Patents Issued in March 14, 2013
-
Publication number: 20130066912Abstract: Methods and systems of defining product attributes may involve receiving a search query and extracting a user expectation from the search query. In addition, an attribute may be defined for a product based on the user expectation. In one example, consumer generated content such as forum content, review content, blog content and social networking content, is used to define the attribute.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Madhu K. Chetuparambil, George T. Jacob Sushil, Kalapriya Kannan
-
Publication number: 20130066913Abstract: Providing information about two or more datasets. The method includes accessing metadata for two or more datasets. The method further includes displaying a comparison of the two or more datasets based on metadata for the two or more datasets.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Elisa Flasko, Robert M. Fries, Maxim Uritsky, Lukasz Gwozdz
-
Publication number: 20130066914Abstract: Methods and systems of defining product attributes may involve receiving a search query and extracting a user expectation from the search query. In addition, an attribute may be defined for a product based on the user expectation. In one example, consumer generated content such as forum content, review content, blog content and social networking content, is used to define the attribute.Type: ApplicationFiled: March 15, 2012Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Madhu K. Chetuparambil, George T. Jacob Sushil, Kalapriya Kannan
-
Publication number: 20130066915Abstract: A method for selecting a subset of information to communicate to others from a set of information comprising a plurality of content items. In accordance with the method, the set of information is stored in a user retrievable format, a relative priority is assigned to each of the plurality of content items, and the subset of information is automatically generated by selecting a predetermined number of the plurality of content items from the set of information based on the relative priorities of each of the plurality of content items. The predetermined number is less than the number of said plurality of content items and the subset of information is a prioritized subset of the set of information. A system, and a computer readable medium carrying computer readable instructions for carrying out the method are also disclosed.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Inventor: Denis J. Alarie
-
Publication number: 20130066916Abstract: Implementing intelligent agent services includes generating an ontological domain for an individual based upon information elements that represent aspects of detectable behaviors of the individual at a point in time. The detectable behaviors occur within a physical and virtual geography and in relation to time. The services also include creating subdomains of contextually organized collections of the information elements and information elements collected from previously conducted detectable behaviors of the individual. The subdomains include orthogonally related data. The services further include determining a relevance of relationships among the information elements across the subdomains. Relationships determined to be relevant are identified as an interest of the individual. The services also include searching sources of information using the information elements having the relationships determined to be relevant and identifying a solution for satisfying the interest responsive to the searching.Type: ApplicationFiled: November 12, 2012Publication date: March 14, 2013Applicant: AT&T INTELLECTUAL PROPERTY I, LPInventor: AT&T Intellectual Property I, LP
-
Publication number: 20130066917Abstract: According to a general aspect, a method includes maintaining rating groups, each rating group providing a rating for content compiled based on information received from a user evaluating the content. The method also includes receiving, from a first user, a selection of a first rating group, to be applied to a set of users associated with the first user. The method also includes receiving, from a user, a request for a piece of content. The method also includes determining that the user from which the request was received belongs to the set of users associated with the first user. The method also includes, based upon the determination that the user belonged to the set of users associated with the first user, accessing information associated with the first rating group and determining whether the first rating group includes a rating for the requested piece of content.Type: ApplicationFiled: September 14, 2012Publication date: March 14, 2013Inventors: Jeffrey Joseph Damick, Sean Cunningham
-
Publication number: 20130066918Abstract: System and methods are provided for an electronic library service. In one embodiment, a method includes receiving a request for content of the electronic library service, the request identifying an account number for the electronic library service and identification number of a device, and authenticating the request based on an account number for the electronic library service and identification number of a device. The method may further include determining that content associated with the request is available for access by the device based on one or more restriction limitations, and providing access to the content based on one or more restriction limitations, wherein content of the electronic library is accessible to a device associated with the account number for a limited period of time.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Applicant: Sony CorporationInventors: Mahyar Nejat, Klaus Hofrichter
-
Publication number: 20130066919Abstract: The Common Point Authoring system functions to provide Livestock Informational Objects via the use of a centralized repository of uniquely identified, immutable Livestock Informational Objects. This system automates the authoring, maintenance, and distribution of the Livestock Informational Objects by using an Internet-based paradigm and a centralized repository of uniquely-identified, immutable Data Elements. The Common Point Authoring system provides a set of software modules that the manufacturers can use to author, maintain, and distribute Livestock Informational Objects and their customers, as Members of the system of Livestock Informational Objects, can use to retrieve, maintain, and distribute the Livestock Informational Objects. The system's interconnectivity allows for the use of an Internet-based paradigm for the purchase and sale among Members of the system of Livestock Informational Objects as commodities, and for reducing the burden costs among Members of compliance with government regulations.Type: ApplicationFiled: November 5, 2012Publication date: March 14, 2013Applicant: Pardalis, Inc.Inventor: Pardalis, Inc.
