Patent application number | Description | Published |
20110312047 | Polypeptides having C4 Dicarboxylic Acid Transporter Activity and Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having C4-dicarboxylic acid transporter activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides, and methods of producing C4-dicarboxylic acids, such as malic acid. | 12-22-2011 |
20120149079 | Polypeptides Having C4 Dicarboxylic Acid Transporter Activity and Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having C4-dicarboxylic acid transporter activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides, and methods of producing C4-dicarboxylic acids, such as malic acid. | 06-14-2012 |
20120219999 | Microorganisms for C4-Dicarboxylic Acid Production - The present invention relates to isolated polypeptides having bicarbonate transporter activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides, and methods of producing C4-dicarboxylic acids, such as malic acid. | 08-30-2012 |
20130089902 | C4 DICARBOXYLIC ACID PRODUCTION IN FILAMENTOUS FUNGI - The present invention relates to methods of producing C4 dicarboxylic acids, such as malic acid, comprising: (a) cultivating a host cell comprising a polynucleotide encoding a C4 dicarboxylic acid transporter; and (b) recovering the C4 dicarboxylic acid. The present invention also relates to methods for increasing C4 dicarboxylic acid production, as well as host cells comprising the polynucleotides. | 04-11-2013 |
20130302865 | Polypeptides Having C4 Dicarboxylic Acid Transporter Activity and Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having C4-dicarboxylic acid transporter activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides, and methods of producing C4-dicarboxylic acids, such as malic acid. | 11-14-2013 |
20140134688 | Microorganisms for C4-Dicarboxylic Acid Production - The present invention relates to isolated polypeptides having bicarbonate transporter activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides, and methods of producing C4-dicarboxylic acids, such as malic acid. | 05-15-2014 |
20140308701 | Cellulolytic enzyme compositions and uses thereof - The present invention relates to recombinant filamentous fungal host cells producing cellulolytic enzyme compositions and methods of producing and using the compositions. | 10-16-2014 |
Patent application number | Description | Published |
20140375186 | PORTABLE DEVICE CASE AND ACCESSORIES - Cases for portable electronic devices are described including multiple alignment elements (e.g. slugs, magnets or physical securing means) embedded in a panel, such as the back panel of the case. Various accessories, such as stands, cord spools, mounts, communication devices, speakers, displays, etc., may also have multiple corresponding alignment elements (e.g. magnets, slugs or cooperative physical securing means) in them that allow the accessories to be semi-securely attached to the case in a plurality of specific positions and/or orientations. | 12-25-2014 |
20160104370 | METHOD OF CONTROLLING AN ELECTRONIC DEVICE - Embodiments disclosed herein generally include a system and a method of controlling a portable electronic device based on the interaction of the portable electronic device with an electronic device, such as a mounting device. Embodiments of the disclosure may include a system and a method of providing information to the portable electronic device that causes the portable electronic device to perform one or more desirable functions or processes based on the portable electronic device's interaction with the mounting device. In some embodiments, the portable electronic device may respond differently when it is caused to interact with differently configured mounting devices. Some aspects of the invention may include an apparatus, method and/or computing device software application that are configured to more easily setup and reliably control a portable electronic device based on the interaction of the portable electronic device with the mounting device. | 04-14-2016 |
20160105794 | METHOD AND APPARATUS FOR AUTOMATICALLY CONFIGURING AND CONTROLLING A PORTABLE ELECTRONIC DEVICE - Embodiments disclosed herein generally include a system and a method of controlling a portable electronic device based on the interaction of the portable electronic device with an electronic device, such as a mounting device. Embodiments of the disclosure may include a system and a method of providing information to the portable electronic device that causes the portable electronic device to perform one or more desirable functions or processes based on the portable electronic device's interaction with the mounting device. In some embodiments, the portable electronic device may respond differently when it is caused to interact with differently configured mounting devices. Some aspects of the invention may include an apparatus, method and/or computing device software application that are configured to more easily setup and reliably control a portable electronic device based on the interaction of the portable electronic device with the mounting device. | 04-14-2016 |
20160105904 | METHOD OF CONTROLLING AN ELECTRONIC DEVICE - Embodiments disclosed herein generally include a system and a method of controlling a portable electronic device based on the interaction of the portable electronic device with an electronic device, such as a mounting device. Embodiments of the disclosure may include a system and a method of providing information to the portable electronic device that causes the portable electronic device to perform one or more desirable functions or processes based on the portable electronic device's interaction with the mounting device. In some embodiments, the portable electronic device may respond differently when it is caused to interact with differently configured mounting devices. Some aspects of the invention may include an apparatus, method and/or computing device software application that are configured to more easily setup and reliably control a portable electronic device based on the interaction of the portable electronic device with the mounting device. | 04-14-2016 |
Patent application number | Description | Published |
