Patents Issued in March 2, 2017
-
Publication number: 20170060527Abstract: A digital emulation of an analog device with tolerance modeling is disclosed. In operation, a model of an analog circuit is provided. The model includes the location of each individual element in the analog circuit. The model also includes a working value for each individual element as well as a tolerance range for each individual element. A randomized working value is then generated for one or more of each individual element based on the tolerance range and the working value. A digital emulation of the analog circuit is performed. The digital emulation uses the randomized working value for one or more of the each individual element and the working value for any remaining of each individual element. The digital emulation is then provided to a user for use in a digital environment.Type: ApplicationFiled: August 31, 2016Publication date: March 2, 2017Inventor: Dirk ULRICH
-
Publication number: 20170060528Abstract: Embodiments described herein relate to a software application that is configured to operate as an add-on software component to audio-playback software on a playback device of a media playback system. One embodiment may involve displaying, on a user interface of a controller of a media playback system, a zone identifier that identifies a zone of the media playback system, where the zone comprises a playback device that has audio-playback software installed thereon; and displaying, on the user interface of the controller, an application identifier in association with the zone identifier, where the application identifier indicates that a software application installed on the playback device is configured to operate as an add-on software component to the audio-playback software.Type: ApplicationFiled: October 31, 2016Publication date: March 2, 2017Inventor: Mark Triplett
-
Publication number: 20170060529Abstract: Certain implementations of the disclosed technology may include systems and method for handling application notifications. According to an example implementation, a method is provided. The method can include receiving a plurality of audio feeds from a respective plurality of applications, and determining a priority status for one or more of the respective applications. Based on the determined priority status, the method may further include determining a first prioritized audio feed and a second prioritized audio feed from the plurality of applications. The method includes detecting, in a signal associated with the first prioritized audio feed, a signal gap having a gap start. The method includes modifying, based at least in part on the signal of the first prioritized audio feed, one or more parameters associated with at least the second prioritized audio feed, and outputting, to an output device, at least a portion of the first prioritized audio feed.Type: ApplicationFiled: November 11, 2016Publication date: March 2, 2017Inventor: Venkatesh Thirumale
-
Publication number: 20170060530Abstract: System, method, and computer product embodiments for processing audio commands are described. A multimedia device receives a digitized audio sequence from a control device. The digitized audio sequence is associated with a display command for controlling a display device. Then, the digitized audio sequence is converted into an audio signature that corresponds to the digitized audio sequence. The multimedia device sends the audio signature to a platform server configured to use the audio signature to process the display command. After, the multimedia device receives content information from the platform server resulting from processing the display command. Then, the multimedia device causes the display device to provide media content related to the content information.Type: ApplicationFiled: September 18, 2015Publication date: March 2, 2017Inventor: Frank Llewellyn MAKER, III
-
Devices and related methods for simplified proofreading of text entries from voice-to-text dictation
Publication number: 20170060531Abstract: Disclosed generally are voice-to-text dictation devices with improved software for simplified proofreading of text entries from voice-to-text dictation. One voice-to-text dictation device may suitably feature a touch-display, a microphone or other audio receiver, and computer hardware and memory. Preferably, the computer memory features software. In one embodiment, the software (in coordination with computer hardware and memory of the device) is configured to automatically and simultaneously during a speech: (1) create a voice recording file from spoken words provided to the microphone of the device; (2) convert the spoken words to an editable text document; and (3) synchronize the timing of words in the voice recording with the position of the words in the text document.Type: ApplicationFiled: July 8, 2016Publication date: March 2, 2017Inventor: Fred E. Abbo -
Publication number: 20170060532Abstract: Embodiments of the inventive concept include a fast close path solution and circuit of a three path fused multiply-adder circuit. The fast close path circuit can include one or more compressors that can receive multiple operands and produce a result sum and a result carry. The close path circuit can include one or more leading zero anticipators (LZAs). The one or more LZAs can receive and process the result sum and the result carry. The close path circuit can include one or more adders. The one or more adders can receive and add the result sum and the result carry in parallel with the one or more LZAs processing the result sum and the result carry. Since the close path is the critical timing path, by performing the addition operations in parallel with the LZA and/or priority encode (PENC) operations, the logic depth and latency of the close path are reduced.Type: ApplicationFiled: February 1, 2016Publication date: March 2, 2017Inventor: Ashraf AHMED
