Patent application number | Description | Published |
20080240144 | File server pipelining with denial of service mitigation - A method of metering bandwidth allocation on a server using credits is disclosed. The method may receive a request for data from a client, respond to the request for data and determining if the request for data for the client exceeds a current data allocation credit limit for the client. Using the round trip time, the method may calculate a connection throughput for a client and may increase the current data allocation credit limit for the client if the server has resources to spare, the client is actively using the current pipeline depth allowed and network connection latency and bandwidth indicate a deeper pipeline is necessary for saturation. The method may decrease the current data allocation credit limit for the client if the server does not have resources to spare. | 10-02-2008 |
20080320155 | Aggregation and re-ordering of input/output requests for better performance in remote file systems - A method and system for managing remote file system requests between client and server redirectors where a set of data request packets may be aggregated and/or ordered at a server based on hint information from a client. | 12-25-2008 |
20090327360 | EFFICIENT FILE MANAGEMENT THROUGH GRANULAR OPPORTUNISTIC LOCKING - Improved methods and systems for granular opportunistic locking mechanisms (oplocks) are provided for increasing file caching efficiency. Oplocks can be specified with a combination of three possible granular caching intentions: read, write, and/or handle. An oplock can be specified with an identifier that indicates a client/specific caller to avoid breaking the original oplock due to an incompatibility from other requests of the same client. An atomic oplock flag is added to create operations that allow callers to request an atomic open with an oplock with a given file. | 12-31-2009 |
20100185704 | CLIENT-BASED CACHING OF REMOTE FILES - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data. | 07-22-2010 |
20120072400 | DIRECTORY OPLOCK - Current file systems may implement opportunistic locks on files that allow clients to locally cache file data, while promoting data consistency when multiple clients read/write the same file. Unfortunately, when a client locally caches directory content of a directory, the file system may lack a mechanism for notifying the client of changes to the directory that would render the cached directory content “stale”. Accordingly, one or more systems and/or techniques for managing a directory oplock are disclosed herein. A directory oplock may be generated based upon an oplock request comprising a first target key and a first parent key. Subsequent access requests for access to the directory or objects therein may be compared with the directory oplock to determine whether to break the directory oplock, and notify the client (e.g., directory oplock is broken if the client submitting the access request is different than the client owning the directory oplock). | 03-22-2012 |
20120072596 | Directory Leasing - Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease which allows the client to cache the directory metadata locally and service requests received from the same application which originally requested the directory metadata using the cache. In addition, the client may also request a handle lease which allows a client to delay the closing of a directory handle and allow the handle to be reused to service subsequent directory metadata requests from the same or a different application. A client may also request a write lease which allows an application on the client to modify the directory metadata, such as by creating or deleting new files in the directory, or changing their attributes, and cache those changes. | 03-22-2012 |
20120102272 | EFFICIENT FILE MANAGEMENT THROUGH GRANULAR OPPORTUNISTIC LOCKING - Improved methods and systems for granular opportunistic locking mechanisms (oplocks) are provided for increasing file caching efficiency. Oplocks can be specified with a combination of three possible granular caching intentions: read, write, and/or handle. An oplock can be specified with an identifier that indicates a client/specific caller to avoid breaking the original oplock due to an incompatibility from other requests of the same client. An atomic oplock flag is added to create operations that allow callers to request an atomic open with an oplock with a given file. | 04-26-2012 |
20120143999 | CLIENT-BASED CACHING OF REMOTE FILES - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data. | 06-07-2012 |
20120144019 | MULTICHANNEL CONNECTIONS IN FILE SYSTEM SESSIONS - A multi-connection information system is described herein that uses multiple connections to connect to a resource in a single file system session in a way that is controllable from protocols above a transport layer. The system also allows a single connection to be shared by multiple sessions. Sessions can be bound to multiple connections to enable communication over multiple transports. During the initial negotiation of a session, a client and a server determine whether multiple connections are supported between the client and the server within a session. After establishing an initial connection, additional connections can be established and bound to the existing session. The multiple connections can be used for failover and/or load balancing. The multi-connection information system provides a protocol for discovering a capability to establish multiple channels within a session and information about the available connections between two particular resources. | 06-07-2012 |
