Patent application number | Description | Published |
20100194323 | ROBUST ON LINE STATOR TURN FAULT IDENTIFICATION SYSTEM - A system and method for identifying turn faults in a stator of a motor are provided. The method includes determining a normalized cross-coupled impedance from the symmetrical components of measured voltages and currents of the motor. Additionally, the normalized cross-coupled impedance may be normalized to a negative sequence impedance. The negative sequence impedance may be determined through a regression analysis using parameters of the motor, such as line-to-line voltage, horsepower, and number of poles. A system is provided that includes a device having a memory and processor configured to determine a normalized cross-coupled impedance, compare the normalized cross-coupled impedance to one or more thresholds, and trigger and alarm and/or trip the motor. | 08-05-2010 |
20100194324 | STATOR TURN FAULT DETECTION APPARATUS AND METHOD FOR INDUCTION MACHINE - A system and method are provided for correction of parameters used in determination of stator turn faults of an induction motor. An embodiment may include determining a residual impedance and/or a residual voltage of the motor, and correcting a normalized cross-coupled impedance based on the residual impedance and residual voltage. Additional embodiments may include measuring an operating temperature of the motor and determining a negative sequence impedance of the motor based on the temperature. Another embodiment may include measuring voltages and currents of the motor and determining phasors for the voltages and currents using compensation for variations from a nominal frequency of the motor. | 08-05-2010 |
20100301792 | DETECTION OF ROTOR SIDE ANOMALY IN AN INDUCTION MACHINE - A method for detecting an anomaly in an induction machine includes obtaining or receiving a signal from the induction machine; processing the signal so as to obtain a low frequency signal, then rectifying the low frequency signal; and, declaring if the anomaly is present, based on the rectified low frequency signal. A system for detecting anomalies is also disclosed. The present invention has been described in terms of specific embodiment(s), and it is recognized that equivalents, alternatives, and modifications, aside from those expressly stated, are possible and within the scope of the appending claims. | 12-02-2010 |
20110163770 | ELECTRICAL NETWORK REPRESENTATION OF A DISTRIBUTED SYSTEM - A method for determining characteristics of a multi-material object is provided. The method includes producing a rotating electric field by providing an applied electrical signal set of individual electrical signal patterns to electrodes surrounding the multi-material object. The method also includes obtaining a measured electrical signal of electrical signals from the electrodes corresponding to each electrical signal pattern applied. An electrical network is determined based on the applied electrical signal set, the measured electrical signal set and an inverse of the applied electrical signal set. The method further includes determining the characteristics of the multi-material object by analyzing the electrical network. | 07-07-2011 |
20110166814 | ELECTRICAL NETWORK ANALYSIS OF A MULTIPHASE SYSTEM - A method for determining characteristics of a multi-material object is provided. The method includes determining an electric element matrix representing the multi-material object. The electric element matrix is pre-multiplied by a first mathematical transformation matrix to obtain a first transformed electric element matrix. The first transformed electric element matrix is post-multiplied with a second mathematical transformation matrix to obtain a second transformed electric element matrix. The method further includes determining the characteristics of the multi-material object based on the second transformed electric element matrix. | 07-07-2011 |
20120109546 | IDENTIFICATION OF ROTOR BROKEN BAR IN PRESENCE OF LOAD PULSATION - A method for detecting an anomaly in a rotor of an induction machine is provided. The method includes obtaining or receiving three-phase stator voltage and current signals from the induction machine connected to a time varying load. The method also includes processing the three-phase stator voltage and current signals by transforming into corresponding two-phase quantities. Further, the method includes transforming the two-phase quantities into two quadrature components into a two-phase reference frame. The method includes analyzing a plurality of in-phase components and the quadrature components. Finally, the method includes detecting the presence of an anomaly and segregating the anomaly from load variations based on the analysis of the plurality of in phase components and the quadrature components, thereby reducing false alarm. | 05-03-2012 |
20120158325 | METHOD AND SYSTEM FOR MONITORING TRANSFORMER HEALTH - A method, system and computer program product for determining the health of a transformer are provided. The method includes computing an effective turns ratio based on a primary electrical parameter associated with a primary winding of the transformer and a secondary electrical parameter associated with a secondary winding of the transformer. The method further includes computing an operational magnetizing current based on the effective turns ratio and primary and secondary currents of the transformer or primary and secondary voltages of the transformer. Finally, the method includes determining an inter-turn winding health indicator based at least in part on the operational magnetizing current. | 06-21-2012 |
20120161684 | SYSTEM AND METHOD FOR SYNCHRONOUS MACHINE HEALTH MONITORING - A method, system and computer program product for monitoring health of a synchronous machine is provided. The method includes receiving a plurality of phase voltage values and a plurality of phase current values. The method then computes a negative sequence voltage (Vn) based on the plurality of phase voltage values. The method also computes one or more operating parameters based on at least one of the plurality of phase voltage values and the plurality of phase current values. The method retrieves from a data store, one or more known Vn based on the one or more operating parameters. The method then computes a machine health indicator based on the computed Vn and the one or more known Vn, and raises an alarm based on the machine health indicator. | 06-28-2012 |
