Patent application number | Description | Published |
20080277312 | Reconfigurable Packaging Material and Packages - Packaging materials are disclosed which are reconfigurable into two different shipping configurations: one for bulk shipment of electronic products, and one for individual shipment of the same electronic products. | 11-13-2008 |
20090113079 | COMPUTING DEVICE LOCATION - Embodiments of the present invention address deficiencies of the art in respect to computing device location and provide a novel and non-obvious method, system and computer program product for visually locating a computing device. In one embodiment of the invention, a computing device location method can include establishing filter criteria grouping different computing devices by common characteristic, wirelessly broadcasting the filter criteria in a discovery request to in range peripheral locators coupled to computing devices, aggregating a list of discovered peripheral locators meeting the filter criteria, selecting at least one of the peripheral locators in the list, and interrogating the selected peripheral locators to retrieve data provided by corresponding ones of the computing devices. Additionally, a display element in each of the discovered peripheral locators can be illuminated upon discovering the peripheral locators. Likewise, a display element can be illuminated in the selected peripheral locators upon selecting the peripheral locators. | 04-30-2009 |
20090167848 | SYSTEM AND METHOD TO IMPROVE MOUTH DISEASE DIAGNOSIS - Embodiments of the present invention address the deficiencies of the art in respect to oral cavity medical assessment and provide a method, system and apparatus for mouth disease diagnosis and treatment. In an embodiment of the invention, an apparatus for scanning an oral cavity can include a mouth guard spreader that has a partially transparent receiving member that defines a receiving cavity, a first spreader portion and a second spreader portion coupled to the partially transparent receiving member. The apparatus further can include an image capture device for capturing images of the oral cavity disposed within the partially transparent receiving member of the mouth guard spreader. The apparatus yet further can include a storage device coupled to the image capture device for storing each captured image of the oral cavity. | 07-02-2009 |
20100019755 | CABLE TRACING SYSTEM AND METHOD FOR CABLE MANAGEMENT - Embodiments of the present invention provide a system, method and testing apparatus for providing, managing and tracing connective cables in electrical and information management systems. In an embodiment of the invention, a selectable tracer cable system can be provided. The selectable tracer cable system can include a cable having a first terminal end and a second terminal, a display member capable of changing states of appearance in response to an applied voltage, where the display member is disposed between the first and second terminal ends, an interface device configured to provide an electrical connection between the display member and a power supply and a core member disposed within the cable and extending from the first terminal end to the second terminal end. The display member can include a first conductive plane, a second conductive plane opposite the first conductive plane, and a plurality of color microcapsules disposed between the first conductive plane and the second conductive plane. | 01-28-2010 |
20100079676 | Providing Multi-User Views - Providing multiple interleaved views for multiple viewers who are using a single display. The display may be, for example, the display of a computing device such as a laptop computer. Alternatively, the display may be the display of a television, gaming device, a projection screen, and so forth. Shutter glasses are synchronized to a display that interleaves frames from multiple different streams, enabling the wearer to perceive the frames of a single one of the multiple streams. In one aspect, inverse frames are applied to public frames and the result is interleaved with positive frames, such that a viewer not wearing shutter glasses perceives only the public frames. In another aspect, frames from multiple private streams are interleaved without use of public frames. | 04-01-2010 |
20110307708 | ENABLING ACCESS TO REMOVABLE HARD DISK DRIVES - A method, apparatus, and computer program product for accessing a device. The device receives a key from an operating system in response to the device in a locked state being connected to a data processing system after the operating system for the data processing system is running. The device compares the key received from the operating system with a set of keys stored in the device. The key is based on a system identifier for the data processing system and a password. The device determines whether a match is present between the key and the set of keys. The device changes the device from the locked state to an unlocked state in response to a determination that the match is present. | 12-15-2011 |
20120272161 | Caching Message Fragments during Real-Time Messaging Conversations - Creating and managing an editable cache of unsent message fragments during conversations using real-time messaging systems (such as instant messaging, text messaging, chat sessions, and so forth). Using this cache, a user participating in a real-time messaging conversation can cache at least one message fragment, and can then recall selected fragments for review and/or editing (as desired by the particular user) before sending to other conversation participants. Preferably, any unsent message fragment from the cache can be sent, upon request of the user, through a mouse click or keystroke. | 10-25-2012 |