20120151249 | PROVIDING TRANSPARENT FAILOVER IN A FILE SYSTEM - A connection state system is described herein that allows a client to resume a connection with a server or a different replacement server by remotely storing client state information in association with a resume key. The system provides a resume key filter operating at the server that facilitates the storing of volatile server state information. The state information can include information such as oplocks, leases granted to a client, and in-flight operations on a file handle. The resume key filter driver sits above the file system, which allows multiple file access protocols to use the filter. Upon a failover event, such as a server going down or losing connectivity to a client, the system can bring up another server or the same server and reestablish state for file handles held by various clients using the resume key filter. | 06-14-2012 |
20120254396 | PROVIDING A WITNESS SERVICE - Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that includes various messages for registering and receiving notifications regarding the state of a resource. The protocol may include a message for requesting node information from a first node in a cluster. The node information identifies nodes in the cluster that provide a witness service, which monitors a resource. The protocol includes a message that is used to register with the witness service for notifications regarding a state, or state change, of a network or cluster resource. The protocol also includes messages for sending notifications with state information of the resource. | 10-04-2012 |
20130007518 | TRANSPARENT FAILOVER - Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by the client. The server uses the handle identifier to associate with state information. When there is a network failure or a server failover, and a reconnection to the client, the handle identifier is used to identify replayed requests that if replayed would create an inconsistent state on the server. The replayed requests are then appropriately handled. | 01-03-2013 |
20130066941 | CLUSTERED CLIENT FAILOVER - An application instance identifier is employed with various systems and methods in order to provide a requestor with continuous access to a resource when operating in a client clustered environment. A requestor residing on a first client in may attempt to access a resource. The first client sends a request to access the resource. The request may be associated with an application instance identifier that identifiers the requestor. At some point, the first client fails and the requestor is associated with a second client via a failover mechanism. The second client sends a second request to access the resource on behalf of the requestor. The second request is associated with the requestor's application instance identifier. The application instance identifier is used to identify the second request as belonging to the same requestor as the first request, thereby granting the second request to access the resource while avoiding a conflict situation. | 03-14-2013 |
20130067095 | SMB2 SCALEOUT - Systems and methods are disclosed for clients and servers operating in a scaled cluster environment. Efficiencies are introduced to the process of connecting a client to a clustered environment by providing the client with the ability to attempt a connection with multiple servers in parallel. Servers operating the in the clustered environment are also capable of providing persistent storage of file handles and other state information. Ownership of the state information and persistent handles may be transferred between servers, thereby providing clients with the opportunity to move from one server to another while maintaining access to resources in the clustered environment. | 03-14-2013 |
20130238809 | Secure Capability Negotiation between a Client and Server - Embodiments of the present disclosure provide for establishing an authenticated session between a client computing device and a remote computing device. In certain embodiments, a connection is established between the client computing device and the remote computing device. Once the connection is established, the client computing device sends a number of requests to the client computing device including a negotiate request, a setup request, and a validation request. In response to the requests, the client computing device receives a number of responses from the remote computing device including a negotiate response, setup response and a validation response. Once the responses have been received, a determination is made as to whether information contained in the validation response matches information contained in the negotiate response. If the information matches, an authenticated session is established between the remote computing device and the client computing device. | 09-12-2013 |
20130254272 | CLIENT-BASED CACHING OF REMOTE FILES - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data. | 09-26-2013 |
20130254492 | ACCESS REQUESTS WITH CACHE INTENTIONS - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data. | 09-26-2013 |