-
Publication number: 20170060533Abstract: Embodiments of the present disclosure include a tininess prediction and handler engine for handling numeric underflow while streamlining the data path for handling normal range cases, thereby avoiding flushes, and reducing the complexity of a scheduler with respect to how dependent operations are handled. A preemptive tiny detection logic section can detect a potential tiny result for the function or operation that is being performed, and can produce a pessimistic tiny indicator. The tininess prediction and handler engine can further include a subnormal post-processing pipe, which can denormalize and round one or more subnormal operations while in a post-processing mode. A schedule modification logic section can reschedule in-flight operations. The schedule modification logic section can issue dependent operations optimistically assuming that a producing operation will not produce a tiny result, and so will not incur extra latency associated with fixing the tiny result in the post-processing pipe.Type: ApplicationFiled: March 10, 2016Publication date: March 2, 2017Inventors: Ashraf AHMED, Nicholas Todd HUMPHRIES, Marc AUGUSTIN
-
Publication number: 20170060534Abstract: A device for random number generation based on an optical process of quantum nature, including a light source emitting photons randomly, a light detector adapted to absorb the randomly emitted photons and to measure a number n of photons produced by the light source in a time interval T, and a randomness extractor. The detector includes a photon sensor acting as a photon-to-electron converter, an amplifier for converting the electron signal received from the photon sensor into a voltage and amplifying the voltage signal, as well as an analog-to-digital converter for processing the amplified signal received from the amplifier by encoding the amplified signal into digital values and sending these digital values to the randomness extractor for further processing such as to produce quantum random numbers (QRNs) based on the number of photons produced by the light source in a time interval T.Type: ApplicationFiled: April 27, 2015Publication date: March 2, 2017Inventors: Bruno SANGUINETTI, Anthony MARTIN, Nicolas GISIN, Hugo ZBINDEN
-
Publication number: 20170060535Abstract: A method of verifying the sensitivity of an electronic circuit executing a modular exponentiation calculation in a first register and a second register, successively including, for each bit of the exponent: a first step of multiplying the content of one of the registers, selected from among the first register and the second register according to the state of the bit of the exponent, by the content of the other one of the first and second registers, placing the result in said one of the registers; a second step of squaring the content of said other one of the registers by placing the result in this other register, wherein the content of that of the first and second registers which contains the multiplier of the operation of the first step is disturbed, for each bit of the exponent, during the execution of the first step.Type: ApplicationFiled: February 29, 2016Publication date: March 2, 2017Inventor: Yannick Teglia
-
Publication number: 20170060536Abstract: Fusion hints can be generated in order to recommend streams application actors (like streams operators) for fusion or separation in a streams computing environment. Profiles can be made for the streams application actors, and fusion candidates can be determined from the profiles, based on fusion candidate rules. Based on the fusion candidate rule satisfied, a particular associated fusion recommendation can be identified and made to the user via a user interface. The recommendation can be displayed, along with the identities of the streams application actors identified as fusion candidates.Type: ApplicationFiled: August 28, 2015Publication date: March 2, 2017Inventors: Eric L. Barsness, Michael J. Branson, John M. Santosuosso
-
Publication number: 20170060537Abstract: In an example, a method for developing a customer system utilizing a preexisting cloud-computing platform is provided. The method may include defining a platform architecture for the customer system to be developed in terms of a plurality of architecture types—and their predefined architecture type unit. The method may include displaying an indicator of first and second indicators, the first and second indicators corresponding to confirmation of the platform architecture and non-confirmation of the platform architecture, respectively, based on information about a subset of deliverables corresponding to the architecture types.Type: ApplicationFiled: August 31, 2015Publication date: March 2, 2017Inventors: Gerhard Friedrich Mack, Stefan Puhl
-
Publication number: 20170060538Abstract: Fusion hints can be generated in order to recommend streams application actors (like streams operators) for fusion or separation in a streams computing environment. Profiles can be made for the streams application actors, and fusion candidates can be determined from the profiles, based on fusion candidate rules. Based on the fusion candidate rule satisfied, a particular associated fusion recommendation can be identified and made to the user via a user interface. The recommendation can be displayed, along with the identities of the streams application actors identified as fusion candidates.Type: ApplicationFiled: September 29, 2015Publication date: March 2, 2017Inventors: Eric L. Barsness, Michael J. Branson, John M. Santosuosso
