04th week of 2014 patent applcation highlights part 55 |
Patent application number | Title | Published |
20140025559 | Credit Default Swap Post Credit Event - Methods, systems and apparatuses are described for determining that a credit event has occurred for an entity; determining an upfront price and a bond price for a credit default swap deliverable (CDSD) contract associated with the entity; determining a first weighting for the upfront price and a second weighting for the bond price; and calculating a settlement price for the CDSD contract that is a function of the first weighting, the second weighting, the upfront price, and the bond price. | 2014-01-23 |
20140025560 | METHOD AND SYSTEM FOR THE EXCHANGE OF INTELLECTUAL PROPERTY ASSETS & THE FORTIFICATION OF COMPANIES WITH INTELLECTUAL PROPERTY TO ENSURE FAVORABLE OUTCOMES - A computer based method and system for exchange of intellectual property assets which permits intellectual property (IP) buyers and IP sellers to interact via a marketplace exchange includes a marketplace exchange accessed via a global communication network by IP buyers and IP sellers through utilization of computers. The marketplace exchange also includes a mechanism for posting of a listing of IP sellers on the marketplace exchange and a transactions section for facilitating transactions relating to intellectual property assets posted on the marketplace exchange. | 2014-01-23 |
20140025561 | SYSTEMS AND METHODS FOR AN ONLINE CREDIT DERIVATIVE TRADING SYSTEM - A credit derivative trading system comprises a credit derivative authority configured to receive defined positions for credit derivatives and update a plurality of trade clients in real-time whenever there is movement in the market for a particular credit derivative. | 2014-01-23 |
20140025562 | ENHANCED CREDIT REPORTING SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT - A system, method and computer program product cooperate to gather and report information relevant to a consumer's credit that is not typically reported on a credit report from one of the major credit bureaus. By accessing other databases regarding borrower specific financially relevant information (e.g., judgments, liens, rental payment compliance, alternative credit transactions, etc.), enhanced data is available for making better lending decisions. Removal of transactions that would prevent compliance with the Fair Credit Reporting Act is performed, as well as removal of transactions that are erroneous for a particular consumer or include information that are not associated with that particular consumer. | 2014-01-23 |
20140025563 | Online Purchasing System Supporting Lenders With Affordability Screening - An online system uses, in various embodiments of the invention, credit report information, loan affordability screening and credit approval and management functionality to facilitate the purchase and finance of products online. The online system may include both sellers of products and lenders that offer financing to buyers seeking to purchase the products. The system may automatically obtain a buyer's credit report information and use that information to determine if the buyer is pre-approved, for example, to obtain financing for a particular product or products. The system also enables use of buyer credit information to identify only those of a seller's products for which the buyer is pre-approved, for example, to finance using one or more loans. The system then enables selection of an identified product or products for purchase, and selection of a loan, for example, for financing of the selected product or products. Credit approval (or pre-approval) may be performed automatically, and along with credit processing, may be performed completely online. | 2014-01-23 |
20140025564 | SYSTEM FOR AGGREGATING PAYMENTS FROM MULTIPLE PAYERS - Receiving payment requests at an from multiple payers for a common supplier, the payments are received by an entity that is separate from the common supplier and the multiple payees; aggregating the payment requests and creating a single aggregated payment request at a hub computing system, the aggregating and creating includes choosing an interchange rate at the aggregator for the aggregated payment that is lower than an interchange rate that at least one of the payment requests would qualify for if not aggregated; electronically transmitting the aggregated payment request from the hub computing system to an acquirer processor computing system associated with the supplier; creating a reconciliation report; and transmitting the reconciliation report to the supplier. | 2014-01-23 |
20140025565 | SYSTEM AND METHOD FOR EMBEDDING FINANCIAL-VALUE ACCOUNT PROVISIONING AND MANAGEMENT FUNCTIONALITY WITHIN A DATABASE ACCOUNT MANAGEMENT SYSTEM - A method and system are provided for integrating a the generation and communication of digitized data associated with a monetary credit account, such as a gift card account, with an account management suite, such as a sales automation system or a customer relationship management system. The invented method allows a user of an electronically accessible data base to create an assigned-value account that is pre-authorized for use with at least one designated merchant, credit card network, debit card network or financial services provider. The user may select from among a plurality of primary merchants, wherein the identification of the assigned-value account includes a branding association of a single primary merchant. Access to the established assigned-value account may be furnished to a beneficiary by an electronic communications network, whereby the beneficiary may receive and/or provide identity information required and sufficient to enable access to the assigned-value account. | 2014-01-23 |
20140025566 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR A COLLECTION ON DELIVERY DELAYED DEPOSIT SERVICE - Various embodiments provide systems for providing a delayed deposit collection on delivery (COD) option to a customer. The system may comprise one or more storage areas containing customer profile data, payment data, package data, and parameter data, such as a default deposit parameter. The system may further comprise one or more computer processors configured to: (a) receive a portion of the payment data and the package data; (b) receive an indication of a payment deposit parameter; (c) associate the payment deposit parameter with the payment data; (d) compare the payment deposit parameter to the default deposit parameter; (e) calculate a payment deposit date based at least in part on the comparison and at least a portion of the package data comprising delivery data; (f) and facilitate depositing the payment mechanism on the calculated payment deposit date. Associated computer program products and computer-implemented methods are also provided. | 2014-01-23 |
20140025567 | PAYMENT SYSTEM PRE-SELECTION ENVIRONMENT PROCESSING - Systems and methods for payment system pre-selection environment processing are provided. One such method comprises receiving payment information from a payment device from a consumer. The method further comprises executing a pre-selection phase to determine a preferred application identifier (AID) and routing option based on the payment information. The method also comprises completing a transaction using the preferred AID and routing option. | 2014-01-23 |
20140025568 | SYSTEM AND METHOD FOR PRICING OF MERCHANT ACCOUNTS - A system for managing merchant payment transaction processing accounts is provided. The system includes a merchant initialization system that receives merchant account data from a user, such as to provide a quote to the merchant for payment processing. A transaction pricing system receives the merchant account data and provides transaction pricing data for payment transaction processing in response to the merchant account information. User access to one or more merchant account pricing algorithms that are used generate the merchant account pricing data in response to the merchant account data is restricted to a predetermined set of users, so as to prevent unauthorized users from obtaining access to the merchant account pricing algorithms. | 2014-01-23 |
20140025569 | PRODUCT LEASE WITH PAYMENT REDUCTION OR SUSPENSION PER MONTH BASED ON USE - A method of providing an electromechanical device to a user includes leasing use of the device to the user for a lease term and in exchange for a dynamic fee. The method further includes determining the fee on a periodic basis during the lease term. The process of the determining includes determining an amount of a resource consumed by the device during a select period. The determining further includes computing the fee in response to the amount. The determining also includes automatically adjusting the fee in response to a change in the amount between the select period and one of a preceding period and an initial rate. The method includes outputting the fee for each period during the lease term. | 2014-01-23 |
20140025570 | READABLE INDICIA FOR BILL PAYMENT - Embodiments of the invention are directed to systems, methods and computer program products for processing readable indicia for bill payment. An exemplary system is configured to: receive information associated with readable indicia associated with a bill; and process the readable indicia to initiate one or more options to schedule payment for the bill, wherein the one or more options comprise a first option to pay the bill immediately, a second option to schedule payment of the bill at a predetermined time in the future, and a third option to establish an electronic link to the merchant in order to schedule periodic payment of the bill. | 2014-01-23 |