20090285172 | ASSIGNMENT OF HOLDING PACKETS IN A WIRELESS COMMUNICATION NETWORK - A method and apparatus for assigning holding packets in a wireless communication system or network includes determining an invalid station address that corresponds to an invalid station and that does not correspond to the address of an affiliated station. The invalid station address is assigned to a holding packet. The holding packet is transmitted to allocate a transmit period to the invalid station. This generates a quiet time in the wireless communication system or network during the transmit period. | 11-19-2009 |
20110044164 | METHOD AND SYSTEM FOR HANDLING OUT-OF-ORDER SEGMENTS IN A WIRELESS SYSTEM VIA DIRECT DATA PLACEMENT - A method for processing information in a wireless system including a host device, the host device including a wireless network processor, the method including receiving by the wireless network processor, at least one out-of-order frame. The wireless network processor may place data of the received at least one out-of-order frame in a memory, and may manage information relating to one or more holes resulting from the at least one out-of-order frame in a TCP receive window. The wireless network processor may set a programmable limit with respect to a number of holes allowed in the TCP receive window. The memory may include a local memory outside of the host device and/or a host memory within the host device. | 02-24-2011 |
20120257753 | MAC Address Anonymizer - Methods and systems for generating anonymous MAC addresses and determining permanent MAC addresses from anonymous MAC addresses are disclosed. Permanent MAC addresses may be associated with a location in a location database. Generating anonymous MAC addresses may protect user privacy and allow manufacturers and users of wireless access points to control their inclusion in location databases. | 10-11-2012 |
20130010779 | Method and system for bridging and routing offload in a multiport wireless system - Aspects of a method and system for bridging and routing offload in a multiport wireless system are presented. Various aspects of the system may include a wireless network interface subsystem that enables transcoding of at least a portion of a data packet received by the wireless network interface subsystem. The wireless network interface subsystem may enable transfer of the transcoded portion of the data packet from the wireless network interface subsystem to a wired network interface subsystem that is communicatively coupled thereto. The transcoded portion of the data packet may be compliant with a format utilized by the wired network interface subsystem. | 01-10-2013 |
20130089000 | Beamforming training within a wireless communication system utilizing a directional antenna - A technique to identify that a station is capable of transmitting a PHY-BRP packet for use in training a directional antenna. The PHY-BRP packet is transmitted, when requested to do so, by appending the PHY-BRP packet to a BRP-Response in order to associate source and destination information to the PHY-BRP packet. | 04-11-2013 |
20130155931 | TIME DOMAIN COEXISTENCE OF RF SIGNALS - Various methods and systems are provided for time domain coexistence of RF signals. In one example, among others, a method includes obtaining access to a WLAN channel during a free period of a coexisting cellular connection, providing a RDG to allow another device to transmit for a duration corresponding to at least a portion of a TXOP, and receiving a transmission during the duration. In another example, a method includes obtaining access to a WLAN channel during a transmission period of a coexisting cellular connection and providing a protection frame to defer transmissions from another device for a duration corresponding to at least a portion of a TXOP. In another example, a method includes determining a shift of a BT transaction based at least in part upon a schedule of cellular communications and shifting at least a portion of the BT transaction based upon the determined shift. | 06-20-2013 |
20130196643 | DYNAMIC SPACE, FREQUENCY AND TIME DOMAIN COEXISTENCE - Various methods and systems are provided for space, frequency and time domain coexistence of RF signals. In one example, among others, a communication device includes a coexistence manager capable of monitoring operating conditions of a cellular modem and a coexistence assistant capable of monitoring operating conditions of a wireless connectivity unit. The coexistence manager is capable of modifying operation of the modem and/or unit based on an operating condition change. In another example, a method includes detecting a change in antenna isolation and/or operating temperature of a FE filter, determining filtering characteristics of the FE filter based at least in part upon the change, and modifying communications of coexisting communication protocols based at least in part upon the filtering characteristics. In another example, a TX/RX configuration for coexisting communication protocols is determined and communications in a protocol is modified based at least in part upon the TX/RX configuration. | 08-01-2013 |
20150305031 | TIME DOMAIN COEXISTENCE OF RF SIGNALS - Various methods and systems are provided for time domain coexistence of RF signals. In one example, among others, a method includes obtaining access to a WLAN channel during a free period of a coexisting cellular connection, providing a RDG to allow another device to transmit for a duration corresponding to at least a portion of a TXOP, and receiving a transmission during the duration. In another example, a method includes obtaining access to a WLAN channel during a transmission period of a coexisting cellular connection and providing a protection frame to defer transmissions from another device for a duration corresponding to at least a portion of a TXOP. In another example, a method includes determining a shift of a BT transaction based at least in part upon a schedule of cellular communications and shifting at least a portion of the BT transaction based upon the determined shift. | 10-22-2015 |
