Quirk, US
Aaron J. Quirk, Durham, NC US
Patent application number | Description | Published |
---|---|---|
20160036904 | PEER NEGOTIATION OF AREA SERVICE PREFERENCES - Methods and systems may provide for joining an overlay network of a plurality of peer devices and identifying a local preference for an area service available to the plurality of peer devices. Additionally, the local preference may be used to negotiate a common preference for the area service with the plurality of peer devices. In one example, the common preference is a best fit value for the plurality of peer devices on the overlay network. | 02-04-2016 |
20160036925 | PEER NEGOTIATION OF AREA SERVICE PREFERENCES - Methods and systems may provide for joining an overlay network of a plurality of peer devices and identifying a local preference for an area service available to the plurality of peer devices. Additionally, the local preference may be used to negotiate a common preference for the area service with the plurality of peer devices. In one example, the common preference is a best fit value for the plurality of peer devices on the overlay network. | 02-04-2016 |
Aaron J. Quirk, Cary, NC US
Patent application number | Description | Published |
---|---|---|
20120233609 | OPTIMIZING VIRTUAL MACHINE SYNCHRONIZATION FOR APPLICATION SOFTWARE - Real-time application metrics of an application executed by a virtual machine are dynamically monitored by a controlling agent and analyzed to determine an optimal configuration of the virtual machine for executing the application. Based on the measured metrics, tunable parameters of the virtual machine may be adjusted to achieve desired application performance. | 09-13-2012 |
20130191528 | AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment. | 07-25-2013 |
20130191826 | AUTOMATICALLY SELECTING OPTIMAL TRANSPORT PROTOCOL IN A CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an optimal transport protocol in a cloud computing environment. An application creates a socket to communicate with a destination Virtual Machine (VM). The application requests a daemon agent to query a virtual machine manager to determine if the destination VM is on the same hypervisor as the application. The daemon agent receives a VMCI address (“context ID”) and an indication of the hypervisor associated with the destination VM from the virtual machine manager. The daemon agent enables the transport layer to route traffic over the VMCI protocol to the destination VM using its context ID in response to the destination VM being on the same hypervisor as the application. In this manner, the application is able to route traffic using an optimal transport protocol, including VMCI, depending on peer hypervisor association without requiring any code modifications to the application. | 07-25-2013 |
20130227132 | AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment. | 08-29-2013 |
20130247041 | AUTOMATICALLY SELECTING OPTIMAL TRANSPORT PROTOCOL IN A CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an optimal transport protocol in a cloud computing environment. An application creates a socket to communicate with a destination Virtual Machine (VM). The application requests a daemon agent to query a virtual machine manager to determine if the destination VM is on the same hypervisor as the application. The daemon agent receives a VMCI address (“context ID”) and an indication of the hypervisor associated with the destination VM from the virtual machine manager. The daemon agent enables the transport layer to route traffic over the VMCI protocol to the destination VM using its context ID in response to the destination VM being on the same hypervisor as the application. In this manner, the application is able to route traffic using an optimal transport protocol, including VMCI, depending on peer hypervisor association without requiring any code modifications to the application. | 09-19-2013 |
20140052945 | OPTIMIZING STORAGE SYSTEM BEHAVIOR IN VIRTUALIZED CLOUD COMPUTING ENVIRONMENTS BY TAGGING INPUT/OUTPUT OPERATION DATA TO INDICATE STORAGE POLICY - A method, system and computer program product for optimizing storage system behavior in a cloud computing environment. An Input/Output (I/O) operation data is appended with a tag, where the tag indicates a class of data for the I/O operation data. Upon the storage controller reviewing the tag appended to the I/O operation data, the storage controller performs a table look-up for the storage policy associated with the determined class of data. The storage controller applies a map to determine a storage location for the I/O operation data in a drive device, where the map represents a logical volume which indicates a range of block data that is to be excluded for being stored on the drive device and a range of block data that is to be considered for being stored on the drive device. In this manner, granularity of storage policies is provided in a cloud computing environment. | 02-20-2014 |
20140053151 | REDUCING USAGE OF RESOURCE UTILIZED BY A VIRTUAL MACHINE WHOSE RESOURCE UTILIZATION IS ADVERSELY AFFECTING NEIGHBORING VIRTUAL MACHINES - A method, system and computer program product for managing resource utilization of virtual machines in a cloud computing environment. A cloud controller computes an index of the utilization of a resource by a virtual machine to determine its adverse impact on its neighboring virtual machine(s) that share the same resource. If the interference index is greater than a threshold, then the utilization of the resource by that virtual machine will be throttled or reduced provided that the servicing of its workload is not weighted at too high of a priority and that one or more of its neighboring virtual machines are not able to meet their service-level agreement requirements. In this manner, the adversely affected neighboring virtual machines may have its performance restored in meeting their service-level agreement requirements without having to add additional resources and/or be migrated to other areas of the cloud computing environment. | 02-20-2014 |
20140059541 | OPTIMIZING DEPLOYMENT OF VIRTUAL MACHINES BY PRE-GENERATING A VIRTUAL MACHINE'S FIRST-BOOT METADATA BY CLOUD CONTROLLER - A method, system and computer program product for optimizing virtual machine deployment. A cloud controller pre-generates and stores a virtual machine's first-boot metadata (e.g., a RSA key) prior to the deployment of the virtual machine so that the virtual machine does not need to generate such metadata at deployment time thereby reducing the deployment time of the virtual machine. Instead, after the deployment and activation of the virtual machine, an activation agent running on the virtual machine requests the pre-generated first-boot metadata from the cloud controller. The cloud controller retrieves the requested pre-generated first-boot metadata to be transmitted to the requesting virtual machine and implements public-key cryptography so that the requesting virtual machine can verify the authenticity of the transmitted first-boot metadata. By reducing the deployment time for the virtual machine, cloud resources can be used for other activities. | 02-27-2014 |
20140059542 | OPTIMIZING VIRTUAL MACHINE DEPLOYMENT TIME BY TEMPORARILY ALLOCATING MORE PROCESSING RESOURCES DURING THE INITIAL DEPLOYMENT TIME OF THE VIRTUAL MACHINE - A method, system and computer program product for optimizing virtual machine deployment time. A cloud controller receives a request from a user to configure a virtual machine with a designated CPU capacity. If the designated CPU capacity is less than or equal to a threshold, then the cloud controller determines if there are additional cloud resources available to be allocated to deploy the virtual machine. If so, then the cloud controller allocates additional CPU capacity to the designated CPU capacity to be used to provision the virtual machine thereby enabling a multithreaded startup to initialize the operating system and middleware tiers so as to reduce the deployment time of the virtual machine. The additional resources would only be available during the initial deployment time of the virtual machine and removed before the user is granted access to the system when it comes online. | 02-27-2014 |
20140101658 | OPTIMIZING VIRTUAL MACHINE SYNCHRONIZATION FOR APPLICATION SOFTWARE - Real-time application metrics of an application executed by a virtual machine are dynamically monitored by a controlling agent and analyzed to determine an optimal configuration of the virtual machine for executing the application. Based on the measured metrics, tunable parameters of the virtual machine may be adjusted to achieve desired application performance. | 04-10-2014 |
20140142923 | TEXT PREDICTION USING ENVIRONMENT HINTS - Provided are techniques for text prediction using environment hints. A list of words is received, wherein each word in the list of words has an associated weight. For at least one word in the list of words, an environment weight is obtained from an environment dictionary. The associated weight of the at least one word is updated using the obtained environment weight. The words in the list of words are ordered based on the updated, associated weight of each of the words. | 05-22-2014 |
20140142926 | TEXT PREDICTION USING ENVIRONMENT HINTS - Provided are techniques for text prediction using environment hints. A list of words is received, wherein each word in the list of words has an associated weight. For at least one word in the list of words, an environment weight is obtained from an environment dictionary. The associated weight of the at least one word is updated using the obtained environment weight. The words in the list of words are ordered based on the updated, associated weight of each of the words. | 05-22-2014 |
20140149421 | DYNAMICALLY QUANTIFYING THE DEMAND OF EACH SOFTWARE COMPONENT OF EACH SOFTWARE STACK DEPLOYED IN THE CLOUD ENVIRONMENT - A method, system and computer program product for dynamically quantifying a demand for the software components deployed in a cloud environment. An administrative server generates a table mapping the software levels of the software components of the deployed software stacks with the number of instances of the deployed software stacks tracked over a period of time. The depth weight based on subtracting a depth index (zero-based) from a depth size is calculated for each software component, where a depth index refers to the software level of the software component in question and a depth size refers to the number of software levels for the software stack bearing the software component in question. A metric used in quantifying the demand for the software component (“popularity index”) is then determined for each software component based on the number of deployed instances and the depth weight for that software component. | 05-29-2014 |