20140025571 | SYSTEM AND METHOD FOR DUAL MESSAGE CONSUMER AUTHENTICATION VALUE-BASED EFT TRANSACTIONS - A system and method for processing funds transfers that may utilize a dual-message transaction with separate authorization and settlement messages for (consumer authentication value) CAV-based transactions. Initial authorization messages may be communicated to authorize and guarantee funds to a payee for goods and/or services before they are rendered. Thereafter, the payee may initiate one or more settlement advice request messages associated with the authorization/pre-authorization, as goods and/or services are rendered without authorization of CAV. | 2014-01-23 |
20140025572 | Tracing as a Service - An instrumented execution environment may connect to an execution environment to provide detailed tracing and logging of an application as it runs. The instrumented execution environment may be configured as a standalone service that can be configured and purchased. The instrumented execution environment may be deployed with various authentication systems, administrative user interfaces, and other components. The instrumented execution environment may engage a customer's system through a distributor that may manage a workload and distribute work to the instrumented execution environment as well as other worker systems. A marketplace may provide multiple preconfigured execution environments that may be selected, further configured, and deployed to address specific data collection objectives. | 2014-01-23 |
20140025573 | Distributed Electronic Commerce System, Method and Apparatus - A method for constructing electronic commerce services and conducting electronic commerce transactions is disclosed. The method is illustrated by instantiating and storing the electronic contract on a server; issuing and transmitting a token message to one or more contracting party's client device. Using a processor to intercept the token message and contact the server to retrieve the electronic contract associated with the token message; and downloading or uploading digital media as instructed by the electronic contract. The method is based on the uniform, highly expressive representation of electronic contracts as digital objects. A system based on a distributed object architecture that implements the method is also described. The architecture enables the execution of the promises encoded as part of an electronic contract to be executed on any device that implements an electronic contract interpreter mechanism. | 2014-01-23 |
20140025574 | READABLE INDICIA FOR A PAYMENT CLAIM - Embodiments of the invention are directed to systems, methods and computer program products for processing readable indicia for a payment claim. An exemplary system is configured to: receive information associated with readable indicia associated with a payment claim; receive authentication credentials associated with the payment claim; and process the readable indicia and the authentication credentials to authorize a payment associated with the payment claim. | 2014-01-23 |
20140025575 | TECHNIQUES FOR OUT-OF-BAND TRANSACTION VERIFICATION - Various embodiments are generally directed to cooperation among networked devices to seek out-of-band verification that an online transaction is requested by a person authorized to do so. An apparatus comprises a processor circuit and a storage communicatively coupled to the processor circuit and storing a sequence of instructions operative on the processor circuit to receive a transaction request requesting performance of a transaction via a first communications channel from a transaction device; transmit a verification request to another computing device via a second communications channel; receive a response to the verification request via the second communications channel; and perform the transaction in response to an indication in the response that the transaction has been verified. Other embodiments are described and claimed herein. | 2014-01-23 |
20140025576 | Mobile Check-In - Methods and systems can facilitate more convenient shopping by users of a payment provider, such as Paypal, Inc. A user can purchase a product simply by swiping a card without being required to enter additional information, such as the user's personal identification number (PIN). Thus, the checkout process at the point-of-sale can be performed more easily and quickly. More particularly, a user can open an app on a mobile device and sign in to a payment provider system using the app. The app can show merchants near the user. The user can select one or more of the merchants. Selecting a merchant allows the user to check in with the merchant. Checking in with the merchant can result in pre-authorization of a purchase by the user with the merchant. | 2014-01-23 |
20140025577 | SYSTEM AND METHOD FOR SECURE TRANSACTIONS UTILIZING PASSIVE NEAR-FIELD COMMUNICATIONS DEVICES - A method for authorizing a transaction between a first party utilizing a client device and a second party, including receiving an authorization request from the second party, the authorization request including first party data and second party data, retrieving stored data corresponding to the first party, comparing at least a portion of the first party data to at least a portion of the stored data corresponding to the first party, generating a first hash value from at least a portion of the authorization request, generating a second hash value from at least a portion of the stored data and at least a portion of the authorization request, and comparing the first hash value and the second hash value. | 2014-01-23 |
20140025578 | LEAST COST ROUTING INTERCHANGE FOR B2B PURCHASE CARD PAYMENTS - Methods and system for processing credit card payments, comprising receiving a credit card transaction, fabricating line item data to obtain favorable interchange rates for transactions, aggregating or disaggregating payments to obtain favorable interchange rates for transactions, and automatically deciding among various interchange rate options for transactions based on criteria chosen by the payer using these methods or system. | 2014-01-23 |
20140025579 | HUB AND SPOKES PIN VERIFICATION - A method for conducting PIN authorized EMV payments using an ordinary mobile phone. The credit card payment is conducted using a merchant's device comprising a card reader and a mobile phone a payment server and a buyer's mobile phone. A PIN entry request is sent from the merchant's device to the buyer's device via the payment server. A secure application in the buyer's device is executed and a PIN code may be entered securely. The entered PIN code is either verified, via the payment server, against the credit card in said merchant's device or against a bank server. Thus, secure credit card payments can be performed using an ordinary unsecure mobile device's. | 2014-01-23 |
20140025580 | Method and System for Securing Payment Transactions - A method for facilitating the widespread use of the PIN-Debit payment method for Internet “eCommerce” and mobile payments sales which requires little or no change for the cardholders, merchants, debit networks and card issuers based primarily on the introduction of a layer of middleware and wherein the Debit Networks and Issuing Banks may customize the implementation of the services based on individual strategy and cardholder preferences. | 2014-01-23 |
20140025581 | MOBILE TRANSACTIONS USING AUTHORIZED TOKENS - Conducting mobile transactions comprises determining, using a processor, whether a network is available to facilitate a mobile transaction. An interface, communicatively coupled to the processor, receives an encrypted token from a mobile device without using the network if the network is not available. The processor is further operable to process the encrypted token to complete the mobile transaction. | 2014-01-23 |
20140025582 | Digital Token Generator, Server For Recording Digital Tokens and Method For Issuing Digital Token - A disconnected digital token generator is provided. which is capable of generating and displaying or delivering a digital token for a customer. The customer can take a picture of the digital token using a smart phone and then communicate with a server through a hyperlink represented by the picture using the smart phone. The disconnected digital token generator thus can be used for issuing a digital token without requiring any networks or logical connections. | 2014-01-23 |
20140025583 | ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION - An electronic transaction verification system for use with transaction tokens such as checks, credit cards, debit cards, and smart cards that gathers and transmits information about the transaction token and biometric data. Customers can be enrolled in the system by receiving customer information that includes at least a biometric datum, associating the received customer information with a transaction instrument issued to the customers and storing the received customer information and the issued transaction instrument information in a database for future reference. | 2014-01-23 |
