15th week of 2013 patent applcation highlights part 47 |
Patent application number | Title | Published |
20130091331 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO MANAGE MEMORY - Methods, apparatus, and articles of manufacture to manage memory are disclosed. An example method includes mapping a cache memory to a random access memory, incrementing a counter in response to a data write to a cache line of the cache memory, decrementing the counter in response to a write-back of the data from the cache line, and committing the data to the RAM when the counter is equal to a threshold. | 2013-04-11 |
20130091332 | OS-independent Framework and Software Library for Real Time Inter-process Data Transfer (Data River) - Proposed is a secure real-time inter-process data exchange mechanism based on memory mapped files (MMF). A modified FIFO access to the data (“one head, multiple tails”) is provided by pointers residing in a MMF buffer. A process writes to a data area of the buffer using “head” pointer, and data are read by processes using “tail” pointers. Only one shared data block is accessible at any given time, thus achieving secure high-performance real-time data sharing data between processes without using OS-dependent thread-synchronization techniques. The invention is implemented as OS-specific dynamic libraries that form a platform-independent software layer which hides the implementation details from the programmer. Access to the libraries is provided by a simple and easy to use API, via a limited number of high-level functions, with syntax consistent across languages (C, C++, Pascal, MATLAB) and OS platforms (Windows, Linux, MacOSX). | 2013-04-11 |
20130091333 | BACKUP OPTIMIZATION - A device includes a data collector module, a policy module, and an optimizer module. The data collector module is to collect values for a plurality of device parameters. The policy module is to receive the values for the plurality of device parameters and update a policy table. The optimizer module is to receive the policy table from the policy module, determine, based on the policy table, whether to proceed with buffered input/output or un-buffered input/output for a read call, and instruct a read module of a backup application to proceed with either buffered input/output or un-buffered input/output for the read call. | 2013-04-11 |
20130091334 | METHOD FOR DATA BACKUP, DEVICE AND SYSTEM - A method for backing up data in a data center, device and system are provided. The data in all the VMs of one data center can be backed up simultaneously, and the associations between the VMs are also backed up during the backup, so it is unnecessary to concern the recovery orders of the VMs when the data of the data center is recovered. Meanwhile, when the stored data is exported from the hypervisor node, it is unnecessary to notify the upper layer OS for a backup, thereby improving the data backup efficiency and reducing the system logical complexity. | 2013-04-11 |
20130091335 | RESOURCE RECOVERY FOR CHECKPOINT-BASED HIGH-AVAILABILITY IN A VIRTUALIZED ENVIRONMENT - A computer-implemented method, computer program product and data processing system provide checkpoint high-available for an application in a virtualized environment with reduced network demands. An application executes on a primary host machine comprising a first virtual machine. A virtualization module receives a designation from the application of a portion of the memory of the first virtual machine as purgeable memory, wherein the purgeable memory can be reconstructed by the application when the purgeable memory is unavailable. Changes are tracked to a processor state and to a remaining portion that is not purgeable memory and the changes are periodically forwarded at checkpoints to a secondary host machine. In response to an occurrence of a failure condition on the first virtual machine, the secondary host machine is signaled to continue execution of the application by using the forwarded changes to the remaining portion of the memory and by reconstructing the purgeable memory. | 2013-04-11 |
20130091336 | Systems and Methods for Internal Initialization of a Nonvolatile Memory - Methods and systems are provided that may include a memory device having a physical nonvolatile memory, a memory space, and a controller. At least a portion of a physical nonvolatile memory may permit a direct read operation of the physical nonvolatile memory and prohibit a direct write operation of the physical nonvolatile memory. A memory space may comprise at least open one write overlay window available after a reset operation. Such a memory space may be adapted to permit at least one read overlay window to be opened that is logically separate from at least one open write overlay window. A controller may be included to open at least one read overlay window. | 2013-04-11 |
20130091337 | RUNTIME TYPE IDENTIFICATION OF NATIVE HEAP ALLOCATIONS - During compilation, a table mapping relative virtual address of a memory-allocating instruction of a native language program to a user type of the instance is created. During execution of the program, a module injected into the process intercepts calls to memory allocating functions and records the virtual address of the instruction calling the memory allocating function and the virtual address of the instance created. When a snapshot of the process heap is requested, the user type of the corresponding compile time instruction is assigned to the created instance. User type and heap information can he used to compute sizes of memory allocations and to aggregate user type instance counts and sizes. Using the static debugging information, a reference graph that displays the nesting of objects in live instances can be computed and displayed. | 2013-04-11 |
20130091338 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND PROGRAM PRODUCT - An information processing device includes a first storage unit configured to store a set value indicating a value corresponding to a set item to define a function and flag information indicating whether an initialization of the set value is required, a second storage unit configured to store a flag address identifying a storage location of the flag information in the first storage unit in association with the set item at least, and an initialization unit configured to identify the flag information for each set item by using the flag address corresponding to each set item, and if the identified flag address indicates that the initialization is required, initialize the set value corresponding to the set item. | 2013-04-11 |
20130091339 | SIMD Memory Circuit And Methodology To Support Upsampling, Downsampling And Transposition - An apparatus and method for creation of reordered vectors from sequential input data for block based decimation, filtering, interpolation and matrix transposition using a memory circuit for a Single Instruction, Multiple Data (SIMD) Digital Signal Processor (DSP). This memory circuit includes a two-dimensional storage array, a rotate-and-distribute unit, a read-controller and a write to controller, to map input vectors containing sequential data elements in columns of the two-dimensional array and extract reordered target vectors from this array. The data elements and memory configuration are received from the SIMD DSP. | 2013-04-11 |
20130091340 | Apparatus and Method for Processing an Instruction Matrix Specifying Parallel and Dependent Operations - A matrix of execution blocks form a set of rows and columns. The rows support parallel execution of instructions and the columns support execution of dependent instructions. The matrix of execution blocks process a single block of instructions specifying parallel and dependent instructions. | 2013-04-11 |
20130091341 | PARALLEL COMPUTER ARCHITECTURE FOR COMPUTATION OF PARTICLE INTERACTIONS - A computation system for computing interactions in a multiple-body simulation includes an array of processing modules arranged into one or more serially interconnected processing groups of the processing modules. Each of the processing modules includes storage for data elements and includes circuitry for performing pairwise computations between data elements each associated with a spatial location. Each of the pairwise computations makes use of a data element from the storage of the processing module and a data element passing through the serially interconnected processing modules. Each of the processing modules includes circuitry for selecting the pairs of data elements according to separations between spatial locations associated with the data elements. | 2013-04-11 |
20130091342 | TRACING SOFTWARE EXECUTION OF A BUSINESS PROCESS - Various embodiments of systems and methods to trace an execution of a business process are disclosed. Business rules and corresponding business objects required to execute the business process are identified and rendered to receive an input. Based upon detecting a trigger to execute the business process, the business rules and the corresponding business objects are processed to compute a process-resultant for the business process. A process-path of the computed process-resultant is traced by tracing key-strings corresponding to the business objects involved in computing the process-resultant, to generate a trace-resultant. The trace-resultant is parsed by determining versioned business objects and business information of the key-strings, to derive a business definition for the traced business objects involved in computing the process-resultant. Based upon the business definition, a comprehensive trace-map comprising a compilation of the process-resultant to execute the business process is generated. | 2013-04-11 |
