29th week of 2009 patent applcation highlights part 24 |
Patent application number | Title | Published |
20090182731 | Search method and system using thinking system - The present invention relates to a system and method for information process using artificially constructed apparatus. More specially, the present invention provides a system and method that can search for information in a document structure and provide precise results by analyzing the inputs and search results using the executing system and the knowledge structure of the think system. In one preferred embodiment of the present invention, the search terms are divided into subject terms and corresponding feature terms, and document entry files comprising respective subject terms and corresponding feature terms will provide access to documents including subject terms and corresponding feature terms. | 2009-07-16 |
20090182732 | Query based operation realization interface - Method and apparatus for an operation realization interface. In some embodiments, the method and apparatus provides a user query interface for a user to enter a query to describe her goal of a product. Then, the method and apparatus processes the query to determine appropriate operations of the product that, when realized, realize the user's goal. Finally, the method and apparatus manipulates the product to realize the appropriate operations so to realize the user's goal. | 2009-07-16 |
20090182743 | Registration and Maintenance of Address Data for Each Service Point in a Territory - A computer system and method is disclosed for mining current and archived address data in order to identify a preferred address for each service point in a territory. The data mining system may start in response to the presentation of a candidate address for matching. The set of mined data may be prioritized by clustering like characteristics, building similarity matrices, and by constructing dendrograms with nodes joined according to common characteristics. A computer system and method for maintaining a central database of preferred addresses is also disclosed. Selected address data gathered in a queue may be scored by characteristic, grouped by consignee location, and staged for processing. The scored queue of data may be prioritized by clustering like characteristics, building similarity matrices, and by constructing dendrograms. | 2009-07-16 |
20090182744 | STRING PATTERN ANALYSIS - A method of analyzing a string-pattern includes defining a minimum length (Lmin | 2009-07-16 |
20090182745 | Methods and Apparatus for Creating, Managing, and Displaying Content Channel and Weblog Dialogues - Systems and methods for creating, managing, and displaying online content channel dialogue—particularly weblog debates—are provided. Online content channels do not presently show ways for users to pull content together and publish comments out to the content for the purpose of developing a robust debate or dialogue. The present invention enables the end-user to randomly select multiple content channels and initiate such dialogue between them. End-user comments may be simultaneously published to all content channels, and such comments may have logical metadata attached to allow the end-user to pull together all content within a debate into a logical framework. | 2009-07-16 |
20090182746 | READ MOSTLY DATABASE TABLES - Described is a technology by which a database management system more efficiently processes read requests than write requests for a read-mostly database table, which is a database table that is generally read far more often than written. A lock partitioning mechanism may be implemented to provide a read lock for each CPU of a plurality of CPUs, in which only one read lock is acquired to process a read request. A database table state changing mechanism may be implemented that more efficiently processes read requests relative to write requests by maintaining the database table in a read-only state until a write request is processed. When a write request is received, the database table is changed to a read-write state to process the write request. The database table is then reset back to a read-only state, such as by running a background thread. | 2009-07-16 |
20090182747 | METHOD AND SYSTEM FOR USING FINE-GRAINED ACCESS CONTROL (FGAC) TO CONTROL ACCESS TO DATA IN A DATABASE - A method and system for controlling access to data stored in a table of a database are provided. The method includes marking the table of the database as being protected with fine-grained access control (FGAC), creating a system authorization class for the table of the database, the system authorization class having a default row authorization that prevents access to all rows in the table, the system authorization class being unmodifiable, creating a user authorization class for the table of the database, the user authorization class having a default row authorization that prevents access to all rows in the table, the user authorization class being modifiable, and associating the system authorization class and the user authorization class with the table of the database. | 2009-07-16 |
20090182748 | Interactive remote wireless system and method to assist in real estate transactions, and the like - A system and apparatus to provide remote interactive access to multiple databases and, specifically, related to a system and apparatus to provide remote interactive access to real estate information related databases using a portable, voice interactive computing device with GPS capabilities and “smart” computer features. The system combines access to search engines configured to retrieve real estate listings, publicly available statistics about a specific geographic area, and retrieval of stored forms specific to completing an offer for real estate. The device can have several components in various combinations including a touch sensitive screen, a keyboard, a processor, GPS circuitry, a microphone, an audio device, wireless circuitry, cellular circuitry, a data jack, a wireless remote, and a camera. Software utilizing those components maximizes efficiency for a real estate agent in the field. | 2009-07-16 |
20090182749 | INTERACTIVE REMOTE WIRELESS SYSTEM AND METHOD TO ASSIST IN REAL ESTATE TRANSACTIONS, AND THE LIKE - A system and apparatus to provide remote interactive access to multiple databases and, specifically, related to a system and apparatus to provide remote interactive access to real estate information related databases using a portable, voice interactive computing device with GPS capabilities and “smart” computer features. The system combines access to search engines configured to retrieve real estate listings, publicly available statistics about a specific geographic area, and retrieval of stored forms specific to completing an offer for real estate. The device can have several components in various combinations including a touch sensitive screen, a keyboard, a processor, GPS circuitry, a microphone, an audio device, wireless circuitry, cellular circuitry, a data jack, a wireless remote, and a camera. Software utilizing those components maximizes efficiency for a real estate agent in the field. | 2009-07-16 |
20090182750 | SYSTEM AND METHOD FOR FLASH FOLDER ACCESS TO SERVICE METADATA IN A METADATA REPOSITORY - Embodiments are systems and methods for automatic submission of service metadata files into a metadata repository by utilizing a protocol for web-based distributed authoring and versioning to expose a folder as a virtual view of a categorization in a hierarchy of categorizations in a metadata repository. After a service metadata file is submitted to the folder, the system automatically introspects the service metadata file to identify service information, and then the system automatically creates a service asset in the metadata repository. | 2009-07-16 |
20090182751 | METHOD OF ACCESSING DIGITAL IMAGES OF MAILPIECES FRANKED BY A STANDARD FRANKING MACHINE - A method of accessing digital images of mailpieces from a workstation of a sender of said mailpieces, which method comprises the following steps:
| 2009-07-16 |
20090182752 | AUTOMATICALLY PERSISTING DATA FROM A MODEL TO A DATABASE - Projects often involve multiple teams of developers in different locations. The different teams make updates to a central or shared database(s) that can store information about the project, such as progress. Each team or even different members of the different teams can check out instances of a representation of a model for the project. The different teams/members can independently modify their instance with data specific to that member and/or team. Database operations embedded in the individual instances are then executed on the database(s) to persist the data from their individual instances to the database(s). Database mechanisms can handle locking and/or conflicts that may arise from performance of the database operations. A manager can then request a report from the database(s), and the report with data from the different members and/or teams can be generated from the database(s). | 2009-07-16 |