20140025584 | INDICIA ENCODING SYSTEM WITH INTEGRATED PURCHASE AND PAYMENT INFORMATION - An indicia encoding system is disclosed herein that encodes integrated information on products and/or services selected for purchase and payment information for purchasing the selected products and/or services, in accordance with a variety of embodiments involving various methods, devices and systems. In one illustrative embodiment, a method may include entering purchase order information via one or more input/output components. The purchase order may include an indication for one or more products and/or one or more services. The method may also include entering payment information, including information on a method of payment, via one or more input/output components. The method may also include generating a machine-readable indicia that encodes both the purchase order information and the payment information, with the payment information in an encrypted form; and displaying the machine-readable indicia on a screen. | 2014-01-23 |
20140025585 | DISTRIBUTING AUTHORIZED TOKENS TO CONDUCT MOBILE TRANSACTIONS - Token rules that facilitate determining whether to generate a token for use in a mobile transaction are stored in a memory. The memory also stores token criteria associated with a user. A processor, communicatively coupled to the memory, accesses the token rules and determines whether to generate the token by applying at least a portion of the token rules to the token criteria associated with the user. The token is generated upon a determination to generate the authorized token, and the token is generated before the mobile transaction begins. An interface, communicatively coupled to the processor, communicates the token to a mobile device associated with the user. | 2014-01-23 |
20140025586 | SYSTEMS AND METHODS FOR CREATING AND MANAGING AN ONLINE COLLABORATIVE ENVIRONMENT - Creating and managing an online platform is described, including receiving I3 information from a user; receiving a request to create an online collaborative community (OCC); associating the I3 information with the online collaborative community; determining that an allowance is received from the user, the allowance indicates that at least one other user is allowed to join the OCC; determining that affirmation to join the OCC is received from each of the at least one other user; determining that each of the at least one other user provides an acceptance to an agreement, which gives the user control of the OCC and ownership of I3 information and grants the at least one other user access to the OCC and I3 information; and allowing the at least one other user to access the OCC and collaborate on the I3 information. | 2014-01-23 |
20140025587 | SYSTEMS AND METHODS FOR COMPUTING CAPITAL RATINGS FOR AN ONLINE COLLABORATIVE ENVIRONMENT - Computing capital ratings for an online collaborative environment is described, including receiving request for a capital rating, the request comprises a user identifier; determining I3 submission data associated with the user identifier; determining online collaborative community data based on the I3 submission data; determining industry information based on the I3 submission data; and computing the capital rating based at least on the I3 submission data, the online collaborative community data, and the industry information. | 2014-01-23 |
20140025588 | METHODS AND SYSTEMS FOR AUTOMATED ISSUE RESOLUTION - Methods and systems for resolving problems are disclosed. The methods and systems receive a communication regarding a first symptom of an underlying problem. In addition, the methods and systems perform operations to resolve the problem. If the problem is resolved, the methods and systems identify the problem by comparing the performed operations to a model. The methods and systems wait for a first amount of time and, after waiting for the first amount of time, determine whether a second symptom indicative of the problem is present. In some embodiments, if the problem is present the methods and systems attempt to resolve the problem. In addition, in some embodiments, if the problem is not present, the methods and systems mark the problem as resolved. | 2014-01-23 |
20140025589 | WASTE COMPRESSION DEVICE WITH FEE CALCULATION FUNCTION - A waste compression device with a fee calculation function is provided for shaking and compressing wastes and calculating the quantity of the wastes. The waste compression device includes a casing. The casing has therein: a storage cart; a compression unit for compressing the wastes in the storage cart; a vibration unit for shaking the storage cart; a quantity sensor; a storage level sensor; an interface unit; and a control unit. The control unit controls the compression and vibration. The interface unit determines the best time to shake and compress the wastes according to the wastes level, and instructs a ticketing unit to dispense a coupon for joining a points reward scheme or receiving a cash discount or a gift according to the wastes quantity. The waste compression device calculates the quantity of the wastes, reduces the volume of the wastes, and encourages consumers to take the initiative in recycling wastes. | 2014-01-23 |
20140025590 | System and method of operation for an automated process of IP search and submission to the USPTO - Pre-issuance submissions may be provided by any third party for addition to the record of a patent application. In addition, the post-grant review proceeding allows a third party to request the USPTO to review a recently issued patent based upon almost any ground of invalidity. The embodiments disclosed herein relate to an automated process of IP search and submissions to the. United States Patent and Trademark Office (USPTO) for pre-issuance submissions and post-grant review. The invention provides a new and efficient means of searching for patents related to a third-parties' business interests, and submitting references to the USPTO by an automated means. | 2014-01-23 |
20140025591 | SYSTEM AND METHOD FOR RECORDING AND DELIVERING A PERSONAL LEGACY TO A BENEFICIARY - A network-based system and a method for recording digital assets belonging to a first entity and delivering at least some of those digital assets to at least a second entity at a designated time or event is set forth. The system includes a designated server coupled to a network and including memory for storing digital assets, an electronic device, such as a computer or smart phone, configured to access the server via the network and capable of storing digital assets, and administrative tools for acquiring, storing, uploading, assigning and delivering digital assets to at least one person upon one of either a specified time or a specified event. Similarly, the method is focused on electronically delivering each assigned asset to the assigned entity upon occurrence of the specified time or event. | 2014-01-23 |
20140025592 | Seller Driven Real Estate Commerce - The invention is a system and method for generating seller-driven real estate commerce. The invention enables sellers of real property to communicate information about their available real estate directly to prospective buyers, and simultaneously extend offers of compensation directly to licensed real estate professionals. The real estate information is validated for accuracy and reliability, then confidential information is shared internally within a database assisted network of real estate professionals, and general information is distributed for public access. Potential buyers have the option of negotiating directly with sellers to create a binding purchase and sale agreement, or buyers may employ a licensed real estate professional to facilitate the purchase. When a licensed real estate professional is employed, that professional is paid according to the seller's original offer of compensation. | 2014-01-23 |
20140025593 | Compliance Analysis System - A compliance analysis system. The compliance analysis system is used to evaluate and monitor compliance with a collection of rules applicable to an entity or site. The compliance analysis system uses checklists to insure consistent inspections. The compliance analysis system provides comprehensive documentation of the inspection including reference materials based on the findings of the inspection. The compliance analysis system stores the results of each inspection and allows comparison of the inspection results over time and across sites. Reports and analysis by the compliance analysis system optionally estimate discretionary penalties for violations. User created additions and modifications to the compliance analysis system data collections may be submitted for approval and distribution to other compliance analysis system users. Custom and user specific content is preserved when shared compliance analysis system data collections are updated. | 2014-01-23 |
20140025594 | PRODUCT AUTHENTICATION METHOD - The present invention provides a commodity carrying out device that can reliably carry out a vertically-long shaped commodity in an upright state from a commodity storage column to a bucket. More specifically, since a commodity positioned at the front end side of a commodity storage column is tilted forward to be moved into a bucket, when moving a vertically-long shaped commodity in an upright state into a bucket, it is possible to move the commodity without the commodity toppling backwards. Thus, the commodity can be reliably moved into the bucket. | 2014-01-23 |