20140258487 | MINIMIZING WORKLOAD MIGRATIONS DURING CLOUD MAINTENANCE OPERATIONS - A method, system and computer program product for minimizing workload migrations during cloud maintenance operations. Upon receiving an indication that a scheduled maintenance operation is to be performed, a cloud controller uploads the maintenance binaries associated with the scheduled maintenance operation and analyzes the maintenance binaries so as to evaluate the requirements of the maintenance packages and dependencies associated with the scheduled maintenance operation. A matrix is then generated by the cloud controller to identify the classes of hardware that will be disrupted by the scheduled maintenance operation based on the analysis. The workloads running on the classes of hardware identified in the matrix will then be consolidated prior to the scheduled maintenance operation. By consolidating the workloads onto a fewer number of hardware components, a fewer number of workload migrations will need to be performed during the cloud maintenance operation. | 09-11-2014 |
20140258539 | MINIMIZING WORKLOAD MIGRATIONS DURING CLOUD MAINTENANCE OPERATIONS - A method, system and computer program product for minimizing workload migrations during cloud maintenance operations. Upon receiving an indication that a scheduled maintenance operation is to be performed, a cloud controller uploads the maintenance binaries associated with the scheduled maintenance operation and analyzes the maintenance binaries so as to evaluate the requirements of the maintenance packages and dependencies associated with the scheduled maintenance operation. A matrix is then generated by the cloud controller to identify the classes of hardware that will be disrupted by the scheduled maintenance operation based on the analysis. The workloads running on the classes of hardware identified in the matrix will then be consolidated prior to the scheduled maintenance operation. By consolidating the workloads onto a fewer number of hardware components, a fewer number of workload migrations will need to be performed during the cloud maintenance operation. | 09-11-2014 |
20140341446 | UTILIZING A TOUCH SCREEN AS A BIOMETRIC DEVICE - A method, system or computer usable program product for authenticating a fingerprint by aggregating samples on a digital touch screen including capturing multiple data samples of a finger swipe across the touch screen, wherein the touch screen is used both for fingerprint recognition and manipulation of a user interface; utilizing a processor to aggregate the multiple data samples to form a combined sample fingerprint of the finger; and responsive to detecting the combined sample fingerprint matching a predetermined allowed fingerprint, providing a signal indicating the fingerprint is authentic. | 11-20-2014 |
20150016000 | PREVENTING MOISTURE DAMAGE TO A DEVICE - A device including a system for preventing moisture damage to the device includes a processor and a module operable on the processor for monitoring for a predetermined capacitance criterion on a surface of the device. The device is automatically powered off in response to detecting the predetermined capacitance criterion. | 01-15-2015 |
20150016001 | PREVENTING MOISTURE DAMAGE TO A DEVICE - A method, device and computer program product for preventing moisture damage to electronic circuitry of a device may include monitoring for a predetermined capacitance criterion on a surface of the device; and automatically powering off the device in response to detecting the predetermined capacitance criterion. | 01-15-2015 |
20150128017 | ENABLING INTERACTIVE SCREENSHOTS WITHIN COLLABORATIVE APPLICATIONS - A resource link within a selected portion of an interface can be identified. The link can include a visible interface element and a non-visible reference to a resource. The reference can be a Uniform Resource Identifier. The identity of an application associated with the interface can be established. The identity can be an application or process identifier. The position/dimensions of the element within the selected portion can be determined. A screenshot image of the current state of the selected portion can be captured. The state can include a visual representation of the element. The position/dimensions of the element can be encoded within an image map. The encoding can map a bounded region surrounding the representation of the element within the screenshot corresponding to the element position/dimension of the link within the interface. The region can be associated with the identity of the application and the reference. | 05-07-2015 |
20150154044 | OPTIMIZING VIRTUAL MACHINE SYNCHRONIZATION FOR APPLICATION SOFTWARE - Real-time application metrics of an application executed by a virtual machine are dynamically monitored by a controlling agent and analyzed to determine an optimal configuration of the virtual machine for executing the application. Based on the measured metrics, tunable parameters of the virtual machine may be adjusted to achieve desired application performance. | 06-04-2015 |
20150248152 | BATTERY WITH INTEGRATED POWER TIMER - Controlling power output is provided. A processing circuit that is incorporated with a battery receives a schedule that identifies at least one interval value, wherein the battery has a form factor that complies with a form factor standard. The processing circuit determines a first power state based, at least in part, on a first interval value of the at least one interval value. The processing circuit determines, based, at least in part, on the first power state, whether to interrupt a power output of the battery and, if so, the processing circuit interrupts the power output of the battery. | 09-03-2015 |
20150261557 | RETURNING TERMINATED VIRTUAL MACHINES TO A POOL OF AVAILABLE VIRTUAL MACHINES TO BE REUSED THEREBY OPTIMIZING CLOUD RESOURCE USAGE AND WORKLOAD DEPLOYMENT TIME - A method, system and computer program product for optimizing cloud resources in utilizing a pool of virtual machines to service user workloads. A writeable partition is created to store middleware and user activity associated with a virtual machine obtained from a pool of available virtual machines to be deployed. In response to the obtained virtual machine being terminated, the contents of the created writeable partition are erased so that the data generated by the middleware and user activity will not be available for subsequent users. The virtual machine is later returned to the pool of available virtual machines after resetting its password and network address to a default state. In this manner, fewer cloud resources are used since resource intensive activities that were required in provisioning a new virtual machine can be eliminated since previously terminated virtual machines can be utilized in the pool of available virtual machines. | 09-17-2015 |
20150261561 | RETURNING TERMINATED VIRTUAL MACHINES TO A POOL OF AVAILABLE VIRTUAL MACHINES TO BE REUSED THEREBY OPTIMIZING CLOUD RESOURCE USAGE AND WORKLOAD DEPLOYMENT TIME - A method, system and computer program product for optimizing cloud resources in utilizing a pool of virtual machines to service user workloads. A writeable partition is created to store middleware and user activity associated with a virtual machine obtained from a pool of available virtual machines to be deployed. In response to the obtained virtual machine being terminated, the contents of the created writeable partition are erased so that the data generated by the middleware and user activity will not be available for subsequent users. The virtual machine is later returned to the pool of available virtual machines after resetting its password and network address to a default state. In this manner, fewer cloud resources are used since resource intensive activities that were required in provisioning a new virtual machine can be eliminated since previously terminated virtual machines can be utilized in the pool of available virtual machines. | 09-17-2015 |
20150277996 | NOTIFICATION OF AN IDLE COMPUTING SYSTEM - A computer-implemented method for system notification of a computing system, is provided. The computer implemented method comprises, detecting, via a sensor, if a user of a computing system is in proximate distance to the computing system is provided. The computer-implemented method further comprises, calculating the user's estimated return time to the computing system, wherein the user's estimated return time to the computing system is based on calendaring information, or system usage pattern of the user of the computing system. The computer-implemented method further comprises intercepting an existing notification of the computing system, wherein the existing notification is intercepted when the user moves away from the computing system. The computer-implemented method further comprises intensifying a new, non-existing notification of the computing system, based on the calculated user's estimated return time, and the detected proximate distance. | 10-01-2015 |
20150304173 | MANAGING ISOLATION REQUIREMENTS OF A MULTI-NODE WORKLOAD APPLICATION - In an approach to manage isolation requirements of a multi-node workload application, a computer determines one or more first isolation levels for each of a plurality of workload nodes. The computer receives performance data for the plurality of workload nodes and analyzes the performance data for statistical trends in the performance data. The computer identifies an adverse trend in the statistical trends of the performance data and identifies a root cause of the adverse trend in the performance data. The computer then identifies one or more second isolation levels required to meet performance targets, the second isolation levels including an adjustment to the first isolation levels for the plurality of workload nodes. | 10-22-2015 |