20130013231 | SYSTEM AND METHOD FOR PREDICTING MECHANICAL FAILURE OF A MOTOR - A method for a vehicle having plural electric motors includes generating motor electrical signatures for the motors. The motor electrical signatures represent one or more characteristics of electrical energy that is supplied to the motors. The method also includes identifying one or more fault measures of each of the motor electrical signatures. The fault measures are indicative of mechanical characteristics of the motors. The method further includes comparing the one or more fault measures of each motor with the one or more fault measures of the other motors in the same vehicle and predicting an impending mechanical failure of one or more of the motors based on comparing the fault measures of the motors. | 01-10-2013 |
Patent application number | Description | Published |
20100174870 | SYSTEM AND METHOD TO PRESERVE AND RECOVER UNWRITTEN DATA PRESENT IN DATA CACHE OF A DISK SUBSYSTEM ACROSS POWER OUTAGES - Disclosed are a system and method to preserve and recover unwritten data present in data cache of a disk subsystem across power outages. In one embodiment, a method of a controller is described. The method includes applying a write-back technique between a host server and a data store, accessing a dirty data in a cache memory during a power outage. The method may apply an algorithm for efficiently offloading the dirty data to a non-volatile storage device during the power outage. In addition the method may apply the algorithm to efficiently transfer the dirty data from the non-volatile storage device to the data store when power is restored. | 07-08-2010 |
20110016260 | MANAGING BACKUP DEVICE METADATA IN A HIGH AVAILABILITY DISK SUBSYSTEM - A system includes a data storage device, a controller coupled with the data storage device, a backup device coupled with the controller for backing up a modified portion of data and volatile memory metadata stored by the controller, and a backup power source for powering the controller. The controller includes a pre-specified region of volatile memory for storing backup device metadata for managing a modified portion of data, the metadata comprising one or more intents corresponding to modified data written back to the data storage device. The controller is configured to invalidate the one or more intents. During a restore operation, the controller is configured to store the backup device metadata in the pre-specified region of volatile memory when a charge on the backup power source is at least a minimum threshold charge and to store the updated backup device metadata in the backup device during an interruption of power. | 01-20-2011 |
20120117555 | METHOD AND SYSTEM FOR FIRMWARE ROLLBACK OF A STORAGE DEVICE IN A STORAGE VIRTUALIZATION ENVIRONMENT - A method and controller device for upgrading the firmware in a virtualized storage environment having a first storage controller and a second storage controller, wherein each storage controller includes a first virtual machine, at least one second virtual machine and a storage device. The method includes upgrading the current firmware of the first virtual machine in the first storage controller to a new firmware version, upgrading the current firmware of the second virtual machine in the first storage controller to a new firmware version, upgrading the current firmware of the first virtual machine in the second storage controller, upgrading the current firmware of the second virtual machine in the second storage controller, and rolling back the firmware version of all virtual machines in the first and second storage controllers if the firmware upgrade of any of the virtual machines in the first and second storage controllers is not successful. | 05-10-2012 |
20120167079 | METHOD AND SYSTEM FOR REDUCING POWER LOSS TO BACKUP IO START TIME OF A STORAGE DEVICE IN A STORAGE VIRTUALIZATION ENVIRONMENT - A method and controller device for supplying battery power to a virtualized storage environment having a storage controller with a virtual machine manager and a second virtual machine. In response to a battery engaged event, the first virtual machine manager enables the image of the second virtual machine to be shared with a new instance of the second virtual machine so that the image does not have to be loaded therein. The first virtual machine manager then creates the new virtual machine. The old virtual machine shuts down non-necessary hardware devices and sets necessary hardware devices to low power mode. During this time, the new virtual machine executes a backup specific start-of-day (SOD) initialization sequence. The method also synchronizes the new and old virtual machines. The method also initiates a cache memory backup operation upon synchronization of the new and old virtual machines and then shuts down the old virtual machine. | 06-28-2012 |
20120291021 | METHOD AND SYSTEM FOR FIRMWARE UPGRADE OF A STORAGE SUBSYSTEM HOSTED IN A STORAGE VIRTUALIZATION ENVIRONMENT - A method and controller device for upgrading firmware in a virtualized storage environment having a virtual machine manager, guest virtual machines and a storage device. The method includes downloading a new firmware solution bundle to a first logical area of the storage device, and installing the new firmware containing the virtual machine manager and guest virtual machines. The installation includes moving the solution bundle to a scratch area carved out of a P-cache area in the storage device, extracting the new firmware, copying the new firmware to the first logical area, marking the first logical area as the Active area, and marking the second logical area as the Staging area. The method also includes rebooting the virtualized storage environment with the installed new firmware, committing to the new firmware if the installation is successful, and rolling back the firmware version from the new firmware to the current firmware if the installation is not successful. | 11-15-2012 |