20130304821 | PROVIDING A WITNESS SERVICE - Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that includes various messages for registering and receiving notifications regarding the state of a resource. The protocol may include a message for requesting node information from a first node in a cluster. The node information identifies nodes in the cluster that provide a witness service, which monitors a resource. The protocol includes a message that is used to register with the witness service for notifications regarding a state, or state change, of a network or cluster resource. The protocol also includes messages for sending notifications with state information of the resource. | 11-14-2013 |
20140040332 | DIRECTORY LEASING - Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease which allows the client to cache the directory metadata locally and service requests received from the same application which originally requested the directory metadata using the cache. In addition, the client may also request a handle lease which allows a client to delay the closing of a directory handle and allow the handle to be reused to service subsequent directory metadata requests from the same or a different application. A client may also request a write lease which allows an application on the client to modify the directory metadata, such as by creating or deleting new files in the directory, or changing their attributes, and cache those changes. | 02-06-2014 |
20140244688 | ACCESS REQUESTS WITH CACHE INTENTIONS - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data. | 08-28-2014 |
20140372521 | TRANSPARENT FAILOVER - Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by the client. The server uses the handle identifier to associate with state information. When there is a network failure or a server failover, and a reconnection to the client, the handle identifier is used to identify replayed requests that if replayed would create an inconsistent state on the server. The replayed requests are then appropriately handled. | 12-18-2014 |
20150101028 | SECURE CAPABILITY NEGOTIATION BETWEEN A CLIENT AND SERVER - Embodiments of the present disclosure provide for establishing an authenticated session between a client computing device and a remote computing device. In certain embodiments, a connection is established between the client computing device and the remote computing device. Once the connection is established, the client computing device sends a number of requests to the client computing device including a negotiate request, a setup request, and a validation request. In response to the requests, the client computing device receives a number of responses from the remote computing device including a negotiate response, setup response and a validation response. Once the responses have been received, a determination is made as to whether information contained in the validation response matches information contained in the negotiate response. If the information matches, an authenticated session is established between the remote computing device and the client computing device. | 04-09-2015 |
20150106516 | PROVIDING A WITNESS SERVICE - Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that includes various messages for registering and receiving notifications regarding the state of a resource. The protocol may include a message for requesting node information from a first node in a cluster. The node information identifies nodes in the cluster that provide a witness service, which monitors a resource. The protocol includes a message that is used to register with the witness service for notifications regarding a state, or state change, of a network or cluster resource. The protocol also includes messages for sending notifications with state information of the resource. | 04-16-2015 |
20150149505 | DIRECTORY LEASING - Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease which allows the client to cache the directory metadata locally and service requests received from the same application which originally requested the directory metadata using the cache. In addition, the client may also request a handle lease which allows a client to delay the closing of a directory handle and allow the handle to be reused to service subsequent directory metadata requests from the same or a different application. A client may also request a write lease which allows an application on the client to modify the directory metadata, such as by creating or deleting new files in the directory, or changing their attributes, and cache those changes. | 05-28-2015 |
20150229735 | EFFICIENT FILE MANAGEMENT THROUGH GRANULAR OPPORTUNISTIC LOCKING - Improved methods and systems for granular opportunistic locking mechanisms (oplocks) are provided for increasing file caching efficiency. Oplocks can be specified with a combination of three possible granular caching intentions: read, write, and/or handle. An oplock can be specified with an identifier that indicates a client/specific caller to avoid breaking the original oplock due to an incompatibility from other requests of the same client. An atomic oplock flag is added to create operations that allow callers to request an atomic open with an oplock with a given file. | 08-13-2015 |
20150256640 | ACCESS REQUESTS WITH CACHE INTENTIONS - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data. | 09-10-2015 |
Patent application number | Description | Published |