-
Publication number: 20170060539Abstract: Various embodiments of systems and methods to generate native access plan source code are described herein. In one aspect, a database query is received. A query execution plan, including a parent operator and one or more descendent operators, corresponding to the database query is retrieved. Further, a check is made to determine whether the parent operator and the one or more descendent operators include at least one loop. When both the parent operator and the one or more descendent operators include at least one loop, consume points for the at least one loop are defined. The parent operator and the one or more descendent operators are merged based on consume point types to generate native access plan source code.Type: ApplicationFiled: September 1, 2015Publication date: March 2, 2017Inventors: XIAOBIN MA, Xun Cheng, Prabhas Kumar Samanta
-
Publication number: 20170060540Abstract: A method, system and computer-usable medium for linking a set of executable code snippets to perform a complicated task, comprising: decomposing a natural language statement into a plurality of decomposed natural language components; searching a repository of code snippets to identify code snippets corresponding to each of the decomposed natural language components; ordering execution of the code snippets based upon the plurality of decomposed natural language components; and, executing the code snippets in order of the natural language statement requests until a final outcome is achieved.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Corville O. Allen, Heather L. Duschl, Marit L. Imsdahl, Alexandra D. Markello, Dana L. Price
-
Publication number: 20170060541Abstract: A Graphical User Interface (GUI) that includes visual representations of executable program elements of a programming language is presented on a display. The GUI enables a user to select and graphically manipulate the visual representations of the executable program elements to form a visual representation of a computer program that includes selected ones of the visual representations. The visual representation of the computer program is translated into computer program text that includes the executable program elements represented by the selected ones of the visual representations, and non-executable comments specifying the selected ones of the visual representations. Conversion from computer program text into visual form including visual representations of executable program elements in the received computer program text is also possible.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Applicant: Ross Video LimitedInventors: Bastiaan Bruno Saleh, Benoit Gatien, Troy David English
-
Publication number: 20170060542Abstract: A system, computer-implemented method and computer program product for efficiently managing enterprise architecture using resource description framework is provided. The system comprises a solution configurator configured to facilitate defining one or more Resource Description Framework (RDF)/Extensible Markup Language (XML) models corresponding to one or more applications. The system further comprises an ontology parser configured to parse the one or more defined RDF/XML models to create corresponding Java objects. Furthermore, the system comprises a solution manager configured to process the one or more parsed RDF/XML models for creating the corresponding one or more applications. Also, the system comprises a user interface generator configured to generate one or more graphical user interfaces corresponding to the one or more created applications, wherein the created one or more applications facilitate efficient management of enterprise architecture.Type: ApplicationFiled: December 7, 2015Publication date: March 2, 2017Inventors: Kamales Mandal, Tapodhan Sen
-
Publication number: 20170060543Abstract: A principal model is configured within a memory to facilitate automatic generation of at least one resource for use by a computer-executable application. At least one model item required for a task that is absent from the principal model is identified. The absent model item is instantiated in a decoration model that operates with the principal model to augment operational functionality of the principal model.Type: ApplicationFiled: November 11, 2016Publication date: March 2, 2017Inventors: Benjamin Halberstadt, Eliezer Israel, Boris Melamed, Guy Yitzhaki
-
Publication number: 20170060544Abstract: A method for building a software application includes: creating data fields based on input from a user, each having a value or a reference to another data field; grouping the data fields into node data structures, each having a node state for specifying allowable operations; assigning respective node data structures to a plurality of container data structures, respectively, where each container data structure stores information about conditions, actions, actions results, and permission settings to operate on one or more data fields. The method further includes creating tree data structures by linking the container data structures in a predetermined hierarchical manner, where each tree data structure includes information about relations of container data structures and node data structures in each tree data structure; and linking the tree data structures in an ordered sequence to create a computer executable process for performing an application.Type: ApplicationFiled: November 14, 2016Publication date: March 2, 2017Inventor: Kirsten Ingmar Heiss
-