20150304232 | MANAGING ISOLATION REQUIREMENTS OF A MULTI-NODE WORKLOAD APPLICATION - In an approach to manage isolation requirements of a multi-node workload application, a computer determines one or more first isolation levels for each of a plurality of workload nodes. The computer receives performance data for the plurality of workload nodes and analyzes the performance data for statistical trends in the performance data. The computer identifies an adverse trend in the statistical trends of the performance data and identifies a root cause of the adverse trend in the performance data. The computer then identifies one or more second isolation levels required to meet performance targets, the second isolation levels including an adjustment to the first isolation levels for the plurality of workload nodes. | 10-22-2015 |
20150358265 | PREVENTING MESSAGES FROM BEING SENT USING INAPPROPRIATE COMMUNICATION ACCOUNTS - A method, system and computer program product for preventing messages from being sent using inappropriate communication accounts. A message created by a user of a mobile device is analyzed to identify the topic and sentiment. The appropriateness of the message being sent to the intended recipient(s) using a selected communication account (e.g., company social media account) is determined based on one or more factors, including the analysis of the message to identify the topic and sentiment. A score is generated as to the appropriateness of sending the message to the intended recipient(s) based on such an analysis. If the score is less than a threshold value, then the message is deemed to not be appropriate to be sent to the intended recipients using the selected communication account. In this manner, potentially erroneous communications, such as accidentally posting a message to a wrong social media account, may be prevented. | 12-10-2015 |
20150358266 | PREVENTING MESSAGES FROM BEING SENT USING INAPPROPRIATE COMMUNICATION ACCOUNTS - A method, system and computer program product for preventing messages from being sent using inappropriate communication accounts. A message created by a user of a mobile device is analyzed to identify the topic and sentiment. The appropriateness of the message being sent to the intended recipient(s) using a selected communication account (e.g., company social media account) is determined based on one or more factors, including the analysis of the message to identify the topic and sentiment. A score is generated as to the appropriateness of sending the message to the intended recipient(s) based on such an analysis. If the score is less than a threshold value, then the message is deemed to not be appropriate to be sent to the intended recipients using the selected communication account. In this manner, potentially erroneous communications, such as accidentally posting a message to a wrong social media account, may be prevented. | 12-10-2015 |
20150370588 | SELECTING OPTIMAL HYPERVISOR PLATFORMS THAT SATISFY APPLICATION WORKLOAD REQUIREMENTS - A method, system and computer program product for selecting hypervisor platforms that are best suited to process application workloads. Attribute requirements for an application workload, such as high CPU capacity, high power and low cost, are received. A ranking algorithm is then applied to a list of pools of compute nodes to identify an ordered list of pools of compute nodes that are best suited for satisfying the attribute requirements of the application workload by comparing hypervisor characteristics of the pools of compute nodes with the attribute requirements of the application workload. Each pool of compute nodes runs on a particular hypervisor platform which has a unique combination of characteristics that correspond to a combination of a set of attribute requirements (e.g., medium CPU/memory/disk capacity; high CPU and memory performance). In this manner, the hypervisor platforms that are best suited for satisfying the application workload requirements are identified. | 12-24-2015 |
20150370594 | OPTIMIZING RUNTIME PERFORMANCE OF AN APPLICATION WORKLOAD BY MINIMIZING NETWORK INPUT/OUTPUT COMMUNICATIONS BETWEEN VIRTUAL MACHINES ON DIFFERENT CLOUDS IN A HYBRID CLOUD TOPOLOGY DURING CLOUD BURSTING - A method, system and computer program product for optimizing runtime performance of an application workload. Network input/output (I/O) operations between virtual machines of a pattern of virtual machines servicing the application workload in a private cloud are measured over a period of time and depicted in a histogram. A score is generated for each virtual machine or group of virtual machines in the pattern of virtual machines based on which range in the ranges of I/O operations per seconds (IOPS) depicted in the histogram has the largest sample size and the number of virtual machines in the same pattern that are allowed to be in the public cloud. In this manner, the runtime performance of the application workload is improved by minimizing the network input/output communications between the two cloud environments by migrating those virtual machine(s) or group(s) of virtual machines with a score that exceeds a threshold value. | 12-24-2015 |
20150370601 | OPTIMIZING RUNTIME PERFORMANCE OF AN APPLICATION WORKLOAD BY MINIMIZING NETWORK INPUT/OUTPUT COMMUNICATIONS BETWEEN VIRTUAL MACHINES ON DIFFERENT CLOUDS IN A HYBRID CLOUD TOPOLOGY DURING CLOUD BURSTING - A method, system and computer program product for optimizing runtime performance of an application workload. Network input/output (I/O) operations between virtual machines of a pattern of virtual machines servicing the application workload in a private cloud are measured over a period of time and depicted in a histogram. A score is generated for each virtual machine or group of virtual machines in the pattern of virtual machines based on which range in the ranges of I/O operations per seconds (IOPS) depicted in the histogram has the largest sample size and the number of virtual machines in the same pattern that are allowed to be in the public cloud. In this manner, the runtime performance of the application workload is improved by minimizing the network input/output communications between the two cloud environments by migrating those virtual machine(s) or group(s) of virtual machines with a score that exceeds a threshold value. | 12-24-2015 |
20150373030 | Mobile Device Storage Volume Encryption with Geography Correlated Key Management and Mount Operations - A method, system and computer-usable medium are disclosed for protecting data stored on a mobile device, based upon its location. Data stored on a mobile device is encrypted with a network-stored secret key that is unknown to the user of the mobile device. The secret key is provided directly to the mobile device once the user is authenticated and it has been determined that the mobile device is located within a predetermined geographical area. The provided secret key is then used to decrypt the encrypted data stored on the mobile device such that it can then be accessed by the user. The user is then prevented from accessing the encrypted data when it is determined that the mobile device is no longer located within the predetermined geographical area. | 12-24-2015 |
20150373093 | SELECTING OPTIMAL HYPERVISOR PLATFORMS THAT SATISFY APPLICATION WORKLOAD REQUIREMENTS - A method, system and computer program product for selecting hypervisor platforms that are best suited to process application workloads. Attribute requirements for an application workload, such as high CPU capacity, high power and low cost, are received. A ranking algorithm is then applied to a list of pools of compute nodes to identify an ordered list of pools of compute nodes that are best suited for satisfying the attribute requirements of the application workload by comparing hypervisor characteristics of the pools of compute nodes with the attribute requirements of the application workload. Each pool of compute nodes runs on a particular hypervisor platform which has a unique combination of characteristics that correspond to a combination of a set of attribute requirements (e.g., medium CPU/memory/disk capacity; high CPU and memory performance). In this manner, the hypervisor platforms that are best suited for satisfying the application workload requirements are identified. | 12-24-2015 |
20160004577 | TECHNOLOGY FOR STALL DETECTION - Detecting stalling of a software process in a computer system includes receiving identification of a task thread group executing in a work process executing on a computer system. The task thread group includes one or more threads and the receiving includes receiving identification of the one or more threads by a control process executing on a computer system. The detecting includes detecting whether there is a thread state change for the task thread group, marking the task as running responsive to detecting a thread state change for the task thread group, marking the task as stalled responsive to detecting an absence of a thread state change for at least a predefined amount of time, and marking the work process as stalled responsive detecting an absence of a predetermined signal from the work process for at least a predefined amount of time. | 01-07-2016 |
20160055023 | SELECTING VIRTUAL MACHINES TO BE MIGRATED TO PUBLIC CLOUD DURING CLOUD BURSTING BASED ON RESOURCE USAGE AND SCALING POLICIES - A method, system and computer program product for selecting virtual machines to be migrated to a public cloud. The current resource usage for virtual machine instances running in the private cloud is determined. Furthermore, any scaling policies attached to the virtual machine instances running in the private cloud are obtained. Additional resource usages for any of the virtual machine instances with a scaling policy are computed for when these virtual machine instances are scaled out. A cost of running a virtual machine instance in the public cloud is then determined using its current resource usage as well as any additional resource usage if a scaling policy is attached to the virtual machine instance based on the cost for running virtual machine instances in a public cloud. If the cost is less than a threshold cost, then the virtual machine instance is selected to be migrated to the public cloud. | 02-25-2016 |