20130179953 | Confidential information access via social networking web site - A server computing device for a social networking web site receives from a user, via access of the web site, confidential information regarding the user, including information that the user does not socially share on the web site. The device associates the confidential information with a user identifier that uniquely identifies the user on the web site, and with an export group identifier corresponding to a type of the confidential information. The device associates the export group identifier with a password different from a user password the user employs to access the web site. The device receives, from a third party, a purported user identifier, a purported export group identifier, and a purported password, which the device validates against the user identifier, the export group identifier, and the password. Where validation is successful, the device permits access to the confidential information by the third party. | 07-11-2013 |
20130179990 | Confidential information access via social networking web site - A server computing device for a social networking web site receives from a user, via access of the web site, confidential information regarding the user, including information that the user does not socially share on the web site. The device associates the confidential information with a user identifier that uniquely identifies the user on the web site, and with an export group identifier corresponding to a type of the confidential information. The device associates the export group identifier with a password different from a user password the user employs to access the web site. The device receives, from a third party, a purported user identifier, a purported export group identifier, and a purported password, which the device validates against the user identifier, the export group identifier, and the password. Where validation is successful, the device permits access to the confidential information by the third party. | 07-11-2013 |
Patent application number | Description | Published |
20100071025 | SECURING LIVE MIGRATION OF A VIRTUAL MACHINE WITHIN A SERVICE LANDSCAPE - In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM cna be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link. | 03-18-2010 |
20130204918 | COMPUTING ENVIRONMENT CONFIGURATION AND INITIALIZATION - According to one aspect of the present disclosure a method and technique for automatically configuring a set of resources for deployment as a computing environment is disclosed. The method includes: executing a configuration management application, the configuration management application configured to automatically connect to and discover each hardware element forming a networked set of resources; determine whether each discovered hardware element is specified for the computing environment; responsive to determining that each discovered hardware element is specified for the computing environment, determine a configuration setting for each respective discovered hardware element; responsive to determining that the configuration setting of the discovered hardware element conflicts with a desired configuration setting for deployment of the discovered hardware element, automatically configure the discovered hardware element to the desired configuration setting; and automatically load and configure a management interface to enable deployment of the networked set of resources as a computing environment. | 08-08-2013 |
20140201365 | IMPLEMENTING A PRIVATE NETWORK ISOLATED FROM A USER NETWORK FOR VIRTUAL MACHINE DEPLOYMENT AND MIGRATION AND FOR MONITORING AND MANAGING THE CLOUD ENVIRONMENT - A method, system and computer program product for optimizing quality of service settings for virtual machine deployment and migration. A first network (e.g., user network) is provided that is dedicated to running user workloads deployed on virtual machines. A second network (e.g., cloud management network), isolated from the first network, is also provided that is dedicated to virtual machine deployment and migration. As a result of the first and second networks not being shared, the administrative server utilizes unique quality of service settings for virtual machine deployment and migration supported by the second network that would otherwise not be possible if the first and second networks were shared. | 07-17-2014 |
20140297893 | EMULATING MULTIPLE UNIVERSAL SERIAL BUS (USB) KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, system and computer program product for efficiently configuring different types of hardware components. A computing device is connected to a hardware component to be configured. The computing device detects the type of the hardware component upon being connected to the hardware component. The computing device then identifies a profile from among multiple profiles associated with the detected type of hardware component, where each profile contains a configuration file(s) for configuring its associated type of hardware component. Upon identifying the profile associated with the connected hardware component, the computing device emulates a Universal Serial Bus (USB) key presenting the configuration file(s) contained in the identified profile to the detected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the computing device emulate multiple USB keys. | 10-02-2014 |
20140297894 | UNIVERSAL SERIAL BUS (USB) KEY FUNCTIONING AS MULTIPLE USB KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys. | 10-02-2014 |
20140297895 | UNIVERSAL SERIAL BUS (USB) KEY FUNCTIONING AS MULTIPLE USB KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys. | 10-02-2014 |