20140025595 | APPLYING FOR A JOB USING SOCIAL NETWORK INFORMATION - Systems and methods for displaying a user interface object associated with a job candidate's social networking site proximate to a job listing presented by a website are described. When a job candidate selects the user interface object, the systems and methods identify and/or obtain information associated with the job candidate that is located or otherwise stored at the social networking site of which the job candidate is a member. Once the information is identified and/or obtained, the systems and methods provide the information to the website, such as to a job application submission system associated with the website. | 2014-01-23 |
20140025596 | Presenting job listings based on the viewer of a webpage - Systems and methods for displaying job listings via a website are described. In some examples, the systems identify information associated with a viewer of a website, and selectively display job listing information based of the information associated with the viewer of the website, such as information attributed to the viewer within a social network of which the viewer is a member. | 2014-01-23 |
20140025597 | APPLYING FOR A JOB USING A MOBILE COMPUTING DEVICE - Systems and methods for displaying a user interface object associated with a job candidate's social networking site proximate to a job listing presented by a website are described. When a job candidate selects the user interface object, the systems and methods identify and/or obtain information associated with the job candidate that is located or otherwise stored at the social networking site of which the job candidate is a member. Once the information is identified and/or obtained, the systems and methods provide the information to the website, such as to a job application submission system associated with the website. | 2014-01-23 |
20140025598 | ELECTRONIC SOURCING MANAGEMENT SYSTEM - An electronic system may be configured to host prospect profiles for a plurality of prospects, host organization profiles for a plurality of organizations, and store an application template for each of the plurality of organizations. The electronic system may be configured to generate an aggregate application that is based on a first one of the plurality of application templates corresponding to a first organization and a second one of the plurality of application templates corresponding to a second organization. In response to a prospect submitting the aggregate application via an interface of the electronic system, the electronic system may be configured to extract data from the aggregate application for upload to a prospect tracking system of the first organization, and extract data from the aggregate application for upload to an prospect tracking system of the second organization | 2014-01-23 |
20140025599 | POINT OF SALE ELECTRONIC FUNDRAISING - An e-fundraising system includes a mobile device and a server. The mobile device produces, or is configured to respond to, an indicator of one or more specific donation amounts. The mobile device sends a first message to the server in response to the indicator. The mobile device receives a second message in response to the sent first message. The mobile device receives a user input based on the received second message. The mobile device sends a third message to a server in response to the user input. A user of the mobile device donates a specific amount based on the sent third message. | 2014-01-23 |
20140025600 | MODIFIED QUEUE LIST GENERATION - A queuing method and system. The method includes retrieving by a computer processor of a stationary computing system or a computing device, queue data placing an individual onto an initial queue list for receiving a service and ID data identifying the individual. The computer processor presents a status of the individual with respect to the queue list. The computer processor receives a request associated with the service and in response presents options for the individual. The computer processor receives a selection for an option and generates a modified queue list. | 2014-01-23 |
20140025601 | SYSTEM AND METHOD FOR IDENTIFYING REVIEWERS WITH INCENTIVES - A system and method includes obtaining reviews from an electronic commerce site, generating statistics via a specifically programmed machine regarding the reviews by reviewers, identifying reviewers via the machine having statistics indicative of a compensated reviewer, generating scores via the machine for the reviewers indicative of a probability that each reviewer is a compensated reviewer. The method may further or alternatively include monitoring user interactions via a specifically programmed machine with electronic commerce generated content with respect to reviews of products, and providing a reviewer score via the machine responsive to such user interactions, wherein the score is representative of the probability that a reviewer generating the score is compensated with respect to providing reviews. | 2014-01-23 |
20140025602 | System and Method For Transforming a Component Business Model - Seamless transition from a Component Business Model (CBM) to a Services Oriented Architecture (SOA) is achieved by converting a tabular representation of a CBM Heat Map to a Unified Modeling Language (UML) representation, and automatically converting the UML representation of a CBM Heat Map to a first iteration of input used during the subsequent SOA solution development using Service Oriented Modeling and Architecture (SOMA). | 2014-01-23 |
20140025603 | Funding Acquisition of University and Non-Profit Patent Portfolios - A method for funding IP procurement for non-profits such as universities and other non-profits that conduct research, includes providing a fund to hold interests in intellectual properties of a non-profit organization, receiving investments from investors to add to the fund to fund acquisition of intellectual properties of the non-profit, by machine, storing information regarding the investments, intellectual properties, and the investors into a database and distributing shares in the fund according to the value of investments made in the fund. | 2014-01-23 |
20140025604 | SYSTEM AND METHOD FOR MANAGING DERIVATIVE INSTRUMENTS - The present invention is a system and method for providing improved functionality for management of derivative instruments. The improved system includes functionality implementing a margin requirement determination function to allow optimization of a portfolio based on impacts to the collateral a user is required to provide for the positions in the swap portfolio. | 2014-01-23 |
20140025605 | DATABASE FOR RISK DATA PROCESSING - A database system for risk data processing is disclosed. The database system includes a database storage configured to store a group of data items stored in a first portion of the database and one or more benchmark sets of data items stored in a second portion of the database storage. The system further includes a database interface configured to provide access to the database storage. The system also includes a processor configured to perform risk data processing. | 2014-01-23 |
20140025606 | METHODS FOR SOLVING COMPUTATIONAL PROBLEMS USING A QUANTUM PROCESSOR - Methods for solving a computational problem including minimizing an objective including a set of weights and a dictionary by casting the weights as Boolean variables and alternately using a quantum processor and a non-quantum processor to successively optimize the weights and the dictionary, respectively. A first set of values for the dictionary is guessed and the objective is mapped to a QUBO. A quantum processor is used to optimize the objective for the Boolean weights based on the first set of values for the dictionary by minimizing the resulting QUBO. A non-quantum processor is used to optimize the objective for the dictionary based on the Boolean weights by updating at least some of the columns of the dictionary. These processes are successively repeated until a solution criterion is met. Minimization of the objective may be used to generate features in a learning problem and/or in data compression. | 2014-01-23 |
20140025607 | Confidence Based Vein Image Recognition and Authentication - An indexed hierarchical tree search structure converts each registration sample into an equivalent registration model based on the clustering of its registration item descriptors in the leaf nodes of the hierarchical tree. Query item descriptors from a query sample from someone wanting to be recognized are distributed into the hierarchical tree. A query model is defined based on the clustering of query item descriptors at the leaf nodes, and registration and verification are made based on comparison of the query model and the registration models. | 2014-01-23 |
20140025608 | System and Method for Generating Legal Documents - A system and method for the automated generation of documents for a legal transaction over a network using probabilistic prediction of customary usage. The predictions are generated by user experience, expert rules and machine learned classifiers based on user input of transaction data. The classifiers are constructed and tested on a partitioned dataset consisting of transaction data and legal document and clause selections in previous transactions. In one embodiment, such dataset is collected in a document management system. | 2014-01-23 |