Publication number: 20170060545Abstract: Software that uses natural language to describe user interactions with user interfaces and associates those natural language descriptions with goals that are achievable using the user interfaces. The software performs the following operations: (i) identifying a first set of action(s) performed by a first user using a user interface (UI), wherein each action of the first set of action(s) corresponds to a respective UI element; (ii) generating a set of natural language statement(s) corresponding to the identified first set of action(s); and (iii) associating one or more natural language statements of the set with a goal, wherein the goal is achievable by performing one or more of the actions of the first set of action(s) using their respectively corresponding UI elements.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Corville O. Allen, Robert E. Loredo, Adrian X. Rodriguez, Eric M. Woods
-
Publication number: 20170060546Abstract: Systems, methods, and other embodiments are disclosed that provide self-healing solutions to problems that occur during a software build. In one embodiment, build log data structures of build data, generated during execution of a software build of a software application, are automatically monitored. The build data is automatically analyzed to detect patterns that can result in build violations. Detected patterns are automatically matched to remediation solutions stored in a knowledge database. The remediation solutions are automatically applied to the software application.Type: ApplicationFiled: September 1, 2015Publication date: March 2, 2017Inventors: Kyasaram Vishwa PRASAD, Anilkumar GANDE, Srikanth Subrahmanya NANDULA, Subhadarshi MISHRA
-
Publication number: 20170060547Abstract: A computer-implemented method includes receiving a set of complete source instructions to process a source code entity, an incremental build part, and a set of file definitions. The method analyzes the set of complete source instructions. The method identifies, from the set of analyzed source instructions, a set of operations that reference the incremental build subset. The method repeats: (i) determining, for each operation, whether any additional files are affected by the operation, the additional files forming a set of affected files; (ii) creating a combined set of files, the combined set of files consisting of the set of affected files and the incremental build subset; and (iii) updating the set of operations to include those from the analyzed source instructions that reference the combined set of files; until no new files are added to the combined set of files. The method generates a set of incremental source instructions.Type: ApplicationFiled: November 5, 2015Publication date: March 2, 2017Inventors: Michael S. Fulton, Gary I. Mazo, Brian W. Svihovec
-
Publication number: 20170060548Abstract: An information processing apparatus includes: a memory configured to store a first code; and a processor configured to compile a source file to generate the first code, wherein the processor: generates a second code, which is executable by the processor, based on a result of analysis of the source program; and divides the second code into blocks of a size equal to or smaller than a given size including a reservation region to generate the first code.Type: ApplicationFiled: July 12, 2016Publication date: March 2, 2017Applicant: FUJITSU LIMITEDInventors: Kohta Nakashima, Yuto Tamura, MASAO YAMAMOTO
-
Publication number: 20170060549Abstract: A method, apparatus, and/or computer program product generates a predictive data structure for an application when operating offline in a network connected data processing system, the application comprising source code having an execution path. The method comprises: determining an exit point within the source code of the application; determining, from the exit point, an execution path comprising at least one conditional statement; identifying one or more branches of the at least one identified conditional statement and for each identified branch determining an expected response; for each determined expected response, generating a data structure from the response; continuing along the execution path of the source code from the exit point and replacing each request for a resource in the source code with a pointer to the generated data structure; and executing the source code with the pointer to the generated data structure from the determined exit point.Type: ApplicationFiled: November 16, 2016Publication date: March 2, 2017Inventor: Benjamin J. Fletcher
-
Publication number: 20170060550Abstract: A computer-implemented method includes receiving a set of complete source instructions to process a source code entity, an incremental build part, and a set of file definitions. The method analyzes the set of complete source instructions. The method identifies, from the set of analyzed source instructions, a set of operations that reference the incremental build subset. The method repeats: (i) determining, for each operation, whether any additional files are affected by the operation, the additional files forming a set of affected files; (ii) creating a combined set of files, the combined set of files consisting of the set of affected files and the incremental build subset; and (iii) updating the set of operations to include those from the analyzed source instructions that reference the combined set of files; until no new files are added to the combined set of files. The method generates a set of incremental source instructions.Type: ApplicationFiled: August 28, 2015Publication date: March 2, 2017Inventors: Michael S. Fulton, Gary I. Mazo, Brian W. Svihovec
-