20160094317 | LONG-TERM EVOLUTION UNLICENSED (LTE-U) AND WIRELESS LOCAL AREA NETWORK (WLAN) COEXISTENCE MECHANISM - In some aspects, the disclosure is directed to methods and systems for protocol coexistence. Within a frequency band of a wireless local area network (WLAN), a device implemented for operation in at least a non-WLAN protocol can determine that the frequency band is quiet at a first time instance. The device can transmit a message in WLAN protocol responsive to the determination and prior to operation in the non-WLAN protocol within the frequency band. The message can have a receiver address other than an address belonging to other devices operating within the frequency band. | 03-31-2016 |
20160095110 | WIFI-COORDINATED LAA-LTE - A method includes detecting, using a WiFi access point, channel use data indicating traffic on a plurality of channels of an unlicensed LTE band in a wireless network. The method further includes providing the channel use data to a Long Term Evolution (LTE) access point. The method further includes selecting, using the LTE access point, a channel for use in transmitting data by the LTE access point from among the plurality of channels based on the channel use data from the WiFi access point. The method further includes providing, from the LTE access point, an indication of an upcoming transmission configured to transmit data on the channel to the WiFi access point. The method further includes broadcasting one or more messages from the WiFi access point to one or more WiFi nodes, the one or more messages configured to prevent the WiFi nodes from transmitting on the channel. | 03-31-2016 |
Patent application number | Description | Published |
20110302135 | MAINTAINING APPLICATIONS THAT ARE OCCASIONALLY CONNECTED TO AN ONLINE SERVICES SYSTEM - In a method for maintaining applications that are occasionally connected to an online services system, metadata describing at least a portion of an online services database is retrieved and the portion of the online services database is authorized for replication at a software application, information for an entity for an application database in accordance with metadata is determined, information is sent for the entity to an application data management service, data for the software application is retrieved from the online services database in accordance with metadata, at least a portion of the data for the software application is sent to the application data management service and the portion of the data for the software application should be synchronized with the online services database, a request for information is received for rendering a component of a user interface, and information is provided for rendering the component of the user interface for the software application | 12-08-2011 |
20110302454 | PERFORMING ASYNCHRONOUS TESTING OF AN APPLICATION OCCASIONALLY CONNECTED TO AN ONLINE SERVICES SYSTEM - In a method, system, and computer-readable medium having instructions for performing asynchronous testing of an application that is occasionally connected to an online services system, metadata describing at least a portion of an online services database is retrieved and the at least a portion of the online services database is authorized for replication at a software application, information is determined for an entity for an application database from the metadata, a request is sent for a database using the software application interface and the request has an asynchronous operation call to the database for the entity, an execution of the asynchronous operation call is recorded within a callback function, a response is received for the asynchronous operation call, and a result is determined for the software application performance. | 12-08-2011 |
20110314373 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PERFORMING ACTIONS ASSOCIATED WITH DATA TO BE DISPLAYED, UTILIZING A WIDGET - In accordance with embodiments, there are provided mechanisms and methods for performing actions associated with data to be displayed, utilizing a widget. These mechanisms and methods for performing actions associated with data to be displayed, utilizing a widget can enable enhanced and expedited data development, improved data display, etc. | 12-22-2011 |
20120304014 | PERFORMING ASYNCHRONOUS TESTING OF AN APPLICATION OCCASIONALLY CONNECTED TO AN ONLINE SERVICES SYSTEM - In a method, system, and computer-readable medium having instructions for performing asynchronous testing of an application that is occasionally connected to an online services system, metadata describing at least a portion of an online services database is retrieved and the at least a portion of the online services database is authorized for replication at a software application, information is determined for an entity for an application database from the metadata, a request is sent for a database using the software application interface and the request has an asynchronous operation call to the database for the entity, an execution of the asynchronous operation call is recorded within a callback function, a response is received for the asynchronous operation call, and a result is determined for the software application performance. | 11-29-2012 |
20130019106 | METHODS AND APPARATUS FOR DIGITAL STEGANOGRAPHY - A computer-implemented digital steganography method includes providing a target dataset comprising a plurality of target data elements, providing a source dataset comprising a plurality of source data elements, and creating a grille dataset configured to map each of the target data elements in the target dataset with a corresponding source data element within the source dataset in accordance with a predefined extraction method. | 01-17-2013 |
20140095874 | METHOD AND SYSTEM FOR SECURED INTER-APPLICATION COMMUNICATION IN MOBILE DEVICES - This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in information from a user and enabling the user to sign in to a second application with the first application to access network resources from a resource server based on (a) a first application identification (ID) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an authorization grant from the resource server to enable the second application to access the network resources, the mobile computing device coupled with the resource server via a network. | 04-03-2014 |