20120330898 | AUTOMATIC DISCOVERY OF CACHE MIRROR PARTNERS IN AN N-NODE CLUSTER - Partner mirroring is provided with tray loss protection in an N node storage cluster architecture. A master proxy receives and records broadcasts of nodes in a cluster and selects mirror partners in a round robin fashion, so that even numbered nodes are mirrored with other even numbered nodes and odd numbered nodes are mirrored with other odd numbered nodes. In an N node storage cluster architecture which includes a cluster of dual controllers, tray loss protection is provided using such an odd numbered and even numbered mirror pairing process. | 12-27-2012 |
20130111456 | CODE SYNCHRONIZATION | 05-02-2013 |
Patent application number | Description | Published |
20150134598 | REPORTING AND SUMMARIZING METRICS IN SPARSE RELATIONSHIPS ON AN OLTP DATABASE - Storing and/or accessing data in a transactional database, with use of the following technique: (i) selecting a set of base tables in a transactional database; and (ii) creating a factless materialized query table, having maximum sparsity, for the set of base tables. The set of base tables includes at least two base tables. The set of base tables includes a set of keys including at least two distinct primary keys. The factless materialized query table includes one record associated with each record in the set of base tables. Each record in the materialized query table includes a value for every primary key in the set of base tables. | 05-14-2015 |
20150134599 | REPORTING AND SUMMARIZING METRICS IN SPARSE RELATIONSHIPS ON AN OLTP DATABASE - Storing and/or accessing data in a transactional database, with use of the following technique: (i) selecting a set of base tables in a transactional database; and (ii) creating a factless materialized query table, having maximum sparsity, for the set of base tables. The set of base tables includes at least two base tables. The set of base tables includes a set of keys including at least two distinct primary keys. The factless materialized query table includes one record associated with each record in the set of base tables. Each record in the materialized query table includes a value for every primary key in the set of base tables. | 05-14-2015 |
20150325105 | DETERMINING ALERT CRITERIA IN A NETWORK ENVIRONMENT - Alert conditions datasets are created from historic data taken from actual incidents for which the alert condition datasets are to indicate during future operations. A networked computers system including various devices is monitored for alert conditions associated with one, or more, of the devices. The severity of an alert is based on the number of alert conditions met for a given alert conditions dataset. | 11-12-2015 |
20150325108 | DETERMINING ALERT CRITERIA IN A NETWORK ENVIRONMENT - Alert conditions datasets are created from historic data taken from actual incidents for which the alert condition datasets are to indicate during future operations. A networked computers system including various devices is monitored for alert conditions associated with one, or more, of the devices. The severity of an alert is based on the number of alert conditions met for a given alert conditions dataset. | 11-12-2015 |
Patent application number | Description | Published |
20090169654 | Tea composition and process for the manufacture thereof - A composition comprising tea, 0.1 to 15% by weight of herb selected from Shankhpushpi, Shatavari, Vidarikhand, Arogyapacha or a mixture thereof; and 0.01 to 0.5% by weight of a flavouring agent is disclosed. Also disclosed is a process for manufacturing the composition. | 07-02-2009 |
20090175964 | Composition for enhancing immunity - Disclosed is an edible composition for enhanced immunity comprising theanine or a source of theanine and a herb selected from Shankhpushpi, Shatavari, or a mixture thereof. | 07-09-2009 |
20100297058 | PREBIOTIC COMPOSITION - The present invention provides for use of a composition comprising black tea flavonoids as a prebiotic and/or for the treatment or prevention of conditions associated with poor gut health or low immunity. The flavonoids comprise thearubigin in an amount of at least 82% by weight of the tea flavonoids. Also provided is an edible product comprising the black tea flavonoids. | 11-25-2010 |
20140170084 | ORAL CARE COMPOSITION - The present invention relates to an oral care composition comprising catechins. We have found that the catechins tend to darken the colour of the chalk based toothpaste due to its oxidation which happens at the high pH of the toothpaste. Once the catechins are oxidized and darken the colour of the toothpaste it is no longer available as such for providing anti-inflammatory benefits. It is an object of the invention to provide a chalk based toothpaste formulation which does not turn substantially dark due to ox illation of catechins. The present inventors while working with oral care compositions comprising catechins preferably green tea catechins for providing anti-inflammatory benefits, surprisingly found that some selected zinc salts when added in particular quantities do not result in darkening the colour of the toothpaste, and also, when stored, are able to deliver green tea catechins. | 06-19-2014 |
20150306161 | EDIBLE COMPOSITION. - The present invention provides relates to an edible composition for anti-diabetic benefit. Diabetes is one of the major and commonly occurring health problems in today's world. Pharmaceuticals companies are very active in this field to develop new medicines for preventing and controlling diabetes. There are several medicines available in the market for the treatment of type 2 diabetes. There are also prior arts which describes composition for the prevention of glucose intolerance and/or diabetes. We have found that though prior that discloses compositions for prevention of glucose intolerance and/or diabetes, it is not that effective for preventing diabetes. The present inventors while working extensively for providing an edible composition for preventing diabetes have surprisingly found that a particular combination of | 10-29-2015 |
20150343007 | EDIBLE COMPOSITION COMPRISING AN EXTRACT OF INULA RACEMOSA AND NARINGIN - The present invention provides relates to an edible composition for anti-diabetic benefit. Diabetes is one of the major and commonly occurring health problems in today's world. Pharmaceuticals companies are very active in this field to develop new medicines for preventing and controlling diabetes. There are several medicines available in the market for the treatment of type 2 diabetes. There are prior arts which describes composition and/or therapies for the prevention of glucose intolerance and/or diabetes. We have found that, though prior art discloses compositions and therapies for treating diabetes, there is not disclose any food composition which is effectively controls GLP-1 activity thereby control diabetes. The present inventors while working extensively for providing an edible composition for preventing diabetes have surprisingly found that a particular combination of | 12-03-2015 |
