Patents Assigned to The System, Inc.
  • Publication number: 20140136683
    Abstract: An appliance receives packets that are part of a flow pair, each packet sharing an application protocol. The appliance determines an estimated application protocol of the packets without performing deep packet inspection on any packets. The estimated application protocol may be determined by using an application protocol estimation table. The appliance then predicts the inter-packet interval between a packet previously received by the appliance and a next packet not yet received by the appliance. The inter-packet interval may be determined by using an inter-packet interval prediction table. The appliance then preloads packet flow data in a cache before the next packet is predicted to arrive at the appliance. Upon receiving the next packet, the packet flow data is preloaded in the cache. This reduces packet processing time by removing waiting periods previously required to cache packet flow data from an external memory after receiving the next packet.
    Type: Application
    Filed: November 13, 2012
    Publication date: May 15, 2014
    Applicant: Netronome Systems, Inc.
    Inventors: Gavin J. Stark, Nicolass J. Viljoen, Niel Viljoen
  • Publication number: 20140136666
    Abstract: Technology for decomposing an application into fragments and streaming the application in fragments is disclosed herein. According to at least one embodiment, a computer-implemented method includes steps of running an intermediary application at a mobile device to enable the mobile device to run the video game application by running multiple game application fragments, the intermediary application acting as an intermediary between the video game application and the game application fragments by determining a next game application fragment for each of the game application fragments; running, at the mobile device, an instance of the video game application by running a first application fragment of the game application fragments at the mobile device; requesting, by the intermediary application, a second application fragment of the game application fragments corresponding to a second portion of the video game application; and receiving, at the mobile device, the second application fragment.
    Type: Application
    Filed: January 21, 2014
    Publication date: May 15, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Justin Quan, Michael A. Chan
  • Publication number: 20140136481
    Abstract: Techniques for a method for automatically synchronizing application state across multiple devices are disclosed herein. The method includes running an instance of a computer application at a first electronic device, detecting a presence of a second electronic device based on a proximity of the second electronic device to the first electronic device, identifying an installation of another instance of the computer application on the second electronic device, and transmitting an application state data to the second electronic device. The application state data represents an application state of the computer application at the first electronic device. The application state data of the computer application enables another instance of the computer application at the second electronic device to resume running the computer application from the transmitted application state.
    Type: Application
    Filed: January 17, 2014
    Publication date: May 15, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Justin Quan, Michael A. Chan, Tom Moss, Michael K. Fleming
  • Publication number: 20140135105
    Abstract: Techniques for a method for automatically synchronizing application state of a video game across multiple devices are disclosed herein. The method includes running an instance of the video game application at a first electronic device, detecting a presence of a second electronic device based on a proximity of the second electronic device to the first electronic device, identifying an installation of another instance of the video game application on the second electronic device, saving a current state of play of the instance of the video game application running on the first electronic device and transmitting the application state data to the second electronic device. The application state data of the video game application enables another instance of the video game application to resume the current state of play of the video game application at the second electronic device.
    Type: Application
    Filed: January 17, 2014
    Publication date: May 15, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Justin Quan, Michael A. Chan, Tom Moss, Michael K. Fleming
  • Publication number: 20140130434
    Abstract: A system and method for forming a wall is disclosed. In some embodiments, the wall comprises blocks having internal couplers configured for use with rods which can be inserted through and which are configured to securely lock blocks together. In some embodiments, the rods which are inserted into internal couplers may be threaded or have another locking features such that the blocks in a wall can be securely fastened together.
    Type: Application
    Filed: January 21, 2014
    Publication date: May 15, 2014
    Applicant: Tie-Cast Systems, Inc.
    Inventor: Barry G. Speer
  • Publication number: 20140136814
    Abstract: A transactional memory (TM) receives a lookup command across a bus from a processor. The command includes a memory address, a starting bit position, and a mask size. In response to the command, the TM pulls an input value (IV). The memory address is used to read a word containing multiple result values (RVs) and multiple threshold values (TVs) from memory. A selecting circuit within the TM uses the starting bit position and mask size to select a portion of the IV. The portion of the IV is a lookup key value (LKV). The multiple TVs define multiple lookup key ranges. The TM determines which lookup key range includes the LKV. A RV is selected based upon the lookup key range determined to include the LKV. The lookup key range is determined by a lookup key range identifier circuit. The selected RV is selected by a result value selection circuit.
    Type: Application
    Filed: November 13, 2012
    Publication date: May 15, 2014
    Applicant: Netronome Systems, Inc.
    Inventor: Gavin J. Stark
  • Publication number: 20140132922
    Abstract: An ophthalmic system for use in performing angular measurements in relation to a patient's eye. The ophthalmic system can include an optical angular measurement device that can provide angular indicia by, for example, projecting an image of an angular measurement reticle onto a patient's eye or by superimposing an image of an angular measurement reticle onto an image of the patient's eye. The ophthalmic system can include an optical refractive power measurement device for providing desired angular orientations for ocular implants or for incisions. The ophthalmic system can be used, for example, to align a toric intraocular lens to a desired angular orientation.