-
Publication number: 20130066920Abstract: A data structure embodied on a computer-readable medium in conformance with a database schema for accessing and managing data related to a plurality of watchlists in a relational database system in a high demand environment, wherein the database schema comprising a watchlist table, a watchlist entry table for storing high-level information, and a plurality of detail tables for storing detailed information associated with a watchlist.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Applicant: RAYTHEON COMPANYInventor: Bryan J. Walaschek
-
Publication number: 20130066921Abstract: A computing system has a user interface allowing a user to view and input data related to concepts in a knowledge area associated with the user, an observation sub-system to centralize data and to identify a plurality of knowledge concepts, a conceptualization sub-system to generate a plurality of nodes within an ontological mapping, wherein each of the nodes corresponds to a certain one of the plurality of identified knowledge concepts identified by the observation sub-system, a relationship identification sub-system to create relationships between at least some of the plurality of identified knowledge concepts, and attribute affinity weights to the relationships, a change refinement sub-system to modify at least one of the plurality of nodes, affinity weights and relationships based upon information associated with the user, and a non-transitory knowledge store to store the information associated with the user pertaining to a sub-plurality of the plurality of identified knowledge concepts.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: SRI INTERNATIONALInventors: William Scott Mark, Thierry Donneau-Golencer, Madhu Yarlagadda
-
Publication number: 20130066922Abstract: Technology is disclosed for providing contact management services. Contact information (e.g., phone numbers, addresses, email addresses, etc.) are collected from multiple, different sources (e.g., a mobile phone, a web server, a social media web site, SMS, an App, etc.) Contact information can also be entered in a free-form format and parsed into structured data that is associated with a contact card. A contact card stores the contact information and the source of the information. Contact cards can be aggregated into a merged contact card that includes information from the multiple, different sources, without loosing the original information. The merged contact card can be disaggregated into its constituent contact cards and used to create other contact cards. A user can associate one or more of their contact cards with a group. The group is optionally notified when the users changes its contact information.Type: ApplicationFiled: September 10, 2012Publication date: March 14, 2013Applicant: WhitePages, Inc.Inventors: Myung Ryul Jang, Tim Miller, Michael Squires, Debbie Cargile
-
Publication number: 20130066923Abstract: Aspects of a data environment, such as the creation, provisioning, and management of data stores and instances, are managed using a separate control environment. A user can call into an interface of the control environment, the call being analyzed to determine actions to be performed in the data environment. A monitoring component of the control plane also can periodically communicate with the data environment to determine any necessary actions to be performed, such as to recover from faults or events in the data environment. A workflow can be instantiated that includes tasks necessary to perform the action. For each task, state information can be passed to a component in the data environment operable to perform the task, until all tasks for an action are completed. Data in the data environment can be accessed directly using a separate interface of the data environment, without accessing the control plane.Type: ApplicationFiled: September 15, 2012Publication date: March 14, 2013Applicant: Amazon Technologies, Inc.Inventors: Swaminathan Sivasubramanian, Grant Alexander MacDonald McAlister, Paul David Franklin, Rajesh Sudhakar Sheth, James Horsley
-
Publication number: 20130066924Abstract: A Java-MATLAB bridge is provided for enabling utilization of MATLAB® functionality in an enterprise environment. The Java-MATLAB bridge includes a Java® wrapper and a MATLAB wrapper. The MATLAB wrapper is coupled to the Java wrapper and the Java wrapper provides an entry point for invoking the MATLAB functionality in the enterprise environment.Type: ApplicationFiled: November 5, 2012Publication date: March 14, 2013Applicant: HONEYWELL INTERNATIONAL INC.Inventor: Honeywell International Inc.