20080228592 | SERVICES FOR GENERATION OF ELECTRONIC MARKETPLACE LISTINGS USING PERSONAL PURCHASE HISTORIES OR OTHER INDICIA OF PRODUCT OWNERSHIP - An electronic marketplace system provides various features for assisting users in listing products for sale, locating the listings for a product, and performing related actions. A user wishing to sell a product can browse to an existing description of the product in an electronic catalog and then select an option to create a corresponding listing. If the user previously purchased the product via the system, the user may alternatively select the product from a personal purchase history. The system may also proactively send product-specific listing requests to those who have purchased or otherwise indicated ownership of specific products. | 09-18-2008 |
20080243644 | MARKETPLACE SYSTEM IN WHICH USERS GENERATE USER-TO-USER PREORDER LISTINGS VIA A DEFINITIVE PRODUCT CATALOG - An electronic marketplace system provides various features for assisting users in listing products for sale, locating the listings for a product, and performing related actions. A user wishing to sell a product can browse to an existing description of the product in an electronic catalog and then select an option to create a corresponding listing. The pending listings for a product are preferably displayed or summarized on the product's detail page in the catalog. When no such listings exist, an option to preorder the product from an unspecified seller may be provided, and information regarding the resulting preorders may be displayed on the associated product detail pages to entice potential sellers. In one embodiment, the electronic catalog also serves as a retail sales catalog of a merchant. | 10-02-2008 |
20120116979 | Enabling Communication Between, and Production of Content By, Rights Holders and Content Producers - A content exchange service facilitates communication between, and production of content by, holders of rights in content titles and producers of content. The content exchange service receives content profiles from various rights holders and surfaces the content profiles to producers for purposes of soliciting auditions to produce the content subject of the content profiles in an alternative form. The rights holder can review the auditions submitted by producers and establish communication with the producer of the audition the rights holder liked via the content exchange service. The content exchange service can then facilitate negotiation of an agreement between the rights holder and the producer for production of the content in an alternative form. Following finalization of the agreement, the producer may submit a complete production of the content in the alternative form to the content exchange service, which in turn presents the complete production to the rights holder for approval. | 05-10-2012 |
20130198084 | UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information. | 08-01-2013 |
20130204789 | UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information. | 08-08-2013 |
20130204790 | UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information. | 08-08-2013 |
20140100930 | REDEMPTION RECORDATION AND VERIFICATION - The collection of voucher redemption information may reduce instances of redemption error or redemption fraud, which benefits both consumers and merchants. The collection of voucher redemption information may involve a service receiving a selection of a voucher for redemption from an application on an electronic device, in which the voucher was previously acquired by a consumer through a deal offered by a merchant. The service may subsequently direct the application to acquire a credential to complete the redemption of the voucher. In various instances, the credential may be a merchant confirmation credential of the merchant or a consumer redemption credential of the consumer. The service may receive the credential from the application on the electronic device, and store a record of the voucher redemption for the voucher in a voucher redemption database, in which the record includes the credential. | 04-10-2014 |
20140278877 | Facilitating Purchase of Excess Items - Disclosed are various embodiments for facilitating the purchase of excess items. In one embodiment, customer information and inventory data are retrieved from a merchant client. A determination is made on whether excess items exist. A list of target purchasers is generated based on data associated with a user account, and offers are generated and sent by electronic communication to the list of target purchasers. | 09-18-2014 |
20140351085 | USING THEME-BASED ITEM GROUPINGS TO FACILITATE ITEM SELECTION - Techniques are described that allow customers and other users of an electronic marketplace to create groups of related items within the electronic marketplace, such as for customers of a Web store to create boutiques within the Web store that each reflect a specified theme. Such themed boutiques within a Web store can include various items that are available via the Web store and that each relate to the specified theme for the boutique. When other customers of the Web store are interested in items that relate to the specified theme for one of the boutiques, information regarding that boutique and/or items in that boutique can then be provided to those other customers. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 11-27-2014 |
Patent application number | Description | Published |
20150262402 | OBJECT CUSTOMIZATION AND ACCESSORIZATION IN VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, move through, and explore 2D or 3D modeled worlds of scenes in a video. The RVE system may allow users to select and manipulate objects within a scene, and to modify an object by adding or removing accessories from the object or otherwise customizing the object according to the user's preferences or desires. The RVE system may also provide an interface or interfaces via which the user can obtain additional information for the object, customize the object, be given a price or price(s) for the object as customized, and purchase the object as specified if desired. | 09-17-2015 |
