Patent application number | Description | Published |
20100246407 | RUNTIME FLOW DEBUGGING A NETWORK DEVICE BY EXAMINING PACKET COUNTERS AT INTERNAL POINTS - In one embodiment, the internal path traversed by packets between two user visible interface, selected by a user, is displayed. The path displayed includes internal interfaces traversed by the packets. First and second count values showing the packets traversing each displayed internal interface at the beginning and end of a selected time period are also displayed. A delta, being the difference between the first and second count values for each internal interface indicates the number of packets traversing the interface during the time period and can be analyzed to determine the identity of a packet processing hardware logic block where packets might be getting dropped. | 09-30-2010 |
20110222538 | Method and System for L3 Bridging Using L3-To-L2 Mapping Database - A method may include creating an L3-L2 database on a first switch, the database having one or more entries, each entry: (a) associating a Level 3 (L3) unique identifier associated with a virtual local area network (VLAN) communicatively coupled to the first switch to a Level 2 (L2) unique identifier associated with the VLAN, and (b) associating the L3 unique identifier with a port of the first switch. The method may also include receiving a network packet at the first switch. The method may additionally include determining if a destination VLAN for the network packet has a corresponding entry in the L3-L2 database. The method may further include switching the network packet to the port in response to a determination that the destination VLAN for the network packet has a corresponding entry in the L3-L2 database, such that the packet is communicated to one of: (a) the destination VLAN, and (b) a second switch intermediate to the first switch and the destination VLAN. | 09-15-2011 |
20110243135 | Systems and Methods for Minimizing the Number of Forwarding Identifiers in a Network Element with Distributed Architecture - A method may include, by a first network interface: receiving a packet having a flow via a first port of the first network interface; examining the packet to determine an ingress local forwarding identifier (LFID) associated with the flow of the packet; converting the ingress LFID to a global forwarding identifier (GFID) of the network element; and forwarding the packet to a switching element. The method may also include, by the switching element: determining a second network interface for egress of the packet based on the GFID; and forwarding the packet to the second network interface. The method may further include, by the second network interface: converting the GFID to an egress LFID associated with the flow of the packet; and forwarding the packet to a second port of the second network interface and a flow of the second network interface based on the egress LFID. | 10-06-2011 |
20110280248 | Hierarchical Isolated Learning and Flooding for Metro Ethernet Bridging Domains - In one embodiment, a switch includes a processor coupled to a memory, one or more forwarding tables residing within the memory, and one or more ports. The one or more ports are associated with a plurality of virtual local area networks. The one or more ports are associated with a plurality of bridge domains. Each of the bridge domains is associated with one of the forwarding tables, and each of the forwarding tables is associated with one of the bridge domains. The processor is configured to assign a first tag to a received packet, the first tag comprising an identification of an active bridge domain, assign a second tag to the received packet, look up the destination address of the received packet in one of the forwarding tables, and if the destination address is not found in the forwarding table, and selectively flood the one or more ports of the active bridge domain with a copy of the received packet. The active bridge domain includes one of the plurality of bridge domains. The active bridge domain is associated with the ingress port of the received packet. The second tag includes an identification of one of the plurality of virtual local area networks. | 11-17-2011 |
20120131299 | METHOD AND SYSTEM FOR REDUCING ENTRIES IN A CONTENT-ADDRESSABLE MEMORY - A method for reducing memory entries in a ternary content-addressable memory may include determining if a first entry and a second entry are associated with the same data value. The method may also include determining if the first entry can be masked such that searching the memory with the content value of either of the first entry or the second entry returns the same data value. The method may further include, in response to determining that the first entry and a second entry are associated with the same data value and determining that the first entry can be masked such that addressing the memory with the content value of either of the first entry or the second entry returns the same data value: (i) masking the first entry such that addressing the memory with the content value of either of the first entry or the second entry returns the same data value; and (ii) deleting the second entry. | 05-24-2012 |