-
Publication number: 20130066925Abstract: A common data type structure can be used to correlate access requests between applications that implement data in accordance with different types or type structures. In one implementation, a common data structure includes schemes for operations, sequences, records, and atoms (i.e., undefined). The system can then map any type structure to the schemes of the common data structure. In operation, a request for data by an application can involve identifying one or more proxies used by an application to map the data to the common data structure. The proxies map the data to the common data structure based on the shape of the data (to the extent it can be identified). The proxies then can return one or more data structures that comprise the identified mapping information. The application can then perform operations directly on the received data structures.Type: ApplicationFiled: November 6, 2012Publication date: March 14, 2013Applicant: MICROSOFT CORPORATIONInventor: Microsoft Corporation
-
Publication number: 20130066926Abstract: Mechanisms are provided for representing white space in a graphical representation of a data model. These mechanisms involve analyzing output data that is to be output to a user via an output device, to identify white spaces in the output data. White spaces comprise portions of a range of metrics of output data values where the output data does not have data objects representing those portions of the range of metrics of output data. For each identified white space, a white space data object is created. The white space data objects are provided to an application which performs an operation on the white space data objects to output the white space data objects in a manner that identifies the white space data objects differently from non-white space data objects in the output data.Type: ApplicationFiled: September 12, 2011Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian J. Cragun, Mary J. Mueller, James S. Taylor
-
Publication number: 20130066927Abstract: The present invention extends to methods, systems, and computer program products for managing object lifetime in a cyclic graph. Embodiments of the invention include reclaiming allocated system resources, for example, from a graph of objects that mixes different resource reclamation techniques (such as reference counting and garbage collection). In response to determining that garbage collection is to be performed, references between GC objects and Ref. Counted objects are detected. A reference type (e.g., direct, indirect, standard, tracked, weakened, etc.) for any detected references is also determined. Garbage collection is performed to determine if any allocated system resources can be reclaimed. Garbage collection considers references and references types between GC objects and Ref. Counted objects when determining if objects are to be reclaimed.Type: ApplicationFiled: August 29, 2012Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Michael John Hillberg, Raja Krishnaswamy
-
Publication number: 20130066928Abstract: A method, system and computer program product for caching socket connections while ensuring that there are file descriptors available for the applications. File descriptor references and their referenced objects are stored in a predefined memory region of the heap (“file descriptor heap”). Each time a socket connection is cached, a file descriptor reference may be created to be associated with the socket connection's file descriptor, where the file descriptor reference references the object of the cached socket connection. In order to ensure that there are available file descriptors for the applications, the file descriptor references and their referenced objects are collected by the garbage collector in response to various events (e.g., too many file descriptors are open) thereby freeing the file descriptors that were previously associated with the collected connection objects to be used by the applications.Type: ApplicationFiled: September 8, 2011Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pramod B. Nagaraja, Sathiskumar Palaniappan, Deepti Verma
-
Publication number: 20130066929Abstract: Techniques are provided for managing versions of files in a file system. According to one technique, new versions of directories are created in response to creation of new versions of files that descend from the directories, where the different versions of a versioned directory are associated with different points in time. Links are maintained between the files in the file system such that the versions of the files that descend from a particular version of a versioned directory reflect the point in time associated with the versioned directory.Type: ApplicationFiled: November 7, 2012Publication date: March 14, 2013Applicant: ORACLE INTERNATIONAL CORPORATIONInventor: Oracle International Corporation
-
Publication number: 20130066930Abstract: In the prior art clone creating technique of a file, a management table of a snapshot and the file was created when creating the clone file, so that a considerable amount of creation time for creating the clone file and storage capacity was required. In order to solve the problems of the prior art, the present invention provides a system wherein if a request to create a clone of a file is received, a differential file is created while inhibiting update of the file, and update data is written to the differential file. Further, when a first update request is received to the differential file after creating the differential file, a management table is created. According to the invention, a large amount of clone files can be created speedily.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Applicant: HITACHI, LTD.Inventors: Hitoshi Kamei, Takaki Nakamura
-