20130091343 | OPERAND FETCHING CONTROL AS A FUNCTION OF BRANCH CONFIDENCE - Data operand fetching control includes calculating a summation weight value for each instruction in a pipeline, the summation weight value calculated as a function of branch uncertainty and a pendency in which the instruction resides in the pipeline relative to other instructions in the pipeline. The data operand fetching control also includes mapping the summation weight value of a selected instruction that is attempting to access system memory to a memory access control. Each memory access control specifies a manner of handling data fetching operations. The data operand fetching control further includes performing a memory access operation for the selected instruction based upon the mapping. | 2013-04-11 |
20130091344 | METHOD OF CONFIGURING MOBILE COMPUTING DEVICE - A method of storing configuration data for mobile computing devices can comprise the steps of providing a master configuration file including one or more parameter records and providing a device file including one or more device records. Each parameter record can map a parameter value to a parameter identifier. Each device record can map a parameter identifier to a mobile computing device identifier. | 2013-04-11 |
20130091345 | AUTHENTICATION OF COMPUTER SYSTEM BOOT INSTRUCTIONS - Various systems, processes, and products may be used to authenticate computer system boot instructions. In particular implementations, a system, process, and product for authenticating computer system boot instructions may include the ability to determine, according to pre-boot computer system instructions, whether a public key associated with the boot instructions is authentic using a public key associated with a central processing unit. The system, process, and product may also include the ability to determine, if the public key associated with boot instructions is authentic, whether the boot instructions are authentic using the public key associated with boot instructions. The system, process, and product may further include the ability to launch the boot instructions if the boot instructions are authentic. | 2013-04-11 |
20130091346 | Code Updates in Processing Systems - A method for updating code images in a system includes booting a first image of a code with a sub-system processor, receiving a second image of the code, performing a security and reliability check of the second image of the code with the sub-system processor, determining whether the security and reliability check of the second image of the code is successful, storing the second image of the code in a first memory device responsive to determining that the security and reliability check of the second image of the code is successful, designating the second image of the code as an active image, and sending the second image of the code to a second memory device, the second memory device communicatively connected with the first memory device and a main processor. | 2013-04-11 |
20130091347 | AUTOMATED DOUBLE FIRMWARE UPGRADE - A downstream network device is booted into a final provisioned state by retrieving a configuration file a first time from an upstream network device, and checking if a currently booted software load of the downstream device matches a first software load (EE) described by the configuration file. If the currently booted software load of the downstream device does not match the EE, the downstream network device checks if the configuration file includes a description of a second software load (NE), and if so, the downstream network device checks if the currently booted software load matches the NE, and if not, the downstream network device downloads the first software load, boots the first software load, and retrieves the configuration file a second time. | 2013-04-11 |
20130091348 | SURFACE TEMPERATURE MANAGEMENT METHOD OF MOBILE DEVICE AND MEMORY THERMAL MANAGEMENT METHOD OF MULTICHIP PACKAGE - A surface temperature management method of mobile device is provided. The method includes sensing a temperature of an application processor in an operation mode of the mobile device; and controlling the application processor using the sensed temperature and a surface temperature management table to manage a surface temperature of a target part of the mobile device. The surface temperature management table includes information related to the temperature of the application processor corresponding to the surface temperature of the target part in the operation mode. | 2013-04-11 |
20130091349 | Enabling Packet Handling Information in the Clear for MACSEC Protected Frames - Techniques are provided to append packet handling information “in the clear” ahead of security related information in a packet to be routed over a network to optimize wide area network deployments of security-configured equipment. In one form, at a network device that performs connectionless secure communication and network routing of packets, data is received from a source device to be sent through a network to a destination device. Packet handling information is inserted in a packet that is to be used to transport the data. The packet handling information is configured to enable controlled handling of the packet in the network and is inserted in an unprotected portion of the packet. Encrypted payload data is generated from the data received from the source device. The encrypted payload data and security information are inserted in a protected portion of the packet and the packet is sent to the network. | 2013-04-11 |
20130091350 | METHODS AND SYSTEMS FOR PROXYING DATA - Methods and systems are provided for proxying data between an application server and a client device. One exemplary application system includes an application server to generate a virtual application and a proxy server coupled to the application server over a network to provide the virtual application to a client device. The proxy server receives input data from the client device and provides the input data to the application server, wherein the application server encodes the input data for an action in response to authenticating the proxy server and provides the data encoded for the action to the proxy server. The proxy server performs the action on the data and provides the result to the client device. | 2013-04-11 |
20130091351 | DIFFERENTIAL CLIENT-SIDE ENCRYPTION OF INFORMATION ORIGINATING FROM A CLIENT - A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network. | 2013-04-11 |
20130091352 | Techniques to Classify Virtual Private Network Traffic Based on Identity - Techniques are provided for obtaining first and second digital certificates from a certificate authority database for establishing a secure exchange between network devices. The first digital certificate contains identity information of a first network device, and the second digital certificate contains classification information of the first network device. In one embodiment, a secure key exchange is initiated with the second network device, and the first and second digital certificates are transmitted as a part of the secure key exchange to the second network device. In another embodiment, the first and second digital certificates are received by an intermediate network device. The first digital certificate is encrypted and is not evaluated by the intermediate network device. The second digital certificate is evaluated for classification information of the first network device. Source information associated with the first network device is stored, and encrypted traffic is processed between the network devices. | 2013-04-11 |
20130091353 | APPARATUS AND METHOD FOR SECURE COMMUNICATION - A method and apparatus are for transferring a client device certificate and an associated encrypted client private key to a client device from a secure device. The secure device receives over a secure connection, a secure device certificate, a secure device private key and a plurality of client device certificates. Each client certificate is associated with a bootstrap public key but is not assigned to any particular client device. A plurality of encrypted client private keys is also received. Each of the encrypted client private keys comprises a client private key associated with one of the client device certificates encrypted with the bootstrap public key. The plurality of client device certificates is stored. The encrypted client private keys are stored in double encrypted protected form. A client device certificate and an associated encrypted client private key are transferred to a client device that has successfully registered with the secure device. | 2013-04-11 |
