Abstract: Embodiments of the present invention pertain to reducing or eliminating speech recognition error when background noise is detected at a caller's location. For example, when background noise is detected at the caller's location, the caller may be prompted to use dual-tone multi-frequency (DTMF).
Abstract: To enable continuous execution of an application, a system and method for transferring an application state is provided. A gesture corresponding to a transfer act is detected by a gesture detection module in a first device executing the application. The first device communicates with a registration and relay server to determine eligible transfer recipients based on criteria such as location and/or devices that are currently executing the application. A transfer recipient is selected and platform independent application state Data Transfer Objects are generated that describe the state of execution on the first device. The application state DTOs are transferred via the server to the recipient device which enacts the application state DTOs to continue the execution of the application on the recipient device. Because the application state DTOs are platform independent, the application state can be transferred to almost any device that is able to execute the application.
Type:
Grant
Filed:
April 23, 2019
Date of Patent:
May 19, 2020
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Robert R. Hauser, Robert DeAnna, Paul Lipari
Abstract: A user interface configuration may permit a user to make selections while the interface is dynamically adjusting and reconfiguring its layout and appearance for optimized user satisfaction. One example method of operation may include receiving an input command on a first menu displayed on a touch receptive surface of a user device, selecting a menu item responsive to the received at least one input command and receiving an additional input command that is different from the first input command type. The method may also provide identifying the additional input command as a multiple item gesture command, and storing the multiple item gesture command in memory.
Abstract: Trend estimation for application-agnostic statistical fault detection of multi-process applications in environments with data trend includes at least one of: a multi-process application runs on a host. Statistical events are collected and sent to a statistical fault detector. The statistical fault detector creates one or more distributions and compares recent statistical event data to historical statistical event data and uses deviation from historical norm for fault detection. Trend is estimated, and if needed, removed from event data prior to the creation of distributions. Trend is estimated using spectral techniques, filter banks and Maximum Entry Spectral Estimation, and dominant frequencies are estimated and utilized to adapt to the environment.
Abstract: Disclosed are an apparatus and method of operating and allocating a shared memory between various applications operating via a processing computing platform. One example may include receiving a first buffer context switch request message from a first application operating via a processor, transmitting a first buffer context switch flag to the processor operating the application confirming the first buffer context switch request was received, receiving a second buffer context switch request from a second application with a different processing cycle operating via the processor and transmitting a second buffer context switch flag to the processor operating the second application confirming the second buffer context switch request was received. Once the applications have been identified and confirmed, a synchronization operation may be performed to create a shared number of memory units between at least two different buffers and provide the shared memory units to the first application and the second application.
Abstract: An example operation may include one or more of determining appropriate emojis on at least one user's originating device by interfacing with the application and data of the user's originating device, performing a search of the at least one user's data to obtain actions relevant to the at least one user of the system, determining an action associated with the emoji, setting at least one of the determined emojis as a system emoji, and transmitting the determined emojis from the user's originating device to a system network as an emoji stream.
Abstract: A method, apparatus and non-transitory computer readable medium that, in one embodiment, interprets a user motion sequence comprises beginning a session, capturing the user motion sequence via a motion capturing device during the session, processing, via a processor, the user motion sequence into a predetermined data format, comparing the processed user motion sequence to at least one predetermined motion sequence stored in a database and determining whether to perform at least one of interpreting the user motion sequence as a universal command and registering the user motion sequence as a new command.
Abstract: A method and system for automating application of software patches to a server system having a virtualization layer. A plurality of software patches are downloaded to a computer system having a first operating system. The software patches to apply to a server console operating system are then determined. The software patches are automatically copied to the server system by executing a first script file. The copied software patches are automatically decompressed by executing a second script file. The decompressed software patches are installed in a specified order by executing the second script file. The console operating system is rebooted only after all software patches are installed.
Abstract: A system according to an embodiment of the present invention includes at least two virtual machines running on a hardware platform using either a hosted or a bare metal hypervisor. The virtual machines may communicate with an agent-server resident in the host operating system or in one of the virtual machines to switch control of the hardware component, such as graphics hardware, from one virtual machine to another.
Type:
Grant
Filed:
September 11, 2018
Date of Patent:
May 12, 2020
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Wing-Yee Au, Alan Rowe, Sameer Narkhede
Abstract: Disclosed are an apparatus and method of verifying an application installation procedure. One example method of operation may include receiving an application at a computer device and initiating the installation of the application on the computer device. The method may also provide executing the application during the installation procedure and creating a hash value corresponding to the executed application data. The method may further provide storing the hash value in memory and comparing the hash value to a pre-stored hash value to determine whether to continue the installation of the application.