20150352164 | COMPOSITION COMPRISING THEANINE AND AN EXTRACT OF INULA RACEMOSA - Edible composition comprising theanine and an extract of | 12-10-2015 |
Patent application number | Description | Published |
20110196908 | OPTIMIZED CAPACITY PLANNING - A computer implemented method, system and/or program product determine capacity planning of resources by utilizing a stochastic analysis of application workloads. Average workloads, which describe past resource utilization, of each of multiple applications are computed. A random sequence of the multiple applications is encoded into a first generation chromosome. The first generation chromosome is executed using a set of computing resources in a resource cloud. In response to execution of the first generation chromosome on the set of computing resources meeting a predetermined service level agreement (SLA) for the first generation chromosome, the first generation chromosome is scored in accordance with how many computing resources within the set of computing resources are utilized in order to meet the predetermined SLA. Next generation chromosomes, derived from the first generation chromosome, are executed and scored until an optimal chromosome, which utilizes the fewest computing resources, is identified and deployed. | 08-11-2011 |
20120101968 | SERVER CONSOLIDATION SYSTEM - A computer program product for a network management device, including: a computer readable storage medium to store a computer readable program, wherein the computer readable program, when executed on a computer, causes the computer to perform operations for server management in a computer network. The operations include: receiving resource usage data generated at a network communication device coupled between a server and a network management device, wherein the resource usage data describes resource usage of the server; and classifying the server into a cluster of servers based on the resource usage data from the network communication device and a cluster characterization for the cluster. The cluster includes a plurality of servers with similar resource usage data, and the cluster is one of a plurality of clusters managed by the network management device. | 04-26-2012 |
20130024484 | SYSTEM MANAGEMENT IN DATACENTER USING A NON-RELATIONAL DATABASE - Systems and methods are disclosed wherein a systems management application uses a non-relational database at its core. Also disclosed is the combined use of a relational database with a non-relational database to selectively store systems management data based on predefined selection criteria. The relational database, if included, comprises a table-based data store that can be queried using a SQL variant. The non-relational database may comprise a file-based data store and consumes UNIX operating system utilities to make faster retrievals from the file-based data store. The novel use of a non-relational database at the core of a systems management application increases performance and scalability in systems management applications. | 01-24-2013 |
20130339200 | Fair Distribution Of Power Savings Benefit Among Customers In A Computing Cloud - A technique for fairly distributing power savings benefits to virtual machines (VMs) provisioned to customers in a computing cloud. One or more VMs are provisioned on a target cloud host in response to resource requests from one or more customer devices. Host power savings on the target host are monitored. The host power savings are used as a variable component in determining per-customer cloud usage for accounting purposes. The host power savings may be reflected as power related cost savings in a generated cloud usage calculation result that may be distributed proportionately to the VMs based on VM size and utilization. VMs of relatively larger size and lower utilization may receive a higher percentage of the cost savings than VMs of relatively smaller size and higher utilization. | 12-19-2013 |
20130339201 | Fair Distribution Of Power Savings Benefit Among Customers In A Computing Cloud - A technique for fairly distributing power savings benefits to virtual machines (VMs) provisioned to customers in a computing cloud. One or more VMs are provisioned on a target cloud host in response to resource requests from one or more customer devices. Host power savings on the target host are monitored. The host power savings are used as a variable component in determining per-customer cloud usage for accounting purposes. The host power savings may be reflected as power related cost savings in a generated cloud usage calculation result that may be distributed proportionately to the VMs based on VM size and utilization. VMs of relatively larger size and lower utilization may receive a higher percentage of the cost savings than VMs of relatively smaller size and higher utilization. | 12-19-2013 |
20140136865 | Cooperatively Managing Enforcement of Energy Related Policies Between Virtual Machine and Application Runtime - A mechanism is provided in a data processing system for runtime based enforcement of energy policies collaboratively. The application runtime environment executing within a virtual machine on the data processing system receives notification of a change in energy policy for the virtual machine or the physical host it is running on. Responsive to determining the virtual machine is to be run under a power cap based on the notification of a change in energy policy, the application runtime environment dynamically modifies execution of an application in the application runtime environment or requests the execution environment for delaying enforcement of energy policies. The application comprises a set of application modules. | 05-15-2014 |