20090182763 | MULTI-CLIENT COLLABORATION TO ACCESS AND UPDATE STRUCTURED DATA ELEMENTS - Tools and techniques for providing multi-client collaboration to access and update structured data elements are disclosed. Client systems may present user interfaces that provide libraries of published data elements that are available for collaboration. The clients may request selected data elements, while referencing unique identifiers associated with the selected data elements. Those clients that publish data elements for collaboration by others may present user interfaces that provide representations of candidate structured data elements, and receive selections of those data elements chosen for publication. The publishing clients may then send the selected data elements for publication. The client systems may interact with servers or collaboration services, which may receive structured data elements that the clients have published for access by others. The servers may define respective unique identifiers for the published data elements, and may send the structured data elements and corresponding unique identifiers to various client systems. | 2009-07-16 |
20090182764 | DATABASE COMPRISING TOPOGRAPHICAL INFORMATION ON OBSTACLES AND METHOD FOR GENERATING ONE SUCH DATABASE - The invention relates to a database and a method of generating a database containing topographical information on obstacles distributed over a geographic area subdivided into cells. The method includes reading topographical data obtained from heterogeneous sources. Topographical data are generated which relate to pointlike obstacles from the information collected from the topographical data. Topographical data are generated which relate to linear obstacles from the information collected from the topographical data. The obstacle database is created. Each cell contains a link to the obstacles whose coordinates in the geographic area covered by the cell are recorded with an uncertainty value. In particular, the invention applies to the generation of a database on board an aircraft. | 2009-07-16 |
20090182765 | FOLDER STORAGE DEVICE - A folder storage device includes a folder storage unit which stores folders with hierarchy structures, a first folder hierarchy information generation unit arranged to generate first folder hierarchy information which indicates a related path and a hierarchical location of each folder based on the folders stored in the folder storage unit, a second folder hierarchy information generation unit arranged to generate second hierarchy information which indicates the hierarchical location of each folder based on the first folder hierarchy information, a display unit which displays the second hierarchy information, and a folder update unit in which contents to be updated of the folders stored in the folder storage unit are specified and the updates of the folders stored in the folder storage unit are executed based on the first folder hierarchy information in response to a receipt of update instructions at a prescribed hierarchical location of the second folder hierarchy information. | 2009-07-16 |
20090182766 | AVOIDING DATABASE RELATED JOINS WITH SPECIALIZED INDEX STRUCTURES - Provided is a solution for storing data, the data comprising a set of tables, each table comprising a set of columns, each column comprising a set of values, each value being one or more data types. In the solution, a binary tree can be created for each of the data types. Each binary tree can comprise a set of nodes. A set of arrays can be associated with each node of the binary tree. The array associated with each node of each binary tree can correspond to one of the columns that comprises the value of the data type represented by the node of the binary tree. Each array can indicate at least one table row and column from the plurality of tables in which the value of the data type represented by the node of the binary tree occurs. | 2009-07-16 |
20090182767 | STORING AND RETRIEVING OBJECTS ON A COMPUTER NETWORK IN A DISTRIBUTED DATABASE - A distributed, object-oriented database engine utilizing independent, intelligent processing nodes as a cooperative, massively parallel system with redundancy and fault tolerance. Instead of using traditional methods of parallelism as found in most distributed databases, the invention utilizes a messaging system and a series of message processing nodes to determine where attributes and data files associated with objects are stored. The architecture is loosely coupled, each node independently determining if it manages or routes storage and retrieval requests. | 2009-07-16 |
20090182768 | MULTI-MVNO WIRELESS SERVICE - Systems and methods for determining an optimal range of frequencies of electromagnetic waves are described. In some embodiments, mobile voice communications devices measure average power received from certain ranges of such frequencies, each range associated with a communications service provider. A cost may be associated with each range. An optimal range of frequencies may be determined based on these factors. Each device may also receive a set of data identifying the location of the device. Each device may transmit one or more communications signals to a CIP with such measurements and location information, and some of this information may be stored in a database. | 2009-07-16 |
20090182769 | Method and Apparatus for Processing a Pasting Link Based on a Data Object Oriented Repository System - The present invention relates to a method and apparatus for processing a pasting link based on a data object oriented repository system (DOORS). The DOORS stores objects and link addresses of the objects, the link addresses of the objects records row numbers or column numbers of a spreadsheet, a group of storing addresses of the objects associating with each other are stored in the rows or columns of the spreadsheet, the storing addresses of the objects are addresses where the objects are stored in the DOORS, and the method comprises following steps when the objects are changed: (1) visiting the DOORS, and reading the link addresses of the objects; (2) visiting the rows or columns of the spreadsheet based on the row numbers or the column numbers recorded by the link addresses of the objects; and (3) performing content update of the objects in the DOORS based on change of content of the objects and/or address update of the objects in the rows or columns based on change of addresses of the objects. The apparatus for processing a pasting link includes a storing module, a guiding module, a locating module and an editing module. The present invention can update data automatically, speedily and accurately, which can ensure the synchronization and consistency of the data. | 2009-07-16 |
20090182770 | PERSONALIZATION OF CONTEXTUALLY RELEVANT COMPUTER CONTENT - An organization defined as a collection of contexts having associated roles and objects is disclosed. In one implementation, a common computing system can maintain the contexts and associated roles and objects and provide data to personal systems. In another implementation, personal systems can maintain a subset of the data to assist in indexing. | 2009-07-16 |
20090182771 | METHOD AND APPARATUS FOR INFORMATION BOOSTING IN RELATED BUT DISCONNECTED DATABASES - Method and apparatus for information boosting in related but disconnected databases, in one aspect, may comprise identifying disconnected data sources comprising data that are related or dependent on one another, determining one or more relationships and dependencies among the disconnected data, and refining the data sources based on one or more relationships and dependencies. | 2009-07-16 |
20090182772 | METHODS AND SYSTEMS FOR IMPLEMENTING STAGED CONFIGURATOR MODELING - This disclosure describes, generally, methods and systems for implementing staged configurator modeling. The method may include initiating a staged product configurator model environment and presenting a user interface (UI) configured to allow for definition of stages. The method may further include receiving input via the UI indicating the definition of stages and storing the stages in a data store. Furthermore, the method may include defining product components and associating product components with one or more of the stages. The method may further include executing one or more applications associated with the product components. The method may further include executing one or more applications associated with the product components. Each application may be configured to use the one or more stages when executing a configurator, and each new stage supplied to the configurator may be equal to or linearly incremented from a previously supplied stage. | 2009-07-16 |
20090182783 | LAZIER TIMESTAMPING IN A TRANSACTION TIME DATABASE - Systems and methods for facilitating more efficient timestamping in a lazy timestamping transaction time database environment are described herein. A recovery log component can store timestamp information of a transaction in a commit record of the transaction, wherein the commit record of the transaction is included in a recovery log. A volatile reference count component can update reference count data of the transaction in a volatile timestamp table to reflect a number of records of the transaction that do not persistently include timestamp information. Further, a checkpoint component can update timestamp information for a batch of transactions, wherein the timestamp information is updated in a record of the persistent timestamp table to ensure that the timestamp information persists in the record of the persistent timestamp table before the commit record of the transaction that contains the transaction's timestamp information is deleted from the recovery log. | 2009-07-16 |