Publication number: 20170060551Abstract: A method and system for automatically integrating component logs is provided. The method includes retrieving from a software application, high level log identification values representing transactions executed by the software application. Compiled machine language identification values representing compiled code associated with the software application and the hardware device are retrieved from an agent and a high level log identification value of the high level log identification values is identified. The high level log identification value is associated with an instruction set processed by a central processing unit (CPU). An instruction set identification value is correlated with the compiled machine language identification values. The compiled machine language identification values are converted into decompiled machine language identification values and the decompiled machine language identification values are correlated with log levels associated with the high level log identification values.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Faried Abrahams, Geetha Adinarayan, Raman Harishankar, Gandhi Sivakumar
-
Publication number: 20170060552Abstract: A method, executed by a computer, for splitting live register ranges includes identifying one or more H pathways comprising one or more H nodes having high register pressure, identifying an L pathway consisting of two or more L nodes, and inserting register splitting instructions for each symbolic register that is live in both the one or more H pathways and the L pathway, wherein the register splitting instructions are inserted at a starting node of the one or more H pathways. A computer program product and computer system corresponding to the above method are also disclosed herein.Type: ApplicationFiled: August 28, 2015Publication date: March 2, 2017Inventor: Steven J. Perron
-
Publication number: 20170060553Abstract: Methods and systems for optimizing an application include optimizing, with a processor on a first device, an application for a second device in accordance with an application execution profile received from the second device to generate a binary for the application that is optimized for use indicated by the application execution profile. The optimized binary is transmitted to the second device.Type: ApplicationFiled: August 25, 2015Publication date: March 2, 2017Inventors: Kiyokuni Kawachiya, Kazuaki Ishizaki, Moriyoshi Ohara, Mikio Takeuchi
-
Publication number: 20170060554Abstract: This invention generates, when the application issues a request, the native code of a function required at the timing and registers the native code in a code cache. This makes it possible to perform processing at high speed as long as the function is requested at a timing earlier than the timing of actually executing the function. This apparatus includes an execution unit configured to execute a native code corresponding to a function requested from the application when the native code is stored in a cache memory and to execute the function requested from the application in an interpreter form when the native code is not stored in the cache memory, and a dynamic compilation unit configured to compile, when a compilation request is received from the application, a requested function and record a generated native code in the cache memory.Type: ApplicationFiled: August 16, 2016Publication date: March 2, 2017Inventor: Takenori Asami
-
Publication number: 20170060555Abstract: A method, system and computer-usable medium for linking a set of executable code snippets to perform a complicated task, comprising: decomposing a natural language statement into a plurality of decomposed natural language components; searching a repository of code snippets to identify code snippets corresponding to each of the decomposed natural language components; ordering execution of the code snippets based upon the plurality of decomposed natural language components; and, executing the code snippets in order of the natural language statement requests until a final outcome is achieved.Type: ApplicationFiled: September 22, 2015Publication date: March 2, 2017Inventors: Corville O. Allen, Heather L. Duschl, Marit L. Imsdahl, Alexandra D. Markello, Dana L. Price
-
Publication number: 20170060556Abstract: As disclosed herein a method, executed by a computer, includes receiving, from a monitoring agent, a notification that an artifact corresponding to a deployed software image has been modified or the artifact has been referenced by a support application, and determining if the artifact is a relevant artifact and should be preserved. The method further includes determining an action corresponding to the relevant artifact to provide an identified action, and performing, prior to deploying a new software image, the identified action. A computer system, and a computer program product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: August 25, 2015Publication date: March 2, 2017Inventors: Leho Nigul, Basalingayya G. Salimath
-
Publication number: 20170060557Abstract: The present disclosure involves systems, software, and computer implemented methods for deploying a multiple target application (MTA). One example method includes identifying a MTA for deployment. The MTA includes one or more software modules and is associated with a deployment descriptor that identifies at least one dependency associated with the one or more software modules. One or more target platforms are identified for deployment of the MTA. The one or more software modules are deployed on the one or more target platforms. Deploying the one or more software modules includes implementing the at least one dependency identified in the deployment descriptor.Type: ApplicationFiled: October 9, 2015Publication date: March 2, 2017Inventors: Chaim Bendelac, Klaus Kopecz, Lior Okman
-