20140137106 | Runtime Based Application Security and Regulatory Compliance in Cloud Environment - A mechanism is provided in a data processing system for runtime based application security. The application runtime environment executing within a virtual machine on the data processing system receives notification of a change in execution environment for the virtual machine. Responsive to determining the virtual machine is being migrated to a virtualized environment based on the notification of a change in execution environment, the application runtime environment dynamically modifies execution of an application in the application runtime environment, wherein the application comprises a set of application modules. | 05-15-2014 |
20140137107 | Cooperatively Managing Enforcement of Energy Related Policies Between Virtual Machine and Application Runtime - A mechanism is provided in a data processing system for runtime based enforcement of energy policies collaboratively. The application runtime environment executing within a virtual machine on the data processing system receives notification of a change in energy policy for the virtual machine or the physical host it is running on. Responsive to determining the virtual machine is to be run under a power cap based on the notification of a change in energy policy, the application runtime environment dynamically modifies execution of an application in the application runtime environment or requests the execution environment for delaying enforcement of energy policies. The application comprises a set of application modules. | 05-15-2014 |
20140137244 | Runtime Based Application Security and Regulatory Compliance in Cloud Environment - A mechanism is provided in a data processing system for runtime based application security. The application runtime environment executing within a virtual machine on the data processing system receives notification of a change in execution environment for the virtual machine. Responsive to determining the virtual machine is being migrated to a virtualized environment based on the notification of a change in execution environment, the application runtime environment dynamically modifies execution of an application in the application runtime environment, wherein the application comprises a set of application modules. | 05-15-2014 |
20140344123 | DYNAMICALLY MODIFYING WORKLOAD PATTERNS IN A CLOUD - A method, computer program product, and system are disclosed for modifying a computing environment hosting one or more workload patterns. A computer system obtains a list of deployed workload patterns on a on a computing environment, wherein each workload pattern is configured to support a predefined workload. The computer system identifies an extension to be deployed on a selected pattern from the list of deployed patterns. The computer system deploys the extension on the selected pattern. The computer system informs a user of the computing environment of new billing information based on deployment of the extension. | 11-20-2014 |
20140344808 | DYNAMICALLY MODIFYING WORKLOAD PATTERNS IN A CLOUD - A method, computer program product, and system are disclosed for modifying a computing environment hosting one or more workload patterns. A computer system obtains a list of deployed workload patterns on a on a computing environment, wherein each workload pattern is configured to support a predefined workload. The computer system identifies an extension to be deployed on a selected pattern from the list of deployed patterns. The computer system deploys the extension on the selected pattern. The computer system informs a user of the computing environment of new billing information based on deployment of the extension. | 11-20-2014 |
20150149612 | CALCULATING THE EFFECT OF AN ACTION IN A NETWORK - An apparatus for calculating the effect of an action on a network includes a mapping module that creates a mapping of a plurality of devices of a networked computing environment. The mapping describes a relationship between a primary device and at least one device of the plurality of devices. The apparatus includes an action module that determines a plurality of potential actions to be performed on the primary device. The apparatus includes a calculation module that calculates an effect of a potential action of the plurality of potential actions on the plurality of devices in response to simulating performing the potential action on the primary device. The apparatus includes an optimization module that performs an optimization action in response to calculating the effect of the potential action. The optimization action maximizes availability of the networked computing environment. | 05-28-2015 |
20150149620 | CALCULATING THE EFFECT OF AN ACTION IN A NETWORK - A method for calculating the effect of an action on a network includes creating a mapping of a plurality of devices of a networked computing environment. In one embodiment, the mapping describes a relationship between a primary device and at least one device of the plurality of devices. In another embodiment, the method includes determining a plurality of potential actions to be performed on the primary device. In a further embodiment, the method includes calculating an effect of a potential action of the plurality of potential actions on the plurality of devices in response to simulating performing the potential action on the primary device. In yet another embodiment, the method includes performing an optimization action in response to calculating the effect of the potential action. In certain embodiments, the optimization action maximizes availability of the networked computing environment. | 05-28-2015 |
20150363276 | MULTI-SITE DISASTER RECOVERY MECHANISM FOR DISTRIBUTED CLOUD ORCHESTRATION SOFTWARE - Multi-site disaster recovery mechanism performed by the following steps: (i) providing a disaster recovery (DR) system that includes a plurality of sites where each site of the plurality of sites actively serves infrastructure-as-a-service to a set of tenant(s); (ii) for each site of the plurality of sites, determining the following characteristics of the site: workloads that require DR, workloads characteristics, tenants and capabilities; (iii) for each site of the plurality of sites, determining a plurality of associated sites; and (iv) on condition that a disaster occurs which impacts a first site of the plurality of sites, distributing a primary site workload of the first site across the associated sites of the first site. The determination of the plurality of associated sites associated with each site is based upon at least one of the following characteristics: capacity, workloads that require DR, workloads characteristics, tenants and/or capabilities. | 12-17-2015 |
