Abstract: Particular embodiments establish static redirection of a function that is a member of a class to an alternate implementation of the function. A software tool executing on a computer server receives an executable file for an application and a location for an alternate implementation of the function. The function may be written in Objective C. The software tool can be used to locate a structure for the function by traversing serialized metadata in the executable file. The software tool can then be used to modify the metadata in the executable file by updating the value of a selector indicating the location of a current implementation of the function to indicate a location of the alternate implementation. The selector may be included in a element of the structure for the class method. Finally, the application may provide the modified executable file for installation on client devices.
Abstract: In one example implementation, a method for generating persistent pointers using non-volatile random access memory (NVRAM) compiler directives in a program for NVRAM based computing systems includes generating a program including modified variables. The modified variables include NVRAM compiler directives indicative of persistent pointer type. The method further includes generating assembly code, including persistent pointer enablers, using the program including the modified variables by a compiler.
Type:
Grant
Filed:
January 30, 2014
Date of Patent:
October 23, 2018
Assignee:
Hewlett Packard Enterprise Development LP
Inventors:
Shyam Sankar Gopalakrishnan, Pramod Kumar Mangalore, Prashanth K E, Sandesh V Madhyastha
Abstract: This invention relates to a method and apparatus for updating software. In particular this invention relates to a method, system and computer program for updating an operating system in a hypervisor comprising: determining a new version of a component of the operating system; installing the new component version; measuring an identifying characteristic of the component and making it available to an attestation system; notifying the attestation system that a component has been updated to a new version whereby, when the attestation system finds that the identifying characteristic of the new component does not match a pre-stored attestation value it is aware that a legitimate mis-match could have occurred.
Type:
Grant
Filed:
January 12, 2016
Date of Patent:
October 23, 2018
Assignee:
International Business Machines Corporation
Inventors:
David A. Gilbert, David Haikney, James W. Walker
Abstract: A method, apparatus and system for achieving visual programming of interaction workflows for customer contact centers which eliminates the need for skilled computer telephony interaction programmers to program the screen pops and workflows that are presented to live-agent customer service representatives in a contact center. Further, the disclosed method and apparatus enables integration of contact information from omni-channel systems, as well as customer relationship management (“CRM”) data, data collected from interactive voice response (“IVR”) systems, and data pulled from third-party databases, into the screen pops and workflows in a way that is agnostic as to the type or protocol of the PBX switch, the IVR system and the CRM system utilized by a particular call center, by facilitating a level of abstraction and data flow between and among these components.
Abstract: An electronic device is provided. The electronic device includes a processor configured to execute an application, and a display configured to display a first window corresponding to the application, wherein, in response to a specified event, the processor is further configured to adjust a transparency of the first window and to output, to a lower layer than a layer of the first window, a second window overlapping at least a part of an area of the first window.
Type:
Grant
Filed:
December 8, 2015
Date of Patent:
October 16, 2018
Assignee:
Samsung Electronics Co., Ltd.
Inventors:
Hwi Woong Kim, Dae Hwan Kim, Hyun Ho Kim, Go Un Lee
Abstract: Technical solutions are described for verifying translatability compliance of a new code for a computer program product includes receiving a notification about a check-in request for the new code, and in response determining whether to verify the translatability compliance of the new code. The method further includes, in response to the translatability compliance being verified, determining whether the new code includes a hardcoded message. Further, in response to identifying the hardcoded message, the method includes sending a warning notification to a developer of the new code. Also, the method includes enabling the check-in of the new code in response to the translatability compliance not being verified.
Type:
Grant
Filed:
October 7, 2016
Date of Patent:
October 9, 2018
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
Yang Fan, Patrick L. Glenski, Syed I. Haiderzaidi, Su Liu
Abstract: Embodiments can enable the uploading of a newer version of a plugin package to a plugin service without affecting an existing user session that is using an older version of the plugin package. When a new user session begins, the plugin service can monitor one or more plugin packages and the versions used during the new user session. Throughout the user session, the plugin service continues to make the plugin packages available to the user regardless of newer versions being uploaded to the plugin service. In the meantime, multiple clients with different user sessions may be using different and possibly newer versions of the plugin packages at the same time. The plugin service can remove an older version of a plugin package when it determines that there are no longer any active user sessions utilizing the older version of the plugin package.
Type:
Grant
Filed:
January 31, 2017
Date of Patent:
October 9, 2018
Assignee:
Oracle International Corporation
Inventors:
Arun Lakshminarayan Katkere, Bo Jonas Birger Lagerblad
Abstract: An automatic code generator that may be located at a server may generate code to handle crowdsourced data. The crowdsourced data may come from members of the public using automatic data collection technology on mobile devices, in one embodiment.
Abstract: Embodiments of the present invention are directed toward apparatuses, systems and methods of switching operating systems. The present invention includes a multi-OS runtime with virtualization technology, which allows applications developed for different operating systems to execute simultaneously, side-by-side, on the same computing device. The computing device typically includes a host operating system and at least one guest operating system. An application, which is disguised as a host operating system specific application on the host operating system, is configured to be installed and executed within the guest operating system. Host operating system based policies can be set for the application. The application can be launched from the host operating system, the guest operating system or both. The computing device allows for the ability to switch between different operating systems via a soft button, a hard button, or based on a configuration of the computing device, or a combination thereof.
Type:
Grant
Filed:
May 23, 2012
Date of Patent:
October 2, 2018
Assignee:
Bluestack Systems, Inc.