20130091354 | Agile Network Protocol for Secure Communications with Assured System Availability - A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are rejected. In addition to “hopping” of IP addresses and discriminator fields, hardware addresses such as Media Access Control addresses can be hopped. The hopped addresses are generated by random number generators having non-repeating sequence lengths that are easily determined a-priori, which can quickly jump ahead in sequence by an arbitrary number of random steps and which have the property that future random numbers are difficult to guess without knowing the random number generator's parameters. Synchronization techniques can be used to re-establish synchronization between sending and receiving nodes. | 2013-04-11 |
20130091355 | Techniques to Prevent Mapping of Internal Services in a Federated Environment - Techniques are provided for securely providing protected information within an enterprise network to a service provider located outside of the enterprise network. An identity provider device hashes an address associated with protected information within an enterprise network to obtain a hashed address and maintains a mapping of the hashed address to the address associated with the protected information within the enterprise network. An assertion is sent to a service provider outside of the enterprise network, which contains the hashed address. The service provider receives a request, including the hashed address contained in the sent assertion, to access the protected information within the enterprise network. The service provider or other authorized party can then gain access to the protected information within the enterprise network by relating the hashed address to the address associated with the protected information within the enterprise network according to the mapping. | 2013-04-11 |
20130091356 | OPTIMIZING WEB LANDING PAGE LINK ACCESS TIMES THROUGH PRELIMINARY FUNCTIONS DURING PAGE DEPLOYMENT - Making redirection from links selected in the landing page to a selected page to a selected page or site more effective and faster by performing functions at the Web site providing the landing page during the deployment of the landing page. | 2013-04-11 |
20130091357 | DATABASE MANAGEMENT SYSTEM AND ENCRYPTION METHOD PERFORMED IN DATABASE - A database management system (DBMS) performs encryption in a DB. The system receives authentication authorization regarding a security policy of the DB from an external encryption unit that is separated from the DB and performs encryption. Important data in a column unit is selectively encrypted and an encrypted comparison code (ECC) of the important data is generated inside the DB. The encrypted important data and the corresponding ECC is generated as a single encryption data type. | 2013-04-11 |
20130091358 | FACILITATING SECURE ONLINE TRANSACTIONS - A method and system for mutually authenticating an identity and a server is provided in accordance with an aspect of the present invention. The method commences with transmitting a token from the server. Thereafter, the method continues with establishing a secure data transfer link. A server certificate is transmitted during the establishment of the secure data transfer link. The method continues with transmitting a response packet to the server, which is validated thereby upon receipt. The system includes an authentication module that initiates the secure data transfer link and transmits the response packet, and a server authentication module that transmits the token and validates the response packet. | 2013-04-11 |
20130091359 | Short-range Secure Data Communication Method Based on Sound Wave or Audio, and Apparatus Thereof - The present invention discloses an apparatus, a system and a method for short-range sound wave communication. The system realizes non-contact secure transmission by using the sound wave as the data transmission medium, and also can realize a reliable and secure data link directly through an audio connection. The invention systematically constructs multiple end-to-end transmission verification mechanisms for the process of data transmission: transmission data integrity verification, valid time verification, password verification, service data verification and data encryption; and according to the security level of the data, the sending end specifies the requirements for encryption and data verification in the transmission data so as to notify the reception end which verifications should be performed to the data packets, how to perform the verifications, etc. By using the same verification processing manner, operations can be performed to the data (e.g. the payment and settlement function of an account). With lower cost, the present invention can realize the reliable communication of a small data volume using sound wave, and has certain security. | 2013-04-11 |
20130091360 | LIGHTWEIGHT GROUP SIGNATURE SYSTEM AND METHOD WITH SHORT SIGNATURE - A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature mechanisms providing the existing known controllable linkability but can make a revocation method simple by outputting a short signature and providing excellent operation efficiency at the time of signature generation, signature verification, and revocation on smart terminals, and can be widely applied to various anonymity-based application environments, making by making operation efficiency excellent at the time of signature generation and verification and outputting very short signature lengths. | 2013-04-11 |
20130091361 | Minimizing the Amount of Time Stamp Information Reported With Instrumentation Data - This invention is time stamping subsystem of an electronic apparatus. A time stamp generator generates a multibit time stamp value including a predetermined number of least significant bits overlapping a predetermined number of most significant bits. Each client receives the least significant bits. Each client associates captured data with a corresponding set of the least significant bits in a message. A central scheduling unit associates most significant bits of the time stamp value with the least significant bits of the message. This associating compares overlap bits of the most significant bits and least significant bits. The most significant bits are decremented until the overlap bits are equal. | 2013-04-11 |
20130091362 | GENERATING IMPLICIT CERTIFICATES - Methods, systems, and computer programs for using an implicit certificate are disclosed. In some implementations, an identifier for an entity is obtained. A first cryptographic pair that includes a first private value and a first public value is generated. A second cryptographic pair that includes a second private value and a second public value is generated. Based on the first public value and the identifier for the entity, an implicit certificate IC is generated at a first computing device. Based on the implicit certificate IC, the first private value, and the second private value, a private key for the entity is generated at the first computing device. The implicit certificate IC is then sent with the second public value from the first computing device to the second computing device. The implicit certificate IC can be used, for example, to generate or verify digital signatures, to encrypt or decrypt messages, etc. | 2013-04-11 |
20130091363 | POWER SUPPLY SYSTEM FOR CENTRAL PROCESSING UNIT - A power supply system for a central processing unit (CPU) mounted on a motherboard includes a power supply unit, a conducting layer, and a number of conducting foils. The conducting layer is set on the motherboard. The conducting foils are connected to the conducting layer in parallel. The power supply unit supplies power to the CPU through the conducting layer and the conducting foils. | 2013-04-11 |
20130091364 | RANDOM ACCESS MEMORY MODULE WITH DRIVING VOLTAGE ADAPTOR AND COMPUTING APPARATUS - A random access memory (RAM) module includes a power input terminal for receiving a power voltage; memory units for data storage; and a driving voltage adaptor electrically connected between the power input terminal and the memory units. The driving voltage adaptor receives the power voltage from the power input terminal, converts the power voltage into a driving voltage with a predetermined value, and outputs the driving voltage to the memory units. | 2013-04-11 |
20130091365 | ROBUST GOVERNING OF POWER MANAGEMENT INFRASTRUCTURE IN A BRIDGE - Methods and apparatus relating to robust governing of power management infrastructure in a bridge design are described. In one embodiment, a first agent (such as a processor core) is coupled to a second agent (such as an input/output device) via a bridge. The bridge may or may not enter a different power management state from a current power management state based on a second derivative value. The second derivative value may be in turn determined based on a plurality of first derivative values corresponding to received packets Other embodiments are also disclosed and claimed. | 2013-04-11 |