20150206459 | METHODS AND APPARATUS FOR DIGITAL STEGANOGRAPHY - A computer-implemented digital steganography method includes providing a plurality of target data elements each comprising a sequence of digital bits, providing a plurality of source data elements each comprising a sequence of digital bits and has a specific start bit, and generating, according to a predefined extraction method, a mapping of each of the target data elements with a corresponding source data element. The mapping includes, for each target data element, a corresponding indice indicating the position of the specific start bit within a bitwise representation of the source data elements irrespective of the bitwise position of each of the source data elements. | 07-23-2015 |
Patent application number | Description | Published |
20110289097 | METRICS-BASED ACCESSING OF SOCIAL THREADS - A method of accessing feeds based on metrics is provided. Feeds, each associated with an object stored in a database system, are provided to users of the database system. Inferential user interaction data captures implicit user behavior of users of the database system, wherein the data is generated in relation to a feed. Feed metrics are determined based on the user interaction data, wherein a feed metric is based upon statistics comprising user consumption, user responsiveness, content proliferation, and feed life. Finally, an action is executed in relation to at least one feed based on the feed metrics, wherein the action comprises discontinuing the feed, characterizing a feed, determining that a feed can be monetized, determining that a feed should be cached, or determining that intervention in a feed is advisable. | 11-24-2011 |
20110289401 | MULTIPLE GRAPHICAL ANNOTATIONS OF DOCUMENTS USING OVERLAYS - Systems and methods for sharing document annotations. A document is displayed on a graphical user interface and first annotation information for the document is created by a first user, the annotation information including first annotations and positioning information for positioning a first overlay window relative to the document. The first overlay window with the first annotations is displayed over the document wherein the document is visible through the first overlay window. The annotation information is sharable with other users, whereby a different user is able to display the overlay with annotations made by the first user over the document on a different system, and the annotations do not modify the underlying document. | 11-24-2011 |
20110289451 | METHODS AND SYSTEMS FOR CUSTOMIZING USER NOTIFICATIONS - Methods and systems are provided that aid users in customizing notification graphical user interface (GUI) components. In some aspects, the customization interface is driven from the notification interface or window. Users may then manage the position and appearance of a notification window or GUI component from the notification itself. In addition, the user can manage the position of a notification and direction of subsequent notifications from an originating notification. | 11-24-2011 |
20110302299 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DETERMINING A RATE AT WHICH AN ENTITY IS POLLED - In accordance with embodiments, there are provided mechanisms and methods for determining a rate at which an entity is polled. These mechanisms and methods for determining a rate at which an entity is polled can enable decreased overall server load, improved efficiency, an increased perception of responsiveness, etc. | 12-08-2011 |
20110302327 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PERFORMING A SYNCHRONIZATION OF DATA - In accordance with embodiments, there are provided mechanisms and methods for performing a synchronization of data. These mechanisms and methods for performing a synchronization of data can enable a more efficient synchronization, time and resource savings, an enhanced user experience, etc. | 12-08-2011 |
20110302479 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RESOLVING A DATA CONFLICT - In accordance with embodiments, there are provided mechanisms and methods for resolving a data conflict. These mechanisms and methods for resolving a data conflict can enable an improved user experience, increased efficiency, time savings, etc. | 12-08-2011 |
20110314029 | RULE-BASED PRIORITIZATION OF SOCIAL DATA - A method of prioritizing feed items based on rules is provided. User input establishes one or more rules to prioritize a feed item, wherein at least one of the one or more rules incorporates the input data. Such user input may include user-created data or feed metrics. The one or more rules may be weighted. Additional user input configures one or more message cues. A plurality of feed items are prioritized based on the one or more rules. The plurality of feed items are associated with a plurality of feeds, wherein each feed is associated with an object stored in a database system. The plurality of feed items are then displayed in combination with the one or more message cues to a plurality of users of the database system. | 12-22-2011 |
20130275509 | SYSTEM AND METHOD FOR SYNCHRONIZING DATA OBJECTS IN A CLOUD BASED SOCIAL NETWORKING ENVIRONMENT - Methods and systems are provided for synchronizing and sharing data objects in a cloud based social networking environment of the type including a collaboration cloud. The method includes defining a sharing configuration within the collaboration cloud to include a second computing device; running a dedicated client synchronization application on a first computing device; creating a sync folder on the first computing device using the client synchronization application; updating a data object using the first computing device; adding the updated data object to the sync folder; automatically synchronizing the updated data object with the collaboration cloud; and propagating, using the collaboration cloud, the updated data object to the second computing device. | 10-17-2013 |
20140067921 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PERFORMING A SYNCHRONIZATION OF DATA - In accordance with embodiments, there are provided mechanisms and methods for performing a synchronization of data. These mechanisms and methods for performing a synchronization of data can enable a more efficient synchronization, time and resource savings, an enhanced user experience, etc. | 03-06-2014 |