20160055038 | SELECTING VIRTUAL MACHINES TO BE MIGRATED TO PUBLIC CLOUD DURING CLOUD BURSTING BASED ON RESOURCE USAGE AND SCALING POLICIES - A method, system and computer program product for selecting virtual machines to be migrated to a public cloud. The current resource usage for virtual machine instances running in the private cloud is determined. Furthermore, any scaling policies attached to the virtual machine instances running in the private cloud are obtained. Additional resource usages for any of the virtual machine instances with a scaling policy are computed for when these virtual machine instances are scaled out. A cost of running a virtual machine instance in the public cloud is then determined using its current resource usage as well as any additional resource usage if a scaling policy is attached to the virtual machine instance based on the cost for running virtual machine instances in a public cloud. If the cost is less than a threshold cost, then the virtual machine instance is selected to be migrated to the public cloud. | 02-25-2016 |
20160070629 | MOBILE DEVICE AND CHASSIS WITH CONTACTLESS TAGS TO DIAGNOSE HARDWARE AND SOFTWARE FAULTS - Diagnosing faults in a hardware appliance. Information is read by a hand-held reader from one or more contactless tags associated with one or more components in a hardware appliance. One or more component faults and/or issues are identified based on the read information. A query is formed based on the identified one or more component faults and/or issues. A diagnostic database in the hand-held reader is queried, based on the formed query, and one or more query results are displayed in a ranked order on a display of the hand-held reader. In one aspect of the embodiments, the information read from the one or more contactless tags includes a pointer to a datastore in one of the one or more components. An ad hoc wireless network connection is established with the hardware appliance, and information in the datastore is downloaded over the connection. | 03-10-2016 |
20160072865 | ACTIVE OFFLINE STORAGE MANAGEMENT FOR STREAMING MEDIA APPLICATION USED BY MULTIPLE CLIENT DEVICES - A system, method and computer program product for storing streaming media content includes: receiving streaming content, at a first mobile computing device, from a content service provider over a communications network; and determining, by a secondary mobile computing device specific details of a use of the content currently being received and buffered at the first device. The second device obtains, using the determined specific details, the content expected to be consumed by the first device to a local memory storage device at the secondary device, and stores the expected content for subsequent consumption. The system and method provides for an awareness of data usage of an account instance on the secondary device; storing a set of data locally on a secondary device based on usage of a primary device; and enabling the downloading of a set of data to the secondary device via a local connection to the primary device. | 03-10-2016 |
20160104218 | AUTOMATICALLY GENERATING A REVIEW RATING THE PERFORMANCE OF A PATTERN BASED ON PATTERN DEPLOYMENT, SERVICE HISTORY AND OPERATION OF PATTERN - A method, system and computer program product for generating a review rating the performance of a pattern. The deployment of a pattern, the service history of the pattern and the operation of the pattern are monitored and information pertaining to the monitored pattern deployment, the monitored service history and the monitored pattern operation is collected, where a pattern is an abstract model of a topology and application environment that encapsulates installation, configuration and management of middleware and applications. The collected information is analyzed to automatically generate a review that contains a score and a comment rating the performance, such as the success or lack of success, in deploying, servicing and operating the pattern. In this manner, a review of a pattern, including a score and a suggested comment, may be automatically generated without requiring the user, such as a system administrator, to spend time writing the review. | 04-14-2016 |
20160105318 | REPRODUCING STATE OF SOURCE ENVIRONMENT WHEN IMAGE WAS SCREEN CAPTURED ON A DIFFERENT COMPUTING DEVICE USING RESOURCE LOCATION, RESOURCE NAVIGATION AND POSITIONAL METADATA EMBEDDED IN IMAGE - A method, system and computer program product for facilitating access to a resource represented in an image at a later time. A screen capture of an image displayed on a computing device is implemented. Metadata, including the resource location, resource navigation and positional metadata, regarding the source data of the screen capture image is generated. The generated metadata is then embedded into the screen capture image. The screen capture image with the embedded metadata is then transmitted to a different user. By embedding the metadata into the screen capture image, the user receiving the screen capture image will be able to reproduce the state of the source environment when the image was captured using the embedded metadata thereby opening the resource represented in the image. | 04-14-2016 |
20160105342 | INTELLIGENTLY MANAGING PATTERN CONTENTS ACROSS MULTIPLE RACKS BASED ON WORKLOAD AND HUMAN INTERACTION USAGE PATTERNS - A method, system and computer program product for managing pattern contents across multiple racks. The workload usage characteristics of the pattern contents on a primary rack in a domain of racks are collected based on monitoring the workload usage of the pattern contents in the pattern definition and in the deployed pattern. Furthermore, information regarding use of the pattern definition, the deployed pattern and the pattern contents by users (“human interaction usage patterns”) is collected based on monitoring the human interaction usage patterns. The pattern contents are then ranked based on analyzing the collected workload usage characteristics and analyzing the collected information regarding human interaction usage patterns. Once the pattern contents are ranked, those contents that are highly ranked are deemed to be more likely to be utilized in the pattern and therefore are the contents that are copied from the primary rack to the other racks of the domain. | 04-14-2016 |
20160105482 | REPRODUCING STATE OF SOURCE ENVIRONMENT WHEN IMAGE WAS SCREEN CAPTURED ON A DIFFERENT COMPUTING DEVICE USING RESOURCE LOCATION, RESOURCE NAVIGATION AND POSITIONAL METADATA EMBEDDED IN IMAGE - A method, system and computer program product for facilitating access to a resource represented in an image at a later time. A screen capture of an image displayed on a computing device is implemented. Metadata, including the resource location, resource navigation and positional metadata, regarding the source data of the screen capture image is generated. The generated metadata is then embedded into the screen capture image. The screen capture image with the embedded metadata is then transmitted to a different user. By embedding the metadata into the screen capture image, the user receiving the screen capture image will be able to reproduce the state of the source environment when the image was captured using the embedded metadata thereby opening the resource represented in the image. | 04-14-2016 |
20160105498 | INTELLIGENTLY MANAGING PATTERN CONTENTS ACROSS MULTIPLE RACKS BASED ON WORKLOAD AND HUMAN INTERACTION USAGE PATTERNS - A method, system and computer program product for managing pattern contents across multiple racks. The workload usage characteristics of the pattern contents on a primary rack in a domain of racks are collected based on monitoring the workload usage of the pattern contents in the pattern definition and in the deployed pattern. Furthermore, information regarding use of the pattern definition, the deployed pattern and the pattern contents by users (“human interaction usage patterns”) is collected based on monitoring the human interaction usage patterns. The pattern contents are then ranked based on analyzing the collected workload usage characteristics and analyzing the collected information regarding human interaction usage patterns. Once the pattern contents are ranked, those contents that are highly ranked are deemed to be more likely to be utilized in the pattern and therefore are the contents that are copied from the primary rack to the other racks of the domain. | 04-14-2016 |
Aaron James Quirk, Cary, NC US
Patent application number | Description | Published |
---|---|---|
20150347430 | TECHNIQUES FOR ENABLING COARSE-GRAINED VOLUME SNAPSHOTS FOR VIRTUAL MACHINE BACKUP AND RESTORE - A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium. | 12-03-2015 |
20150356286 | Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management - A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use. On a next interaction, the state machine transitions to full authentication requiring robust authentication to continue operating in a normal mode. | 12-10-2015 |
20150363413 | TECHNIQUES FOR ENABLING COARSE-GRAINED VOLUME SNAPSHOTS FOR VIRTUAL MACHINE BACKUP AND RESTORE - A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium. | 12-17-2015 |
20150365478 | CLOUD INFRASTRUCTURE BACKUP IN A SHARED STORAGE ENVIRONMENT - A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup. | 12-17-2015 |
Brian Quirk, Aurora, IL US
Patent application number | Description | Published |
---|---|---|
20140047731 | Dryer Conveyor Speed Control Apparatus and Method - In one embodiment, a conveyor speed control system for a dryer is provided. The system includes a dryer having a housing with an entrance and an exit, and a conveyor within the housing, the conveyor capable of moving at a desired speed. A sensor senses the temperature of the interior of the dryer housing. A controller is provided. The controller receives a signal from the temperature sensor. The controller also controls the speed of the conveyor, and limits the speed of the conveyor to a desired speed until a desired dryer housing temperature is attained. | 02-20-2014 |
Brian William Quirk, Aurora, IL US
Patent application number | Description | Published |
---|---|---|
20140107826 | Printing Machine Safety System - A screen printing safety system is provided. The system includes a screen printing machine, and a plurality of zones in the vicinity of the screen printing machine. Each of the zones includes at least one sensor for sensing encroachment past a predetermined point. The sensors are adapted to stop operation of the screen printing machine when encroachment is sensed in at least one of the plurality of zones. | 04-17-2014 |