    Type: Application
    Filed: October 4, 2013
    Publication date: May 15, 2014
    Applicant: WaveTec Vision Systems, Inc.
    Inventors: Thomas D. Padrick, Jack T. Holladay, Dan Bao Tran, Aric K. Plumley, Richard J. Michaels, Jeff Padgett
  • Publication number: 20140134581
    Abstract: An assessment is provided to identify an individual's derailers of interpersonal behavior and provide a fine-grained analysis of the identified derailers. The assessment provides a score for a number of potentially negative aspects, i.e., derailers, where each aspect is represented as a scale. A subscale structure provides additional insights about specific facets of potentially negative behavior related to each aspect. The assessment provides scores for the subscale facets to illustrate the facets most contributing to the respective potentially negative aspect of interpersonal behavior. An elevated subscale score serves as an indication that the individual is at risk for the respective facet.
    Type: Application
    Filed: November 9, 2012
    Publication date: May 15, 2014
    Applicant: Hogan Assessment Systems, Inc.
    Inventors: Robert Travis Hogan, Joyce Cummings Hogan
  • Publication number: 20140130575
    Abstract: An apparatus for generating a signal representing one of the density and the pressure of gas within a high voltage circuit breaker based on a dial position of a pressure switch includes a clip configured to mechanically couple to the dial, the clip including a magnet, and lens assembled into the switch between the switch housing and an outer component of the switch. The lens includes a sensor positioned within a cavity of the lens in alignment with the clip magnet to detect the position of the pressure switch dial from a magnetic orientation of the magnet, and circuitry for converting the detected position into an electric signal.
    Type: Application
    Filed: November 8, 2013
    Publication date: May 15, 2014
    Applicant: Franklin Fueling Systems, Inc.
    Inventors: James A. Webber, John P. Eastman
  • Publication number: 20140135799
    Abstract: Devices and methods are disclosed for retrieving an implant or tissue anchor during the course of a percutaneous medical procedure. An implant is provided having a retrieval tether attached to it. The retrieval tether is attached to the implant on one end, and the proximal end of the tether can be threaded through an implant retrieval device. The retrieval device comprises an inner elongate body that is used to capture and secure the retrieval tether. The retrieval device also comprises an outer elongate body that may be configured to be advanced over the retrieval tether from a location remote from the implant (e.g., outside a patient's body) to contact and retrieve the implant after it has been deployed and/or implanted within a patient's body.
    Type: Application
    Filed: February 17, 2012
    Publication date: May 15, 2014
    Applicant: Guided Delivery Systems Inc.
    Inventor: Jennifer Lake Henderson
  • Publication number: 20140133649
    Abstract: Traditionally, echo cancellation has employed linear adaptive filters to cancel echoes in a two way communication system. The rate of adaptation is often dynamic and varies over time. Disclosed are novel rates of adaptation that perform well in the presence of background noise, during double talk and with echo path changes. Additionally, the echo or residual echo can further be suppressed with non-linear processing performed using joint frequency-time domain processing.
    Type: Application
    Filed: January 21, 2014
    Publication date: May 15, 2014
    Applicant: CONEXANT SYSTEMS, INC.
    Inventors: Youhong Lu, Trausti Thormundsson, Yair Kerner, Ragnar H. Jonsson
  • Publication number: 20140136855
    Abstract: A device includes a key store memory that stores one or more cryptographic keys. A rule set memory stores a set of rules for accessing the cryptographic keys. A key store arbitration module grants access to the cryptographic keys in accordance with the set of rules. The device can be used in conjunction with a key ladder. The device can include a one-time programmable memory and a load module that transfers the cryptographic keys from the one one-time programmable memory to the key store memory and the set of rules to the rule set memory. A validation module can validate the cryptographic keys and the set of rules stored in the key store and rule set memories, based on a signature defined by a signature rule.
    Type: Application
    Filed: October 8, 2013
    Publication date: May 15, 2014
    Applicant: ViXS Systems, Inc.
    Inventors: Paul D. Ducharme, Wendy Wai Yin Cheung, Albert Yunsang Wong, Shijun Huang, Norman V.D. Stewart
  • Publication number: 20140136664
    Abstract: Technology for decomposing an application into fragments and streaming the application in fragments is disclosed herein. According to at least one embodiment, a computer-implemented method includes steps of determining multiple application fragments of a computer application, wherein each application fragment of the application fragments includes a code to present at least one interface of the computer application; storing the application fragments at a storage device; generating a resource dependency data structure, wherein for each specific application fragment of the application fragments, the resource dependency data structure includes identifications of resources that are needed for running the specific application fragment; and streaming, via a network component, at least one application fragment of the application fragments to a computing device.
    Type: Application
    Filed: January 17, 2014
    Publication date: May 15, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Justin Quan, Michael A. Chan
  • Publication number: 20140134611
    Abstract: The present invention relates to a method for amplifying and detecting a target nucleic acid in a sample, said target nucleic comprising subgroups with sequence variations and/or individual mutations, wherein an amplification of the nucleic acids in said sample is carried out. This amplification involves a polymerase, primers for generating an amplicon and at least two detectable probes specific for different sequence portions of said amplicon. Detection of the obtained amplicon is brought about by detecting hybridization of the probes mentioned above to said different sequence portions of the amplicon. The invention further provides reaction mixtures and kits for amplifying and detecting a target nucleic acid comprising subgroups with sequence variations and/or individual mutations involving the use of at least two detectable probes specific for different sequence portions of an amplicon.