20140214830 | METRICS-BASED ACCESSING OF SOCIAL THREADS - A method of accessing feeds based on metrics is provided. Feeds, each associated with an object stored in a database system, are provided to users of the database system. Inferential user interaction data captures implicit user behavior of users of the database system, wherein the data is generated in relation to a feed. Feed metrics are determined based on the user interaction data, wherein a feed metric is based upon statistics comprising user consumption, user responsiveness, content proliferation, and feed life. Finally, an action is executed in relation to at least one feed based on the feed metrics, wherein the action comprises discontinuing the feed, characterizing a feed, determining that a feed can be monetized, determining that a feed should be cached, or determining that intervention in a feed is advisable. | 07-31-2014 |
20150026119 | RULE-BASED PRIORITIZATION OF SOCIAL DATA - A method of prioritizing feed items based on rules is provided. User input establishes one or more rules to prioritize a feed item, wherein at least one of the one or more rules incorporates the input data. Such user input may include user-created data or feed metrics. The one or more rules may be weighted. Additional user input configures one or more message cues. A plurality of feed items are prioritized based on the one or more rules. The plurality of feed items are associated with a plurality of feeds, wherein each feed is associated with an object stored in a database system. The plurality of feed items are then displayed in combination with the one or more message cues to a plurality of users of the database system. | 01-22-2015 |
20150293892 | MULTIPLE GRAPHICAL ANNOTATIONS OF DOCUMENTS USING OVERLAYS - Systems and methods for sharing document annotations. A document is displayed on a graphical user interface and first annotation information for the document is created by a first user, the annotation information including first annotations and positioning information for positioning a first overlay window relative to the document. The first overlay window with the first annotations is displayed over the document wherein the document is visible through the first overlay window. The annotation information is sharable with other users, whereby a different user is able to display the overlay with annotations made by the first user over the document on a different system, and the annotations do not modify the underlying document. | 10-15-2015 |
20150379103 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PERFORMING A SYNCHRONIZATION OF DATA - In accordance with embodiments, there are provided mechanisms and methods for performing a synchronization of data. These mechanisms and methods for performing a synchronization of data can enable a more efficient synchronization, time and resource savings, an enhanced user experience, etc. | 12-31-2015 |
Patent application number | Description | Published |
20090077361 | DETECTING SPIN LOOPS IN A VIRTUAL MACHINE ENVIRONMENT - Embodiments of apparatuses, methods, and systems detecting spin loops in a virtual machine environment are disclosed. In one embodiment, an apparatus includes detection logic and virtualization logic. The detection logic is to detect whether a guest is executing a spin loop. The virtualization logic is to transfer control of the apparatus from the guest to a host in response to the detection logic detecting that the guest is executing the spin loop | 03-19-2009 |
20100146311 | Method and Apparatus for a Zero Voltage Processor Sleep State - Embodiments of the invention relate to a method and apparatus for a zero voltage processor sleep state. A processor may include a dedicated cache memory. A voltage regulator may be coupled to the processor to provide an operating voltage to the processor. During a transition to a zero voltage power management state for the processor, the operational voltage applied to the processor by the voltage regulator may be reduced to approximately zero and the state variables associated with the processor may be saved to the dedicated cache memory. | 06-10-2010 |
20100332574 | Digital random number generator - A hardware-based digital random number generator is provided. The digital random number generator is a randomly behaving random number generator based on a set of nondeterministic behaviors. The nondeterministic behaviors include temporal asynchrony between subunits, entropy source “extra” bits, entropy measurement, autonomous deterministic random bit generator reseeding and consumption from a shared resource. | 12-30-2010 |
20120072750 | METHOD AND APPARATUS FOR A ZERO VOLTAGE PROCESSOR SLEEP STATE - Embodiments of the invention relate to a method and apparatus for a zero voltage processor sleep state. A processor may include a dedicated cache memory. A voltage regulator may be coupled to the processor to provide an operating voltage to the processor. During a transition to a zero voltage power management state for the processor, the operational voltage applied to the processor by the voltage regulator may be reduced to approximately zero and the state variables associated with the processor may be saved to the dedicated cache memory. | 03-22-2012 |
20120191951 | MFENCE and LFENCE Micro-Architectural Implementation Method and System - A system and method for fencing memory accesses. Memory loads can be fenced, or all memory access can be fenced. The system receives a fencing instruction that separates memory access instructions into older accesses and newer accesses. A buffer within the memory ordering unit is allocated to the instruction. The access instructions newer than the fencing instruction are stalled. The older access instructions are gradually retired. When all older memory accesses are retired, the fencing instruction is dispatched from the buffer. | 07-26-2012 |