Publication number: 20130066931Abstract: Peer-to-peer redundant file server system and methods include clients that determine a target storage provider to contact for a particular storage transaction based on a pathname provided by the filesystem and a predetermined scheme such as a hash function applied to a portion of the pathname. Servers use the same scheme to determine where to store relevant file information so that the clients can locate the file information. The target storage provider may store the file itself and/or may store metadata that identifies one or more other storage providers where the file is stored. A file may be replicated in multiple storage providers, and the metadata may include a list of storage providers from which the clients can select (e.g., randomly) in order to access the file.Type: ApplicationFiled: September 14, 2012Publication date: March 14, 2013Applicant: OVERLAND STORAGE, INC.Inventors: Francesco Lacapra, Peter Wallace Steele, Bruno Sartirana, Ernest Ying Sue Hua, I Chung Joseph Lin, Samuel Sui-Lun Li, Nathanael John Diller, Thomas Reynold Ramsdell, Don Nguyen, Kyle Dinh Tran
-
Publication number: 20130066932Abstract: An apparatus for performing a Fast Fourier Transform (FFT) is provided. The apparatus comprises a reorder matrix, symmetrical butterflies, and a memory. The reorder matrix is configured to have a constant geometry, and the butterflies are coupled in parallel to the reorder matrix. The memory is also coupled to the reorder matrix and each butterfly. The reorder matrix, the butterflies, and the memory can then execute a split radix algorithm.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: Texas Instruments IncorporatedInventors: Joyce Y. Kwong, Manish Goel
-
Publication number: 20130066933Abstract: A method for deriving a composite tie metric for an edge between nodes of a telecommunication call graph includes receiving descriptive data with original values for descriptive attributes associated with a telecommunication call graph formed by edges between nodes. Each edge relates to two nodes. Each original value relates to an edge and a descriptive attribute forming an edge-attribute pair for the corresponding original value. The descriptive data is stored in a local storage device. Scaling factors for each descriptive attribute are determined taking into account a distribution of the original values for the corresponding descriptive attribute and a common base for the descriptive attributes. Weighting factors are determined for each descriptive attribute. The composite tie metric is computed for an edge based on the original value, scaling factor, and weighting factor for the descriptive attributes.Type: ApplicationFiled: July 25, 2012Publication date: March 14, 2013Applicant: ALCATEL-LUCENT USA INC.Inventors: Veena B. Mendiratta, Derek Doran, Chitra Phadke, Huseyin Uzunalioglu, Dan Kushnir
-
Publication number: 20130066934Abstract: To variably change the filter characteristic of a decimation filter in accordance with a sampling rate. A decimation filter 13 in a semiconductor device 1 sequentially inputs a signal sampled at a predetermined sampling rate fos, and calculates, for each input signal that is input within a predetermined period (a period for M+2N), a filter coefficient Cj for performing predetermined filtering processing in response to a trigger signal TR continuously applied, and furthermore sequentially multiplies the input signal by the calculated filter coefficient, accumulates a multiplication value within the predetermined period, and sequentially outputs the result. The predetermined period is made variable in accordance with a time interval at which the trigger signal is applied.Type: ApplicationFiled: July 17, 2012Publication date: March 14, 2013Applicant: Renesas Electronics CorporationInventors: Yusuke EDO, Seiji KAMADA
-
Publication number: 20130066935Abstract: The present invention provides a method, system and computer program product for exposing at least one local service as at least one web service. In an exemplary embodiment, the method includes receiving a call for the at least one web service, where the call comprises a request and a response. The method also includes delegating the call to a client bundle. The method further includes obtaining the at least one local service from a service registry via the client bundle. The method also includes invoking at least one method on the at least one local service via the client bundle. The method further includes returning a response from the invoked method for the at least one web service.Type: ApplicationFiled: March 7, 2012Publication date: March 14, 2013Applicant: International Business Machines CorporationInventors: Benjamin C. Reed, Ted J. Bonkenburg
-
Publication number: 20130066936Abstract: A collapsed cloud proximal to the user of a client device determines, stores, and provides access to content needed by the user or group of users. Content needed by the user is pushed into one or more access points that a client device is accessing or is expected to access. The client device accesses the content via local access to the access point(s) that it connects to, access relevant content from the local storage of the access point that it connects to as it moves.Type: ApplicationFiled: April 16, 2012Publication date: March 14, 2013Inventors: Ram Krishnan, Vidya Govindan, Asif Qamar
-
Publication number: 20130066937Abstract: A system is adapted to manage the distribution of content to one or more cooperating media/substrates. The system receives data representative of environment conditions for one or more cooperating media/substrates adapted to display digital content. The media/substrates may be located in public spaces. The system compares the received data representative of environment conditions with selection criteria to identify content for distribution to the media/substrates. The selected content is distributed to the one or more cooperating media/substrates.Type: ApplicationFiled: October 24, 2012Publication date: March 14, 2013Applicant: CIRIGHT SYSTEMS, INC.Inventor: Ciright Systems, Inc.