Brien Quirk US
Patent application number | Description | Published |
---|---|---|
20130309355 | METHOD FOR PRODUCING PURPLE SWEET POTATO JUICE AND DRIED POWDER - A method for preparing a purple sweet potato concentrate that is free from starch, rich in anthocyanins, phenolic compounds, minerals, and soluble dietary fiber with low viscosity, attractive color, and with natural sweetness is presented. The method first prepares and liquefies the purple sweet potatoes and fixes the colorization by adjusting the pH value. Next, amylase and an enzyme complex of hemicellulase, pectinase, cellulose, glucoamylase and protease are added in sequence under conditions effective to produce the juice with the above mentioned properties. The juice is then centrifuged and membrane-filtered to produce a purified purple sweet potato juice which is vacuum-concentrated to yield a purple sweet potato concentrate. Purple sweet potato powder can be obtained by vacuum drying the sediment and concentrate mixture. | 11-21-2013 |
Brien Quirk, Eugene, OR US
Patent application number | Description | Published |
---|---|---|
20100119469 | GYNOSTEMMA EXTRACT SURFACTANT/CLEANING AGENT/EMULSIFIER/FOAMING AGENT AND METHOD OF PRODUCING SAME - extract compositions containing | 05-13-2010 |
20100144892 | METHOD OF PRODUCING ORGANIC CERTIFIED GLYCERIN - A process for the production of naturally and organically fermented glycerin includes cleaning and sanitizing of the fermentation equipment prior to fermentation without using any traditional synthetic organic hydrocarbon-based chemicals. The fermentation process uses a non-chemical nutrient and nitrogen source from natural proteins during the fermentation to reduce trace amounts of toxins or contaminants. A purification stage following the fermentation process increases the purity of the glycerin to a desired level. | 06-10-2010 |
Christopher Quirk, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140172407 | LANGUAGE PROCESSING RESOURCES FOR AUTOMATED MOBILE LANGUAGE TRANSLATION - Automated language translation often involves language translation resources of significant size (e.g., 50-gigabyte phrase tables) and significant computational power exceeding the capabilities of many mobile devices. Remotely accessible servers capable of near-realtime, automated translation may be inaccessible or prohibitively costly while traveling abroad. Presented herein are adaptations of language translation techniques for offline mobile devices involving reducing the size and raising the efficiency of the language modeling resources. A word index may be provided that stores respective string representations of the words of a language, and maps respective words to a location (e.g., address or offset) of respective word representations within the word index. Language translation resources (e.g., phrase tables) may then specify logical relationships using the word index addresses of the involved words, rather than the string equivalents. This technique significantly condenses the language resources and provides faster, bidirectional access to the word representations of the language. | 06-19-2014 |
Christopher B. Quirk, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090271177 | EXTRACTING TREELET TRANSLATION PAIRS - In one embodiment of the present invention, a decoder receives a dependency tree as a source language input and accesses a set of statistical models that produce outputs combined in a log linear framework. The decoder also accesses a table of treelet translation pairs and returns a target dependency tree based on the source dependency tree, based on access to the table of treelet translation pairs, and based on the application of the statistical models. | 10-29-2009 |
20090299729 | PARALLEL FRAGMENT EXTRACTION FROM NOISY PARALLEL CORPORA - Machine translation algorithms for translating between a first language and a second language are often trained using parallel fragments, comprising a first language corpus and a second language corpus comprising an element-for-element translation of the first language corpus. Such training may involve large training sets that may be extracted from large bodies of similar sources, such as databases of news articles written in the first and second languages describing similar events; however, extracted fragments may be comparatively “noisy,” with extra elements inserted in each corpus. Extraction techniques may be devised that can differentiate between “bilingual” elements represented in both corpora and “monolingual” elements represented in only one corpus, and for extracting cleaner parallel fragments of bilingual elements. Such techniques may involve conditional probability determinations on one corpus with respect to the other corpus, or joint probability determinations that concurrently evaluate both corpora for bilingual elements. | 12-03-2009 |
20090326911 | MACHINE TRANSLATION USING LANGUAGE ORDER TEMPLATES - Many machine translation scenarios involve the generation of a language translation rule set based on parallel training corpuses (e.g., sentences in a first language and word-for-word translations into a second language.) However, the translation of a source corpus in a source language to a target corpus in a target language involves at least two aspects: selecting elements of the target language to match the elements of the source corpus, and ordering the target elements according to the semantic organization of the source corpus and the grammatic rules of the target language. The breadth of generalization of the translation rules derived from the training may be improved, while retaining contextual information, by formulating language order templates that specify orderings of small sets of target elements according to target element types. These language order templates may be represented with varying degrees of association with the alignment rules derived from the training in order to improve the scope of target elements to which the ordering rules and alignment rules may be applied. | 12-31-2009 |
20110295897 | QUERY CORRECTION PROBABILITY BASED ON QUERY-CORRECTION PAIRS - Query-correction pairs can be extracted from search log data. Each query-correction pair can include an original query and a follow-up query, where the follow-up query meets one or more criteria for being identified as a correction of the original query, such as an indication of user input indicating the follow-up query is a correction for the original query. The query-correction pairs can be segmented to identify bi-phrases in the query-correction pairs. Probabilities of corrections between the bi-phrases can be estimated based on frequencies of matches in the query-correction pairs. Identifications of the bi-phrases and representations of the probabilities of those bi-phrases can be stored in a probabilistic model data structure. | 12-01-2011 |
20120179450 | MACHINE TRANSLATION SPLIT BETWEEN FRONT END AND BACK END PROCESSORS - A method of translation includes uploading a source text portion to a back end processor. The back end processor identifies a subset of translation knowledge associated with the source text portion. The back end processor downloads the subset to a front end processor. A translation engine runs on the front end processor. The translation engine generates a translation of the source text portion as a function of the subset. | 07-12-2012 |
20140156259 | Generating Stimuli for Use in Soliciting Grounded Linguistic Information - A processing system is described which generates stimulus information (SI) having one or more stimulus components (SCs) selected from an inventory of such components. The processing system then presents the SI to a group of human recipients, inviting those recipients to provide linguistic descriptions of the SI. The linguistic information that is received thereby has an implicit link to the SCs. Further, each linguistic component is associated with at least one feature of a target environment, such as a target computer system. Hence, the linguistic information also maps to the features of the target environment. These relationships allow applications to use the linguistic information to interact with the target environment in different ways. In one case, the processing system uses a challenge-response authentication task presentation to convey the stimulus information to the recipients. | 06-05-2014 |
20140236571 | Inducing and Applying a Subject-Targeted Context Free Grammar - A processing system is described which induces a context free grammar (CFG) based on a set of descriptions. The descriptions pertain to a particular subject. Thus, the CFG targets the particular subject, and is accordingly referred to as a subject-targeted context free grammar (ST-CFG). The processing system can use the ST-CFG to determine whether a new description is a proper description of the subject. The processing system also provides synthesizing functionality for building an ST-CFG based on one or more smaller component ST-CFGs. | 08-21-2014 |
Christopher Brian Quirk, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100023315 | RANDOM WALK RESTARTS IN MINIMUM ERROR RATE TRAINING - The claimed subject matter provides systems and/or methods that minimize error rate training for statistical machine translation. The systems can include devices that optimize a statistical machine translation model for translating between a first natural language and a second natural language by generating lists of n-best translation hypotheses and associated feature weights, optimizing the associated feature weights with respect to the lists of n-best translation hypotheses, and thereafter determining a translation quality measurement for the training sets from which the lists of n-best translation hypotheses were derived. | 01-28-2010 |
20100262575 | FASTER MINIMUM ERROR RATE TRAINING FOR WEIGHTED LINEAR MODELS - The claimed subject matter provides systems and/or methods for training feature weights in a statistical machine translation model. The system can include components that obtain lists of translation hypotheses and associated feature values, set a current point in the multidimensional feature weight space to an initial value, chooses a line in the feature weight space that passes through the current point, and resets the current point to optimize the feature weights with respect to the line. The system can further include components that set the current point to be a best point attained, reduce the list of translation hypotheses based on a determination that a particular hypothesis has never been touched in optimizing the feature weights from at least one of an initial staring point or a randomly selected restarting point, and output the point ascertained to be the best point in the feature weight space. | 10-14-2010 |