20140025609 | Methods and Arrangements For Creating Customized Recommendations - A method and arrangement for creation of a customized recommendation of items in a user device ( | 2014-01-23 |
20140025610 | BENCHMARKING PROGRESSIVE SYSTEMS FOR SOLVING COMBINATORIAL PROBLEMS - A system is provided for benchmarking a progressive combinatorial solver. The system may initialize a parametric model collector, and perform a plurality of parametric trials associated with respective numbers of sub-part iterations of the progressive combinatorial solver. For each of the plurality of parametric trials, the system may initialize a statistical data collector. The system may perform a plurality of randomized executions of the progressive combinatorial solver, and add data including metric values for respective solutions of the executions to the statistical data collector. The system may then determine statistical parameter(s) of data in the statistical data collector, and add data including an indication of the respective number of sub-part iterations, a cost of finding the metric values for the respective solutions, and the statistical parameters of the trial to the parametric data collector. And the system may determine a best-fit model from data in the parametric data collector. | 2014-01-23 |
20140025611 | Knowledge based platform and associated methods to identify and aid in decision making skills of human being by mapping selection of products or services to underlying reasoning parameters.Underlying parameters are determined by domain experts based on domain of product or service in which user submitted his selection without providing any additional parameters - A knowledge based platform and associated methods to identify and aid in decision making skills of human being by mapping selection of products or services to underlying reasoning parameters. Underlying parameters being determined by domain experts based on domain of product or service in which user submitted his selection without providing any additional parameters. | 2014-01-23 |
20140025612 | ADAPTIVE COGNITIVE METHOD - An adaptive cognitive method has been revealed where each distinguishable information unit, entering a given input channel, receives a unique label /identifier/ which serves as a center for the dynamic building of a structure for the presentation of knowledge on the respective information unit. A basic marker for the analysis of the correlation between the separate information units is the time quantum which is recorded—for each change—in the data base. The time quantum is the number of the shortest periods of time for the system, which have so far passed. | 2014-01-23 |
20140025613 | APPARATUS AND METHODS FOR REINFORCEMENT LEARNING IN LARGE POPULATIONS OF ARTIFICIAL SPIKING NEURONS - Neural network apparatus and methods for implementing reinforcement learning. In one implementation, the neural network is a spiking neural network, and the apparatus and methods may be used for example to enable an adaptive signal processing system to effect network adaptation by optimized credit assignment. In certain implementations, the credit assignment may be based on a comparison between network output and individual unit contribution. The unit contribution may be determined for example using eligibility traces that may comprise pre-synaptic and/or post-synaptic activity. In certain implementations, the unit credit may be determined using correlation between rate of change of network output and eligibility trace of the unit. | 2014-01-23 |
20140025614 | METHODS AND DEVICES FOR PROGRAMMING A STATE MACHINE ENGINE - A state machine engine having a program buffer. The program buffer is configured to receive configuration data via a bus interface for configuring a state machine lattice. The state machine engine also includes a repair map buffer configured to provide repair map data to an external device via the bus interface. The state machine lattice includes multiple programmable elements. Each programmable element includes multiple memory cells configured to analyze data and to output a result of the analysis. | 2014-01-23 |
20140025615 | ASSESSING RISK ASSOCIATED WITH A DOMAIN - Devices, methods, and systems for assessing risk associated with a domain are described herein. One method includes determining an inherent risk associated with a number of boundaries associated with a domain, determining a threat potential associated with a number of disturbances associated with the domain, determining an actual threat associated with a number of control mechanisms associated with the domain, and determining an overall risk associated with the domain based on the inherent risk, the threat potential, and the actual threat. | 2014-01-23 |
20140025616 | STRING PREDICTIONS FROM BUFFER - In a mobile device, the strings that make up a current thread in application are stored in a buffer. A thread is a series of communications sent between a user of the mobile device and one or more other users, such as a series of text messages or a series of emails. When the user enters text to continue the current thread, characters of the entered text are compared against the strings stored in the buffer, and strings that have the entered text as a prefix are selected and displayed to the user as string predictions in a soft input panel. Alternatively, the strings in the buffer may be used to increase the probabilities of matching strings in a dictionary or model that is used to select string predictions. | 2014-01-23 |
20140025617 | DETERMINING SOFT GRAPH CORRESPONDENCE - A method for determining a correspondence between a first node set of a first graph and a second node of a second graph includes building a feature representation for each of the first graph and the second graph, and inferring the correspondence between the first node set and the second node set based on the feature representations. | 2014-01-23 |
20140025618 | SYSTEM AND METHOD FOR COMPOSITE DISTANCE METRIC LEVERAGING MULTIPLE EXPERT JUDGMENTS - A system and method for a composite distance metric leveraging multiple expert judgments includes inputting a data distribution of multiple expert judgments stored on a computer readable storage medium. Base distance metrics are converted into neighborhoods for comparison, wherein each base distance metric represents an expert. The neighborhoods are combined to leverage the local discriminalities of all base distance metrics by applying at least one iterative process to output a composite distance metric. | 2014-01-23 |
20140025619 | CREATING VARIATIONS WHEN TRANSFORMING DATA INTO CONSUMABLE CONTENT - Concepts and technologies are described herein for creating variations when transforming data into consumable content. In accordance with the concepts and technologies disclosed herein, a computing device can execute a transformation engine for transforming data into the consumable content. The computing device can be configured to analyze the data to identify relationships among data elements or other portions of the data, and to identify any possible approaches to transforming the data (“worlds”) based upon the relationships and the data. The worlds can be ranked and selected based upon rank. The computing device can obtain rules associated with the selected and apply the rules to the data to generate the output. In some embodiments, the computing device can be configured to obtain and apply feedback regarding the world selection. | 2014-01-23 |
20140025620 | INFERRING USER MOOD BASED ON USER AND GROUP CHARACTERISTIC DATA - An individual's responsiveness to targeted content delivery can be affected by a number of factors, such as an interest in the content, other content the user is currently interacting with, the user's current location, or even the time of day. A way of improving targeted content delivery can be to infer a user's current mood and then deliver content that is selected, at least in part, based on the inferred mood. The present technology analyzes mood-associated characteristic data collected over a period of time to produce at least one baseline mood profile for a user. The user's current mood can then be inferred by applying one or more mood rules to compare current mood-associated data to at least one baseline mood profile for the user. | 2014-01-23 |
20140025621 | METHOD AND SYSTEM FOR PERFORMING ROOT CAUSE ANALYSIS - A root cause analysis engine uses event survival times and gradual deletion of events to improve analysis accuracy and reduce the number of required calculations. Certainty factors of relevant rules are recalculated every time notification of an event is received. The calculation results are held in a rule memory in the analysis engine. Each event has a survival time, and when the time has expired, that event is deleted from the rule memory. Events held in the rule memory can be deleted without affecting other events held in the rule memory. The analysis engine can then re-calculate the certainty factor of each rule by only performing the re-calculation with respect to affected rules that are related with the deleted event. The calculation cost can be reduced because analysis engine processes events incrementally or decrementally. Analysis engine can determine the most possible conclusion even if one or more condition elements were not true, because analysis engine can calculate the certainty factor of rule even if one or more events were not notified to analysis engine. | 2014-01-23 |