-
Publication number: 20130066938Abstract: Methods, apparatuses, and computer program products for performing collective operations on a hybrid distributed processing system that includes a plurality of compute nodes and a plurality of tasks, each task is assigned a unique rank, and each compute node is coupled for data communications by at least two different networking topologies. At least one of the two networking topologies is a tiered tree topology having a root task and at least two child tasks and the at least two child tasks are peers of one another in the same tier. Embodiments include for each task, sending at least a portion of data corresponding to the task to all child tasks of the task through the tree topology; and sending at least a portion of the data corresponding to the task to all peers of the task at the same tier in the tree topology through the second topology.Type: ApplicationFiled: November 6, 2012Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORP
-
Publication number: 20130066939Abstract: This disclosure discloses a cloud service consuming method, a cloud service message packet, a cloud serviced broker and a cloud system. Wherein, the cloud service consuming method comprises: a cloud service broker receives a cloud service consumer request sent by a cloud service requester (S202); the cloud service broker returns a cloud service consumer response to the cloud service requester (S204). Through this disclosure, the problems of wasted system resource and low system efficiency caused as the cloud service requester sends cloud service requests for many times are avoided, the utilization ratio of system resources is effectively improved, and the system efficiency is improved.Type: ApplicationFiled: May 18, 2011Publication date: March 14, 2013Applicant: ZTE CORPORATIONInventor: Weixiang Shao
-
Publication number: 20130066940Abstract: The disclosure discloses a cloud service broker, a cloud computing method and a cloud system. The cloud service broker comprises: a cloud service publishing interface module, configured to subscribe to information of cloud computing services and/or resources provided by a plurality of cloud service providers; a cloud service consuming interface module, configured to provide a consuming interface for a cloud service requester to access the cloud service provider; a cloud service processing module, configured to process a cloud service consumer request of the cloud service requester; and a cloud service adapting module, configured to adapt or call, according to cloud service consumer request, cloud computing services and/or resources provided by the cloud service provider. With the disclosure, the effect of facilitating cloud service requesters to use cloud services provided by different cloud service providers is achieved. Furthermore, system resources are saved and the system efficiency is improved.Type: ApplicationFiled: May 18, 2011Publication date: March 14, 2013Inventor: Weixiang Shao
-
Publication number: 20130066941Abstract: An application instance identifier is employed with various systems and methods in order to provide a requestor with continuous access to a resource when operating in a client clustered environment. A requestor residing on a first client in may attempt to access a resource. The first client sends a request to access the resource. The request may be associated with an application instance identifier that identifiers the requestor. At some point, the first client fails and the requestor is associated with a second client via a failover mechanism. The second client sends a second request to access the resource on behalf of the requestor. The second request is associated with the requestor's application instance identifier. The application instance identifier is used to identify the second request as belonging to the same requestor as the first request, thereby granting the second request to access the resource while avoiding a conflict situation.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: David M. Kruse, Diaa Fathalla, James T. Pinkerton, Mathew George, Prashanth Prahalad, Thomas E. Jolly
-
Publication number: 20130066942Abstract: Systems and methods for customizing mobile applications are provided. The systems and methods may include a computer program product, comprising a computer-usable medium having a computer-readable program code adapted to be executed to implement a method for customizing a mobile application, said method comprising: receiving or retrieving information representative of (i) a user, and (ii) an entity that the user is affiliated with; delivering the information representative of (i) the user, and (ii) the entity that the user is affiliated with; receiving customization information associated with one or both of the user or the entity; and presenting a user interface for the user, the user interface reflecting at least a portion of the customization information.Type: ApplicationFiled: September 12, 2011Publication date: March 14, 2013Applicant: FISERV, INC.Inventors: Edward Branton Massey, Karl Howard Chaffey, Jonathan Eric Drudge, Calvin Grimes, JR., Bradley Shayle Scott, Amelia Slaughter Wilkinson
-