Abstract: A system and method thereof for performing loss-less migration of an application group. In an exemplary embodiment, the system may include a high-availability services module structured for execution in conjunction with an operating system, and one or more computer nodes of a distributed system upon which at least one independent application can be executed upon. The high-availability services module may be structured to be executable on the one or more computer nodes for loss-less migration of the one or more independent applications, and is operable to perform checkpointing of all state in a transport connection.
Type:
Grant
Filed:
July 24, 2018
Date of Patent:
April 28, 2020
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Keith Richard Backensto, Allan Havemose
Abstract: The present disclosure relates to distributed computing systems, and methods and devices relating thereto, said systems comprising a plurality of distributed computing hosts that process client requests from a computing client; and a programmable network switch, comprising two or more network ports for communicatively interfacing said plurality of distributed computing hosts and said computing client, said programmable network switch operable to forward client requests to a given network port based on forwarding rules related to client source addresses; wherein the programmable network switch replaces a request destination address with an incoming network port indicator that identifies on which network port a given client request is received; and wherein the programmable network switch forwards, without reference to the forwarding rules, request responses to the network port associated with the request source address and replaces the response source address with the request destination address associated with
Abstract: Batch, or “offline”, blocking takes a set of records and generates sets (or blocks, hence the name blocking) of potentially matching records for the entire set. The blocks of potential matches are then passed to a matching process to evaluate which records match. Applications include but are not limited to individual matching such as student identification, householding, business matching, supply chain matching, financial matching, news or text matching, and other applications.
Type:
Grant
Filed:
January 19, 2011
Date of Patent:
April 21, 2020
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Andrew Borthwick, Arthur Goldberg, Put Cheung, Adam Winkel
Abstract: A system includes a multi-process application that runs. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of at least one of a kernel-mode checkpointer module and one or more user-space interceptors providing at least one of barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing may be incremental using Page Table Entry (PTE) pages and Virtual Memory Areas (VMA) information. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Type:
Grant
Filed:
July 10, 2018
Date of Patent:
April 21, 2020
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Keith Richard Backensto, Allan Havemose
Abstract: Systems, apparatuses, methods, and computer programs for overprovisioning resources are disclosed. Resource usage statistics may be gathered for a plurality of client virtual machines (“VMs”). Statistical characteristics of resource usage by the plurality of client VMs may be calculated. It may also be determined which of the plurality of client VMs requesting resources to allocate resources to, as well as an amount of the resources to allocate, in a given time slot based on the calculated statistical characteristics.
Abstract: Certain aspects of the present disclosure relate to a computer implemented method for executing application code to connect with a social networking website, the method including analyzing information from at least a user that is in conversation. At least a word is filtered from the analyzed information. A tag is generated from the filtered word. The tag is connected with at least a media file, and a link is added to the media file and the tag to the display of the conversation in the social networking website.
Abstract: A system, method, and computer readable medium for hybrid kernel-mode and user-mode checkpointing of multi-process applications using a character device. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Abstract: One or more embodiments of the present invention include a memory and a processor. The memory includes a plurality of files, a master cluster record, and an operating system. The processor is configured to execute the operating system in order to locate and load each cluster of a file. Each file includes a plurality of clusters and each cluster includes a first pointer and a second pointer. The first pointer is linked to a previous cluster of a file and second pointer is linked to a subsequent cluster of the file using a double linked list data structure.
Abstract: A method, system, and program product are provided for updating software deployed on computers in an enterprise computer network wherein each computer has a software update agent installed to enable the computer to receive software patch updates. The method includes determining a required software component and updates; determining a version of the agent and updating the agent if required; selecting a server from which required updates are to be downloaded; scanning a plurality of software components on a selected computer and comparing the components with updates available on the server to determine required updates; downloading the required patches from the server; and installing the patches on the selected computer. The system includes components that perform the method steps when operated on a computer in the network. A computer readable medium implements the method for updating software deployed on computers in a network.
Abstract: Cloud migration may be performed by identifying applications that are currently operating in the enterprise and performing certain determinations as to whether those applications are proper candidates for the migration to the cloud. One example method of operation may provide identifying at least one application operating on an enterprise network, retrieving current usage data of the at least one application, comparing the current usage data of the at least one application to a threshold amount of usage data to determine whether the application has exceeded the threshold amount of usage data. Next, the creation of an instance process may be performed on an entity operating outside the enterprise network and the application may be operated via the instance process and otherwise terminated in the enterprise network to alleviate resources.