20140025622 | UNIVERSAL DATA DISCERNMENT - An contextual artificial intelligence system is disclosed. Intelligent business objects enable dynamic data object interaction and encapsulation of user context. Data is rationalized and data objects evolve by way of an artificial intelligence assisted process of self-discovery. Significant data is identified based upon factors such as cost, revenue and outcome and contextually significant result sets are automatically generated for users. | 2014-01-23 |
20140025623 | POSTERIOR PROBABILITY OF DIAGNOSIS INDEX - The likelihood of a disorder can be determined using a variety of techniques. One or more exhibited symptoms may be obtained for a patient. The likelihood that each symptom will be exhibited for the disorder can be computed, and a posterior probability of the disorder given the exhibited symptoms can be computed from the likelihood of the symptoms. Based on the resulting posterior probability of the disorder, a more accurate determination can be made of whether the patient is suffering from the disorder. | 2014-01-23 |
20140025624 | SYSTEM AND METHOD FOR DEMOGRAPHIC ANALYTICS BASED ON MULTIMODAL INFORMATION - The system and method of the present invention are described for automatic detection of error in the entry of particular category of individuals, especially referring to gender and age classification either real time while creating a database of such information or on an existing database on the record of individuals by analyzing their biometric characteristics like speech, image or face and other related demographic information like name of the individual in order to accord each individual with a unique identification. | 2014-01-23 |
20140025625 | AUTOMATED DATA ANALYSIS AND TRANSFORMATION - A transformation method and system is provided. The method includes generating a data hub application configured to embed extract, transform, and load (ETL) processes. The data hub application is linked to source tables and target tables. Meta data associated with the source and target tables is transferred from virtual views of the data hub application to an ETL work area of the ETL processes. An ETL job is generated and linked to the data hub application. ETL processes are executed and results are determined. | 2014-01-23 |
20140025626 | METHOD OF USING SEARCH ENGINE FACET INDEXES TO ENABLE SEARCH-ENHANCED BUSINESS INTELLIGENCE ANALYSIS - A query technique and interactive tool for analyzing unstructured data and structured data together through an easy-to-use interface. The query technique uses field indexes within a search engine to enable fast response times, scalability across large data sets, and availability to large audiences. This invention enables embodiments to combine the best features from search experiences with the best features from business intelligence experiences. A preferred embodiment of this technique enables all features to be fully composable so that one request includes structured data analysis features including multi-column grouping and aggregations as well as unstructured data analysis features including search term stemming and dynamic summaries. | 2014-01-23 |
20140025627 | Targeted Maintenance of Computing Devices in Information Technology Infrastructure - Techniques, an apparatus and an article of manufacture for targeted maintenance of computing devices in a system. A method includes assessing a maintenance request to determine a class of computing devices to which the request applies, selecting a propagation mechanism applicable to the class of computing devices, generating an agent based on the propagation mechanism to carry out the maintenance request on the class of computing devices, deploying the agent on at least one computing device in the class of computing devices, and propagating the agent to additional devices in the class of computing devices. | 2014-01-23 |
20140025628 | IMITATION OF FILE EMBEDDING IN A DOCUMENT - A container document can include a file node indicating a file and pointing to a location for the file that is separate from the container document on a server. An embedded relationship between the file and the container document can be imitated. The imitation can include responding to user input by performing the update on the file node, and by requesting that the server perform an update on the file that reflects the update performed on the file node. A request for an update to be performed on the file node can be received from a client at the server. In response to the request, the update can be performed on the file node at the server. A corresponding update, which reflects the update performed on the file node, can also be performed on the file at the server. | 2014-01-23 |
20140025629 | SYSTEM AND METHOD FOR GATHERING AND ANALYZING LITIGATION MARKETPLACE INTELLIGENCE - A system and method for gathering publicly-available litigation marketplace intelligence data for litigation support companies and law firms and about law firms, corporations, attorneys, and cases, and analyzing it. The litigation marketplace intelligence system and method employs an Internet-based, relational legal database (“IBLD”), which is hosted on a server, and maintained and administered by an IBLD Proprietor. Subscribers subscribe to the IBLD, which they access via an Internet connection to their local computer. A User associated with an IBLD Subscriber can create and save reports that select data fields and add criteria from any number of the Attorneys, Law Firms, Lawsuits, and G3K companies in the IBLD. | 2014-01-23 |
20140025630 | DATA-STORE MANAGEMENT APPARATUS, DATA PROVIDING SYSTEM, AND DATA PROVIDING METHOD - A data-store management apparatus includes a storage unit, a communication unit, and a processor. The storage unit holds response speed information indicating a response speed of each of data stores. The communication unit receives a subscribe request for requesting subscription of a topic updated by an update-side apparatus. The subscribe request includes communication speed information indicating a first communication speed of a first terminal that has transmitted the subscribe request. The processor identifies a first data store, among the data stores, that has a response speed higher than or equal to the first communication speed on the basis of the communication speed information included in the subscribe request and the response speed information. The processor causes the first data store to store the topic. The processor causes the first data store to respond to a read request for the topic. The read request has been transmitted from the first terminal. | 2014-01-23 |
20140025631 | Storing State in a Dynamic Content Routing Network - A client module of an object state storage is configured to identify a live object at a client. The client module is further configured to receive an update message for the live object from storage, the update message is stored by an object ID associated with the live object, and the update message allowing the property to be updated for the live object at the client in real-time. The client module is further configured to transmit the update message for the live object to the client. | 2014-01-23 |
20140025632 | COMPUTER IMPLEMENTED SYSTEMS AND METHODS TO AUGMENT DATA FROM DATA SOURCES BY SIMULTANEOUSLY ADDING ENHANCEMENTS GENERATED BY DIFFERENT TECHNOLOGIES - Embodiments of the present invention generally relate to the field of computer implemented methods, software development, and software integration. Specifically, this invention comprises computer implemented applications and methods providing the management and control needed to augment data from different data sources by adding enhancements generated by any number of technologies supported by the invention. | 2014-01-23 |
20140025633 | Global Information Management System and Method - A global information management system (GIMS) includes a collection of standards and methods that allow information management on a global scale. A GIMS computer network includes a central registration database (CRD) and one or more GIMS computer systems connected over a network. Each GIMS computer system includes a relational database having a set of standardized tables. The CRD may provide a GIMS network-unique system ID to each GIMS computer system. Each GIMS computer system uses the GIMS network-unique system ID as part of a primary key for each record generated by and stored in the set of standardized tables of the GIMS database. The GIMS enables global database normalization through the globally unique identification of database records. | 2014-01-23 |
20140025634 | GENERATING DATABASE SEQUENCES IN A REPLICATED DATABASE ENVIRONMENT - Embodiments relate to generating database sequences in a replicated database environment. An aspect includes providing a group of nodes each hosting an instance of a replicated database, with one node in the group elected as a master node responsible for generating and distributing values for auto-generated values in a column or row of the replicated database. Another aspect includes dividing, by the master node, a sequence space of possible auto-generated values for the column or row into sub-ranges and assigning a sub-range to a particular node in the group of nodes. Another aspect includes distributing, by the master node, values of the assigned sub-range to a particular node of the group of nodes. | 2014-01-23 |