20090182784 | RECOVERY POINT IDENTIFICATION IN CDP ENVIRONMENTS - The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached. | 2009-07-16 |
20090182785 | Multi-Way Checkpoints in a Data Storage System - Embodiments of the present invention allow multiple checkpoints to be taken so that multiple versions of the filesystem, including a working version and at least two checkpoint versions, can be maintained over time. Specifically, at least three “superblock” root structures are used to manage multiple instantiations of the filesystem. The superblocks are preferably stored in fixed locations within the storage system for easy access, although they may alternatively be stored in other ways. The number of superblocks may be fixed or variable. | 2009-07-16 |
20090182786 | APPLICATION COHERENCY MANAGER - An application coherency manager (ACM) implements and manages the interdependencies of simulation, data, and platform information to simplify the task of organizing and executing large simulations composed of numerous models and data files. One or more file systems or repositories stories raw data in the form of files, data, or models, and a graphical users interface (GUI) enabling a user to enter and receive results from a query involving the files, data, or models. One or more coherency checking modules (CCMs) are operative to determine the types and versions of, and compatibility between, the files, data, or models. A database stores processed information about the file systems or repositories and the results of previous queries, and a data aggregator and manager (DAM) that manages the flow of information between the file system or repository, the GUI, the CCMs, and the database. The invention is applicable to simulation and non-simulation type applications such as document control, source code control, image libraries, etc. | 2009-07-16 |
20090182787 | Recovery Administration of Global Transaction Participants - A transaction system that allows for analysis and administration at the global transaction participant level is disclosed. | 2009-07-16 |
20090182788 | APPARATUS AND METHOD FOR CUSTOMIZED EMAIL AND DATA MANAGEMENT - An apparatus and method for customized email and data management is disclosed. According to one embodiment, a collaborative page is created to contain an email module configured to access one or more email accounts. Emails from the one or more email accounts are selected using an email selection criterion. The selected emails are processed to parse data based on a parsing rule. The emails and the parsed data are displayed on the collaborative page. The collaborative page is updated with new emails and the updated content. | 2009-07-16 |
20090182789 | SCALABLE DE-DUPLICATION MECHANISM - A method for removing redundant data from a backup storage system is presented. In one example, the method may include receiving the application layer data object, selecting a de-duplication domain from a plurality of de-duplication domains based at least in part on a data object characteristic associated with the de-duplication domain, determining that the application layer data object has the characteristic and directing the application layer data object to the de-duplication domain. | 2009-07-16 |
20090182790 | Storage of Data - In one example, multimedia content is requested from a plurality of storage modules. Each storage module retrieves the requested parts, which are typically stored on a plurality of storage devices at each storage module. Each storage module determines independently when to retrieve the requested parts of the data file from storage and transmits those parts from storage to a data queue. Based on a capacity of a delivery module and/or the data rate associated with the request, each storage module transmits the parts of the data file to the delivery module. The delivery module generates a sequenced data segment from the parts of the data file received from the plurality of storage modules and transmits the sequenced data segment to the requester. | 2009-07-16 |
20090182791 | Non-Volatile Memories And Method With Adaptive File Handling In A Directly Mapped File Storage System - In a memory system with a file storage system, an optimal file handling scheme is adaptively selected from a group thereof based on the attributes of the file being handled. The file attributes may be obtained from a host or derived from a history of the file had with the memory system. In one embodiment, a scheme for allocating memory locations for a write operation is dependent on an estimated size of the file to be written. In another embodiment, a scheme for allocating memory locations for a relocation operation, such as for garbage collection or data compaction, is dependent on an estimated access frequency of the file in question. In this way, the optimal handling scheme can be used for the particular file at any time. | 2009-07-16 |
20090182792 | METHOD AND APPARATUS TO PERFORM INCREMENTAL TRUNCATES IN A FILE SYSTEM - The present invention provides a computer implemented method for truncating a file in a file system. The file system receives a request to truncate a file to a target size, the file having a first inode. The file system creates a second inode to a transient directory, wherein the second inode holds a plurality of in-progress entries. The file system sets a target size in the first inode. The file system writes a truncate entry to a journal, the truncate entry comprising a predetermined size. The file system truncates the file by up to the predetermined size. The file system determines that the file is above the target size. Responsive to a determination that the file is above the target size, the file system repeats the truncating step and the determining step. Responsive to a determination that the file is not above the target size, the file system applies the in-progress entries from the transient directory. | 2009-07-16 |
20090182803 | BROWSER-BASED PROXY SERVER FOR CUSTOMIZATION AND DISTRIBUTION OF EXISTING APPLICATIONS - A system, method and computer program product for executing at least one client computer software application by embedding a web browser in a proxy server, thereby forming a proxy browser. The proxy browser is used to execute the application inside the proxy server. In one embodiment of the invention, each client browser that connects to the proxy server is assigned an instance of the proxy browser and session information is maintained for the client browser. When the client browser makes a request to the proxy server, the request is linked to the instance of the proxy browser. | 2009-07-16 |
20090182804 | SYSTEM AND METHOD FOR A TAGGING SERVICE - Disclosed is a service for displaying custom information. The service includes establishing a data connection to at least one data source, storing specific information via the data connection in the data source, and providing a data crawler to crawl said at least one data source using the stored information. The results are pushed from the data crawler to an end user for displaying a combination of the stored information and the at least one data source. | 2009-07-16 |
20090182805 | Methods and Systems for Peripheral-Device-Assisted Networking - Aspects of the present invention relate to systems and methods for peripheral-device-assisted networking. | 2009-07-16 |
20090182806 | Methods and Systems for Content-Consumption-Aware Device Communication - Aspects of the present invention relate to systems and methods for content-consumption-aware device communication. | 2009-07-16 |
20090182807 | TERMINAL DEVICE, NETWORK SYSTEM, METHOD TO PROVIDE CONTEXT INFORMATION, AND PROGRAM TO PROVIDE CONTEXT INFORMATION - A terminal device is provided with a context information storing means for storing context information on a prescribed memory medium, a Cookie receiving means for receiving a Cookie to request specific context information in the case of communication with an outside server, a context information extracting means for extracting the specific context information from the prescribed memory medium in accordance with the received Cookie, and a transmitting means for transmitting the extracted context information to the outside server. | 2009-07-16 |
20090182808 | INSTANT MESSAGING SYSTEM AND METHOD - Methods and apparatuses for processing an instant message from a source wireless communication device to a destination device are described herein. In one aspect of the invention, an exemplary method includes receiving the instant message from the source wireless communication device, the instant message having a source wireless communication identifier, a destination instant messenger identifier, and data contents; extracting the source wireless communication identifier, the destination instant messenger identifier and the data contents from the instant message; retrieving a source instant messenger identifier corresponding to the source wireless communication identifier; binding the source instant messenger identifier with the source wireless communication identifier; and transmitting the data contents with the source instant messenger identifier to the destination device over a communication network, based on the destination instant messenger identifier. Other methods and apparatuses are also described. | 2009-07-16 |