20130013945 | METHOD AND APPARATUS FOR A ZERO VOLTAGE PROCESSOR SLEEP STATE - Embodiments of the invention relate to a method and apparatus for a zero voltage processor sleep state. A processor may include a dedicated cache memory. A voltage regulator may be coupled to the processor to provide an operating voltage to the processor. During a transition to a zero voltage power management state for the processor, the operational voltage applied to the processor by the voltage regulator may be reduced to approximately zero and the state variables associated with the processor may be saved to the dedicated cache memory. | 01-10-2013 |
20130067200 | MFENCE AND LFENCE MICRO-ARCHITECTURAL IMPLEMENTATION METHOD AND SYSTEM - A system and method for fencing memory accesses. Memory loads can be fenced, or all memory access can be fenced. The system receives a fencing instruction that separates memory access instructions into older accesses and newer accesses. A buffer within the memory ordering unit is allocated to the instruction. The access instructions newer than the fencing instruction are stalled. The older access instructions are gradually retired. When all older memory accesses are retired, the fencing instruction is dispatched from the buffer. | 03-14-2013 |
20130073834 | MFENCE AND LFENCE MICRO-ARCHITECTURAL IMPLEMENTATION METHOD AND SYSTEM - A system and method for fencing memory accesses. Memory loads can be fenced, or all memory access can be fenced. The system receives a fencing instruction that separates memory access instructions into older accesses and newer accesses. A buffer within the memory ordering unit is allocated to the instruction. The access instructions newer than the fencing instruction are stalled. The older access instructions are gradually retired. When all older memory accesses are retired, the fencing instruction is dispatched from the buffer. | 03-21-2013 |
20130205117 | MFENCE AND LFENCE MICRO-ARCHITECTURAL IMPLEMENTATION METHOD AND SYSTEM - A system and method for fencing memory accesses. Memory loads can be fenced, or all memory access can be fenced. The system receives a fencing instruction that separates memory access instructions into older accesses and newer accesses. A buffer within the memory ordering unit is allocated to the instruction. The access instructions newer than the fencing instruction are stalled. The older access instructions are gradually retired. When all older memory accesses are retired, the fencing instruction is dispatched from the buffer. | 08-08-2013 |
20130212370 | METHOD AND APPARATUS FOR ESTABLISHING SAFE PROCESSOR OPERATING POINTS - A system and method is provided for establishing safe processor operating points. Some embodiments may include a tamper resistant storage element that stores information regarding one or more operating points of an adjustable processor operating parameter. Some embodiments may further include an element to determine what the current processor operating point is of the operating parameter, and an element to compare the current operating point of the operating parameter with the stored information. | 08-15-2013 |
20140096245 | Protection Against Return Oriented Programming Attacks - In one embodiment, a processor includes at least one execution unit. The processor also includes a Return Oriented Programming (ROP) logic coupled to the at least one execution unit. The ROP logic may validate a return pointer stored on a call stack based on a secret ROP value. The secret ROP value may only be accessible by the operating system. | 04-03-2014 |
20140096247 | Protection Against Return Oriented Programming Attacks - In one embodiment, a processor includes at least one execution unit. The processor also includes a Return Oriented Programming (ROP) logic coupled to the at least one execution unit. The ROP logic may validate a return pointer stored on a call stack based on a secret ROP value. The secret ROP value may only be accessible by the operating system. | 04-03-2014 |
20140123281 | DETECTION OF RETURN ORIENTED PROGRAMMING ATTACKS - In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine a ROP metric based on a plurality of control transfer events. The ROP detection logic may also determine whether the ROP metric exceeds a threshold. The ROP detection logic may also, in response to a determination that the ROP metric exceeds the threshold, provide a ROP attack notification. | 05-01-2014 |
20140123286 | Detection Of Return Oriented Programming Attacks - In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine a ROP metric based on a plurality of control transfer events. The ROP detection logic may also determine whether the ROP metric exceeds a threshold. The ROP detection logic may also, in response to a determination that the ROP metric exceeds the threshold, provide a ROP attack notification. | 05-01-2014 |
20140281457 | METHOD FOR BOOTING A HETEROGENEOUS SYSTEM AND PRESENTING A SYMMETRIC CORE VIEW - A heterogeneous processor architecture and a method of booting a heterogeneous processor is described. A processor according to one embodiment comprises: a set of large physical processor cores; a set of small physical processor cores having relatively lower performance processing capabilities and relatively lower power usage relative to the large physical processor cores; and a package unit, to enable a bootstrap processor. The bootstrap processor initializes the homogeneous physical processor cores, while the heterogeneous processor presents the appearance of a homogeneous processor to a system firmware interface. | 09-18-2014 |
20150052377 | Method And Apparatus For A Zero Voltage Processor - Embodiments of the invention relate to a method and apparatus for a zero voltage processor sleep state. A processor may include a dedicated cache memory. A voltage regulator may be coupled to the processor to provide an operating voltage to the processor. During a transition to a zero voltage power management state for the processor, the operational voltage applied to the processor by the voltage regulator may be reduced to approximately zero and the state variables associated with the processor may be saved to the dedicated cache memory. | 02-19-2015 |