20130091366 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM - An apparatus determines, when receiving a packet transited via a network in a power saving mode, whether or not the packet is a packet according to a predetermined protocol. If the packet is determined to be the packet according to a predetermined protocol, the apparatus analyzes the data of a succeeding packet described in a data description language, and instructs the apparatus to return from the power saving mode to a normal power mode depending on an analysis result. | 2013-04-11 |
20130091367 | Method and System for Controlling the Operation of an Electronic Device - The present invention relates to a method for controlling the operation of an electronic device for processing data, said device comprising at least one computational unit for receiving input data and processing said input data for generating output data, and further comprising a control unit for receiving at least a part of said input data and delivering at least one control signal to said at least one computational unit for controlling the operation of said at least one computational unit, characterised in said control unit using said input data to determine a computational effort and further using said control signal to control parameters of said at least one computational unit depending on said computational effort, wherein said parameters comprise a combination of: clock rate and/or supply voltage; and process complexity. | 2013-04-11 |
20130091368 | METHOD FOR OPTIMIZING MANAGEMENT OF STANDBY OF A MICROPROCESSOR ENABLING THE IMPLEMENTATION OF SEVERAL LOGICAL CORES AND COMPUTER PROGRAM IMPLEMENTING SUCH A METHOD - The subject of the invention is in particular the optimization of standby management of a part of a microprocessor allowing implementation of at least two logic cores, said at least one microprocessor comprising means for placing at least one resource non common to said at least two logic cores on standby. After having determined ( | 2013-04-11 |
20130091369 | POWER-SAVING INPUT DEVICE AND POWER-SAVING METHOD FOR SUCH INPUT DEVICE - A power-saving method for an input device is provided. The power-saving method includes steps of: counting an idle time of the input device, judging whether an ambient luminance value in an environment of the input device is detected or not according to the idle time of the input device, and allowing the input device to enter a first shallow sleep mode or a deep sleep mode by judging whether the ambient luminance value is higher than or lower than a predetermined luminance value. | 2013-04-11 |
20130091370 | Controlling Power States of a Peripheral Device in Response to User Proximity - In a method of controlling the power state of a peripheral device, the peripheral is changed from a first power state to a second power state in response to communications across a network connected to the peripheral indicating that a user is proximately located to the peripheral. A user may be determined to be proximately located to the peripheral by monitoring communications across the network to detect traffic that is associated with a user logging onto a computer that can utilize the peripheral, by discovering a wireless terminal that is associated with a user and which is proximately located to the peripheral, by receiving information from a cellular communication network across the network that indicates that a user of the peripheral is proximately located to the peripheral, and/or in response to a time of day and/or day of week/month schedule. | 2013-04-11 |
20130091371 | SERVER CLUSTER AND CONTROL MECHANISM THEREOF - A server cluster including a network switch and multiple server nodes is provided. The network switch is connected to an external network. Each server node performs an operation system and respectively includes a network port, a network chip and a south bridge chip. The network port is connected to the network switch via a cable. The network chip outputs a power-off signal according to a received power-off packet after the network switch is started. The south bridge chip outputs a shutdown signal to shut down the server node according to the power-off signal when the server node is turned on and the operation system is working normally. | 2013-04-11 |
20130091372 | CONTROL DEVICE AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a control device includes a receiving unit, a judging unit, an estimating unit, a deciding unit, a directing unit, and a sending unit. The receiving unit is configured to receive an interrupt request requesting a processing device that includes elements capable of being individually subjected to voltage control to execute an interrupt process. The judging unit is configured to judge a state of the elements. The estimating unit is configured to estimate a start-up time for the element to change into an operating mode after power is supplied. The deciding unit is configured to decide a starting point in time at which power supply is to be started on basis of a difference in the start-up times between the elements. The directing unit is configured to direct a power supply unit for supplying power to the elements. The sending unit is configured to send the interrupt request. | 2013-04-11 |
20130091373 | MONITORING DEVICE AND METHOD FOR MONITORING POWER PARAMETERS OF CENTRAL PROCESSING UNIT OF COMPUTING DEVICE - A monitor device is used to monitor power parameters of a CPU of a computing device. The monitoring device comprises a main circuit board, a connector, and a parameter monitoring device. The parameter monitoring device comprises an acquisition unit, a processing unit, and a display unit. The main circuit board is connected to a power supply and provides power signals to one or more power pins of the CPU. The connector is connected between the main circuit board and the CPU. The parameter monitoring device is connected to the CPU through the connector. The acquisition unit acquires a voltage passing through each power pin of the CPU after the CPU is powered to work. The processing unit processes the voltage acquired from each of the one or more power pins to obtain power parameters of the CPU. The display unit displays the power parameters. | 2013-04-11 |
20130091374 | MONITORING DEVICE AND METHOD FOR MONITORING POWER PARAMETERS OF MEMORY BANK OF COMPUTING DEVICE - A monitored device is used to monitor power parameters of a memory bank of a computing device. The monitoring device includes a main circuit board, a connector, and a parameter monitoring device. The parameter monitoring device comprises an acquisition unit, a processing unit, and a display unit. The main circuit board is connected to a power supply and providing power signals to one or more power pins of the memory bank. The connector is connected between the main circuit board and the memory bank. The acquisition unit acquires a voltage passing through each power pin of the memory bank when power is supplied to the memory bank. The processing unit processes the voltage acquired from each of the one or more power pins to obtain power parameters of the memory bank. The display unit displays the power parameters of the memory bank. | 2013-04-11 |
20130091375 | Advanced Array Local Clock Buffer Base Block Circuit - A clock stretcher mechanism is provided for shifting a rising edge of a negative active global clock signal beyond a rising edge of a feedback path signal. A negative active global clock signal and a clock chopper signal are received in a base block. First base block circuitry modifies the clock chopper signal in order to form the feedback path signal. Second base block circuitry shifts the rising edge of the negative active global clock signal beyond the rising edge of the feedback path signal using a delay negative active global clock signal. | 2013-04-11 |
20130091376 | SELF-REPAIRING DATABASE SYSTEM - A method, system, and computer program product include generating a database copy from a database of a primary virtual machine (VM), provisioning a standby VM with the database copy, detecting a failure associated with the database, and promoting the standby VM to replace the primary VM. | 2013-04-11 |
20130091377 | METHODS AND SYSTEMS FOR AUTOMATICALLY REROUTING LOGICAL CIRCUIT DATA - An example involves selecting a logical failover circuit comprising an alternate communication path for communicating data upon a failure of a dedicated logical circuit connecting a host device to a remote device. When a first logical circuit identifier of the dedicated logical circuit does not match a second logical circuit identifier of the logical failover circuit: the second logical circuit identifier of the logical failover circuit is renamed to identify the logical failover circuit using the first logical circuit identifier when the logical failover circuit is a dedicated logical failover circuit used to communicate only when the dedicated logical circuit fails, and the dedicated logical circuit is renamed to identify the dedicated logical circuit using the second logical circuit identifier when the logical failover circuit is used to communicate regardless of the failure of the dedicated logical circuit. The data is rerouted to the logical failover circuit without manual intervention. | 2013-04-11 |