20160041857 | OPTIMIZING PLACEMENT PLANS FOR HOST FAILURE IN CLOUD COMPUTING ENVIRONMENTS - Embodiments of the present invention provide systems, methods, and computer program products for optimizing a placement plan. In one embodiment, a method is disclosed in which a request for registration with an external advisor is received. A time to live is received from each external advisor and used to determine an overall timeout period value for a placement engine. After receiving a predictive failure alert, internal and external advisors are ranked according to criteria and advice is received from the qualified advisors. A placement plan is generated based on the advice received from the advisors. | 02-11-2016 |
20160041889 | OPTIMIZING PLACEMENT PLANS FOR HOST FAILURE IN CLOUD COMPUTING ENVIRONMENTS - Embodiments of the present invention provide systems, methods, and computer program products for optimizing a placement plan. In one embodiment, a method is disclosed in which a request for registration with an external advisor is received. A time to live is received from each external advisor and used to determine an overall timeout period value for a placement engine. After receiving a predictive failure alert, internal and external advisors are ranked according to criteria and advice is received from the qualified advisors. A placement plan is generated based on the advice received from the advisors. | 02-11-2016 |
Patent application number | Description | Published |
20080313309 | CLIENT-SERVER DATA TRANSFER CONTROL - Disclosed are a method, a client/server system and a computer program for controlling the data transfer from a server system to a client system that runs remotely an application on the server. The data transfer control is effected by defining a first trigger event and a second trigger event in the client system. The client system and the server are arranged so that an occurrence of a first trigger event terminates the transfer of at least one type of data from the server system to the client computer, while an occurrence of the second trigger event reintroduces the terminated data transfer. | 12-18-2008 |
20110119369 | MONITORING COMPUTER SYSTEM PERFORMANCE - Disclosed are embodiments related to a method for monitoring performance of a plurality of client nodes. The client nodes are coupled to a master node over a network. The method comprises the master node requesting performance data from at least one of the client nodes. At least one of the client nodes being configured to collect the performance data from at least one other client node and transmit the performance data to the master node. Other embodiments are also disclosed. | 05-19-2011 |
20110202925 | OPTIMIZED CAPACITY PLANNING - A computer implemented method, system and/or program product determine capacity planning of resources allocation for an application scheduled to execute on a virtual machine from a set of multiple applications by computing a mean associated with a pool of pre-defined resources utilization over a time interval; computing a variance associated with the pool of pre-defined resources utilization over the same time interval; identifying a set of resource to execute the scheduled application from the pool of pre-defined resources, wherein the pool of pre-defined resources is created from a pre-defined Service Level Agreement (SLA); and allocating a set of fixed resources from the pool of pre-defined resources to execute the application based on the mean resource utilization. | 08-18-2011 |
20130007279 | DYNAMICALLY TUNING SERVER PLACEMENT - An input is received relative to a user objective. An application placement consideration is established based upon, at least in part, the user objective. A best-fit application placement is dynamically determined for a plurality of applications relative to a plurality of servers based upon, at least in part, the application placement consideration. | 01-03-2013 |
20130007281 | DYNAMICALLY TUNING SERVER PLACEMENT - An input is received relative to a user objective. An application placement consideration is established based upon, at least in part, the user objective. A best-fit application placement is dynamically determined for a plurality of applications relative to a plurality of servers based upon, at least in part, the application placement consideration. | 01-03-2013 |
Patent application number | Description | Published |
20100091037 | IMAGE ROTATION - Presented is a method of rotating an input image comprising a plurality of rows of input pixels by a predetermined arbitrary angle to generate a rotated output image comprising a plurality of rows of output pixels. The method comprises: receiving a first input segment comprising a first contiguous subset of the plurality of rows of input pixels; applying to the first input segment a transformation depending on the predetermined angle and storing the transformed result in a memory; receiving a second input segment comprising a second contiguous subset of the plurality of rows of input pixels, the second subset being adjacent to the first in the input image; applying the transformation to the second input segment and storing the transformed result in a memory; and generating a first output segment based on the transformed results of the first and second input segments, the output segment comprising a contiguous subset of the plurality of rows of output pixels. | 04-15-2010 |
20110170144 | DOCUMENT PROCESSING - Proposed is the use of a document widget for representing a property of a document. The document widget comprises: a human-readable portion for interpretation by a user; and a machine-readable portion representing the document property. By comprising information about a property of a document, a document widget may be processed in accordance with an optical recognition process so as to identify the document widget and enable extraction of the document property. | 07-14-2011 |
20120087596 | METHODS AND SYSTEMS FOR PIPELINED IMAGE PROCESSING - A system and method for pipeline image processing is disclosed. In one example embodiment the one or more swaths of the image may be received on the server from a client device connected to the server via a network. The received one or more swaths are processed on a swath by swath basis to obtain one or more image quality parameters. The obtained one or more image quality parameters are compared with a predetermined threshold level. The obtained one or more image quality parameters may be sent to the client device for further processing of the image based on the obtained one or more image quality parameters. | 04-12-2012 |