    Type: Application
    Filed: October 16, 2013
    Publication date: May 15, 2014
    Applicant: ROCHE MOLECULAR SYSTEM, INC.
    Inventors: Frank Bergmann, Dorothea Sizmann, Heike Zitzer
  • Publication number: 20140135023
    Abstract: Area event triggers are handled by receiving an original area event trigger with an initial target area within a given mobile network, for a given target mobile device. When the target mobile device is outside the mobile network serving the target area, a first changed area event trigger based on entry into the given mobile network is transmitted to the given target mobile device. When the first changed area event trigger becomes satisfied, a second changed area event trigger is generated based on entry into the initial target area, and transmitted to the given target mobile device. The second changed area event trigger may be based on entry into a region larger than, but including, the initial target area. Then when the second changed area event trigger becomes satisfied, the original area event trigger may be transmitted to the target mobile device.
    Type: Application
    Filed: January 22, 2014
    Publication date: May 15, 2014
    Applicant: TeleCommunication Systems, Inc.
    Inventors: Yinjun Zhu, Paul Thompson
  • Publication number: 20140136445
    Abstract: A system for securities lending data management aggregates securities lending transaction data across a plurality of firms. The data comprises records including parameters for securities lending transactions entered into by individual firms. The system queries the data in order to identify instances wherein for a record of a transaction engaged by one firm, there is no corresponding record for another firm indicating a counterparty. The system compares instances of such orphan records in order to identify instances wherein the parameters for an orphan record corresponds to the parameters of another orphan record with the exception of perhaps one or two parameter values. The system outputs a listing of such instances and receives input confirming or invalidating that the identified orphan records correspond to the same transaction.
    Type: Application
    Filed: November 15, 2012
    Publication date: May 15, 2014
    Applicant: SUNGARD DATA SYSTEMS INC.
    Inventors: Valarie Thorgerson, Payman Khodabandehloo, David Sean Van Anglen, Dmytro Vorobey
  • Publication number: 20140137101
    Abstract: Technology disclosed herein includes a method for loading a network specific operating system (OS) onto a computing device depending on a specific network the computing device is connected to. The computing device can connect to multiple networks, e.g., different networks at different times or multiple networks simultaneously. When the computing device switches from a first network to a second network, an OS specific to the second network is automatically installed on the computing device. When the computing device connects to more than one network simultaneously policies may be defined to determine which specific OS distribution is to be installed on the computing device.
    Type: Application
    Filed: January 17, 2014
    Publication date: May 15, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Tom Moss, Justin Quan
  • Publication number: 20140137102
    Abstract: Technology disclosed herein includes a method for loading a carrier specific operating system (OS) onto a computing device depending on what network the computing device is connected to. The computing device detects an identity of a network to which a computing device is connected or is to be connected during a network identification process executed on the computing device. The network can be identified, e.g., by examining a subscriber identification module (SIM) card electronically connected to the device. The device then sends a request including the identity of the network to a remote registration service. In turn the device receives an instruction from the remote registration service identifying a distribution of an OS specific for the network. After retrieving the OS distribution, the device loads the distribution of the OS on the computing device. Specific OS distribution is chosen based on predefined policies when the device connects to multiple networks.
    Type: Application
    Filed: January 16, 2014
    Publication date: May 15, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Tom Moss, Justin Quan
  • Publication number: 20140133315
    Abstract: The present invention is directed towards a method for using a listening policy for a virtual server on an intermediary device. An intermediary device establishes for a first virtual server a first listening policy with an expression for evaluating packets received by the intermediary device to determine whether the packet may access the first virtual server. The intermediary device listens for packets at a first internet protocol (IP) address and a first port specified for the first virtual server. Then, the intermediary device evaluates the expression of the first listening policy to a first packet received at the first IP address and first port and determines whether to provide the first packet to the first virtual server based on a result of the evaluation.
    Type: Application
    Filed: January 23, 2014
    Publication date: May 15, 2014
    Applicant: Citrix Systems, Inc.
    Inventors: Dinesh Gandhewar, Josephine Suganthi
  • Publication number: 20140136830
    Abstract: Technology disclosed herein includes a method for loading a carrier specific OS onto a computing device depending on what network the computing device is connected to. The computing device detects an identity of a network to which a computing device is connected or is to be connected during a network identification process executed on the computing device. The network can be identified, e.g., by examining a subscriber identification module (SIM) card electronically connected to the computing device. The device then sends a request including the identity of the network to a remote registration service. In turn the device receives an instruction from the remote registration service identifying a distribution of an operating system (OS) specific for the network. After retrieving the OS distribution, the device loads the distribution of the operating system on the computing device.
    Type: Application
    Filed: January 16, 2014
    Publication date: May 15, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Tom Moss, Justin Quan