20150262423 | REAL-TIME EXPLORATION OF VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, and explore 2D or 3D modeled worlds of scenes in a video. The system may leverage network-based computation resources to render and stream new video content from the models to clients with low latency. A user may pause a video, step into a scene, and interactively change viewing positions and angles in the model to move through or explore the scene. The user may resume playback of the recorded video when done exploring the scene. Thus, rather than just viewing a pre-rendered scene in a movie from a pre-determined perspective, a user may step into and explore the scene from different angles, and may wander around the scene at will within the scope of the model to discover parts of the scene that are not visible in the original video. | 09-17-2015 |
20150264416 | REAL-TIME RENDERING OF TARGETED VIDEO CONTENT - A real-time video targeting (RVT) system may leverage network-based computation resources and services, available 2D or 3D model data, and available viewer information to dynamically personalize content of, or add personalized content to, video for particular viewers or viewer groups. When playing back pre-recorded video to viewers, at least some objects or other content in at least some of the scenes of the video may be replaced with objects or content targeted at particular viewers or groups according to profiles or preferences of the viewers or groups. Since the video is being rendered and streamed to different viewers or groups in real-time by the network-based computation resources and services, any given scene of a video may be modified and viewed in many different ways by different viewers or groups based on the particular viewers' or groups' profiles. | 09-17-2015 |
20150264425 | OBJECT DISCOVERY AND EXPLORATION IN VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, move through, and explore 2D or 3D modeled worlds of scenes in a video. The RVE system may allow users to discover, select, explore, and manipulate objects within the modeled worlds used to generate video content. The RVE system may implement methods that allow users to view and explore in more detail the features, components, and/or accessories of selected objects that are being manipulated and explored. The RVE system may also implement methods that allow users to interact with interfaces of selected objects or interfaces of components of selected objects. | 09-17-2015 |
20150264441 | GENERATING NEW VIDEO CONTENT FROM PRE-RECORDED VIDEO - A real-time video exploration (RVE) system that allows users to pause a pre-recorded video (e.g., a movie) and change viewing positions and angles of one or more scenes. The RVE system may also allow users to select, manipulate, and modify objects within one or more scenes. The RVE system may render new video of the scenes and stream the new video to the user's client device. Using the RVE system, a user may create modified versions of one or more scenes to replace original scenes in a video to thus create a modified version of the video. The RVE system may allow the user to record the modified version of the video, and may allow the user to share the modified version of the video with other viewers. | 09-17-2015 |
Patent application number | Description | Published |
20110245623 | Medical Diagnosis Using Community Information - A computer includes one or more processors; and logic coupled to the one or more processors and comprising one or more stored sequences of instructions which, when executed by one or more processors, cause the one or more processors to perform: collecting first patient data, associated with at least one attribute, from a patient by one or more biometric sensors based on a first protocol; evaluating the first patient data based at least on a portion, of aggregate medical information, associated with the at least one attribute; based on the evaluating, determining a second protocol for collecting additional patient data; collecting the additional patient data by the one or more biometric sensors based on the second protocol. | 10-06-2011 |
20110245632 | Medical Diagnosis Using Biometric Sensor Protocols Based on Medical Examination Attributes and Monitored Data - A method comprises obtaining, by a computer, patient information associated with a patient and operator information associated with one or more biometric sensors; determining, by the computer, a protocol for obtaining patient data from the patient based on the patient information and the operator information; obtaining, by the one or more biometric sensors, the patient data from the patient based on the protocol. | 10-06-2011 |
20110246217 | Sampling Patient Data - In an embodiment, a computer includes one or more processors; a computer readable storage medium comprising a sequence of instructions, which when executed by the one or more processors, cause: transmitting, to a second computer over a network, a first subset of patient data; receiving, from the second computer, a command for additional data, wherein the command is based on the first subset of the patient data; identifying a second subset of the patient data based on the command; transmitting, to the second computer, the second subset of the patient data; wherein the first subset of the patient data and the second subset of the patient data were collected by one or more biometric sensors within a same medical examination session. | 10-06-2011 |