20090182809 | ELIMINATING REDUNDANT NOTIFICATIONS TO SIP/SIMPLE SUBSCRIBERS - A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparactor configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match. | 2009-07-16 |
20090182810 | System and Method for Real-Time Media Object-Specific Communications - A system and method to facilitate word-of-mouth advertising and sales support associated with displayed media objects on distributed networks is described. The system provides one or more advocates to a network user accessing advertising of a brand, product, or service. One or more of the advocates may be socially related to the user. User interactions with the advocates are facilitated through a real-time communication network, follow-on commercial activity is tracked, and the value of word-of-mouth advocacy is captured and distributed. | 2009-07-16 |
20090182811 | DATA SHARING SYSTEM, DATA SHARING METHOD, INFORMATION PROCESSING APPARATUS,AND COMPUTER-READABLE STORAGE MEDIUM - A data sharing system which is capable of preventing duplicated data which does not match original data stored in an original node from being spread across the network. An original node stores original data. A first duplicating node acquires duplicated data of the original data from the original node, and sends the duplicated data to a second duplicating node. The original node receives a request for confirmation of the duplicated data received from the first duplicating node, from the second duplicating node, compares the duplicated data received by the second duplicating node and the original data with each other, in response to the request, and transmits a request for deletion of the duplicated data, to the second duplicating node, depending on a result of the comparison. | 2009-07-16 |
20090182812 | METHOD AND APPARATUS FOR DYNAMIC SCALING OF DATA CENTER PROCESSOR UTILIZATION - In one embodiment, the present invention is a method and apparatus for dynamic scaling data center of processor utilization. In one embodiment, a system for managing a data center includes a control module for gathering data related to at least one server in the data center, the data being gathered from a plurality of sources, and a user interface coupled to the control module for displaying the gathered data to a user in a centralized manner. The control module is further configured to receive a command from the user, the command relating to the operation of the server, and to transmit the command to server. | 2009-07-16 |
20090182813 | DATA REPURPOSING - A digital broadcast network is provided in which multiple original experiences powered by the same data is created. A server software intelligently handles delivery of data so that the data can be utilized by several different client-side applications at substantially the same time. Through filtering of large amounts of data and creation of a universal format, this data can be used by devices capable of receiving a digital broadcast stream. | 2009-07-16 |
20090182814 | SOLVING MIXED INTEGER PROGRAMS WITH PEER-TO-PEER APPLICATIONS - The present invention discloses methods of solving mixed integer programs (MIP) in distributed environments, where the number of computers or users involved in the optimization can be extremely high. The proposed methods are designed to be robust in order to cope with all the difficulties in public and heterogeneous environments including load balancing and privacy. The present invention also describes a market on computation power. | 2009-07-16 |
20090182815 | ACCELERATING PEER-TO-PEER CONTENT DISTRIBUTION - The acceleration of peer-to-peer downloads of content files wherein a tracker performs a condition based peer selection that is dynamically adjustable. A further feature relates to the use of enhanced message scheme for communications. One embodiment is a system in a swarm having at least one origin seed capable of at least initially storing the content files with at least one tracker maintaining a list of peers wherein the tracker uses at least one dynamically adjusting peer selection algorithm to generate a condition based peer-list and provides the condition based peer-list to a requesting peer. | 2009-07-16 |
20090182816 | METHOD AND SYSTEM FOR MANAGING J2EE AND .NET INTEROPERATING APPLICATIONS - A computer implemented method, system, and computer usable program code for managing a transaction between a service client and a service provider is provided. A request from a Web services client application is received. A correlation token and a unique transaction handle associated with the correlation token are extracted from the request, forming an extracted correlation token and an extracted transaction handle. A child correlation token is generated using the extracted correlation token as a parent correlation token. A unique transaction handle associated with the child correlation token is generated. A timer associated with the unique transaction handle and child correlation token is started. The request is performed. The timer associated with the unique transaction handle is stopped. The extracted transaction handle is inserted in a response to the request. The response with the extracted transaction handle is transmitted to a Web services client application. | 2009-07-16 |
20090182817 | Architecture for online communal and connected experiences - Various aspects are disclosed herein for an architecture for online communal and connected experiences. This architecture can be embodied in an application running a host computing device, where the application provides functionalities such as finding modules on local devices or hosted on online services, launching such modules, switching between a plurality of such concurrently running modules, and providing many-to-many text, voice, and video functionality. This application can also interface with managed runtime code on the host computing device, thereby providing inputting, outputting, and network communication means among a plurality of computing devices having different platforms. | 2009-07-16 |
20090182818 | HEURISTIC DETECTION OF PROBABLE MISSPELLED ADDRESSES IN ELECTRONIC COMMUNICATIONS - Methods and systems for detecting suspicious electronic communications, such as electronic mail (email) messages containing, originated or purportedly originated from misspelled and/or deliberately misleading addresses, are provided. According to one embodiment, an electronic communication, such as an electronic mail (email) message, is scanned to determine whether the electronic communication contains one or more suspicious addresses or represents a suspicious traffic pattern. If the electronic communication is determined to contain one or more suspicious addresses or is determined to represent a suspicious traffic pattern, then the electronic communication is handled in accordance with an electronic communication security policy associated with suspicious electronic communications. For example, an event may be logged, the electronic communication may be dropped or quarantined, the communication may be tagged as spam or possible phishing and/or an end user may be alerted to the existence of the one or more suspicious addresses. | 2009-07-16 |
20090182819 | TECHNIQUES TO SELECTIVELY SHARE MESSAGES - Techniques to selectively share messages are described. An apparatus may comprise a trusted delegate server having a message sharing module. The message sharing module may be operative to selectively retrieve messages for a primary message recipient from a unified messaging server based on a message type defined by a message sharing policy. The messaging sharing module may send the messages to a secondary message recipient for the message type as defined by the message sharing policy over a packet-switched network. Other embodiments are described and claimed. | 2009-07-16 |
20090182820 | METHOD FOR AUTOMATICALLY MODIFYING ELECTROINIC DISTRIBUTION LISTS USING PREDEFINED RULES - An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 2009-07-16 |
20090182821 | APPARATUS AND ASSOCIATED METHOD FOR PROVIDING NETWORK BASED ADDRESS BOOK AND SHARING AND SYNCHORNIZING ADDRESS BOOK INFORMATION AT MULTIPLE COMMUNICATION DEVICES - Apparatus, and associated methodologies for facilitating sharing and distributing contact, calendar, and scheduling information amongst communication devices. The information is distributed using presence information maintained at a presence server, thereby obviating the need for a user manually to enter the information, or changes to the information, at the different devices that are to be provided with the information. | 2009-07-16 |