20130091378 | METHODS AND SYSTEMS FOR AUTOMATICALLY REROUTING LOGICAL CIRCUIT DATA FROM A LOGICAL CIRCUIT FAILURE TO A DEDICATED BACKUP CIRCUIT IN A DATA NETWORK - An example method involves rerouting a logical circuit from a first set of switches to a second set of switches to communicate data between network devices without breaking the logical circuit. The logical circuit includes variable communication paths, and the second set of switches are to form a route associated with the variable communication paths that is not predefined and that is dynamically defined at a time of automatic rerouting. The example method also involves detecting a failure of the logical circuit based on at least one of a committed information rate or a committed burst size having been exceeded. In addition, the data is rerouted from the logical circuit to a logical failover circuit in the data network in response to detecting the failure of the logical circuit. The logical failover circuit includes an alternative communication path to communicate the data. | 2013-04-11 |
20130091379 | SYSTEM AND METHOD FOR HIGH-SPEED DATA RECORDING - A system and method for high speed data recording includes a control computer and a disk pack unit. The disk pack is provided within a shell that provides handling and protection for the disk packs. The disk pack unit provides cooling of the disks and connection for power and disk signaling. A standard connection is provided between the control computer and the disk pack unit. The disk pack units are self sufficient and able to connect to any computer. Multiple disk packs are connected simultaneously to the system, so that one disk pack can be active while one or more disk packs are inactive. To control for power surges, the power to each disk pack is controlled programmatically for the group of disks in a disk pack. | 2013-04-11 |
20130091380 | Dynamically Reconfiguring A Primary Processor Identity Within A Multi-Processor Socket Server - Methods, apparatuses, and computer program products for dynamically reconfiguring a primary processor identity within a multi-processor socket server are provided. Embodiments include detecting, by the service processor, a processor socket reconfiguration event corresponding to a first processor socket; disabling, by the service processor, the first processor socket of the server in response to detecting the processor socket reconfiguration event; and reassigning, by the service processor, the primary processor identity to a second processor socket of the server. | 2013-04-11 |
20130091381 | TERMINAL RECOVERY METHOD, TERMINAL RECOVERY SYSTEM, AND PROGRAM FOR THE SAME - The operator terminal receives input of the terminal status of the recovery target terminal | 2013-04-11 |
20130091382 | Modeling Test Space for System behavior with Optional Variable combinations - A method for modeling a test space is provided. The method comprises defining a coverage model including: one or more variables, wherein respective values for the variables are assigned, and one or more definitions for value combinations for said variables with assigned values, wherein at least one of said value combinations is defined as optional, and zero or more other said value combinations are defined as forbidden or mandatory for purpose of generating test scenarios to test a system for which the coverage model is defined. | 2013-04-11 |
20130091383 | Serialized Error Injection Into a Function Under Test - Method, system, and computer program product embodiments for triggering error injection into a function under test using a serialization resource are provided. A test process invokes the function under test immediately after relinquishing exclusive control of the serialization resource. An error-injection process injects the error into the running function after gaining exclusive control of the serialization resource from the test process. The error-injection process may add a delay to inject the error. If the processes are repeated, the error-injection process may vary the delay, perhaps randomly, over a specified time window to thoroughly exercise the function's error recovery routine. | 2013-04-11 |
20130091384 | SYSTEM AND METHOD FOR MEASURING THE EFFECT OF INTERRUPTIONS ON SOFTWARE APPLICATION USABILITY - An exemplary embodiment of the present techniques may request a user to execute a task using a software application under test. An interruption may be generated that interrupts the user while the user is attempting to complete the task, and measuring an effect of the interruption on the ability of the user to successfully complete the task. | 2013-04-11 |
20130091385 | USER-COORDINATED RESOURCE RECOVERY - A computing system resource recovery method can include identifying a resource manager associated with a computing transaction, classifying the computing transaction to determine a predetermined metric, measuring an actual metric of the computing transaction, comparing the predetermined metric to the actual metric to detect abnormal behavior in the transaction and modeling the abnormal behavior to determine how the resource manager is affected by the abnormal behavior. | 2013-04-11 |
20130091386 | ADMINISTERING EVENT POOLS FOR RELEVANT EVENT ANALYSIS IN A DISTRIBUTED PROCESSING SYSTEM - Methods, systems, and computer program products for administering event pools for relevant event analysis are provided. Embodiments include assigning, by an incident analyzer, a plurality of events to an events pool; determining, by the incident analyzer, an event suppression duration; determining, by the incident analyzer in dependence upon event analysis rules, to suppress events having particular attributes indicating the events occurred during the event suppression duration; and suppressing, by the incident analyzer, each event assigned to the events pool having the particular attributes indicating the events occurred during the event suppression duration. | 2013-04-11 |
20130091387 | Method for Automatically Generating a Trace Data Set for a Software System, a Computer System, and a Computer Program Product - The invention relates to a method, a computer system, and a computer program product for automatically generating a trace data set for a software system on a computer system. The method includes the step of providing a software system comprising a source code. Binary code is provided by compiling the source code by inserting a plurality of tracing instructions into the binary code. The tracing instructions initiate trace data generation during runtime of the software system. The method also includes modifying the binary code by replacing at least one tracing instruction of the plurality of tracing instructions with a neutral instruction. The modified binary code is run by activating trace data generation by re-replacing the neutral instruction with the at least one tracing instruction. The method further includes recording the trace data set. The recording step is initiated by the at least one tracing instruction. | 2013-04-11 |
20130091388 | HARDWARE QUEUE FOR TRANSPARENT DEBUG - A method for transparent debug of a hardware queue and recreation of an operational scenario comprising: use of a computer device to: monitor a plurality of inputs and outputs from a plurality of hardware queues associated as parts of a design; receive a request to save from an external source; pause one or more hardware queues upon command; receive hardware queue information from at least one of the paused hardware queues; dump said hardware queue information from at least one paused hardware queue; store the hardware queue information in a data storage connected to the computing device; compare the received information to stored data representative of a functional hardware queue; identify errors and failures in each monitored hardware queue from the comparing and; restore the hardware queue to a previous state. | 2013-04-11 |
20130091389 | Application Initiated Tracing of Its Operation Beginning With Reset - This invention includes a state machine entering a first state upon cold reset of the data processing system. Trace information collection and trace information export are prohibited in the first state. The state machine transits from said first state to a second state upon a change in a predetermined bit to a first state. Direct memory access setup is enabled in the second state. The state machine transits from the second state to a third state upon set up of the direct memory access. Trace information collection is enabled in the third state. The state machine transits from the third state to a fourth state upon a direct memory access request corresponding to the direct memory access setup in the second state. Trace data export via direct memory access from the trace collection unit is enabled in the fourth state. | 2013-04-11 |
20130091390 | COMMUNICATION TEST APPARATUS AND METHOD - The present invention relates to a communication test apparatus. The communication test apparatus includes an insertion module configured to insert a test agent into the process control block, a hooking module configured to hook a test target to a test code using the test agent when an event-related to communication occurs between the plurality of processes, a scanning module configured to collect pieces of test information about communication between the plurality of processes when the test target is hooked to the test code, and a logging module configured to store the pieces of test information collected by the scanning module. | 2013-04-11 |
