document is opened, an embedding module obtains one or more document history parameters. The document history parameters may include a MAC address or the computer used to open the document, an operating system, a file size of the document, time of opening the document, a user ID, etc. The embedding module encrypts the document history parameters and embeds them into the document, for example using steganography techniques.
Abstract: A method and apparatus are disclosed that create an electronic form based on table data provided by Internet searching operations. One example may include determining at least one search term, querying, via a server, information provided by at least one network based on the search term, and copying at least one data table resulting from the information discovered during the querying operation. Additional operations may include parsing the at least one data table and storing the information in the server, displaying the data table to an end user so that the end user may select whether the data table should be included in the electronic form, and providing the user with the option to select and edit the contents of the data table. Upon the user's approval the data table may be copied into the electronic form.
Abstract: In order to manage stale data on a network of computer systems, a file harvester agent may be configured with a list of stale data files to be deleted. The file harvester agent may be deployed to the computer systems of a network. When executed in a computer system, the file harvester agent searches the file system of the computer system to locate any files or data indicated in the file list. Any located data files are deleted. Once the agent has finished processing the file list on a computer system, the agent can copy or replicate itself to other computer systems of the network in accordance with a pre-configured itinerary.
Abstract: Disclosed are an apparatus and method of transmitting a message to a plurality of data recipients subscribed to receive information from a leader. An example method of operation may include transmitting a message intended for the plurality of data recipients, analyzing content of the message to determine a category corresponding to the content and matching the message with the category. The method may also include determining that only a subset of the plurality of data recipients are configured to receive the message based on the determined category, and transmitting the message to the subset of the plurality of data recipients.
Abstract: The disclosed embodiments provide a system that processes data. The system includes a first client that encrypts a first set of data, uploads the encrypted first set of data to a volume on a cloud storage system, and creates a commit record of the upload. The system also includes a synchronization server that verifies access to the volume by the first client and includes the commit record in a change set containing a set of commit records associated with the volume. The synchronization server also signs the change set and provides the change set for use in synchronizing the upload with a second client.
Type:
Grant
Filed:
March 16, 2017
Date of Patent:
October 15, 2019
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
John Whaley, Thomas Joseph Purtell, II, Geoffrey G. Thomas
Abstract: Some embodiments provide a method for creating an image of a virtual machine. The method identifies a particular computer system operating as a virtual machine with a particular configuration on a hardware resource of a hosting system that includes several hardware resources. The method captures data representing the particular computer system. Capturing the data includes copying a particular section of the data, computing a checksum for the particular section of the data, and streaming the particular section with the computed checksum to a storage.
Type:
Grant
Filed:
January 16, 2018
Date of Patent:
October 15, 2019
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Paul Lappas, John M. Keagy, Justin Kitagawa