20090182822 | SOCIAL COLLABORATIVE SCORING FOR MESSAGE PRIORITIZATION ACCORDING TO AN APPLICATION INTERACTION RELATIONSHIP BETWEEN SENDER AND RECIPIENT - Embodiments of the present invention address deficiencies of the art in respect to message prioritization and provide a novel and non-obvious method, system and computer program product for social collaborative prioritization of messages in a messaging system. In an embodiment of the invention, a method for social collaborative prioritization of messages can be provided for a messaging system. The method can include receiving a message from a sender as directed to a recipient, determining a value for a different social collaborative criterion based upon an application interaction relationship between the sender and the recipient, transforming the value into a priority for the message, and associating the priority with the message in the messaging system. | 2009-07-16 |
20090182833 | Sharing Material in a Master-Slave Configuration Using an Instant Messaging Infrastructure - A method for utilizing an IM system enables presenters and participants to interact with material in a master-slave configuration. Both the presenter and participants access the material locally on their computers. The material on the participants' computer interacts with the presenter's computer using an existing instant messaging infrastructure. As the presenter interacts with local material, events are broadcast to slave material as instant messages, such that these events are reproduced as interactions. | 2009-07-16 |
20090182834 | Device and Method for Providing Data - Devices and methods for providing data via a network are disclosed. | 2009-07-16 |
20090182835 | Non-disruptive storage caching using spliced cache appliances with packet inspection intelligence - A method, system and program are disclosed for accelerating data storage by providing non-disruptive storage caching using spliced cache appliances with packet inspection intelligence. A cache appliance that transparently monitors NFS and CIFS traffic between clients and NAS subsystems and caches files using dynamically adjustable cache policies provides low-latency access and redundancy in responding to both read and write requests for cached files, thereby improving access time to the data stored on the disk-based NAS filer (group). | 2009-07-16 |
20090182836 | System and method for populating a cache using behavioral adaptive policies - A method, system and program are disclosed for accelerating data storage in a cache appliance cluster that transparently monitors NFS and CIFS traffic between clients and NAS subsystems and caches files using dynamically adjustable cache policies which populate the storage cache using behavioral adaptive policies that are based on analysis of clients-filers transaction patterns and network utilization, thereby improving access time to the data stored on the disk-based NAS filer (group) for predetermined applications. | 2009-07-16 |
20090182837 | Spatial Sieve Tree - A method, apparatus, and system is described for creating a spatial sieve tree which stores, manages, and manipulates multidimensional data by partitioning the bounds of the nodes of the tree, creating child nodes which each have defined bounds associated with a partitioned portion of their parent node(s) and may be further partitioned into additional levels of child nodes, and determining which level of the tree has the smallest size node in which a data object could wholly fit regardless of the data object's location in coordinate space and the one or more nodes of that determined level that could at least partially contain the data object based on the bounds of the one or more nodes and the data object's location in coordinate space. | 2009-07-16 |
20090182838 | Starting Enterprise Applications On Demand - A method to start enterprise applications on demand using naming references is described. The method matches Enterprise JavaBeans applications to respective naming references, checks if the matched application is running and starts it if it is not. | 2009-07-16 |
20090182839 | IMAGE PROCESSING DEVICE, CONTROL METHOD THEREFOR, AND PROGRAM - An image processing device communicable with an information processing device, includes: a first management unit for managing at least one service provided by the image processing device based on a first protocol; a second management unit for managing the at least one service provided by the image processing device based on a second protocol; a reception unit for receiving a search request for searching for a service managed by the second management unit, the search request being transmitted from the information processing device based on the first protocol; and a transmission unit for transmitting, in response to the search request received by the reception unit, an address of a service satisfying the search request and managed by the second management unit to the information processing device. | 2009-07-16 |
20090182840 | INFORMATION DEVICE - A device for obtaining, storing and displaying information from a remote server, the device has a modem for establishing communication sessions with the remote server. A memory coupled to the modem stores the obtained information, and a display is coupled to the memory for displaying the stored information. The device automatically and periodically communicates with the remote server for obtaining the information. | 2009-07-16 |
20090182841 | Electronic ad delivery system and method - A system, method and computer readable medium configured to determine whether an initial electronic advertisement has been displayed, and to deliver an alternate advertisement when the initial electronic advertisement has not been displayed. | 2009-07-16 |
20090182842 | Method And System For Redirecting Data Requests In Peer-To-Peer Data Networks - A methodology for operating a data sharing application in a peer-to-peer network is presented. After a first peer node receives a request for a copy of a specified file from a second peer node, the first peer node may either return a copy of the specified file or a response message containing an alternate node list associated with the specified file. The alternate node list contains a set of node identifiers indicating a set of alternate peer nodes within the peer-to-peer network that may have a copy of the specified file. The alternate node list is dynamically maintained at each peer node. The response provided by the first peer node, i.e. either a copy of the specified file or the alternate node list, can be determined based on an operational condition of the first peer node, e.g., whether or not the first peer node is experiencing an overload condition. | 2009-07-16 |
20090182863 | CENTRALIZED SOCIAL NETWORK RESPONSE TRACKING - Embodiments of the present invention address deficiencies of the art in respect to response subscriptions and provide a method, system and computer program product for centralized response tracking across social networks. In one embodiment of the invention, a social networking response tracking method can be provided. The method can include associating subscribers with a user or a group of users based upon a posting by the user or a user in the group of users within a centralized response tracking system, aggregating different postings from the user to correspondingly different forums disposed about a global computer communications network within the centralized response tracking system, and, notifying the subscribers of the aggregated postings from the centralized response tracking system. | 2009-07-16 |
20090182864 | Method and apparatus for fingerprinting systems and operating systems in a network - A system and method for identifying the number of computer hosts and types of operating systems behind a network address translation is provided. The method includes processing an internet protocol packet associated with the host computer system. The process may involve capturing the internet protocol packet and extracting key fields from the internet protocol packet to produce a fingerprint. The method continues with analyzing the fields in order to determine if a network address translator is connected between the host computer and a public network (e.g. the internet). If there is a network address translator connected, fields may be analyzed in order to determine the number of computers using the network address translator. The fields may also be analyzing in order to determine with a level of probability that the fingerprint identifies the correct operating system running the host computers. Generally, the internet protocol packet that is analyzing will be captured from an aggregation point in the carrier network. | 2009-07-16 |
20090182865 | SMART COMPONENT MONITORING - One embodiment of the present invention provides a system that automatic discovers and monitors enterprise components. During operation, the system scans an enterprise environment for an item of meta-data. Next, the system analyzes the item of meta-data to determine a monitoring instruction for a corresponding enterprise component. Finally, the system performs the monitoring instruction for the corresponding enterprise component. | 2009-07-16 |