20120155485 | EFFICIENT SPACE UTILIZATION OF DISTRIBUTED MAC ADDRESS TABLES IN ETHERNET SWITCHES - A method for networked communications includes receiving, on an inbound port, a frame to be forwarded, mapping the received frame to a flooding domain, determining an inbound port through which a frame is received, wherein the plurality of ports includes the inbound port, determining a destination address of the received frame, and determining one or more of the plurality of ports through which the received frame is to be forwarded. If the line card contains a port that is part of the flooding domain, the method includes populating a forwarding table associated with the line card with information regarding the received frame and information regarding the flooding domain. If the line card contains no ports that are part of the flooding domain, the method includes populating no forwarding tables associated with the line card with information regarding the received frame and information regarding the flooding domain. | 06-21-2012 |
Patent application number | Description | Published |
20140203783 | Monitoring/Managing Electrochemical Energy Device Using Detected Intercalation Stage Changes - A system includes utilizes optical sensors arranged within or on portions of an electrochemical energy device (e.g., a rechargeable Li-ion battery, supercapacitor or fuel cell) to measure operating parameters (e.g., mechanical strain and/or temperature) of the electrochemical energy device during charge/recharge cycling. The measured parameter data is transmitted by way of light signals along optical fibers to a controller, which converts the light signals to electrical data signal using a light source/analyzer. A processor then extracts temperature and strain data features from the data signals, and utilizes a model-based process to detect intercalation stage changes (i.e., characteristic crystalline structure changes caused by certain concentrations of guest species, such as Li-ions, within the electrode material of the electrochemical energy device) indicated by the data features. The detected intercalation stage changes are used to generate highly accurate operating state information (e.g., state-of-charge and state-of-health), and management/control signals for optimizing charge/discharge rates. | 07-24-2014 |
20150051890 | AUTOMATED AUGMENTED MODEL EXTENSION FOR ROBUST SYSTEM DESIGN - A method is provided for automatically generating an augmented model of a cyber-physical component. Cyber-physical components are built from or depend upon the synergy computational and physical components. The method includes: reading an input model ( | 02-19-2015 |
20150127425 | STRATEGIC MODELING FOR ECONOMIC OPTIMIZATION OF GRID-TIED ENERGY ASSETS - One embodiment of the present invention provides an energy-asset control system for utilizing an energy asset to provide one of more modes of operation services. The system includes an economic optimizer configured to identify at least one mode of operation opportunity based on current and/or future market conditions; a prognostics module configured to perform a prognostic analysis associated with the mode of operation opportunity for the energy asset using an existing model, and determine a confidence level associated with the prognostic analysis; and an operation controller. The economic optimizer is further to configured to, in response to the prognostics module determining the confidence level exceeding a predetermined threshold, determine an expected profit of the mode of operation opportunity based on outcomes of the prognostic analysis; and optimize, over a predetermined time period, a usage of the energy asset based on the expected profit of the mode of operation opportunity. | 05-07-2015 |
20150280290 | Method For Monitoring/Managing Electrochemical Energy Device By Detecting Intercalation Stage Changes - A method for determining an operating state (e.g., state-of-charge or state-of-health) and/or generating management (charge/discharge) control information in a system including an electrochemical energy device (EED, e.g., a rechargeable Li-ion battery, supercapacitor or fuel cell) that uses optical sensors to detect the intercalation stage change events occurring in the EED. The externally or internally mounted optical sensors measure operating parameter (e.g., strain and/or temperature) changes of the EED during charge/recharge cycling, and transmit measured parameter data using light signals sent over optical fibers to a detector/converter. A processor then analyzes the measured parameter data, e.g., using a model-based estimation process, to detect intercalation stage changes (i.e., crystalline structure changes caused by migration of guest species, such as Li-ions, between the EED's anode and cathode), and generates the operating state and charge/discharge control information based the analysis. | 10-01-2015 |
20160028129 | EMBEDDED FIBER OPTIC CABLES FOR BATTERY MANAGEMENT - A battery includes a folded bicell battery stack with an embedded fiber optic cable and sensor. A cell casing encloses the bicell stack with at least one fiber optic cable is embedded within the battery. The fiber optic cable includes an internal portion disposed within the cell casing and having at least one optical sensor disposed thereon. An external portion of the fiber optic cable protrudes from the casing. A sealing gasket is disposed at least partially around the fiber optic cable and between the cell sealing edges at a point of entry of the fiber optic cable into the battery. | 01-28-2016 |
Patent application number | Description | Published |