Publication number: 20130066943Abstract: An approach is provided in which a number of requests are received from a variety of clients over a computer network. The system uses a processor to calculate request priority values pertaining to the received requests. The calculation of the request priority values is based on one or more attributes that correspond to the respective requests. For example, the attributes could include network level attributes, session attributes, and application specific attributes. Each of the requests is assigned a request priority value. A request may receive the same request priority value as other requests. The requests are queued in a memory based on the request priority values that were assigned to the requests. The queued requests are then serviced in order of request priority so that queued requests assigned higher request priority values are processed before queued requests with lower request priority values.Type: ApplicationFiled: September 13, 2011Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Simon Gilbert Canning, Scott Anthony Exton, Neil Ian Readshaw
-
Publication number: 20130066944Abstract: Management of a task made up of a list of activities is presented. A task includes an identification of a task creator and of a set of task activities retrieved by a computer system. A user likely to perform a portion of the set of activities is identified, wherein the portion includes one or more activities of the set of activities, and at least a portion of the set of activities is selectively delegated. The delegated portion of the set of activities is sent to the identified user. A set of responses related to the portion of the set of activities is received. Whether the task is complete is determined based on a policy for establishing that the set of responses meets a configured confidence level. Such set is reported to a task creator as responsive to determining completion of the set of responses.Type: ApplicationFiled: September 13, 2011Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jim A. Laredo, Sriram K. Rajagopal, Maja Vukovic
-
Publication number: 20130066945Abstract: A mechanism is provided for presenting a software application to a plurality of users in a cloud computing environment. For example, an application that was designed for use by a single user is provided in a cloud based platform without re-architecting the application. Using a web-based interface, multiple cloud users may launch and execute the application. The various instances of the application are provided to the cloud users as if the application were designed as a multi-user application.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Manuvir Das, Sudarshan Yadav, Arvind Kandhare, Sanjay Malpani, Ravi K. Balachandran, Adam Herscher, Nelamangal K. Srinivas, Rochak Mittal
-
Publication number: 20130066946Abstract: A system and method for providing a dynamic invocation and service interface for use in a middleware or other environment. At the service-side, messages can be inserted into an inbound processing chain. After service-side inbound processing, messages are given to the user via a provider request function. The user gives a response by using a provider response function that inserts messages into a service-side outbound processing chain. After service-side outbound processing, messages are given to the user's service response transport. On the client side, the user can insert messages into the outbound processing chain using a dispatcher request. After client-side outbound processing, messages are given to the user's client request transport. This decouples message processing from the transport and makes the message processing asynchronous in nature. When the response is received, a user uses a client response transport function to insert the response into the client-side inbound processing chain.Type: ApplicationFiled: March 22, 2012Publication date: March 14, 2013Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Harold Carr, Ryan Eberhard
-
Publication number: 20130066947Abstract: A multi-endpoint application server is provided that allows administrators to create and update content and data for endpoint applications using content management capabilities that allows the administrators to control how the endpoint application should be presented and how it should behave for various end-point types. A runtime application can be provided to each endpoint, which is configured to obtain content that is managed and maintained from the server in the same way as a normal web browser-based application would. To enable such multiple endpoint types to experience the same or similar endpoint application experience, the multi-endpoint application server accepts requests from the runtime application and determines what kind of endpoint is making the request such that it can present the content to the runtime application in a manner that is deemed appropriate for the endpoint type.Type: ApplicationFiled: April 13, 2012Publication date: March 14, 2013Applicant: Web Impact Inc.Inventors: Rashed Ahmad, Kaleem Ahmad, Dmytro Svrid, Ky David Michael Patterson
-
Publication number: 20130066948Abstract: A method, machine, and computer-readable medium is provided for managing transactional sets of commands sent from a client to a server for execution. A first server reports logical identifiers that identify transactional sets of commands to a client. The first server commits information about a set of commands to indicate that the set has committed. A second server receives, from the client, a request that identifies the set based on the logical identifier that the client had received. The second server determines whether the request identified the latest set received for execution in a corresponding session and whether any transactions in the set have not committed. If any transaction has not committed, the second server enforces uncommitted state of the identified set by blocking completion of the identified set issued in the first session. The identified set may then be executed in the second session without risk of duplication.Type: ApplicationFiled: April 16, 2012Publication date: March 14, 2013Applicant: Oracle International CorporationInventors: Carol L. Colrain, Stefan Heinrich Roesch, Kevin S. Neel