20120134576 | AUTOMATIC RECOGNITION OF IMAGES - Presented is a method of automatically performing an action, based on graphical input. The method comprises: receiving, for a user, an input image; comparing the input image with the contents of a user-customized database comprising a plurality of records, each record representing a predefined class of image, wherein the user has previously associated records in the database with respective specified actions; attempting to recognize the image, based on the similarity of the input image to one of the predefined classes of image represented in the user-customised database; and if the image is recognized, performing the action previously associated by the user with the class. Also presented is apparatus for recognizing an image and a method of constructing a user-customized database. | 05-31-2012 |
20130268476 | METHOD AND SYSTEM FOR CLASSIFICATION OF MOVING OBJECTS AND USER AUTHORING OF NEW OBJECT CLASSES - A system and method for classification of moving objects and user authoring of new object classes is disclosed. In one embodiment, in a method of classification of moving objects, a moving object is inputted. Then, an object descriptor and a motion descriptor are extracted from the inputted moving object. Multiple initial candidate library object descriptors are identified from an object library and a motion library using the extracted object descriptor and the extracted motion descriptor. An initial object class estimate is identified based on the identified multiple initial candidate library object descriptors. Then, an initial residue is computed based on the extracted object descriptor and the identified multiple initial candidate library object descriptors associated with the initial object class estimate. The object class estimates are iteratively identified and it is determined whether the object class estimates converge based on a stopping criterion. | 10-10-2013 |
20150324614 | Image Analysis - Provided is a method for performing analysis on an image. An image is provided to users, wherein contents of the image are hidden from the users. Information regarding the contents of the image is collected from the users wherein a question is posed to the users to determine contents of the image. Alternate inputs are received from the users to reveal the contents of the image, wherein each input from the users partially reveals the contents of the image. A response to the question from the users is received until it is determined that an input from one of the users would reveal an identity of a human subject present in the image. | 11-12-2015 |
20160050338 | SKEW DETECTION - Presented is a skew detection apparatus. In one form, the apparatus estimates skew based on the locations of a set of foreground content pixels or a set of edge pixels that are nearest to the side of an image of a document. In another form, the apparatus includes a skew estimation unit adapted to estimate skew based on the orientation of foreground or background content in the interior of a document. In another form, the apparatus estimates skew using segments of an image of a document. Also presented is a document image processing apparatus including the skew detection apparatus. | 02-18-2016 |
Patent application number | Description | Published |
20090307029 | SYSTEM AND METHOD FOR DISCOUNTED PRINTING - A system and method for method for implementing a discounted printing is disclosed. In one embodiment, a method for implementing discounted printing includes creating a sponsored document including a digital signature using a cryptographic protocol provided in an application by an enterprise, sending the sponsored document including the digital signature to a client computing system including a sponsored printer for printing by the enterprise, dynamically verifying the digital signature by a trusted service provider upon the enterprise sending the sponsored document to the sponsored printer, and printing the sponsored document by the sponsored printer upon a successful verification of the digital signature. The method may also include crediting an end user associated with the sponsored printer by an amount that substantially subsidizes cost associated with the printing of the sponsored document. | 12-10-2009 |
20100100607 | Adjusting Content To User Profiles - One embodiment is a method that determines at a client computer a relevancy of information received with respect to a user profile. The method then adjusts a ranking of the information according to the relevancy and displays a selected portion of the adjusted information on the client computer. | 04-22-2010 |
20100281044 | METHOD AND SYSTEM FOR CREATING A PROFILED SOCIAL NETWORK - Presented is a computer implemented method and system for creating a profiled social network. The method includes mapping at least one identity to each node in the plurality of nodes, defining a profile for each node in the plurality of nodes, identifying a relationship between the at least two nodes in the plurality of nodes, defining a profile for the relationship between the at least two nodes in the plurality of nodes, and forming a collection of profiles defined for all relationships between the plurality of nodes. | 11-04-2010 |
20100306144 | SYSTEM AND METHOD FOR CLASSIFYING INFORMATION - An exemplary embodiment of the present invention provides a computer implemented method for classifying information. The method may include accessing a plurality of information sources to identify example information items for each of a plurality of classification categories. Each of the example information items may be analyzed to generate a training corpus for each information source for each of the classification categories. The training corpus for each of the information sources may be combined to generate a training set for each of the classification categories, wherein the training set may be configured to allow the generation of a classification function. | 12-02-2010 |