Publication number: 20170060558Abstract: A service provider system may include an application fulfillment platform that delivers desktop applications on demand to desktops on physical computing devices or virtual desktop instances of end users. An application delivery agent installed on an end user's computing resource instance may store application state data (e.g., configuration data, runtime settings, or application templates) or scratch data that is generated by an application executing on the computing resource instance to a secure location on service provider storage resources. After a machine failure or change, or a rebuilding of a virtualized computing resource instance or virtual desktop instance, an application delivery agent installed on the new machine or instance may reinstall the application, retrieve the stored application state or scratch data from service provider resources, and restore the application to the last known persisted state.Type: ApplicationFiled: November 14, 2016Publication date: March 2, 2017Applicant: Amazon Technologies, Inc.Inventors: SHESHADRI SUPREETH KOUSHIK, YANG LIN, JAIMIN PARESH SHAH, ABHINAV SHRIVASTAVA, VIKRAM VIJAY SAHIJWANI, DAVID PESSIS
-
Publication number: 20170060559Abstract: A vehicle may receive a software update to be installed to a vehicle electronic control unit (ECU). The vehicle ECU may download a software update received from a server to a first storage; generate a nonce value associated with the software update; send to the server, a swap authorization request including the generated nonce value; receive a swap authorization including the nonce value and a command-and-control signature from the server; validate the signature and the nonce value from the swap authorization; and reboot using the first storage instead of a second storage when the recovered nonce value matches the generated nonce value.Type: ApplicationFiled: August 25, 2015Publication date: March 2, 2017Inventors: Xin YE, Aldi CAUSHI, John R. BIELAWSKI, JR., Michael Raymond WESTRA
-
Publication number: 20170060560Abstract: The present disclosure describes testing regression and compatibility of software and associated hardware. Embodiments herein disclosed receive an indication from a user to test the regression and the compatibility of proposed software; access software files related to installation of the proposed software; present a verification interface to the user, wherein the verification interface includes various validation functions for validating entries created or updated along with the proposed software being installed or uninstalled, such as a registry entry, a log file entry, an Add or Remove Programs entry, and the like, wherein when each of the validation functions is selected, the system automatically determines if the corresponding entry for installation or uninstallation of the proposed software is successful. Embodiments herein disclosed further receive an indication from the user for selection of the validation functions and present to the user an indication of success of the validation of the entries.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Amit Kumar, Vivek Kumar, Hitendra Kumar, Purushottam Baghel
-
Publication number: 20170060561Abstract: An independent product upgrade function is associated with each of multiple software products installed in a set of multiple computing devices. Responsive to a triggering event, each upgrade function determines whether the corresponding product can be updated based on rules for the corresponding product. Upgrade may be dependent on other products, but the upgrade function need not know the conditions for upgrading other products. If a product can be updated, update is performed and all other products are notified. Each of the other product upgrade functions then determines whether its corresponding product can be upgraded as a result of the recent upgrade to the first product, and if so, another set of notifications is sent. This cycle continues until all dependent products have been updated. Upgrade functions preferably operate in a peer-to-peer relationship, and upgrade can be initiated in any node.Type: ApplicationFiled: August 30, 2015Publication date: March 2, 2017Inventors: Robert Miller, Kiswanto Thayib
-
Publication number: 20170060562Abstract: A method, a device, and a non-transitory storage medium having instructions to deploy files of a web-based application, wherein a deploying includes: receive an upload of the files from a user device via a web browser, and store the files; receive from the user device via the web browser, a first request to run the web-based application that has been deployed; run the web-based application in response to the first request, and wherein during a running of the web-based application: determine a type of a second request for data to be used to generate a user interface of the web-based application; obtain the data based on the type of the second request; and render the user interface based on the obtained data.Type: ApplicationFiled: August 31, 2015Publication date: March 2, 2017Inventors: David Lopez, Benjamin Pomales, Timothy E. Richmond, Umashankar Velusamy
-
Publication number: 20170060563Abstract: Adding an instance to a series in a fashion that preserves the series for both modern and legacy systems, even when the addition would not ordinarily be compatible with the legacy system. A method includes identifying a master message. The master message includes default values for events in the series. The method further includes identifying user input for a new event in the series. The user input identifies exceptions to the default values.Type: ApplicationFiled: September 1, 2015Publication date: March 2, 2017Inventors: Jaskaran Singh, Dipak Sarjerao Pawar, Szymon Madejczyk, Roberto Ribeiro da Fonseca Mendes