-
Publication number: 20130066949Abstract: A method, machine, and computer-readable medium is provided for managing transactional sets of commands sent from a client to a server for execution. A first server reports logical identifiers that identify transactional sets of commands to a client. The first server commits information about a set of commands to indicate that the set has committed. A second server receives, from the client, a request that identifies the set based on the logical identifier that the client had received. The second server determines whether the request identified the latest set received for execution in a corresponding session and whether any transactions in the set have not committed. If any transaction has not committed, the second server enforces uncommitted state of the identified set by blocking completion of the identified set issued in the first session. The identified set may then be executed in the second session without risk of duplication.Type: ApplicationFiled: April 16, 2012Publication date: March 14, 2013Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Carol L. Colrain, Stefan Heinrich Roesch, Kevin S. Neel
-
Publication number: 20130066950Abstract: The present invention discloses a service development platform, system and method, wherein a service development platform processes a service request of a user equipment (UE), and the method includes: the UE dialing service access codes and initiating the service request; the service development platform establishing a media channel with the UE; the service development platform loading a WEB page on a WEB browser according to the service request of the UE; the service development platform capturing data of the WEB page on the WEB browser and sending the data after encapsulation to the UE through the media channel; and the service development platform receiving key information of the UE through the media channel, and sending the key information of the UE to the WEB browser in manner of a windows message, so as to realize an operation on the WEB page.Type: ApplicationFiled: February 18, 2011Publication date: March 14, 2013Applicant: ZTE CORPORATIONInventors: Kai Liao, Dong Wang, Xi Zuo
-
Publication number: 20130066951Abstract: A communication system is presented for managing data transfer via a communication network. The communication system comprises a server system connected to a plurality of client systems via a first management network of said communication network. Such first management network may for example be operable as multi-hops network. The server system is configured and operable to be responsive to data pieces from the client systems via said first management network, to selectively switch between first and second modes of operation. In the first operational mode, the server system manages and executes data transfer to and from the client systems through the first management network. In the second operational mode, the server system operates to manage direct data transfer between the client systems via a second data network of said communication network connecting the client systems between them. The second data network may for example be operable as ad-hoc circuits.Type: ApplicationFiled: November 18, 2010Publication date: March 14, 2013Applicant: YISSUM RESEARCH DEVELOPMENT COMPANY OF THE HEBREW UNIVERSITY OF JERUSALEMInventors: Aharon Agranat, Larry Rudolph, Noam Sapiens
-
Publication number: 20130066952Abstract: Methods, devices, and storage media are provided for preserving the context of a server-client session. A server generates an initial context and a context for each user command executed in a first session and sends context to a client with the return for each command. The context describes software, session state, returned data, and/or hardware characteristics of a server-side environment for the first session. The client receives and stores the context with each user command. Upon determining that the database session should be rebuilt in the second session, the client sends initial context. A server for the second session receives the initial context and determines whether commands should be replayed in the second session. If commands are replayed, the server validates that server environment and client-visible results for each command in the second session match that from execution in the first session using the context for that command.Type: ApplicationFiled: July 5, 2012Publication date: March 14, 2013Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Carol L. Colrain, Hochak Hung, Kevin S. Neel
-
Publication number: 20130066953Abstract: The present invention contemplates a system whereby a service provider can service a large number of customers (millions) and connect them to their rented PC from millions of locations around the world. Many customers (10 to 100 thousand) can be connected simultaneously. The service provider is responsible for maintaining the latest PC Hardware and Software configurations available on the market instead of the customer. The rented PC operates in essentially the same manner as if one purchased and maintained their PC at home or office. Access to the individuals rented PC can be obtained from any existing PC, office network computer, a Web TV computer or other customer interface computer which has been authorized by the service provider. The current invention will greatly improve existing Client/Server systems being used to service large global offices.Type: ApplicationFiled: July 13, 2012Publication date: March 14, 2013Inventor: Charles C. Freeny, JR.