20140025635 | METHOD AND APPARATUS FOR FAULT-TOLERANT MEMORY MANAGEMENT - A device and method for providing a fault-tolerant file system. The fault-tolerant file system attempts to minimize the number of writes used when updating file system data structures. In one embodiment, file system data, including file system metadata, is stored in a fault-tolerant tree including a working state and a transacted state. In one embodiment, a change list is used to track blocks that have been updated, instead of cascading updates to leaf nodes up the tree, and a delta block is used to further minimize block updates when adding or removing nodes from the tree. In one embodiment, a Q-Block is used to prevent cycles when adding and removing free blocks from an allocation tree. Metadata values are stored in the tree in a way that allows certain metadata values to be inferred when not present in the tree, thus conserving space and lowering query time. | 2014-01-23 |
20140025636 | SYSTEMS AND METHODS FOR PROVIDING METADATA ENHANCED FILENAMES - Described are computer-based methods and apparatuses, including computer program products, for metadata enhanced filenames. A filename is received, the filename including a first set of characters that represents a name for the electronic file, and a second set of additional characters. The filename is parsed to identify the second set of additional characters. Metadata associated with the electronic file is determined based on the second set of additional characters without downloading additional data of the electronic file. The electronic file is processed based on the determined metadata. | 2014-01-23 |
20140025637 | De-Duplication Based Backup Of File Systems - File system backups are performed by copying information describing changes in the file system since a previous point in time. To restore data, a virtual restored file system (VRFS) structure is created corresponding to a snapshot of data copied from the file system that is stored in the backup file system. A client can read the data stored in the backup file system pointed at by the VRFS structure as well as write to the backup file system. Multiple clients can share blocks of data stored on the backup file system via the same VRFS structure or via multiple VRFS structures. If a client writes to a data block pointed at by a VRFS, a copy of the data block is made to which the client makes changes so that the data in the original data blocks is saved for other clients. | 2014-01-23 |
20140025638 | Method, system and serving node for data backup and restoration - Disclosed is a method, a system and a serving node for data backup and restoration, in which a serving node generates a backup schedule after receiving a data backup request, uploads the schedule to a cluster public storage block, each serving node sends a copy to be backed up to a target node for consolidation; a client sends a data record in a consolidated copy to the serving node through a data writing request, generates a data distribution table according to a load balancing principle, sends the request to other serving nodes according to the table to perform a write operation, the client sends the data writing request for a next data record after the write operation, until the copy is completely restored. The backup and restoration is performed in a complex cluster network accounting for performance differences among serving nodes, data consistency, data integrity and data uniform distribution. | 2014-01-23 |
20140025639 | DATA BACKUP, STORAGE AND MANAGEMENT SYSTEM AND METHODOLOGY - Systems and methods for simultaneously providing local data backup and online data backup. A local backup device is programmed with an application, which allows a user to connect a client device to the local backup device and to an online backup service so that data backup can be done simultaneously to the local backup device and to the online backup service. | 2014-01-23 |
20140025640 | DATA MINING SYSTEMS AND METHODS FOR HETEROGENEOUS DATA SOURCES - Systems and methods integrate disparate backup devices with a unified interface. In certain examples, a management console manages data from various backup devices, while retaining such data in its native format. The management console can display a hierarchical view the client devices and/or their data and can further provide utilities for processing the various data formats. A data structure including fields for storing both metadata common to the client device data and value-added metadata can be used to mine or process the data of the disparate client devices. The unified single platform and interface reduces the need for multiple data management products and/or customized data utilities for each individual client device and provides a single pane of glass view into data management operations. Integrating the various types of storage formats and media allows a user to retain existing storage infrastructures and further facilitates scaling to meet long-term management needs. | 2014-01-23 |
20140025641 | SYSTEMS AND METHODS FOR DATABASE ARCHIVING - A data storage system according to certain aspects can archive database data associated with different database applications. The data storage system according to certain aspects may provide database archiving modules that include logic incorporating and/or based on the native schema and/or native commands specific to particular database applications. The database archiving modules according to certain aspects may determine the relationship between tables associated with corresponding database applications and archive selected database data based on the native schema and native commands. | 2014-01-23 |
20140025642 | METHODS AND SYSTEMS FOR RECURSIVE SAVING OF HIERARCHICAL OBJECTS TO A DATABASE - Methods and systems include embodiments that recursively save parent, grandparent, and other records in a database that depend from a record. User-provided code within a save event or trigger can thus call further save methods without corrupting the database. Junction objects, objects that reflect records with two or more parents, can also be recursively saved. | 2014-01-23 |
20140025643 | MAINTAINING OBJECT AND QUERY RESULT CONSISTENCY IN A TRIPLESTORE DATABASE - A database management data processing system has been provided. The system can include a host computing system that includes at least one server with memory and at least one processor. The system further includes a database coupled to the host computing system and a database management system (DBMS) executing in the host computing system and managing access to the database through a statement table implemented as a triplestore. Finally, the system includes a triplestore management module coupled to the DBMS. The module includes program code enabled to retrieve from the triplestore a record for a number of rows provided for a common subject in order to validate consistency of data read from the statement table for the particular subject. | 2014-01-23 |
20140025644 | GARBAGE COLLECTION AWARE DEDUPLICATION - Mechanisms are provided for improving the efficiency of garbage collection in a deduplication system by intelligently managing storage of deduplication segments. When a duplicate segment is identified, a reference count for an already maintained segment is incremented only if the already maintained segment has the same lifecycle as the identified duplicate segment. In some instances, an already maintained segment is assumed to have the same lifecycle if it is not stale or the age is not significantly different from the age of the newly identified duplicate. If the already maintained segment is has a different lifecycle, the new segment is stored again even though duplicates are already maintained. | 2014-01-23 |
20140025645 | Resolving Database Integration Conflicts Using Data Provenance - A method, a system and a computer program product for resolving conflicts between data for database integration. Data is integrated from first and second data sources to produce integrated data, and the presence of a conflict is determined between data from the first data source and data from the second data source, where one or more sets of prioritized policies for resolving conflicts is associated with data of the first and second data sources. A policy is selected from the set of prioritized policies associated with the conflicted data, where the selected policy is appropriate to resolve the conflict and includes the greatest priority. The selected policy is applied to resolve the conflict and to produce a resulting data value for the integrated data. | 2014-01-23 |
20140025646 | DATA MANAGEMENT IN A DATA VIRTUALIZATION ENVIRONMENT - The invention relates to a system handling a plurality of data sets stored in different repositories ( | 2014-01-23 |