-
Publication number: 20170060564Abstract: According to one embodiment, an electronic device includes a memory and a hardware processor. The hardware processor is coupled to the memory. The hardware processor is configured to obtain a difference file for updating a program, and apply the difference file to the program at a first time point at which the program is permitted to be updated after elapse of a first application delay time from issuance of the difference file or obtention of the difference file.Type: ApplicationFiled: January 13, 2016Publication date: March 2, 2017Inventor: Midori Nakamae
-
Publication number: 20170060565Abstract: It is often desired to add or change the functionality of an existing executable, also known as binary. Simply splicing in new machine code into the binary will not work due to host system-specific and platform-specific limitations. The present invention will enable adding any new code to an existing program while overcoming the aforementioned consistency limitations and maintaining the original functionality.Type: ApplicationFiled: August 8, 2016Publication date: March 2, 2017Applicant: APPDOME LTD.Inventors: Avner Yehuda, Omer Schory, Meir Tsvi, Daniel Zatuchne
-
Publication number: 20170060566Abstract: The present disclosure relates to a method and a device for installing a plug-in of a smart device in a mobile terminal. An integrated application is disclosed for controlling a plurality of smart devices using one mobile terminal based on installation of plug-ins each for one of the plurality of smart devices. In one embodiment, a method for installing a plurality of plug-ins each for a plurality of smart home devices in a mobile terminal is disclosed.Type: ApplicationFiled: August 11, 2016Publication date: March 2, 2017Applicant: Xiaomi Inc.Inventors: Feiyun Li, Hao Chen, Enxing Hou
-
Publication number: 20170060567Abstract: A wireless terminal and a method for updating software installed on the wireless terminal are provided. The wireless terminal is communicable with an external device, a first server, and a second server. The method includes receiving update policy information on the software from the first server, obtaining a latest version of the software newer than a version of the software from the second server, and, if state information of the external device satisfies an installation condition for the obtained latest version of the software according to the received update policy information, installing the obtained latest version of the software on the wireless terminal.Type: ApplicationFiled: August 25, 2016Publication date: March 2, 2017Inventors: Sang Jae KIM, Soon Yeon CHOI
-
Publication number: 20170060568Abstract: A system and method for developing and distributing software. Third-party software development kits (SDKs) are received and stored by a software development and distribution platform (SDDP), with each third-party SDK published by a third-party service provider, the plurality of third-party SDKs including a first third-party SDK. An installation request from an application developer machine is received by the SDDP and the SDDP sends the first third-party SDK in response to the installation request for installation in an application under development.Type: ApplicationFiled: September 2, 2016Publication date: March 2, 2017Inventors: Jeffrey H. Seibert, JR., Wayne Chang
-
Publication number: 20170060569Abstract: A multi-tenant software program is maintained in a computing environment having a plurality of compatible instances of the program, each adapted to serve a plurality of tenants, with each controlling corresponding individual data. The method includes: receiving a maintenance request for a target instance, the target instance having one or more target tenants each controlling corresponding target individual data; selecting an auxiliary instance from other instances different from the target instance; providing the target individual data of each target tenant to the auxiliary instance; redirecting each target tenant by forwarding each target tenant request to the auxiliary instance; applying a maintenance operation on the target instance according to the maintenance request; returning the target individual data of each target tenant from the auxiliary instance in response to the applying of the maintenance operation; and restoring the serving of each target tenant request by the target instance.Type: ApplicationFiled: August 24, 2015Publication date: March 2, 2017Inventors: Sandro PICCININI, Riccardo PIZZUTILO, Luigi PICHETTI
-
Publication number: 20170060570Abstract: An independent product upgrade function is associated with each of multiple software products installed in a set of multiple computing devices. Responsive to a triggering event, each upgrade function determines whether the corresponding product can be updated based on rules for the corresponding product. Upgrade may be dependent on other products, but the upgrade function need not know the conditions for upgrading other products. If a product can be updated, update is performed and all other products are notified. Each of the other product upgrade functions then determines whether its corresponding product can be upgraded as a result of the recent upgrade to the first product, and if so, another set of notifications is sent. This cycle continues until all dependent products have been updated. Upgrade functions preferably operate in a peer-to-peer relationship, and upgrade can be initiated in any node.Type: ApplicationFiled: September 24, 2015Publication date: March 2, 2017Inventors: Robert Miller, Kiswanto Thayib
-