Inventors:
Suman Saraf, Harvinder Singh Sawhney, Sharad Agrawal, Ambreesh Bangur, David P. Reese, Jr.
Abstract: One method for managing encryption includes identifying an available or a secure mode. During restarts a passphrase must be entered in secure mode but not in available mode. Further, a master key is created for encrypting volume keys, where master and volume encryption keys are not stored in non-volatile memory (NVRAM) nor in disk storage. A half-key is created by encrypting the master key with a secure key, the secure key and the encrypted volume encryption keys being stored in disk storage. The half-key is stored in NVRAM only in available mode but not in secure mode. The master key is recreated during a restart when operating in the available mode by decrypting the NVRAM half-key with the secure key from disk storage. Further, the passphrase must be entered by an operator to recreate the half-key and the master key during a restart in the secure mode.
Type:
Grant
Filed:
May 12, 2016
Date of Patent:
October 2, 2018
Assignee:
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventors:
John Kent Peacock, Tomasz Barszczak, Brian Rowe
Abstract: A semiconductor integrated circuit operates with a voltage supplied from a first power supply IC to transmit and receive data to and from an external memory. The semiconductor integrated circuit includes: an interface circuit operating with a voltage supplied from a second power supply IC and accessing the external memory to transmit and receive data to and from the external memory; a determination circuit which determines, based on a result of the access by the interface circuit, an AC timing specification between the external memory and the interface circuit to generate control information for controlling an output voltage of the second power supply IC in accordance with the AC timing specification; and a voltage control circuit which controls the output voltage of the second power supply IC in accordance with the control information.
Abstract: Certain aspects of the present disclosure relate to a method and apparatus for visualizing events received and processed by a plurality of software agents in a distributed system.
Type:
Grant
Filed:
August 4, 2015
Date of Patent:
September 25, 2018
Assignee:
International Business Machines Corporation
Inventors:
James L. Lentz, David D. Martin, Jung W. Van, Yee Pin Yheng
Abstract: In one embodiment, the present invention includes an apparatus having a core including functional units each to execute instructions of a target instruction set architecture (ISA) and a power controller to control a power mode of a first functional unit responsive to a power identification field of a power instruction of a power region of a code block to be executed on the core. Other embodiments are described and claimed.
Abstract: A disclosed communication apparatus includes a receiving unit that receives metadata of update data used for an update; a determination unit that determines, based on a description of the metadata, whether or not there is update data that is subject to advance download in which download of the update data is executed before a point of time at which the update is able to start; a control unit that determines whether or not it is timing to perform the advance download; and an update processing unit that downloads the update data in a case in which the determination unit determines that there is the update data that is subject to the advance download and the control unit determines that it is the timing to perform the advance download.
Abstract: Dynamic power control embodiments concern a data processing pipeline. First and second pipeline stages respectively receive first and second clock signals. The first and second pipeline stages are configured to perform first and second operations respectively triggered by first timing edges of the first clock signal and second timing edges of the second clock signal. A clock controller is configured to generate the first and second clock signals. The clock controller is capable of operating in a first mode in which, during a first data processing cycle of the data processing pipeline, a first of the first timing edges is in-phase with a first of the second timing edges. The clock controller is also capable of operating in a second mode in which, during a second data processing cycle of the data processing pipeline, a second of the first timing edges is out of phase with a second of the second timing edges.
Abstract: In a method of software item testing, an automated test of a software item is initiated in a cloud-based computing environment in exchange for a fee. The test is part of a testing framework in the cloud-based computing environment. In response to occurrence of an error condition during the test, the test is paused within the cloud-based computing environment. An alteration to the test is accepted while the test is paused. The alteration is accepted via a user interface to the cloud-based computing environment. Testing is continued within the cloud-based computing environment, using altered test.
Abstract: Apparatus and methods for updating binary images are described. A computing device can determine transfers for updating a binary source image to become a binary target image. A transfer can include a source memory reference for the source image and a target memory reference for the target image. The computing device can determine a graph based on ordering dependencies between the transfers. The graph can include vertices for the transfers with edges between vertices. The computing device can generate an edge from a first vertex for a first transfer to a second vertex for a second transfer, with the first transfer to be performed before the second transfer. The computing device can break any cycles present in the graph to obtain an acyclic graph. The computing device can order the transfers based on the acyclic graph and send the ordered transfers in an update package for the source image.
Abstract: This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that allows investigators to invoke their own trusted tools or third-party generated tools. The investigative tool described herein seamlessly and transparently invokes the tools in accordance with an investigative profile created by the investigator.
Type:
Grant
Filed:
February 10, 2011
Date of Patent:
August 21, 2018
Assignee:
Architecture Technology Corporation
Inventors:
Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
Abstract: Certain aspects of the present disclosure relate to a method and apparatus for visualizing events received and processed by a plurality of software agents in a distributed system.
Type:
Grant
Filed:
June 30, 2015
Date of Patent:
August 21, 2018
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
James L. Lentz, David D. Martin, Jung W. Van, Yee Pin Yheng
Abstract: A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer, obtaining a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component from the data storage dealer, and transmitting a request for obtaining the user attribute component of the data access requester respectively to the attribute authorizers. The attribute authorizers generate the user attribute components of the data access requester respectively and transmit the user attribute components of the data access requester to the data access requester. The data access requester restores the encryption key, and decrypts the cipher text of the shared data according to the encryption key for obtaining the shared data requested to be accessed.