20110264670 | METHOD AND SYSTEM FOR SEARCHING UNSTRUCTURED TEXTUAL DATA FOR QUANTITATIVE ANSWERS TO QUERIES - Disclosed is a method of querying a collection of electronic documents, comprising defining a query for retrieving a numerical answer, said query comprising one or more search terms and a tolerance for said numerical answer; defining a set of document portions from said collection, each document portion in said set being extracted from an electronic document and comprising at least one term relevant to at least one of the one or more search terms and a numerical value associated with the at least one term; ordering the associated numerical values contained in said set; defining a plurality of results groups, each results group comprising an interval of ordered numerical values, each interval having a range not exceeding the tolerance; ranking the results groups; and returning at least the interval of the highest ranked results group as a response to said query A computer program product for executing this method on a computer processor and a server are also disclosed. | 10-27-2011 |
Patent application number | Description | Published |
20130185698 | SIMPLIFYING ANALYSIS OF SOFTWARE CODE USED IN SOFTWARE SYSTEMS - An aspect of the present invention facilitates analysis of software code written in a programming language. In one embodiment, a visual interface designed to receive values identifying constructs of the programming language is provided on a display unit. In response to receiving, from a user using the visual interface, values corresponding to a construct of interest, a rule indicating a string of characters (that would constitute the construct of interest) is generated based on the received values. The generated rule is then applied to the software code to identify blocks matching the string of characters, each block representing a corresponding occurrence of the construct of interest in the software code. | 07-18-2013 |
20130263089 | GENERATING TEST CASES FOR FUNCTIONAL TESTING OF A SOFTWARE APPLICATION - An aspect of the present invention generates test cases for functional testing of a software application. In one embodiment, rules specifying corresponding patterns in a natural language and corresponding templates are maintained. Each pattern contains corresponding variables and words of the natural language together in an ordered sequence. On receiving a design document containing statements in the natural language, a first statement is determined to match a first pattern specified in a first rule. A match is deemed to exist only if the words in the first pattern exist in the first statement in the same corresponding positions of the ordered sequence, and if the first statement also contains values for each of the variables specified in the first pattern. A set of test cases is generated based on a first template specified in the first rule and the values for each of the variables. | 10-03-2013 |
20140075347 | SIMPLIFYING DEVELOPMENT OF USER INTERFACES OF APPLICATIONS - An aspect of the present invention simplifies development of user interfaces of applications. In one embodiment, specifications of user interfaces provided by applications are maintained, each specification containing interface definitions of UI elements in the corresponding user interface. A first user interface of a first application and a second user interface of a second application are displayed on a display unit. In response to receiving from a developer, an indication that a first UI element from the first user interface and a second UI element from the second user interface elements are to be included in a new user interface of a new application, a new specification for the new user interface incorporating the interface definitions of the first and second UI elements is created. | 03-13-2014 |
20140310620 | DETERMINING FOREGROUND AND BACKGROUND COLOR COMBINATION FOR A USER INTERFACE ELEMENT IMPORTED FROM ANOTHER USER INTERFACE - An aspect of the present invention facilitates development of user interfaces of applications. In one embodiment, a user is enabled to select a user interface (UI) element from a source interface, the UI element being displayed using a source foreground color in a backdrop of a source background color in the source interface. Upon receiving a target background color forming a backdrop to the UI element in a target interface, a target foreground color is computed based on the target background color and a color difference between the source foreground color and the source background color. The selected UI element is then displayed in the target interface using the (computed) target foreground color and the (received) target background color. | 10-16-2014 |
20150277723 | EXPORTING A COMPONENT OF A CURRENTLY DISPLAYED USER INTERFACE TO A DEVELOPMENT SYSTEM - According to an aspect of the present disclosure, a repository of (user interface) components is maintained, with each component having an associated interface definition. A user interface containing a set of components rendered on a display unit is then provided, the set of components being contained in the repository. In response to receiving from a user, a selection of a component rendered on the display unit, the interface definition of the selected component is made available in defining a new user interface in a development system. | 10-01-2015 |
20150278172 | SIMPLIFYING IDENTIFICATION OF POTENTIAL NON-VISIBILITY OF USER INTERFACE COMPONENTS WHEN RESPONSIVE WEB PAGES ARE RENDERED BY DISPARATE DEVICES - Aspects of the present disclosure simplify identification of potential non-visibility of user interface (UI) components when a responsive web page is rendered by disparate devices. In one embodiment, a browser is instructed to display the web page in a viewport of a desired size. Upon the browser rendering the web page in the viewport, a data structure (e.g., DOM) generated by the browser is examined to determine whether each of the components of the responsive web page is visible or non-visible within the viewport, and a corresponding visibility report is generated. The steps of instructing and examining may be performed iteratively for a number of viewports of corresponding sizes. The visibility report is then generated as a two-dimensional matrix indicating whether each component (along a first dimension) is visible or non-visible when the web page is rendered in a corresponding viewport (along a second dimension). | 10-01-2015 |