20130091391 | USER-COORDINATED RESOURCE RECOVERY - A computing system includes a processor configured to identify a resource manager associated with a computing transaction, classify the computing transaction to determine a predetermined metric, measure an actual metric of the computing transaction, compare the predetermined metric to the actual metric to detect abnormal behavior in the transaction and model the abnormal behavior to determine how the resource manager is affected by the abnormal behavior. | 2013-04-11 |
20130091392 | Apparatus and Method to Measure Timing Margin in Clock and Data Recovery System Utilizing a Jitter Stressor - A method and a system for accurately calculating the timing margin in a clock and data recovery system (CDR) is provided that utilizes a singular path environment of hardware. The method entails adding an amount of jitter within the CDR to change the receiver phase. The amount of jitter is incrementally increased until a threshold level of bit errors occur. Based on the amount of jitter needed to cause the threshold level of bit errors, timing margin can be calculated. | 2013-04-11 |
20130091393 | TRANSMISSION TEST DEVICE AND TRANSMISSION TEST METHOD - A transmission test device that performs a transmission test in a transmission path includes a determining unit and a killer pattern transfer unit. The determining unit acquires an abnormality incidence rate representing a rate of abnormality having occurred in test data in a transmission path, and determines whether or not the abnormality incidence rate is lower than a predetermined reference value. The killer pattern transfer unit changes the test data and transmits changed test data when the determining unit determines that the abnormality incidence rate is lower than the predetermined reference value. | 2013-04-11 |
20130091394 | DATA PROCESSING APPARATUS AND VALIDITY VERIFICATION METHOD - A data processing apparatus includes a ROM (Read Only Memory) having a validity verification program stored therein, an auxiliary storage device including a plurality of storage areas having a plurality of target verification data stored therein, an execution unit configured to perform a validity verification process on the plural target verification data in accordance with the validity verification program. An order of priority is assigned to the plural target verification data. The plural storage areas have addresses that is recognizable by the execution unit. The execution unit is configured to determine validity of each of the plural target verification data based on the order of priority until one of the plural target verification data is determined to be valid. | 2013-04-11 |
20130091395 | CIRCUIT TO REDUCE PEAK POWER DURING TRANSITION FAULT TESTING OF INTEGRATED CIRCUIT - A circuit for reducing peak power during transition fault testing of an integrated circuit (IC) includes a programmable register that receives scan shift and SDI (scan data in) signals. Input and output ports of the programmable register are connected together. A multiplexer is provided that has a first input port that is maintained asserted, and a second input port connected to the output port of the programmable register. A scan shift signal, which remains asserted during a scan shift operation and de-asserted during a scan capture operation, is provided at a select input port of the multiplexer. The output of the multiplexer is provided as an input to a clock gating cell. The clock gating cell selectively provides the clock signal to the scan-chain flip-flops in the IC based on the scan shift signal and a functional enable signal, and reduces peak power during transition fault testing. | 2013-04-11 |
20130091396 | PACKET-BASED PROPAGATION OF TESTING INFORMATION - A packet-based testing capability is provided. The packet-based testing capability is configured to provide a packet-based JTAG (PJTAG) protocol. The PJTAG protocol is an asynchronous protocol configured to support the synchronous JTAG protocol. The PJTAG protocol is configured to convert between JTAG signals and packets configured to transport information of the JTAG signals (e.g., to convert JTAG signals into PJTAG packets at an interface from a JTAG domain to a PJTAG domain and to convert PJTAG packets into JTAG signals at an interface from a PJTAG domain to JTAG domain). | 2013-04-11 |
20130091397 | Systems and Methods for Parity Sharing Data Processing - Various embodiments of the present invention provide systems and methods for data processing. For example, a data processing system is disclosed that includes: a data detector circuit, a low density parity check data decoder circuit, and a processing circuit. The processing circuit is operable to: reconstitute a second encoded sub-codeword from a combination of data including the first encoded sub-codeword and the composite sub-codeword; and correct an error in one of the first encoded sub-codeword and the second encoded sub-codeword based at least in part on a combination of the first encoded sub-codeword, the second encoded sub-codeword, and the composite sub-codeword. | 2013-04-11 |
20130091398 | OPTIMUM SIGNAL CONSTELLATION DESIGN FOR HIGH-SPEED OPTICAL TRANSMISSION - Systems and methods for data transport, comprising encoding one or more streams of input data with one or more low density parity check (LDPC) encoders, corresponding to one or more polarization/spatial mode branches. One or more encoded data streams are mapped to symbols, wherein the mapper is configured to assign bits of the symbols to a signal constellation and to associate the bits of the symbols with signal constellation points. A signal constellation is formulated which minimizes a mean-square error of the signal constellation representing the source. The optimum signal constellation size is adjusted to improve transmission quality by adjusting the signal constellation an optical signal to noise ratio (OSNR), wherein the signal constellation is selected using a look-up table (LUT); and the symbols are modulated in accordance with the output of the mapper onto a transmission medium. | 2013-04-11 |
20130091399 | HIGH-SPEED LONG CODEWORD QC-LDPC SOFT DECISION DECODER - A Quasi-Cyclic, LDPC, large girth, soft-decision decoder and accompanying methods. | 2013-04-11 |
20130091400 | Systems and Methods for Parity Shared Data Encoding - Various embodiments of the present invention provide systems and methods for data processing. For example, a low density parity check encoding system is described that includes: a low density parity check encoder circuit, and a combining circuit. The low density parity check encoder circuit is operable to encode a first data set to yield a first low density parity check encoded sub-codeword, and to encode a second data set to yield a second low density parity check encoded sub-codeword. The combining circuit is operable to: generate a composite low density parity check sub-codeword by mathematically combining at least the first low density parity check encoded sub-codeword and the second low density parity check encoded sub-codeword; and combine at least the first low density parity check encoded sub-codeword and the composite low density parity check sub-codeword into an overall codeword. | 2013-04-11 |
20130091401 | FEEDBACK SIGNALING ERROR DETECTION AND CHECKING IN MIMO WIRELESS COMMUNICATION SYSTEMS - A method of feedback in a wireless transmit receive unit includes providing a precoding matrix index (PMI), error checking the (PMI) to produce an error check (EC) bit, coding the PMI and the EC bit and transmitting the coded PMI and EC bit. | 2013-04-11 |
20130091402 | STRONG SINGLE AND MULTIPLE ERROR CORRECTING WOM CODES, CODING METHODS AND DEVICES - Preferred embodiments of the invention provide WOM coding methods and electronic devices with error correcting codes that provide single, double and triple error correction. Preferred codes of the invention also the following property: if the code corrects two/three errors it has two/three parts of redundancy bits. For double error correction, if only one part of the redundancy bit has no errors then it is possible to correct one error. For triple error correction, if only one/two parts of the redundancy bits have no errors then it is possible to correct one/two errors. Preferred methods of the invention use codes that correct/detect a single, two and three cell-erasures. A preferred method of the invention applies a code that has three roots, ah a2, a3, each of which is a primitive element and where every pair of roots generates a double error correcting code. Methods of the invention further provide and utilize codes utilitizing a triple error correcting WOM code that can correct an arbitrary number of errors. | 2013-04-11 |