20090182866 | Method of setting and managing performance monitoring conditions and computer system using the method - In order to change a policy while alarm-monitoring a production environment, during a production-environment operation, a method of controlling a computer system is provided, in which a policy is temporarily changed, thereby performing setting change. An agent transmits a monitoring result based on a first monitoring condition. A management unit generates a second monitoring condition based on a received change request. The agent transmits a monitoring result based on the second monitoring condition. The management unit holds information for correlating the first and second monitoring conditions with each other. Upon reception of a confirmation request for confirming the second monitoring condition, the management unit specifies the first monitoring condition correlated with the second monitoring condition based on the information. The agent which has received the deletion request stops the transmission of the monitoring result based on the first monitoring condition. | 2009-07-16 |
20090182867 | METHOD AND APPARATUS FOR IDENTIFYING A PACKET - A system and method for identifying target packets in a network. The invention identifies packets by computing a hash value over at least a portion of a packet passing through a network device such as a router. The hash value is used as an address, or index, into a memory. The hash value identifies a unique memory address and a flag is set at the respective memory location. When a target packet is detected elsewhere in a network, the network device receives a query message containing a hash value of the target packet. The network device compares the target packet to the hash values in memory. A match between the hash value in memory and the hash value in the query message indicates the target packet was observed by the network device. After a match is detected, the network device makes a reply available to the network. | 2009-07-16 |
20090182868 | Automated network infrastructure test and diagnostic system and method therefor - A testing system provides automated testing of one or more network infrastructures. The testing system may automatically reconfigure one or more devices within a network infrastructure and then conduct testing on the newly configured network infrastructure. Test results may be used to diagnose network anomalies and to compare performance or other characteristics of various network configurations. In one embodiment, the testing system tests a communication channel between a front-end and back-end mechanism where data traffic is encoded between the front-end and back-end mechanism. | 2009-07-16 |
20090182869 | VIEWING EFFECT MEASURING SYSTEM, AND MEASURING METHOD AND MEASURING TERMINAL THEREOF - A viewing effect measuring system is provided. A user terminal performs a content output process for receiving content from a content delivery apparatus and outputting the content, a Web site displaying process for accepting a request to access a Web site, while the content are outputted, accessing the Web site via the network, and displaying the Web site in such a manner as available for browsing, and a measurement information sending process for establishing an association between Web site specifying information which identifies the Web site as to which the access is requested, and content specifying information which identifies the content being outputted when the access is performed, and sending information of the association as viewing information to a measuring server. The measuring server receives the viewing information from the user terminal and sends the information to a Web server of the Web site as measurement information. | 2009-07-16 |
20090182870 | METHOD AND COMMUNICATION SYSTEM FOR MANAGING A COMMUNICATION NETWORK - Communication networks are automatically tested from a superordinate producer-independently managing network management center, such as when subordinate, producer-specific operation and maintenance centers (OMCs) are not occupied. Producer-dependent information is transmitted when an alarm report is sent and producer-specific hardware tests are automatically generated in the network management center (NMC). It is unnecessary for producer-specific object classes to be completely defined in the information model of the OMC-NMC interface. The tests automatically generated in the network management center can be triggered in response to errors, e.g. for a particular hardware board, or preventively, for example for the entire hardware of a network unit. | 2009-07-16 |
20090182871 | BACKUP PAGING FOR WIRELESS COMMUNICATION - A backup page is provided for a node that misses a page. In some aspects, a first type of access point in a system provides a backup page for an access terminal that is idling on a second of access point in the system in the event the access terminal misses a page by the second of access point in the system. An access point of the first type may page the access terminal according to a first paging schedule while an access point of the second type may page the access terminal according to a second paging schedule. In some aspects an access point of the first type (e.g., a macro node) provides service over a macro coverage area and an access point of the second type (e.g., a femto node) provides service over a smaller coverage area and/or provides restricted service. | 2009-07-16 |
20090182872 | Method and Apparatus for Detecting Events Indicative of Inappropriate Activity in an Online Community - A method of detecting events in a computer-implemented online community includes providing a computer-implemented event processor, providing the computer-implemented event processor with a description of at least one event to be detected, automatically analyzing messages of the online community with the computer-implemented event processor to detect the at least one event, and issuing a notification of a detected event. Also an apparatus for carrying out the method. | 2009-07-16 |
20090182883 | POLICY CONTROL AND CHARGING (PCC) RULES BASED ON MOBILITY PROTOCOL - Techniques for supporting policy control and charging (PCC) functions in a wireless communication network are described. In one design, a Policy Control and Charging Rules Function (PCRF) may receive a request from a first network entity (e.g., a home agent) to establish a PCC session for a user equipment (UE) accessing the first network entity using a mobility protocol (e.g., Mobile IP). The PCRF may determine the mobility protocol used by the UE based on an IP-CAN Type parameter included in the request. The PCRF may determine PCC rules for the PCC session based on the mobility protocol and may send the PCC rules to the first network entity. The first network entity may apply the PCC rules on packets for the PCC session and may count each packet for charging. A second network entity may forward the packets but would not count these packets for charging. | 2009-07-16 |
20090182884 | Domain name resolution making IP address selections in response to connection status when multiple connections are present - Methods, configured storage media, and systems are provided for resolving domain names into IP addresses in a path-sensitive manner, namely, a manner that may consider information about a link to a server and/or information about routers and other path components. The IP addresses given in response to domain name resolution requests are selected to provide increased reliability and/or dynamic load-balancing over paths. | 2009-07-16 |
20090182885 | System And Method For Interactively Delivering Expert Information To Remote Outlets - A networked interactive expert system is disclosed for selectively providing relevant expertise when a user requires such assistance. System provides a set of networked facilities for determining an expertise needed by a customer based on a location. Such location can be either physical or logical. A physical “location” corresponds, for example, to a department within a retail outlet. Examples of logical “locations” are ones corresponding to a web-page, a product identification code of interest, a customer identification code, and/or explicit knowledge category selected by the customer. An expert studio, from a list of expert studios providing expertise corresponding to the identified location associated with the customer's request, is matched up with the request. Thereafter, a primary connection, supporting an interactive videoconference session, is established between a first networked node associated with the customer and a second networked node associated with the designated expert studio. | 2009-07-16 |
20090182886 | DELIVERY AND DISPLAY OF INFORMATION OVER A DIGITAL BROADCAST NETWORK - A digital broadcast network is disclosed that can provide information at different frequency repetition rates in order to mitigate delay of information at a receiving device. A data stream can be divided into sets of data and depending on how each set of data will be consumed by a user, respective weights or priorities can be assigned to each set. Based on the weight or priority, at least one set of data can repeat more frequently within the data stream than other sets of data. Thus, upon receiving the data stream, the set of data repeated more frequently can be rendered on a user device at substantially the same time as the information is requested. Assigning a more frequent repetition rate of certain sets of data allows the receiving device to quickly obtain and render more important data. | 2009-07-16 |