20100317444 | USING A HUMAN COMPUTATION GAME TO IMPROVE SEARCH ENGINE PERFORMANCE - Human computation games are provided wherein a player is shown a page, such as a web page. The player is then asked to provide one or more terms that are intended to cause a search engine to return the page in response to performing a query using the terms. The terms provided by the player during game play are then collected, stored, and utilized to improve the performance of the search engine. | 12-16-2010 |
20110301935 | LOCATING PARALLEL WORD SEQUENCES IN ELECTRONIC DOCUMENTS - Systems and methods for automatically extracting parallel word sequences from comparable corpora are described. Electronic documents, such as web pages belonging to a collaborative online encyclopedia, are analyzed to locate parallel word sequences between electronic documents written in different languages. These parallel word sequences are then used to train a machine translation system that can translate text from one language to another. | 12-08-2011 |
20120296627 | UNIVERSAL TEXT INPUT - The universal text input technique described herein addresses the difficulties of typing text in various languages and scripts, and offers a unified solution, which combines character conversion, next word prediction, spelling correction and automatic script switching to make it extremely simple to type any language from any device. The technique provides a rich and seamless input experience in any language through a universal IME (input method editor). It allows a user to type in any script for any language using a regular qwerty keyboard via phonetic input and at the same time allows for auto-completion and spelling correction of words and phrases while typing. The technique also provides a modeless input that automatically turns on and off an input mode that changes between different types of script. | 11-22-2012 |
20130103695 | MACHINE TRANSLATION DETECTION IN WEB-SCRAPED PARALLEL CORPORA - Various technologies described herein pertain to detecting machine translated content. Documents in a document pair are mutual lingual translations of each other. Further, document level features of the documents in the document pair can be identified. The document level features can correlate with translation quality between the documents in the document pair. Moreover, statistical classification can be used to detect whether the document pair is generated through machine translation based at least in part upon the document level features. Further, a first document can be a machine translation of a second document in the document pair or a disparate document when generated through machine translation. | 04-25-2013 |
20130124492 | Statistical Machine Translation Based Search Query Spelling Correction - Statistical Machine Translation (SMT) based search query spelling correction techniques are described herein. In one or more implementations, search data regarding searches performed by clients may be logged. The logged data includes query correction pairs that may be used to ascertain error patterns indicating how misspelled substrings may be translated to corrected substrings. The error patterns may be used to determine suggestions for an input query and to develop query correction models used to translate the input query to a corrected query. In one or more implementations, probabilistic features from multiple query correction models are combined to score different correction candidates. One or more top scoring correction candidates may then be exposed as suggestions for selection by a user and/or provided to a search engine to conduct a corresponding search using the corrected query version(s). | 05-16-2013 |
David Vincent Quirk, Easton, PA US
Patent application number | Description | Published |
---|---|---|
20120310420 | DYNAMIC HVAC AIRSIDE ECONOMIZER HIGH LIMIT START CONTROL - A device stores control settings for an air conditioning unit for a space that houses power-consuming equipment. The air conditioning unit includes an economizer configured to supply outside cooling air when the economizer is in an active state. The device receives an inside temperature value associated with the space, and receives a real-time or near-real-time operating load value for the power-consuming equipment. The device determines, based on the inside temperature value, the operating load value, and the control settings, an outside temperature threshold for starting the economizer. The device determines if an outside temperature reading associated with the space is below the outside temperature threshold, and activates the economizer when the outside air temperature reading is below the outside temperature threshold. | 12-06-2012 |
George Quirk, Lawrenceville, NJ US
Patent application number | Description | Published |
---|---|---|
20080221502 | Absorbent Tampon Providing Clean Digital Insertion - A tampon has a generally uniform fiber distribution along its length, an insertion end, a withdrawal end, and a longitudinal axis. A finger recess having a depth of at least about 5 mm is formed into the withdrawal end. Nonetheless, a column strength of at least about 10 Newtons (N) can still be achieved. The tampon can be formed by winding an absorbent fibrous web around a winding mandrel; transferring the blank into a press; inserting a forming mandrel into one end of a tampon blank while the tampon blank is positioned in the press; moving a plurality of press jaws toward a central longitudinal press axis to compress the tampon blank and to form a compressed tampon having a finger recess formed into the one end of the tampon; and ejecting the compressed tampon from the press. | 09-11-2008 |
Gregory Quirk, Maple Glen, PA US
Patent application number | Description | Published |
---|---|---|
20150347769 | PERMISSION REQUEST - To perform a restricted action, such as access a restricted content item, a subordinate user account can transmit a permission request to an authorizing user account. The permission request can request authorization from the authorizing user account to perform the restricted action. The permission request can be transmitted to one or more client devices of the authorizing user account, and enable to the authorizing user account to remotely select to approve or deny the permission request, thereby either granting or denying the subordinate user account from performing the restricted action. In addition to approving or denying a permission request, an authorizing user account can also be enabled to ignore a permission request, thereby allowing the authorizing user account to respond to the permission request at a later time. Further, in some embodiments, an authorizing user account can select to deny all further permission requests to perform the restricted action. | 12-03-2015 |
Gregory T. Quirk, Maple Glen, PA US
Patent application number | Description | Published |
---|---|---|
20130019233 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STOREAANM Pardehpoosh; Pedraum R.AACI Palo AltoAAST CAAACO USAAGP Pardehpoosh; Pedraum R. Palo Alto CA USAANM Federighi; Craig M.AACI Los Altos HillsAAST CAAACO USAAGP Federighi; Craig M. Los Altos Hills CA USAANM Feldman; Daniel I.AACI San FranciscoAAST CAAACO USAAGP Feldman; Daniel I. San Francisco CA USAANM Quirk; Gregory T.AACI Maple GlenAAST PAAACO USAAGP Quirk; Gregory T. Maple Glen PA USAANM Matthew; Jack R.AACI San FranciscoAAST CAAACO USAAGP Matthew; Jack R. San Francisco CA USAANM Lee-Kang; JackieAACI SunnyvaleAAST CAAACO USAAGP Lee-Kang; Jackie Sunnyvale CA USAANM Ciudad; Jean-PierreAACI San FranciscoAAST CAAACO USAAGP Ciudad; Jean-Pierre San Francisco CA USAANM Gromek; Monika E.AACI OaklandAAST CAAACO USAAGP Gromek; Monika E. Oakland CA USAANM Burkholder; Thomas K.AACI VancouverAACO CAAAGP Burkholder; Thomas K. Vancouver CAAANM Pu; Daniel EmilAACI San FranciscoAAST CAAACO USAAGP Pu; Daniel Emil San Francisco CA USAANM Gharabally; SamAACI San FranciscoAAST CAAACO USAAGP Gharabally; Sam San Francisco CA USAANM Verosub; Ellis MarshallAACI San CarlosAAST CAAACO USAAGP Verosub; Ellis Marshall San Carlos CA USAANM Hwang; Yoon SubAACI AlamedaAAST CAAACO USAAGP Hwang; Yoon Sub Alameda CA US - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives a request to download the application to a computing device, determines that the application is a pre-installed application, presents an authorization prompt configured to request user authorization to link the application with a user account, receives the user authorization, generates a unique hardware identifier associated with the computing device, determines that the application is linkable based upon the unique hardware identifier, and links the adoptable application with the user account when the adoptable application is linkable. | 01-17-2013 |
20130019234 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STORE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives a request to download the application to a computing device, determines that the application is a pre-installed application, presents an authorization prompt configured to request user authorization to link the application with a user account, receives the user authorization, generates a unique hardware identifier associated with the computing device, determines that the application is linkable based upon the unique hardware identifier, and links the adoptable application with the user account when the adoptable application is linkable. | 01-17-2013 |
20130019237 | SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STORE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application for installation on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives from a client device a software adoption request including an identifier associated with a user account and a proof of entitlement associated with a software package or the user account, verifies the proof of entitlement by comparing the proof of entitlement to a database, and if the proof of entitlement is verified, adopts the software package as part of the user account. | 01-17-2013 |