20130091403 | PROGRAMMABLE QUASI-CYCLIC LOW-DENSITY PARITY CHECK (QC LDPC) ENCODER FOR READ CHANNEL - The present invention is a programmable QC LDPC encoder for encoding user data. The encoder may be configurable for implementation with a read channel. The encoder may include a plurality of barrel shifter circuits. The barrel shifter circuits are configured for generating a plurality of parity bits based on interleaved user bits received by the encoder. The barrel shifter circuits are further configured for outputting the parity bits. The encoder may further include an encoder interleaver memory. The encoder interleaver memory may be communicatively coupled with the barrel shifter circuits and may receive the parity bits output from the barrel shifter circuits. The encoder interleaver may be configured for interleaving the parity bits. Further, the encoder may be configured for outputting the interleaved parity bits to a multiplexer. The barrel shifter circuits may generate the plurality of parity bits via an encoding algorithm: p=u*G | 2013-04-11 |
20130091404 | MEMORY CONTROLLER AND STORAGE DEVICE - According to one embodiment, a memory controller that writes write data provided from a host device into a memory, reads read data from the memory, and transmits the read data to the host device. The memory controller includes an external interface, a first ECC generating unit, an access unit, a first ECC correcting unit, and a control unit. | 2013-04-11 |
20130091405 | INDEPENDENT ORTHOGONAL ERROR CORRECTION AND DETECTION - A data memory is organized as a logical matrix having multiple virtual data words. Along with the physical representation of the data as being associated with physical memory cells, other virtual data words and their virtual check bits are formed that intersect (logically) with the real data word in a multi-dimensional array. Each of these virtual words can possess errors that can be quickly corrected using independent EDAC methodology. The validity of the virtual word can be used to verify the validity of a single bit in the real word thus correcting multiple bit errors. | 2013-04-11 |
20130091406 | METHOD AND SYSTEM FOR ROUTING IN LOW DENSITY PARITY CHECK (LDPC) DECODERS - An approach is provided for decoding a low density parity check (LDPC) coded signal. Edge values associated with a structured parity check matrix used to generate the LDPC coded signal are retrieved from memory. The edge values specify the relationship of bit nodes and check nodes, and are stored within memory according to a predetermined scheme that permits concurrent retrieval of a set of the edge values. A decoded signal corresponding to the LDPC coded signal is output based on the retrieved edge values. | 2013-04-11 |
20130091407 | COMPUTATIONALLY EFFICIENT CONVOLUTIONAL CODING WITH RATE-MATCHING - An error coding circuit comprises a non-systematic convolutional encoder for coding an input bit stream to produce two or more groups of parity bits, an interleaver circuit for interleaving parity bits within each group of parity bits, and a rate-matching circuit for outputting a selected number of the interleaved parity bits ordered by group to obtain a desired code rate. | 2013-04-11 |
20130091408 | ENHANCING ACCURACY OF SERVICE LEVEL AGREEMENTS IN ETHERNET NETWORKS - A method of determining frame loss between two management points (C, D) in an Ethernet network, in which the said management points each transmit frames to each other and each of the said two management points transmits in regular intervals to the other measurement messages which contain current counts of frames transmitted and received by the respective transmitting management point. At least one of the said two management points responds to a received management message to compute from counts of actual packets transmitted and/or received by a given one of the management points the frame loss at said given management point. At least one of the management points computes the said frame loss only once in a measurement interval which consists of a multiplicity of said regular intervals and employs in the computation the counts indicated by the measurement message most recently received by said one of the management points. | 2013-04-11 |
20130091409 | METHOD AND SYSTEM FOR DYNAMIC ASSEMBLY OF MULTIMEDIA PRESENTATION THREADS - The present invention involves a technique for the customization and display of multimedia content. Customization is via a dynamic thread generator that receives data from multiple inputs including, but not limited to, user surveys, demographic databases, analytics of past customer behavior and preferences stored in a customer relationship management system, analytics of customer interaction with the media in the tool, and/or interaction of the user with sensors /measurement devices. The dynamic thread generator produces a plurality of thread nodes which can be traversed in a particular order, forming a presentation thread, customized to a specific user. | 2013-04-11 |
20130091410 | SYSTEM AND METHOD OF PROVIDING A CONTEXT-AWARE PERSONALIZED BLOGGING AGENT - A mobile multimedia content aggregation and dissemination platform is provided that aims to automate the creation, collection, aggregation, and dissemination of RSS and non-RSS information for and to interested parties. This platform may be used for the construction of a personalized blogging agent as well as for a personalized news aggregator. | 2013-04-11 |
20130091411 | DOCUMENT DATA ENTRY SUGGESTIONS - A document having multiple data entry areas can be presented, and a list of suggestions for a designated data entry area can be generated. Generating the list can include analyzing a first set of data previously entered into one or more data entry areas of the document other than the designated data entry area and analyzing a second set of data including data outside the first set of data. The list of suggestions can be presented without having received manual entry of data in the designated data entry area, and user input selecting one of the suggestions can be received. Data represented by the selected suggestion can be entered in the data entry area in response to receiving the user input selecting the selected suggestion. | 2013-04-11 |
20130091412 | REPRESENTATION OF DATA RECORDS IN GRAPHIC TABLES - Various arrangements for creating a pivot table are presented. A set of stored records may be accessed. A plurality of stored records from the set of stored records may be selected to be represented in a plurality of cells of the pivot table. A graphical representation may be generated for display for each stored record of the plurality of stored records. Each graphical representation may be generated for display within a cell of the plurality of cells of the pivot table. Each graphical representation of the pivot table is actively linked with the corresponding stored record. | 2013-04-11 |
20130091413 | Rich Data Label Formatting - Rich data label formatting may be provided. A rich data label may be created for at least one data point associated with a visualization. The data label may be formatted and displayed on the visualization. In response to determining that the change event has occurred on the visualization, the display of the formatted label may be updated according to the change event. | 2013-04-11 |
20130091414 | Mining Web Applications - Systems and methods of mining Web applications are disclosed. An example method may include selecting a distance measure between subtrees of the Web applications. The method may also include computing an edit distance for the subtrees. The method may also include finding sets of similar subtrees using the edit distance with a Similar Sibling-Trees-aware RTDM (SiSTeR) approach. | 2013-04-11 |
20130091415 | SYSTEMS AND METHODS FOR INVISIBLE AREA DETECTION AND CONTEXTUALIZATION - Where a page has dynamic (DHTML) content that isn't visible to the end-user when the page is first rendered, a client agent of the augmentation system of the present solution detects the visibility status of areas that may become visible after end-user action. The client agent adds event handlers so that upon these areas becoming visible the client agent sends the content data of the invisible areas, now visible, to the server and receive a new set of hooks and adverts to place in the newly visible content. | 2013-04-11 |
20130091416 | METHOD FOR ESTABLISHING A RELATIONSHIP BETWEEN SEMANTIC DATA AND THE RUNNING OF A WIDGET - The present invention relates to a method for automatically establishing the relationship between the semantic data of an information source with running widgets using said data as input parameters. On one hand, the method comprises establishing the configuration by means of selecting the parts of the information source which will be used as input parameters of the widgets, identifying which widgets will be initialised with said parameters, choosing the mode of sharing that information; and on the other hand, using the configuration information for running the widget with the aforementioned parameters. | 2013-04-11 |
20130091417 | METHOD AND APPARATUS FOR USING PROXIES TO INTERACT WITH WEBPAGE ANALYTICS - An overlay may be displayed over a webpage for displaying different analytics, such as displayed with heatmaps. The webpage is parsed to identify webpage objects. Proxy objects are generated for the identified webpage objects and displayed on Z-index layers above the overlay. The proxy objects are configured to detect and react to events on behalf of associated webpage objects. A mobile device proxy server may send mobile device requests on behalf of a desktop computing device and modify received webpages so the desktop computing device renders the webpages in substantially a same manner as a mobile device. | 2013-04-11 |