Publication number: 20170060571Abstract: A system and method for masking the complexity of developing software for a heterogeneous target execution environment may be established by configuring an integrated development environment to perform certain masking mechanisms. For example, the integrated development environment used to develop a background process may be used to create a background process-file on the target execution environment. The integrated development environment may further be configured to synchronously connect with an agent on the target execution environment, allowing the agent to initiate the background process using the integrated development environment user credentials. Additionally, the integrated development environment may be configured to monitor completion of the background process execution on the target execution environment, and to return the output from the background process after completion to the integrated development environment user.Type: ApplicationFiled: August 31, 2015Publication date: March 2, 2017Applicant: UNISYS CORPORATIONInventors: Kelsey L. Bruso, Eugene J. Gretter, Alan Hood
-
Publication number: 20170060572Abstract: This technology relates to a method for managing the real-time risks associated with application lifecycle management platforms (ALM) comprising a plurality of application projects. In an embodiment, a risk management computing device is integrated within application lifecycle management platforms. The risk management computing device maps one or more risks from pre-defined risks to one or more delivery parameters. Based on the mapping the risk management computing device monitors one or more delivery parameters for identifying one or more risks associated with the application. On identification of one or more risk, the risk management computing device provides solutions to mitigate the occurrence of one or more risks.Type: ApplicationFiled: October 15, 2015Publication date: March 2, 2017Inventor: Jayashree Sripathan
-
Publication number: 20170060573Abstract: A reverse API system is provided wherein data retrieved from disparate data sources, including legacy information in obsolete formats, are standardized and combined. An interactive text editor software tool allows an administrator to compose or edit standardization schema that include data source formulas which identify the data locations and any needed access protocols and that also include standardization functions which define transformations and other data handling instructions whereby retrieved data is standardized, unified and optionally enhanced by the system prior to delivery to a requestor. Requestors invoke the composed schema stored in a library, which invocation then triggers the retrieval and standardization of the data by the system executing the data source formulas and standardization functions associated with that selected schema.Type: ApplicationFiled: August 26, 2016Publication date: March 2, 2017Applicant: 6Connect, Inc.Inventor: William R. Renner
-
Publication number: 20170060574Abstract: A method for enabling intelligence at the edge. Features include: triggering by sensor data in a software layer hosted on either a gateway device or an embedded system. Software layer is connected to a local-area network. A repository of services, applications, and data processing engines is made accessible by the software layer. Matching the sensor data with semantic descriptions of occurrence of specific conditions through an expression language made available by the software layer. Automatic discovery of pattern events by continuously executing expressions. Intelligently composing services and applications across the gateway device and embedded systems across the network managed by the software layer for chaining applications and analytics expressions. Optimizing the layout of the applications and analytics based on resource availability. Monitoring the health of the software layer. Storing of raw sensor data or results of expressions in a local time-series database or cloud storage.Type: ApplicationFiled: August 29, 2016Publication date: March 2, 2017Inventors: Sastry KM Malladi, Thirumalai Muppur Ravi, Mohan Komalla Reddy, Kamesh Raghavendra
-
Publication number: 20170060575Abstract: A repository control computer checks-out source code from a source code repository to a local memory of a developer's computer responsive to receiving a developer initiated check-out message. The control computer repetitively checks-in intermediate versions of the source code from the local memory of the developer's computer to the source code repository responsive to corresponding occurrences of a condition defined by a rule being satisfied. The control computer checks-in a final version of the source code from the local memory of the developer's computer to the source code repository responsive to receiving a developer initiated check-in message.Type: ApplicationFiled: September 1, 2015Publication date: March 2, 2017Applicant: CA, Inc.Inventor: Ganesh Prasad Agrawal
-
Publication number: 20170060576Abstract: A method includes receiving a selection of a predefined implementation variation for a variable service component in at least one computing device configured to implement a service-oriented application; and executing source code associated with the variable service component in response to receiving the selection, wherein the source code performs a predetermined rebuilding of at least a portion of the service-oriented application such that the variable service component is redefined according to the selected implementation variation.Type: ApplicationFiled: November 10, 2016Publication date: March 2, 2017Applicant: International Business Machines CorporationInventors: Ge Jin, Jia Tan, Zhi Rong Zhou