20090182887 | Data transmission and writing method using multicast data flows - A data transmission and writing method using multicast data flows is used for performing data transmission and writing operation of a mirror file on one or more client computers simultaneously by multicast data flows sent from various servers, in a network system architecture having a plurality of client computers and servers. Firstly, the client computer sends a request information to each server in the network by using a broadcast protocol, then the client computer is added into a plurality of multicast data flows sent by a plurality of corresponding servers according to response of each server. The data of different designated parts of the mirror file required to be downloaded is received, and the received data is finally written into a disk of the client computer. This method effectively improves data transmission amount through multicast technique of network and by fully utilizing hardware performance of the client computers. | 2009-07-16 |
20090182888 | SOURCE UPDATING FOR STREAMING BASED SERVERS - A method includes the steps of: detecting a request from a client to restart a streamed multimedia presentation from a new starting point; determining if an update to a source file of the streamed multimedia presentation is available; if the update is available: closing the source file, opening the update, and establishing a link to the existing data channel; locating the new starting point of the streamed multimedia presentation; and streaming the multimedia presentation from the new starting point. | 2009-07-16 |
20090182889 | SYSTEM AND METHOD OF MANAGING MULTIPLE VIDEO PLAYERS - A system and method are provided for managing multiple video players executing on a client software platform. The method includes the operation of displaying a plurality of video players viewable by an end user. Each video player can have at least one video data stream supplied over a data network. A priority value can be applied to selected video players. In addition, an amount of bandwidth available from the data network to supply the plurality of video players can then be determined. Another operation is calculating whether the selected video players can sustain a video playback quality above a pre-defined threshold using the determined amount of bandwidth available. This operation can include appropriately apportioning and managing bandwidth and/or processing power allotments between the video players based on the priority assignments when the bandwidth and/or processing power is less than what the video players want to consume A modify playback message may be sent to at least one video player when the video playback rate is not sustainable or has become sustainable again. | 2009-07-16 |
20090182890 | Information Communication - Methods, systems, and apparatus, including medium-encoded computer program products, for imparting information. In general, one or more aspects of the subject matter described in this specification can be embodied in one or more methods that include receiving (e.g., in a peer-to-peer network) multiple sets of numerical residuals generated in accordance with multiple corresponding prime numbers; determining, based on the prime numbers, whether the sets of numerical residuals are sufficient to recover information encoded by the sets of numerical residuals; and recovering the information, when the sets of numerical residuals are sufficient, from at least a portion of the sets of numerical residuals using at least a portion of the prime numbers. | 2009-07-16 |
20090182891 | Interactive Data Stream - The present invention is geared generally towards the transmission of data, such as images, audio, video, or text, as a continuous stream via a network to recipients. In particular, the present invention relates to enabling the transmission of data to recipients and enabling the recipients to interact and influence the content of the transmission. | 2009-07-16 |
20090182892 | Method And System For Device Property For Specification Of Vendor Specific Protocol Features - One or more vendor extensions that may be communicated to and/or from a device that may communicate via media transfer protocol (MTP) may be specified within an extension of the MTP. The vendor extension may comprise vendor specific information such as proprietary supported features. Vendor extensions may be indicated as a device property and may be communicated to another device during initiation of communication. Supported vendor extensions may be specified in an MTP DevicePropDesc dataset as a response to a request such as a MTP GetDevicePropDesc operation. Alternatively, data from a current value field of an MTP DevicePropDesc dataset may be returned in response to a GetDevicePropValue operation. An MTP SetDevicePropValue operation may be utilized for selecting a vendor extension. However, the selection may be accepted or rejected by a device. An event may be issued to other devices when a change of vendor extension has occurred. | 2009-07-16 |
20090182893 | CACHE COHERENCE IN A VIRTUAL MACHINE MANAGED SYSTEM - A method, a system, and computer readable program code for managing cache coherence in a virtual machine managed system are provided. In response to a processor issuing a message to be broadcast, a determination is made as to whether the processor is part of a virtual domain. In response to a determination that the processor is part of the virtual domain, the message and a first bit mask are sent from a source node to a destination node. In response to receiving the message and the first bit mask, one of a primary link or a secondary link is selected to send the message and the first bit mask over, forming a selected link. The message and the first bit mask are sent to the destination node over the selected link. | 2009-07-16 |
20090182894 | DYNAMIC PATH COMPUTATION ELEMENT LOAD BALANCING WITH BACKUP PATH COMPUTATION ELEMENTS - In one embodiment, a first path computation element (PCE) operates between first and second network domains, and is adapted to service requests from path computation clients (PCCs) in at least the first domain. In response to a backup event (e.g., failure of a second PCE), a backup PCE in the second domain may be informed of path computation information for the first domain used by the first PCE, and tunnels may be bi-directionally established between the first PCE and the backup PCE. Once the tunnels are established, the backup PCE may be advertised into the first domain, and the backup PCE may operate to load balance service requests for the first domain through the bi-directionally established tunnels. | 2009-07-16 |
20090182895 | HANDHELD COMPUTER SYSTEM THAT ATTEMPTS TO ESTABLISH AN ALTERNATIVE NETWORK LINK UPON FAILING TO ESTABLISH A REQUESTED NETWORK LINK - A computer system that attempts to establish an alternative network link upon failing to establish a requested network link is described. The computer system may encounter conditions where access to numerous networks, in particular wireless networks, is not available. Rather than only providing an error message to the user upon a failed attempt to establish the requested network link, the computer system determines whether the user has designated an alternative network link in case the requested network link cannot be established, whereas the alternative network link is selected from the plurality of network links that the computer system is configured to support. If an alternative network link has been designated, the computer system attempts to establish the alternative network link. Hence, the user experience is made smooth and uneventful when the requested network link cannot be established. | 2009-07-16 |
20090182896 | Various methods and apparatuses for a route server - A method, apparatus, and system are described for a route server that connects network users to network providers. The route server may connect to network elements, including routers, from a plurality of Internet network service providers (ISP) to the network elements of a plurality of users through the route server. The route server also may make routing decisions for the plurality of users and the plurality of ISPs and is programmed to maintain multiple views of the routing table as well as implement multiple BGP instances, each instance representing different autonomous systems, in a single instance of the route server. The route server also may match a first user to one or more of the ISPs based on criteria including not only the best possible routes of each ISP but a full listing of all possible routes to a destination address from each ISP matching the user's criteria in order to construct a route table to get IP packets of a user to a destination address. | 2009-07-16 |