20110246876 | PRECISE MEASUREMENT ON A MOBILE COMPUTING DEVICE - In an embodiment, precise measurement on a mobile computing device is facilitated with a computer comprising one or more processors; a computer readable storage medium comprising a sequence of instructions, which when executed by the one or more processors, cause the one or more processors to perform displaying, in a touch-sensitive computer display unit: an image of an object; over the image, a first reticle at a first position and a second reticle at a second position that is spaced apart from the first position; a measurement value representing a linear distance between the first reticle and the second reticle with reference to the object; one or more fine positioning icons each associated with a different direction; obtaining a selection of one of the first reticle and the second reticle as a selected reticle; obtaining user input selecting one of the fine positioning icons; in response to the user input, re-displaying the selected reticle in a new position in a particular direction associated with the selected one of the fine positioning icons. | 10-06-2011 |
Patent application number | Description | Published |
20090282475 | Media Streams from Containers Processed by Hosted Code - Described is a technology by which code, such as an untrusted web application hosted in a browser, provides content through an interface for playback by an application environment, such as an application environment running in a browser plug-in. Content may be in the form of elementary video, audio and/or script streams. The content is in a container that is unpackaged by the application code, whereby the content may be packaged in any format that the application understands, and/or or come from any source from which the application can download the container. An application environment component such as a platform-level media element receives information from an application that informs the application environment that the application is to provide media stream data for playback. The application environment requests media stream data (e.g., samples) from the application, receives them as processed by the application, and provides the requested media stream data for playback. | 11-12-2009 |
20090300597 | APPLICATION LOADING - Extensions or additional software programs that are requested by a computer application running on an application platform are handled in an efficient manner by, among other things, regulating and tracking extensions that are downloaded. This allows the size of the application platform upon which the application is running to remain relatively small so as to mitigate strain on resources when the platform is initially deployed over a network (e.g., the Internet), thus making it easier and more likely for a user to install the application platform (and/or updates thereto). Requested extensions are subsequently added to and/or removed from the (already deployed) application platform based on, among other things, download metrics. | 12-03-2009 |
20090328066 | UNTRUSTED COMPONENT HOSTING - In a computing environment, one may wish to have interoperability between trusted and untrusted controls/plug-ins allowing for richer expression of content and control within a platform. This can be accomplished by allowing an untrusted plug-in to communicate with a trusted plug-in, while having the trusted plug-in exercise control over the platform. This allows for the creation of a layered secure approach of communication with a platform, thus allowing for increased application richness in untrusted third party applications. | 12-31-2009 |
20100235820 | HOSTED APPLICATION PLATFORM WITH EXTENSIBLE MEDIA FORMAT - A media interaction system is described herein that allows hosted applications to consume and/or produce rich media content independent of the format of the media content, while still maintaining the security of the host. The media interaction system accepts raw, uncompressed media data from a hosted application, and allows the hosted application to provide its own codec through a sandboxed API that restricts the actions the codec can perform to a set of trusted actions. Then, the application provides the uncompressed data to the system for playback. Thus, the media interaction system provides rich media content in any format that the application developer supports, and maintains the security of the user's computer system. | 09-16-2010 |
20110122070 | TOUCH INPUT FOR HOSTED APPLICATIONS - A multi-touch plug-in system is described herein that exposes multi-touch data for web application developers to consume in a platform independent way. The multi-touch plug-in system receives platform-specific touch data from an operating system or touch hardware, interprets the platform-specific touch data to convert the platform-specific touch data to generic touch data, and provides the generic touch data to a hosted application running within a plug-in sandbox. Often, sandboxed environments only allow identified, trusted plug-ins to execute. By managing multi-touch data within a trusted plug-in, the plug-in can ensure that hosted applications are properly restricted to well-defined behavior, while still allowing rich features such as multi-touch interaction. Thus, the multi-touch plug-in system brings rich multi-touch interaction to a web browsing environment. | 05-26-2011 |