20150055778 | METHOD AND APPARATUS FOR A NON-DETERMINISTIC RANDOM BIT GENERATOR (NRBG) - A hardware-based digital random number generator is provided. In one embodiment, a processor includes a digital random number generator (DRNG) to condition entropy data provided by an entropy source, to generate a plurality of deterministic random bit (DRB) strings, and to generate a plurality of nondeterministic random bit (NRB) strings, and an execution unit coupled to the DRNG, in response to a first instruction to read a seed value, to retrieve one of the NRB strings from the DRNG and to store the NRB string in a destination register specified by the first instruction. | 02-26-2015 |
20150058667 | Method And Apparatus For A Zero Voltage Processor - Embodiments of the invention relate to a method and apparatus for a zero voltage processor sleep state. A processor may include a dedicated cache memory. A voltage regulator may be coupled to the processor to provide an operating voltage to the processor. During a transition to a zero voltage power management state for the processor, the operational voltage applied to the processor by the voltage regulator may be reduced to approximately zero and the state variables associated with the processor may be saved to the dedicated cache memory. | 02-26-2015 |
20160085966 | Detection Of Return Oriented Programming Attacks - In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine a ROP metric based on a plurality of control transfer events. The ROP detection logic may also determine whether the ROP metric exceeds a threshold. The ROP detection logic may also, in response to a determination that the ROP metric exceeds the threshold, provide a ROP attack notification. | 03-24-2016 |
20160091958 | METHOD AND APPARATUS FOR A ZERO VOLTAGE PROCESSOR SLEEP STATE - Embodiments of the invention relate to a method and apparatus for a zero voltage processor sleep state. A processor may include a dedicated cache memory. A voltage regulator may be coupled to the processor to provide an operating voltage to the processor. During a transition to a zero voltage power management state for the processor, the operational voltage applied to the processor by the voltage regulator may be reduced to approximately zero and the state variables associated with the processor may be saved to the dedicated cache memory. | 03-31-2016 |
20160098075 | Method And Apparatus For A Zero Voltage Processor Sleep State - Embodiments of the invention relate to a method and apparatus for a zero voltage processor sleep state. A processor may include a dedicated cache memory. A voltage regulator may be coupled to the processor to provide an operating voltage to the processor. During a transition to a zero voltage power management state for the processor, the operational voltage applied to the processor by the voltage regulator may be reduced to approximately zero and the state variables associated with the processor may be saved to the dedicated cache memory. | 04-07-2016 |
Patent application number | Description | Published |
20120041837 | PAPER CALCULATION SYSTEMS AND METHODS - A system and method to provide a price calculation for e-commerce related sales by utilizing a plurality of paper characteristics to determine final prices. The present invention utilizes at least four inputs including paper type, width, length and sheets to return to potential online e-commerce users a price calculation for a particular order. Additionally, the system may allow the individual user to select paper type, length and sheets, then utilizes a multiplication factor which is stored in a remote database which calculates a MWT value and returns to the user the final price calculated for their particular order. | 02-16-2012 |
20130167012 | DYNAMIC WEBSITE BUILDING SYSTEM - A dynamically integrated website that allows for collection of web page templates and themes to be used in the development of an individual or business website is provided. The system allows for use of a plurality of different colors, images, and text within the website development and checks for availability of any particular domain name through a customizable search mechanism. The system also maintains a database having a plurality of image libraries with the ability for the individual user to choose stored images, texts and the like, and the ability to download and/or upload customized text, images, and other data to the system for integration into the website. Moreover, the system may add title tag and metatag information to help search engine keyword searches during development of the website. Additionally, the system may have a online support portion whereby support tickets may be utilized to help individual system users. The system may also utilize an online live chat help mechanism allowing for individualized help in the creation of the customized website. | 06-27-2013 |
20130218692 | METHOD AND SYSTEM FOR SELECTION OF FOODSTUFFS - A method and system for online selection of ingredients and/or use with the selection of a prepared foodstuff supplied by a food vendor is provided. The present invention utilizes an online grid system which lists the toppings and/or ingredients which can be included in any particular food item. The grid has a plurality of columns which includes icons with particular food items and allows the consumer to visually indicate the inclusion of specific food ingredients in their food choices. Additionally, the columns allow the individual consumer to determine the amounts of each ingredient to be included in the preparation of a food item and may also include information relating to directing the food vendor where to locate the particular ingredient, such as including only one ingredient on only a part of a foodstuff, for example, a pizza. | 08-22-2013 |
20140282076 | Online Proofing - The present invention relates to an on-line application for advertising. More specifically, the present invention relates to an on-line portion or a web-based application that allows an artist working on an advertisement or other artistic work to provide a client with a preview of the advertisement. The application permits the client to provide comments directly, efficiently, and securely back to the artist. The client may highlight the areas that need modification, and may permit the client to add comments, files, renders, or other annotations to the artistic work. | 09-18-2014 |
Patent application number | Description | Published |