20090182897 | METHOD AND APPARATUS THAT PROVIDES TARGETED HTTP DELIVERIES FOR USERS WITHIN A PRIVATE NETWORK - The present invention enables a NSP to customize content to any number of user profiles, instances, browsers or computers including systems that are located behind a NAT network. It solves the persistent issues that multiple users and NAT networks present to the NSP who does not have view into the individual computers located on the NSP network. In addition to enabling the full revenue potential of a network, the invention enables the targeting of any customer service content to be delivered. | 2009-07-16 |
20090182898 | System for Tracking Domain Name Related Reputation - Systems and methods of the present invention allow for tracking of domain name related reputation by a domain name Registering Entity (e.g. Registry, Registrar, etc.). In a preferred embodiment, the Registering Entity maintains a database with reputation data that can be accessed by the requesters. The Registering Entity may update reputation data based on a variety of events related to the domain name. The reputation data may be tracked on the domain name itself, URLs, domain name purchaser or registrant, or email addresses associated with the domain name. The reputation data may include various categories, such as email practices, website content, privacy policies and practices, fraudulent activities, domain name related complaints, overall reputation, etc. The registrant may opt for a reputation service while registering domain name. The requester may decide whether to allow email messages or to visit URLs based on the domain name related reputation. | 2009-07-16 |
20090182899 | METHODS AND APPARATUS RELATING TO WIRE FORMATS FOR SQL SERVER ENVIRONMENTS - Systems and methods are provided, wherein the method includes retrieving and/or storing one or more data types representative of a selected date and/or time value from a server to a client in a server/client SQL environment using a selected wire format. Another aspect provides apparatus including a SQL server, a SQL client operationally coupled to the server, and means to transmit the selected time/date data types between the server and the client according to a selected wire format. In an illustrative implementation, the wire format translates the date/time data into a binary format. | 2009-07-16 |
20090182900 | NETWORK ADAPTER WITH SHARED DATABASE FOR MESSAGE CONTEXT INFORMATION - A network interface adapter includes a network interface and a client interface, for coupling to a client device so as to receive from the client device work requests to send messages over the network using a plurality of transport service instances. Message processing circuitry, coupled between the network interface and the client interface, includes an execution unit, which generates the messages in response to the work requests and passes the messages to the network interface to be sent over the network. A memory stores records of the messages that have been generated by the execution unit in respective lists according to the transport service instances with which the messages are associated. A completion unit receives the records from the memory and, responsive thereto, reports to the client device upon completion of the messages. | 2009-07-16 |
20090182901 | AUTOMATICALLY CONFIGURING COMPUTING DEVICES THROUGH INPUT DEVICE - Localization and/or customization of computing devices are accomplished automatically through an add-on input device. Operating system or a separate application in the computing device is arranged to communicate with or recognize the input device such as a keypad and configure parameter of the computing device such as language, user interface arrangement, communication setup, and the like accordingly without user interaction. | 2009-07-16 |
20090182902 | AUTOMATED CLASSIFICATION OF COMPUTER CONFIGURATION USING RULE SET - A method, computer system and computer program product for generating a configuration status of a computer is provided. A method for generating a configuration status of a computer includes reading a plurality of configuration items of the computer and executing a plurality of rules upon the configuration items that were read, wherein each rule comprises an if-portion including at least one configuration item and a then-portion including an action for storing a configuration status value if the at least one configuration item of the if-portion matches the configuration items that were read. The method can further includes executing an algorithm that reads each of the configuration status values that were stored responsive to executing the plurality of rules and processes the configuration status values so as to produce a final configuration status of the computer and storing a record indicating the final configuration status of the computer. | 2009-07-16 |
20090182913 | Data store and enhanced features for headset of portable media device - A media headset for exchanging data with a media device includes at least one audio speaker that provides an audio output, a data store that stores media device data, a communications interface for exchanging the media device data with the media device, and a connector for detachably connecting the communications interface to the media device. | 2009-07-16 |
20090182914 | Semiconductor memory device and data processing system including the semiconductor memory device - A semiconductor device that includes a plurality of memory cell arrays, a plurality of ports, a plurality of internal address generating circuits, and a controller. The plurality of internal address generating circuits may generate first and second internal addresses of first and second memory cell arrays of the plurality of memory cell arrays. The first internal address may designate a first area of the first memory cell array. The second internal address may designate a second area of the second memory cell array. The controller reads a series of data from the first area sequentially and writes the series of read data into the second area sequentially without transferring the series of read data to the plurality of ports. | 2009-07-16 |
20090182915 | Performing a Configuration Virtual Topology Change and Instruction Therefore - In a logically partitioned host computer system comprising host processors (host CPUs) partitioned into a plurality of guest processors (guest CPUs) of a guest configuration, a perform topology function instruction is executed by a guest processor specifying a topology change of the guest configuration. The topology change preferably changes the polarization of guest CPUs, the polarization related to the amount of a host CPU resource is provided to a guest CPU. | 2009-07-16 |
20090182916 | SERVER, AND METHOD OF RECOVERY FROM LINK FAILURE IN SERVER - In a server composed of a server module having a processor in it, an I/O module having an I/O extension slot for accommodating an I/O extension adapter to expand the server's I/O capability, and a management module managing the entire server, the server module and the I/O extension slot (and through it, ultimately the I/O extension adapter) are interconnected using a PCI Express interface and the I/O module and the management module are interconnected using a special interface carrying detection information indicating whether an I/O extension adapter is actually mounted on the I/O extension slot. In the event of a link failure on the PCI Express interface, link recovery is attempted by grasping the status of the link based on the detection information obtained through the special interface. | 2009-07-16 |
20090182917 | SYSTEM HAVING CAPABILITY FOR DAISY-CHAINED SERIAL DISTRIBUTION OF VIDEO DISPLAY DATA - A serial display interface such as the VESA-Display Port interface is expanded to support daisy chained coupling of one display monitor to the next. Each daisy chain wise connectable display monitor (except optionally the most downstream one on the daisy chain) has a local daisy chain transceiver device associated with it where the local transceiver device routes a selectable one or more video data streams to the local monitor and the local transceiver device relays on to more downstream devices of the daisy chain other video data streams. In one embodiment, the daisy chain wise connectable display monitors are hot-pluggable and unpluggable. | 2009-07-16 |
20090182918 | DATA BUS INVERSION APPARATUS, SYSTEMS, AND METHODS - Apparatus, systems, and methods are disclosed such as those that operate to encode data bits transmitted on a plurality of channels according to at least one of multiple Data Bus Inversion (DBI) algorithms. Additional apparatus, systems, and methods are disclosed. | 2009-07-16 |
20090182919 | Media Card Command Pass Through Methods - Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions. | 2009-07-16 |
20090182920 | AUTOMATIC SERIAL INTERFACE ADDRESS SETTING SYSTEM - An automatic address setting system includes a master device, a plurality of slave devices are connected to the master device via a bus, a direct current (DC) power source, and a plurality of resistors connected in series between the DC power source and ground. Each of the slave devices includes an analog to digital (A/D) conversion pin. A node between every two adjacent resistors is exclusively connected to the A/D conversion pin of a corresponding slave device. Voltages at the A/D conversion pins of the slave devices are changed to different address signals of the slave devices. | 2009-07-16 |