20140214515 | PROMOTIONAL CODE REDEMPTION FOR IN-APPLICATION FEATURES USED WITH APPLICATION PROGRAMS - Improved techniques and systems for redemption of a promotional code for acquisition of a digital product, such as an in-application asset, for use in a corresponding application program are disclosed. The in-application asset can, for example, pertain to a consumable asset or a non-consumable asset. The techniques and systems can operate to validate the promotional code that is being redeemed to acquire the in-application asset, and can confirm that a requestor's redemption device has the corresponding application program installed thereon. Compatibility of the corresponding application program with the in-application asset can be confirmed. Updates to the corresponding application program can also be provided. | 07-31-2014 |
20150348032 | REAL TIME APPROVAL OF DIGITAL STORE PURCHASES FOR A SHARED CONTENT STORAGE ACCOUNT - A computing device provides methods and workflow for setting up a shared family account on a content storage system, including the creation of accounts for child family members. A computing device supports the creation of a family account using an account on the content storage system associated with an adult family member acting as a family organizer. The family organizer can designate a specific account as a purchase account for allowing other family member to purchase content from content servers associated with the content storage system. The family organizer can invite other adult family members to join the shared family account. The family organizer can create new accounts on the content storage system for child family members, and can designate access and purchase restrictions for such child family members. Family members have access to shared storage content, as well as services such as family calendar, group messaging, and device location. | 12-03-2015 |
J. Gerald Quirk, Saint James, NY US
Patent application number | Description | Published |
---|---|---|
20140378855 | APPARATUS AND METHOD FOR FEATURE EXTRACTION AND CLASSIFICATION OF FETAL HEART RATE - Provided are an apparatus and method for receiving a fetal heart rate (FHR) signal at each interval during a monitoring period, receiving a uterine pressure (UP) signal at each of the intervals to obtain a plurality of FHR-UP signal pairs, and extracting a feature value for each FHR-UP signal pair, with the feature value being extracted from a predefined alphabet of feature values. | 12-25-2014 |
John Quirk, Portland, OR US
Patent application number | Description | Published |
---|---|---|
20120140784 | SPECKLE REDUCTION FOR LASER PROJECTION DISPLAYS - Various embodiments of the present invention relate to a laser driver, and more particularly, to systems, devices and methods of applying low current pulses to a laser modulation current to reduce the speckling noise on the projected images. | 06-07-2012 |
Kevin Quirk, Stanhope, NJ US
Patent application number | Description | Published |
---|---|---|
20120280537 | WINDOW ASSEMBLY FOR AN AUTOMOBILE HOOD - A window for an automobile hood, made of a transparent material, such as a polycarbonate sheet, sized and shaped to be a loose fit to an automobile hood cut-out. The window element may be held in place on the automobile by ring shaped, metallic trim elements. The trim elements may have outer edges that are an enlarged copy of the periphery the cut-out in the hood of the automobile and inner edges that are a reduced copy of the periphery the window element. In this way, the window element may be held in the cutout in the automobile hood, sandwiched between the upper and lower trim elements. By applying a suitable adhesive between the trim elements and the automobile hood, the trim and window elements may be fixed in place. | 11-08-2012 |
Matthew Quirk, Bloomfield, NJ US
Patent application number | Description | Published |
---|---|---|
20160092972 | Operation Management - Described herein are systems, methods, and apparatus for managing operations, for instance making orders and fulfilling orders, using one or more computing devices. In accordance with an example embodiment, an operations management system can include a self-order system, a self-payment system, and an order-fulfillment system. The self-order system, the self-payment system, and the order-fulfillment system can communicate with each other via a communication system that connects the systems, such as a wireless network for example. Using the operation management system, orders can be placed and fulfilled efficiently and with minimal personal interaction. | 03-31-2016 |
20160093003 | OPERATION MANAGEMENT - Described herein are systems, methods, and apparatus for managing operations, for instance making orders and fulfilling orders, using one or more computing devices. In accordance with an example embodiment, an operations management system can include a self-order system, a self-payment system, and an order-fulfillment system. The self-order system, the self-payment system, and the order-fulfillment system can communicate with each other via a communication system that connects the systems, such as a wireless network for example. Using the operation management system, orders can be placed and fulfilled efficiently and with minimal personal interaction. | 03-31-2016 |
Matthew J. Quirk, Emeryville, CA US
Patent application number | Description | Published |
---|---|---|
20100109601 | PORTABLE SOLAR ELECTRICAL GENERATOR AND WATER FILTRATION AND DESALINATION SYSTEM - A portable solar power collection and storage system integrated into a body affixed to a towable trailer vehicle, which in a preferred configuration may require no complicated setup steps or even no setup steps at all, and may be not wind vulnerable due to integrated body construction with substantially contained rather than extended solar panel(s). The system may further include water pumping and treatment equipment. | 05-06-2010 |
Morgan Quirk, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20150099249 | EDUCATIONAL GAMING PLATFORM - Described are systems and methods for providing an educational gaming platform. The educational gaming platform can include games and puzzles that users can solve. The educational gaming platform can also include an editor that permits users to modify the games and puzzles as well as create new games and puzzles. | 04-09-2015 |
Patrick J. Quirk, Huntsville, AL US
Patent application number | Description | Published |
---|---|---|
20090073734 | Programmable feedback voltage pulse sampling for switched power supplies - Disclosed is a method and apparatus that includes a power supply having a primary coil and a secondary coil. The secondary coil generates an output voltage and a feedback voltage related to the output voltage. The feedback voltage is sampled at a time instant that is digitally controllable. The output voltage is determined from the feedback voltage. | 03-19-2009 |
20100218003 | TRANSFORMERLESS POWER OVER ETHERNET SYSTEM - In one embodiment, a powered device (PD) ( | 08-26-2010 |
Robert J. Quirk, Peoria, AZ US
Patent application number | Description | Published |
---|---|---|
20100182233 | SYSTEMS AND METHODS FOR DETECTING CURSOR INTERFERENCE IN VISUAL DISPLAYS - A system for detecting cursor interference includes a graphics engine configured to generate graphics information; a first evaluation unit coupled to the graphics engine and configured to evaluate the graphics information; a cursor generation unit coupled to the graphics engine and configured to generate cursor information, the cursor generator further configured to merge the cursor information and the graphics information into merged information; a second evaluation unit coupled to the cursor generation unit and configured to evaluate the merged information; and a display device coupled to the cursor generation unit and configured to display the merged information based on the evaluations of the graphics information and the merged information. | 07-22-2010 |
20100205414 | HIGH INTEGRITY PROCESSOR MONITOR - A method of ensuring high integrity of a processor is provided. The method includes executing sets of sequential instructions, each execution being based on a unique initial value, generating a computed final value responsive to each execution of a set of sequential instructions, and sending computed values to a monitoring portion of a high integrity processor monitor system responsive to the generating for each execution of the set of sequential instructions. The execution of the sets of sequential instructions tests pertinent addressing modes, operand sizes, and instruction side-effects for each instruction tested in a monitored central processing unit. | 08-12-2010 |
20130207981 | APPARATUS AND METHODS FOR CURSOR ANIMATION - Methods and systems are provided for animating a cursor image. In an exemplary embodiment, image data for the cursor image maintained by a first memory is provided for display on a display device, and that image data is written to a second memory while being provided from the first memory for display. Prior to writing new image data for a portion of the cursor image to the first memory, the image data maintained by the second memory is provided for display on the display device and the new image data is written to the first memory while the image data maintained by the second memory is being provided to the display. | 08-15-2013 |
Roderic P. Quirk, Akron, OH US
Patent application number | Description | Published |
---|---|---|
20130144083 | PROCESS AND METHOD FOR THE EFFICIENT PREPARATION OF FULLERYNES - The preparation of novel fullerynes which are fullerenes (e.g. C | 06-06-2013 |
20150175854 | HYDROGENATED ALKENYL AROMATIC-DIENE COPOLYMERS CONTAINING COMONOMERS HAVING SILYL HYDRIDE UNITS AND THEIR FUNCTIONALIZED ANALOGS - The present invention relates primarily to polymers comprising at least one alkenyl aromatic monomer, at least one conjugated diene monomer, and at least one monomer containing silyl hydride moieties, characterized in that said polymers are hydrogenated and preferably functionalized by hydrosilylation reactions between the silyl hydride groups on the polymer chain and the multiple bonds of any alkene or alkyne compound. Besides the described products, this invention comprises their synthesis processes and their uses, especially as thermofusible adhesives, in plastics impact modification, and in chain-extension reactions to obtain new materials, among others. | 06-25-2015 |