-
Publication number: 20130066954Abstract: The security of source code is maintained when computer software is analyzed. To achieve this, computer software to undergo analysis is obfuscated in a client computer. The obfuscated computer software is transmitted to a server computer. Software analysis is performed in the server computer and data representing the result of this analysis is transmitted to the client computer. Since the data representing the result of analysis has thus been obfuscated, the contents of the computer software cannot be ascertained in the server computer. The obfuscated data representing the result of analysis is restored to the original in the client computer.Type: ApplicationFiled: July 16, 2012Publication date: March 14, 2013Applicant: FUJIFILM CorporationInventor: Masaya NAGASE
-
Publication number: 20130066955Abstract: Methods, devices, and computer-readable media are provided for restoring state that was built up on a first session between a first server instance and a client to a second session between a second server instance and the client. Non-transactional session state that existed for the first session is preserved by repeating non-transactional commands in the second session. Transactions are executed in the second session when the transactions did not complete in the first session. The first server instance sends, to the client in the first session, information to maintain for a possible replay of commands that were sent in a request to the first server instance for execution in the first session. If the first session becomes unavailable, the maintained information may be used by the second server instance to restore the database session, masking the outage from users, applications, and clients.Type: ApplicationFiled: July 31, 2012Publication date: March 14, 2013Inventors: Kevin S. Neel, Carol L. Colrain, Douglas N. Surber, Nancy R. Ikeda, Stefan Heinrich Roesch, Tong Zhou, Jean De Lavarene
-
Publication number: 20130066956Abstract: An information management device includes: a receiving unit that receives a request of information from an information process unit having a CGI; an information collection unit that collects the information corresponding to the request; and a process unit that requests the information collection unit to collect the information corresponding to the request in response to the request of information, and during a time period shorter than a timeout period of the CGI, generates progress information indicating progress of collection of the information and corrected information, and causes a display unit to display the progress information.Type: ApplicationFiled: August 22, 2012Publication date: March 14, 2013Applicant: FUJITSU LIMITEDInventors: Hiroko SATO, Wataru Aiba, Minoru Imaizumi, Yoichi Iwakura
-
Publication number: 20130066957Abstract: A server device configured to provide a content aggregation service. The server device comprises a first transceiver unit configured to communicate with a terminal, a second transceiver unit configured to communicate with content network sources, a memory for storing a resource list of addresses of the content network sources, and a content aggregation processor operably connected with the first and second transceiver and the memory, and configured to fetch content from the addresses of the content network sources as well as to aggregate the fetched content into a notification message to the terminal.Type: ApplicationFiled: September 13, 2012Publication date: March 14, 2013Applicant: Vringo Infrastructure, Inc.Inventors: Miquel An. Garcia-Martin, Janne K. Suotula, Juha Louhisuo
-
Publication number: 20130066958Abstract: Access to content may be enabled by receiving an instruction indicating a client request to access content, accessing a list of content sources capable of rendering the content for which access is requested by the client, determining a performance metric for at least two of the content sources, and selecting among the content sources based on the performance metric to identify a content source to be accessed by the client.Type: ApplicationFiled: September 13, 2012Publication date: March 14, 2013Inventors: Scott K. BROWN, Keith PETERS, David L. BIDERMAN
-
Publication number: 20130066959Abstract: A server system provides responsive content to a user when a request for an invalid URL is received. The server system may implement multiple rescue strategies for attempting to rescue the invalid URL. One such rescue strategy involves repairing the URL by correcting for encoding errors. Another rescue strategy involves determining that the URL contains an obsolete or outdated item identifier (e.g., product identifier) that renders the URL invalid, and returning information regarding one or more related items to the user. Another rescue strategy involves mining the invalid URL for one or more text strings reflective of the type of content desired, and then using the one or more text strings to execute a keyword search to identify content to provide to the user. The various rescue strategies may be attempted in sequence according to a hierarchy.Type: ApplicationFiled: September 15, 2012Publication date: March 14, 2013Inventors: Michael L. Brundage, Sarah E. Williams
-
Publication number: 20130066960Abstract: A system, a method and a device are each configured for dynamic assignment of survivability services to communication devices (such as, e.g. tablets, smart phones, mobile phones, laptops or other types of mobile communication devices) based on the device's current location and network context. Survivability services provide session and service continuity in case a centralized or cloud based session management service that may be hosted by one or more remote computer devices, such as for example servers, is not reachable due to network failure or service failure.Type: ApplicationFiled: February 13, 2012Publication date: March 14, 2013Applicant: Siemens Enterprise Communications GmbH & Co. KGInventors: Geert Robert Marc Fieremans, Rodrigo Pastro, Johannes Ruetschi
-
Publication number: 20130066961Abstract: An embodiment of the invention automatically generates for a crowdsourcing procedure to achieve a goal. A first template pertaining to the prespecified goal is constructed, and provides a specified context and set of rules, and is associated with one or more data repositories. The first template is used to generate first level tasks, wherein a given first level task is completed by selecting a single object from a repository of objects, and then performing an operation requiring information from the single object. The first template is used further to generate second level tasks, a given second level task being completed by selecting a plurality of objects from the same or from different repositories, and then performing a single operation requiring information supplied by respective objects. The given second level task is submitted to the crowdsourcing procedure for execution.Type: ApplicationFiled: September 8, 2011Publication date: March 14, 2013Applicant: International Business Machines CorporationInventors: Vijay K. Naik, Zon-Yin Shae, Maja Vukovic