20130091418 | CROSS-BROWSER TOOLBAR AND METHOD THEREOF - A tool configured to build a cross-browser toolbar is provided. The tool comprises a processor; and a memory coupled to the processor and configured to store at least instructions for execution of a wizard program by the processor, wherein the wizard program causes to: receive an input identifying at least user interface elements and event handlers respective of the user interface elements, wherein the input further identifies at least two different types of a web browser on which the toolbar can be executed; generate respective of the received input a toolbar render object, a script file, and at least one toolbar library for each type of web browser; and compile the toolbar render object, the script file, and the least one toolbar library into an installer file. | 2013-04-11 |
20130091419 | CONTEXTUAL COMMENTING ON THE WEB - Techniques for contextual commenting on the web are disclosed. In some embodiments, contextual commenting on the web includes receiving a content selection for a comment within a corpus of content; determining a contextual based location within the corpus of content to map the contextual comment to a subset of content with the corpus of content; and storing the comment and the contextual based location within the corpus of content for the comment. | 2013-04-11 |
20130091420 | Flyer Content Integration System - In this disclosure, a flyer content integration system and method is disclosed. The system includes a request processing module for receiving an integration request from an integration trigger module embedded in an editorial and a content integration module for creating a subset of flyer content from a collection of pre-selected digital flyer content for the editorial, the subset being created based on location of a viewer of the editorial and availability of the digital flyer content. | 2013-04-11 |
20130091421 | TIME RELEVANCE WITHIN A SOFT COPY DOCUMENT OR MEDIA OBJECT - A technique is provided for identifying time context in a media object to embed meta tags for the time context in the media object. Input is received of the media object including time relevant expressions. Each of the time relevant expressions in the media object are identified for display to a user. The time relevant expressions in the media object are displayed with an option for the user to enter values for each of the time relevant expressions. The values are respectively included in meta tags. The meta tags are assigned to the time relevant expressions in the media object, such that the meta tags include the values respectively corresponding to each of the time relevant expressions. The meta tags having the values for the time relevant expressions are embedded in the media object, such that the meta tags in the media object are available for searching and indexing. | 2013-04-11 |
20130091422 | System and Method for Dynamically Creating a Document Using a Template Tree - A document creation tool for dynamically generating a document that is specific to a context using a template tree of that document type. The document creation tool includes a database that stores templates of various document types, each of the templates includes a set of alternative clauses and alternative sub-clauses. A processing module processes a mere selection a template having a template tree that includes a set of the alternative clauses and alternative sub-clauses, and a mere selection of a sub-set of a plurality of alternative clauses and alternative sub-clauses from the set of the alternative clauses and alternative sub-clauses based on a corresponding text and metadata associated with the sub-set of the alternative clauses and the alternative sub-clauses. A document creation module generates the document that is specific to the context based on the corresponding text and metadata of the sub-set of the alternative clauses and alternative sub-clauses. | 2013-04-11 |
20130091423 | Method and Apparatus for Checking a Structure Conformity for a Piece Of Development Documentation with at Least One Development Document - A method and an apparatus for checking a structure conformity for a piece of development documentation with at least one development document are disclosed. The method may include the following steps: the at least one development document from the development documentation is read in and a document structure for the development document that has been read in is captured by a capture unit, and discrepancies in the captured document structure from a predetermined document structure are ascertained by a checking unit by using prescribed criteria for checking the structure conformity of the development documentation. | 2013-04-11 |
20130091424 | TIME RELEVANCE WITHIN A SOFT COPY DOCUMENT OR MEDIA OBJECT - A technique is provided for identifying time context in a media object to embed meta tags for the time context in the media object. Input is received of the media object including time relevant expressions. Each of the time relevant expressions in the media object are identified for display to a user. The time relevant expressions in the media object are displayed with an option for the user to enter values for each of the time relevant expressions. The values are respectively included in meta tags. The meta tags are assigned to the time relevant expressions in the media object, such that the meta tags include the values respectively corresponding to each of the time relevant expressions. The meta tags having the values for the time relevant expressions are embedded in the media object, such that the meta tags in the media object are available for searching and indexing. | 2013-04-11 |
20130091425 | SERVER-SIDE INTERNATIONALIZATION AND LOCALIZATION OF WEB APPLICATIONS USING A SCRIPTING LANGUAGE - A server computing system receives a request for a web page from a client that specifies a preferred language. The server computing system searches mapping data stored in a local data store using a web page identifier in the request to locate one or more terms for the requested web page to be translated. The server computing system searches translations for web pages in the local data store for a sub-set of the translations that correspond to the one or more terms for the requested web page in the specified language. The computer system generates a client-executable script to provide the sub-set of translations that correspond to the one or more terms to the client and transmits the requested web page and the client-executable script having the sub-set of translations for the requested web page to the client. The client-executable script, when executed on the client, renders the web page in the specified language. | 2013-04-11 |
20130091426 | DATA PROCESSING APPARATUS, INPUT SUPPORTING METHOD, AND PROGRAM - To present information that is likely to be input by a user as an input candidate in a case of supporting user input. | 2013-04-11 |
20130091427 | SKETCH EFFECTS - Systems and methods for distorting the form or format of an object in an electronic document. A sketch effect theme defines parameters that when applied to the object modify one or more coloring, formatting, and effects characteristics of the object to convey a sketched or hand-drawn look or feel to the object. The parameters are stored in a record associated with the document to persist the sketch effect theme through different sessions in which the document is active or open. | 2013-04-11 |
20130091428 | USER INTERFACE APPARATUS, AND ASSOCIATED METHOD, FOR MEDIA PLAYBACK DEVICE - A user interface apparatus, and an associated method, for a device having media playback functionality. A screen display generator generates a screen display for display at a display screen. The screen display includes a disc-shaped, or other elliptical-patterned, display icon at which album-track titles are listed. Input commands are entered at the display screen. | 2013-04-11 |
20130091429 | APPARATUS, AND ASSOCIATED METHOD, FOR COGNITIVELY TRANSLATING MEDIA TO FACILITATE UNDERSTANDING - An apparatus, and an associated method, facilitates user understanding of the audio component of media that is played back at a device having media player functionality. Responsive to detection of user selection, a portion of the audio component of the media is converted into textual, or other, form to provide a converted-form representation of the audio component portion. The representation is displayed to the user. The representation is further translatable into a second language, and the translated, representation is displayed to the user. | 2013-04-11 |
20130091430 | GRAPHICAL USER INTERFACE FOR TONE MAPPING HIGH DYNAMIC RANGE VIDEO - A tone mapping graphical user interface is provided that allows a video engineer to process a video using a set of tools for changing high dynamic range data into lower dynamic range data. | 2013-04-11 |