Staci L. Quirk, Oxford, NJ US
Patent application number | Description | Published |
---|---|---|
20150286938 | SELECTING A WINDOW TREATMENT FABRIC - A fabric selection tool provides an automated procedure for recommending and/or selecting a fabric for a window treatment to be installed in a building. The recommendation may be made to optimize the performance of the window treatment in which the fabric may be installed. The recommended fabric may be selected based on performance metrics associated with each fabric in an environment. The fabrics may be ranked based upon the performance metrics of one or more of the fabrics. One or more of the fabrics, and/or their corresponding ranks, may be displayed to a user for selection. The recommended fabrics may be determined based on combinations of fabrics that provide performance metrics for various façades of the building. Using the ranking system provided by the fabric selection tool, the user may obtain a fabric sample and/or order one or more of the recommended fabrics. | 10-08-2015 |
20150286939 | SELECTING A WINDOW TREATMENT FABRIC - A fabric selection tool provides an automated procedure for recommending and/or selecting a fabric for a window treatment to be installed in a building. The recommendation may be made to optimize the performance of the window treatment in which the fabric may be installed. The recommended fabric may be selected based on performance metrics associated with each fabric in an environment. The fabrics may be ranked based upon the performance metrics of one or more of the fabrics. One or more of the fabrics, and/or their corresponding ranks, may be displayed to a user for selection. The recommended fabrics may be determined based on combinations of fabrics that provide performance metrics for various façades of the building. Using the ranking system provided by the fabric selection tool, the user may obtain a fabric sample and/or order one or more of the recommended fabrics. | 10-08-2015 |
20150286940 | SELECTING A WINDOW TREATMENT FABRIC - A fabric selection tool provides an automated procedure for recommending and/or selecting a fabric for a window treatment to be installed in a building. The recommendation may be made to optimize the performance of the window treatment in which the fabric may be installed. The recommended fabric may be selected based on performance metrics associated with each fabric in an environment. The fabrics may be ranked based upon the performance metrics of one or more of the fabrics. One or more of the fabrics, and/or their corresponding ranks, may be displayed to a user for selection. The recommended fabrics may be determined based on combinations of fabrics that provide performance metrics for various façades of the building. Using the ranking system provided by the fabric selection tool, the user may obtain a fabric sample and/or order one or more of the recommended fabrics. | 10-08-2015 |
20150286941 | SELECTING A WINDOW TREATMENT FABRIC - A fabric selection tool provides an automated procedure for recommending and/or selecting a fabric for a window treatment to be installed in a building. The recommendation may be made to optimize the performance of the window treatment in which the fabric may be installed. The recommended fabric may be selected based on performance metrics associated with each fabric in an environment. The fabrics may be ranked based upon the performance metrics of one or more of the fabrics. One or more of the fabrics, and/or their corresponding ranks, may be displayed to a user for selection. The recommended fabrics may be determined based on combinations of fabrics that provide performance metrics for various façades of the building. Using the ranking system provided by the fabric selection tool, the user may obtain a fabric sample and/or order one or more of the recommended fabrics. | 10-08-2015 |
Stephen Quirk, Alpharetta, GA US
Patent application number | Description | Published |
---|---|---|
20080248517 | Diagnostic Device - Diagnostic devices for detecting the presence of an analyte in a sample are provided. Devices of the present invention comprise a means for inducing a pressure differential on a sample to direct the sample to a test surface. In one embodiment, the means for inducing a pressure differential on a sample to direct the sample to a test surface comprises a syringe that can be used to draw a sample from an opening to a test surface. In other embodiments, the device also provides means for diluting a sample. In yet other embodiments, the device also provides a means | 10-09-2008 |
Stephen Quirk, Millburn, NJ US
Patent application number | Description | Published |
---|---|---|
20090089116 | Method and System for Acquiring and Tracking Redeemable Codes - Improved approaches to generate, distribute, redeem or return codes are disclosed. The codes can be used (i.e., redeemed) to purchase products from an online store. The codes can be electronically requested and received. In one embodiment, the codes can be acquired from a server via a network. The codes can be content specific codes that are redeemable for particular content, such as specific digital media assets. The codes can be returnable, and royalty obligations that may be due can be adjusted for returns. | 04-02-2009 |
Steve Quirk, Chicago, IL US
Patent application number | Description | Published |
---|---|---|
20140149312 | SYSTEMS AND METHODS FOR DETERMINING A QUANTITATIVE RETAIL SENTIMENT INDEX FROM CLIENT BEHAVIOR - Systems, methods, and instructions stored on computer-readable mediums for calculating a volatility score for each of a plurality of securities and calculating a reference volatility score for a benchmark. A relative volatility score is derived for each of the plurality of securities based upon the volatility score for each of the plurality of securities and the reference volatility score. A correlation for each of the plurality of securities to the benchmark is determined. The relative volatility score for at least one of the securities is adjusted based on the correlation. An aggregated volatility score is derived for each of a plurality of accounts based in part on securities held within an account and the relative volatility scores for the securities. A sentiment index is determined based upon the aggregated volatility score for each of the plurality of accounts. | 05-29-2014 |
20150262300 | SYSTEMS AND METHODS FOR DETERMINING A SIGNIFICANCE INDEX - Systems, methods, and instructions stored on computer-readable mediums for calculating an aggregated significance score for each of a plurality of consumer goods or website interactions by aggregating historical significance scores and calculating a reference significance score for a benchmark. A relative significance score is derived for each of the plurality of consumer goods or website interactions based upon the significance score for each of the plurality of consumer goods or website interactions and the relative significance score. A consumer priority index is derived indexed to a relevant measure based on the aggregated significance scores and the reference significance score. | 09-17-2015 |
Steven Quirk, Millburn, NJ US
Patent application number | Description | Published |
---|---|---|
20140214515 | PROMOTIONAL CODE REDEMPTION FOR IN-APPLICATION FEATURES USED WITH APPLICATION PROGRAMS - Improved techniques and systems for redemption of a promotional code for acquisition of a digital product, such as an in-application asset, for use in a corresponding application program are disclosed. The in-application asset can, for example, pertain to a consumable asset or a non-consumable asset. The techniques and systems can operate to validate the promotional code that is being redeemed to acquire the in-application asset, and can confirm that a requestor's redemption device has the corresponding application program installed thereon. Compatibility of the corresponding application program with the in-application asset can be confirmed. Updates to the corresponding application program can also be provided. | 07-31-2014 |
Thomas Joseph Quirk, Albuquerque, NM US
Patent application number | Description | Published |
---|---|---|
20150251099 | METHODS AND SYSTEMS FOR MOBILE BASED APPLICATIONS - A person can use a computing device such as a computer, mobile device, or other such device to record the completion of a task. The task can include any task that is verifiable via the sensors associated with the mobile device. These sensors may be, for example, video, audio, a clock, a timer, still image, accelerometer based, gyro based, GPS location, locations according to triangulation, temperature, barometer, and the like. The task can then be sent to another person in the form of a challenge to do something better. The other person can then record a responsive task and send it to the challenger. The decision as to if the challenge has been met or beat can be decided by the challenger or someone else including a large voting audience. In some embodiments, a large number of people can respond to the challenge. | 09-10-2015 |
William Quirk, Littleton, CO US
Patent application number | Description | Published |
---|---|---|
20150245810 | ULTRASOUND GEL DISPENSING AND PROBE SANITIZING STATION - A cart includes a power supply, a display unit, a holder having a primary coil positioned with respect to a compartment to be proximate a secondary coil of a handheld ultrasound probe when it is positioned in the compartment, a charging circuit that provides an alternating current to inductively couple the primary and the secondary coils, light sources operable to provide at least ultraviolet light, and a drive circuit electrically coupled to drive the light sources. The cart may include a dispenser with a container that can hold an ultrasound coupling medium, and a dispensing mechanism having a scoop with an elongated recess that is rotatably mounted with respect to the container to move between a first position in which the elongated recess is in fluid communication with the interior of the container and a second position in which the elongated recess is exposed to an exterior of the dispenser. | 09-03-2015 |