20140025647 | Normalization Engine to Manage Configuration Management Database Integrity - Data is often populated into Configuration Management Databases (CMDBs) from different sources. Because the data can come from a variety of sources, it may have inconsistencies—and may even be incomplete. A Normalization Engine (NE) may be able to automatically clean up the incoming data based on certain rules and knowledge. In one embodiment, the NE takes each Configuration Item (CI) or group of CIs that are to be normalized and applies a rule or a set of rules to see if the data may be cleaned up, and, if so, updates the CI or group of CIs accordingly. In particular, one embodiment may allow for the CI's data to be normalized by doing a look up against a Product Catalog and/or an Alias Catalog. In another embodiment, the NE architecture could be fully extensible, allowing for the creation of custom, rules-based plug-ins by users and/or third parties. | 2014-01-23 |
20140025648 | Method of Optimizing Data Flow Between a Software Application and a Database Server - A method may include receiving a request for a resource on a database server, the request being from a request initiator coupled to a network. Redundant data in the request is identified based on the data optimization rules, where the redundant data is unnecessary for the database server to satisfy the request for the resource. The redundant data is removed from the request based on the data optimization rules to create an optimized request. The optimized request is provided, using the network to the database server. | 2014-01-23 |
20140025649 | Generic Lifecycle Management of Entity in Hierarchy According to Status - Lifecycle of an entity residing within a hierarchy, may be managed according to corresponding status identifiers of a ruleset referenced by an engine. At design time, particular embodiments determine a finite set of fundamental statuses common to the entities, and covering the full lifecycle of each entity. A ruleset is created comprising rules accounting for each change in the status of the entity over its lifetime within the hierarchy. The status may be indicated by status identifiers, that in some embodiments are stored within a database. During runtime, an engine receives information from the entity. The engine references the ruleset including the status identifier information, and then propagates the status change of the entity to other entities in the same or different hierarchy levels based upon the ruleset. In this manner, the lifecycle of an entity within a hierarchy can be managed according to its status. | 2014-01-23 |
20140025650 | ABSTRACT RELATIONAL MODEL FOR TRANSFORMING DATA INTO CONSUMABLE CONTENT - Concepts and technologies are described herein for an abstract relational model for transforming data into consumable content. In accordance with the concepts and technologies disclosed herein, a computing device can execute a transformation engine for transforming data into the consumable content. The computing device can be configured to generate an abstract relational model from data to analyze the data and to identify relationships within data elements or other portions of the data. The computing device also can determine a visualization model to apply to the data and to choose a world based upon the determined visualization model. The computing device can obtain rules associated with the selected or chosen world, and can apply the rules to the data to generate the output. In some embodiments, the computing device can be configured to obtain and apply feedback to the output. | 2014-01-23 |
20140025651 | Lock-Free, Scalable Read Access to Shared Data Structures - At least one read operation of at least one object of an object graph is initiated. For each corresponding read operation, a reference count of the root object is incremented (with the reference count 1 for the root object initially reflecting a single anchor pointer pointing to the root object). Subsequently, one or more of the objects are changed. Incompatible changes result in the root object, at least one changed object, and any intervening objects within the hierarchy of objects being cloned. The anchor pointer is then linked to the cloned root object. The root object is later dropped when the reference count for the root object is zero. In addition, the object graph is traversed starting at the root object and ending at the at least one changed object removing any edges for such objects. Each object having a reference count of zero is then dropped. | 2014-01-23 |
20140025652 | REDISTRIBUTE NATIVE XML INDEX KEY SHIPPING - Techniques are described for data redistribution. Embodiments store a first set of receiver location identifiers mapped to a document identifier and assigned to a first set of receiver locations storing relational data referencing the document identifier. Embodiments store a second set of receiver location identifiers mapped to the document identifier and assigned to a second set of receiver locations storing document data corresponding to the document identifier referenced by the relational data. Sender index keys are received separately from the relational data and the document data, the sender index keys referencing the document identifier and containing sender location identifiers. Embodiments determine, from the first set of receiver location identifiers and the second set of receiver location identifiers, which receiver location identifiers are mapped to the document identifier referenced by the sender index keys. The sender location identifiers are then replaced with the determined receiver location identifiers. | 2014-01-23 |
20140025653 | Source Control Inheritance Locking - An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process. | 2014-01-23 |
20140025654 | System for Generating Digital Event Material and Event-Based Updating of User Profiles to Create New Communities - System and method for event-based updating of user profiles UP of users U in a social network and formation of new communities based on a resonance condition. A database of user profiles UP with profile domains D based on self-reports as well as observed network behaviors is deployed. The user profiles UP of users U in groups G attending an event are re-compiled by an event-based updating module based on event responses ER. Further, the event-based updating module identifies a profile change ΔP* in at least one of the profile domains D of user profiles UP, and the new community is formed by the event-based updating module from a subgroup SG whose profile change ΔP* indicates a mutual resonance or consensus in their event responses ER. | 2014-01-23 |
20140025655 | FILE IDENTIFICATION MANAGEMENT AND TRACKING - Embodiments are directed towards managing and tracking item identification of a plurality of items to determine if an item is a new or existing item, where an existing item has been previously processed. In some embodiments, two or more item identifiers may be generated. In one embodiment, generating the two or more item identifiers may include analyzing the item using a small item size characteristic, a compressed item, or for an identifier collision. The two or more item identifiers may be employed to determine if the item is a new or existing item. In one embodiment, the two or more item identifiers may be compared to a record about an existing item to determine if the item is a new or existing item. If the item is an existing item, then the item may be further processed to determine if the existing item has actually changed. | 2014-01-23 |
20140025656 | Method and Apparatus for Processing Streaming Data Using Programmable Logic - Methods and apparatuses for processing streaming data using programmable logic are disclosed. With an exemplary embodiment, a programmable logic device can be used to sort streaming data and provide a processor with access to the sorted data. With another exemplary embodiment, an Internet search engine can include a programmable logic device to perform match operations in response to search queries for web pages. With another exemplary embodiment, a programmable logic device is configured to perform match operations on streaming data while a processor is freed to perform other tasks. | 2014-01-23 |
20140025657 | AUTOMATED LANDING PAGE GENERATION AND PROMOTION FOR REAL ESTATE LISTINGS - A system for automatic landing page creation comprises a processor configured to determine a set of popular search queries. The processor is configured to create, automatically, a landing page for each of the set of popular search queries. | 2014-01-23 |
20140025658 | VALIDATING DATABASE TABLE PARTITIONING SCHEMES USING STRATIFIED RANDOM SAMPLING - A method, system, and computer program product for validating database table partitioning from partition advisors. The method commences by receiving a workload comprising a plurality of queries, then analyzes the queries to determine stratification buckets based on the usage of tables in the queries. Further analysis of the queries results in assigning the queries into one or more of the stratification buckets from which buckets a number n of queries (n being smaller than the total number of queries in the received workload) are drawn from the stratification buckets to form a representative workload having a confidence interval C and a margin of error M. Now, having a representative workload that is smaller, yet statistically representative of the received workload, a computer evaluates each of a plurality of partition schemes using the representative workload to determine an optimal partitioning scheme. The confidence interval C can be increased or decreased. | 2014-01-23 |