20110161485 | MANAGING MULTIPLE DYNAMIC MEDIA STREAMS - A coordinated adaptive streaming system provides a level of intelligence between adaptive streaming heuristics applied to multiple multi-bitrate streams playing on a client computer at the same time. The system receives a media event that includes multiple multi-bitrate streams and plays two or more of the streams. Each stream registers with the coordinated adaptive streaming system so that the system is aware of each of the streams. The system receives a priority indication from each stream that indicates the priority of the stream relative to other streams associated with the media event. The system uses the received priority indications to make adaptive streaming decisions. Thus, the coordinated adaptive streaming system provides playback that more closely aligns with a user's priorities and provides a higher quality experience to a user viewing multiple concurrent media streams. | 06-30-2011 |
20110307623 | SMOOTH STREAMING CLIENT COMPONENT - A streaming abstraction system is described herein that provides application developers a client software development kit (SDK) on top of which to build smooth streaming solutions. The system reduces development time considerably and abstracts platform specific intricacies and protocol handling on the client. In addition, the streaming abstraction system makes it possible to monetize streaming content with advanced features like advertising and analytics and provides advanced capabilities like multiple camera angles, diagnostics, and error handling. In some embodiments, the streaming abstraction system provides an intermediate layer that operates between an application and an underlying client media platform. The intermediate layer manages smooth streaming protocol handling as well as interactions with the platform-specific runtime. | 12-15-2011 |
20140337433 | Media Streams from Containers Processed by Hosted Code - Described is a technology by which code, such as an untrusted web application hosted in a browser, provides content through an interface for playback by an application environment, such as an application environment running in a browser plug-in. Content may be in the form of elementary video, audio and/or script streams. The content is in a container that is unpackaged by the application code, whereby the content may be packaged in any format that the application understands, and/or or come from any source from which the application can download the container. An application environment component such as a platform-level media element receives information from an application that informs the application environment that the application is to provide media stream data for playback. The application environment requests media stream data (e.g., samples) from the application, receives them as processed by the application, and provides the requested media stream data for playback. | 11-13-2014 |
Patent application number | Description | Published |
20080240539 | Method For Imaging And Differential Analysis Of Cells - Provided are methods for determining and analyzing photometric and morphogenic features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis. | 10-02-2008 |
20090202130 | Image based quantitation of molecular translocation - The use of an imaging system, cell compartment markers, and molecular markers in methods for correlating the movement of molecules within a cell to a particular compartment are provided, including measuring and correlating molecule movement in adherent and non-adherent cells. | 08-13-2009 |
20110280467 | METHOD FOR IMAGING AND DIFFERENTIAL ANALYSIS OF CELLS - Provided are methods for determining and analyzing photometric and morphogenic features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis. | 11-17-2011 |
20120100532 | METHOD FOR IMAGING AND DIFFERENTIAL ANALYSIS OF CELLS - Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis. | 04-26-2012 |
20120244550 | IMAGE-BASED QUANTITATION OF MOLECULAR TRANSLOCATION - The use of an imaging system, cell compartment markers, and molecular markers in methods for correlating the movement of molecules within a cell to a particular compartment are provided, including measuring and correlating molecule movement in adherent and non-adherent cells. | 09-27-2012 |
20120328177 | Method for Imaging and Differential Analysis of Cells - Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis. | 12-27-2012 |
20130201317 | BLOOD AND CELL ANALYSIS USING AN IMAGING FLOW CYTOMETER - Multimodal or multispectral images of cells comprising a population of cells are simultaneously collected. Photometric and/or morphometric image features identifiable in the images are used to identify differences between first and second populations of cells. The differences can include changes in a relative percentage of different cell types in each population, or a change in a first type of cell present in the first population of cells and the same type of cell in the second population of cells. The changes may be indicative of a disease state, indicative of a relative effectiveness of a therapy, or indicative of a health of the person from whom the cells populations were obtained. | 08-08-2013 |
20130202183 | METHOD FOR IMAGING AND DIFFERENTIAL ANALYSIS OF CELLS - Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis. | 08-08-2013 |
20130251234 | METHOD FOR IMAGING AND DIFFERENTIAL ANALYSIS OF CELLS - Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis. | 09-26-2013 |