20090069419 | MASKED CARBOXYLATE NEOPENTYL SULFONYL ESTER CYCLIZATION RELEASE PRODRUGS OF ACAMPROSATE, COMPOSITIONS THEREOF, AND METHODS OF USE - Masked carboxylate neopentyl sulfonyl ester prodrugs of acamprosate, pharmaceutical compositions comprising such prodrugs, and methods of using such prodrugs and compositions thereof for treating diseases are disclosed. In particular, acamprosate prodrugs exhibiting enhanced oral bioavailability and methods of using acamprosate prodrugs to treat neurodegenerative disorders, psychotic disorders, mood disorders, anxiety disorders, somatoform disorders, movement disorders, substance abuse disorders, binge eating disorder, cortical spreading depression related disorders, tinnitus, sleeping disorders, multiple sclerosis, and pain are disclosed. | 03-12-2009 |
20090076147 | COMPLEX PANTOIC ACID ESTER NEOPENTYL SULFONYL ESTER CYCLIZATION RELEASE PRODRUGS OF ACAMPROSATE, COMPOSITIONS THEREOF, AND METHODS OF USE - Pantoic acid ester neopentyl sulfonyl ester prodrugs of acamprosate, pharmaceutical compositions comprising such prodrugs, and methods of using such prodrugs and compositions thereof for treating diseases are disclosed. In particular, acamprosate prodrugs exhibiting enhanced oral bioavailability and methods of using acamprosate prodrugs to treat neurodegenerative disorders, psychotic disorders, mood disorders, anxiety disorders, somatoform disorders, movement disorders, substance abuse disorders, binge eating disorder, cortical spreading depression related disorders, tinnitus, sleeping disorders, multiple sclerosis, and pain are disclosed. | 03-19-2009 |
20090082440 | SIMPLE PANTOIC ACID ESTER NEOPENTYL SULFONYL ESTER CYCLIZATION RELEASE PRODRUGS OF ACAMPROSATE, COMPOSITIONS THEREOF, AND METHODS OF USE - Pantoic acid ester neopentyl sulfonyl ester prodrugs of acamprosate, pharmaceutical compositions comprising such prodrugs, and methods of using such prodrugs and compositions thereof for treating diseases are disclosed. In particular, acamprosate prodrugs exhibiting enhanced oral bioavailability and methods of using acamprosate prodrugs to treat neurodegenerative disorders, psychotic disorders, mood disorders, anxiety disorders, somatoform disorders, movement disorders, substance abuse disorders, binge eating disorder, cortical spreading depression related disorders, tinnitus, sleeping disorders, multiple sclerosis, and pain are disclosed. | 03-26-2009 |
20090082464 | EXTERNALLY MASKED NEOPENTYL SULFONYL ESTER CYCLIZATION RELEASE PRODRUGS OF ACAMPROSATE, COMPOSITIONS THEREOF, AND METHODS OF USE - Masked nitrogen-substituted and oxygen-substituted neopentyl sulfonyl ester prodrugs of acamprosate, pharmaceutical compositions comprising such prodrugs, and methods of using such prodrugs and compositions thereof for treating diseases are disclosed. In particular, acamprosate prodrugs exhibiting enhanced oral bioavailability and methods of using acamprosate prodrugs to treat neurodegenerative disorders, psychotic disorders, mood disorders, anxiety disorders, somatoform disorders, movement disorders, substance abuse disorders, binge eating disorder, cortical spreading depression related disorders, tinnitus, sleeping disorders, multiple sclerosis, and pain are disclosed. | 03-26-2009 |
20090099253 | Internally Masked Neopentyl Sulfonyl Ester Cyclization Release Prodrugs of Acamprosate, Compositions Thereof, and Methods of Use - Internally masked neopentyl sulfonyl ester prodrugs of acamprosate, pharmaceutical compositions comprising such prodrugs, and methods of using such prodrugs and compositions thereof for treating diseases are disclosed. In particular, acamprosate prodrugs exhibiting enhanced oral bioavailability and methods of using acamprosate prodrugs to treat neurodegenerative disorders, psychotic disorders, mood disorders, anxiety disorders, somatoform disorders, movement disorders, substance abuse disorders, binge eating disorder, cortical spreading depression related disorders, tinnitus, sleeping disorders, multiple sclerosis, and pain are disclosed. | 04-16-2009 |
20150218085 | BETA-SUBSTITUTED GAMMA-AMINO ACIDS AND ANALOGS AS CHEMOTHERAPEUTIC AGENTS - β-Substituted γ-amino acids, β-substituted γ-amino acid derivatives, and β-substituted γ-amino acid analogs and (bio)isosteres and their use as chemotherapeutic agents are disclosed. The β-substituted γ-amino acid derivatives and β-substituted γ-amino acid analogs and (bio)isosteres are selective LAT1/4F2hc substrates, capable of passing through the blood-brain barrier, and exhibit rapid uptake and retention in tumors expressing the LAT1/4F2hc transporter. Methods of synthesizing the β-substituted γ-amino acid derivatives and β-substituted γ-amino acid analogs and (bio)isosteres and methods of using the compounds for treating tumors are also disclosed. The β-substituted γ-amino acid derivatives and β-substituted γ-amino acid analogs and (bio)isosteres exhibit an improved selectivity toward tumor cells expressing the LAT1/4F2hc transporter and accumulate in cancerous cells when administered to a subject in vivo. The β-substituted γ-amino acid derivatives and β-substituted γ-amino acid analogs and (bio)isosteres exhibit an increased efficacy on a variety of tumor types. | 08-06-2015 |
20150218086 | BETA-SUBSTITUTED BETA-AMINO ACIDS AND ANALOGS AS CHEMOTHERAPEUTIC AGENTS - β-Substituted β-amino acids, β-substituted β-amino acid derivatives, and β-substituted β-amino acid analogs and (bio)isosteres and their use as chemotherapeutic agents are disclosed. The β-substituted β-amino acid derivatives and β-substituted β-amino acid analogs and (bio)isosteres are selective LAT1/4F2hc substrates and exhibit rapid uptake and retention in tumors expressing the LAT1/4F2hc transporter. Methods of synthesizing the β-substituted β-amino acid derivatives and β-substituted β-amino acid analogs and methods of using the compounds for treating cancer are also disclosed. The β-substituted β-amino acid derivatives and β-substituted β-amino acid analogs exhibit selective uptake in tumor cells expressing the LAT1/4F2hc transporter and accumulate in cancerous cells when administered to a subject in vivo. The β-substituted β-amino acid derivatives and β-substituted β-amino acid analogs and (bio)isosteres exhibit cytotoxicity toward several tumor types. | 08-06-2015 |