20140063244 | CONSTRAINED PARAMETRIC CURVE DETECTION USING CLUSTERING ON HOUGH CURVES OVER A SEQUENCE OF IMAGES - A method for automatically detecting a constrained curve over a set of images includes: obtaining a set of one or more binary images of a scene wherein pixels thereof are designated as an edge pixel or not; and, processing at least one of the images. The processing includes: applying a Hough transform to the image to generate an accumulator array; determining Hough peaks from the accumulator array; selecting Hough peaks subject to a set of constraints; determining Hough curve segments for the selected Hough peaks; grouping the Hough curve segments into clusters; selecting from the clusters a cluster having a greatest number of Hough curve segments; and fitting a curve to the Hough curve segments grouped in the selected cluster. | 03-06-2014 |
20140092375 | MONITORING AND MANAGEMENT FOR ENERGY STORAGE DEVICES - A monitoring and management system (MMS) includes one or more fiber optic cables arranged within or on portions of an energy storage device. Each fiber optic cable includes multiple optical sensors. At least one of the optical sensors is configured to sense a parameter of the energy storage device that is different from a parameter of the energy storage device sensed by at least another optical sensor of the multiple optical sensors. The MMS includes a light source configured to provide light to the one or more fiber optic cables and a detector configured to detect light reflected by the optical sensors. The detector generates an electrical signal based on the reflected light. A processor is coupled to receive the electrical signal, to analyze the electrical signal, and to determine state of the energy storage device based on analysis of the electrical signal. | 04-03-2014 |
20150185139 | SENSOR APPARATUS AND METHOD BASED ON WAVELENGTH CENTROID DETECTION - Sensor material is arranged to interact with input light and to asymmetrically alter a spectral distribution of the input light in response to presence of an external stimulus. A detector is configured to sense the altered input light and to generate at least one electrical signal comprising information about a shift in the centroid of a spectral distribution of the altered input light relative to a centroid of the spectral distribution of the input light. | 07-02-2015 |
20150224864 | HYBRID VEHICLE WITH POWER BOOST - A hybrid vehicle includes at least one axle, an energy storage device disposed within the hybrid vehicle, a fuel consuming engine, a power boosting feature, and a controller. The fuel consuming engine is operably connected to selectively provide power to at least one of the energy storage device and the at least one axle. The engine is capable of providing at least the mean but less than a peak power to drive the hybrid vehicle over a typical route. The power boosting feature is configured to provide the fuel consuming engine with additional power to achieve a desired power to accelerate the hybrid vehicle. The controller is adapted to selectively control power flow to the one or more axles from one or more of the energy storage device, the engine, and the power boosting feature to achieve the desired power. | 08-13-2015 |
20150298684 | CONTROL SYSTEM FOR HYBRID VEHICLES WITH HIGH DEGREE OF HYBRIDIZATION - Systems and methods for controlling and operating a hybrid vehicle having a high degree of hybridization are disclosed. A power flow control system predicts vehicle power demand to drive the hybrid vehicle based on changing conditions during operation of the hybrid vehicle. The power flow control system controls the power flow so as to provide power to drive the hybrid vehicle based on the predicted vehicle power demand, wherein the predicted vehicle power demand is greater than a maximum | 10-22-2015 |
20150298689 | DESIGN SYSTEMS AND METHODS FOR HYBRID VEHICLES WITH A HIGH DEGREE OF HYBRIDIZATION - Hybrid vehicle design circuitry quantifies values for utility/disutility variables of a hybrid vehicle design by evaluating a hybrid vehicle model over a collection of drive cycles/routes. The utility/disutility values include at least one of: total time or additional time beyond a reference time needed for the hybrid vehicle design to complete the drive cycles/routes, a fraction or number of the drive cycles/routes for which the hybrid vehicle design fails to achieve a target velocity, and amount of time or distance over which the hybrid vehicle design fails to achieve a target acceleration or the target velocity over the drive cycles/routes. The hybrid vehicle design circuitry calculates one or more specifications of a hybrid vehicle design based on the utility/disutility values. | 10-22-2015 |
20150303723 | BATTERY MANAGEMENT BASED ON INTERNAL OPTICAL SENSING - A battery management system includes one or more fiber optic sensors configured to be disposed within an electrochemical battery. Each fiber optic sensor is capable of receiving input light and providing output light that varies based on the input light and an amount of free or dissolved gas present within the battery. A detector detects the output light and generates an electrical detector signal in response to the output light. Battery management circuitry determines the state of the battery based at least in part on the detector signal. | 10-22-2015 |
Patent application number | Description | Published |
20080270745 | Hardware acceleration of a write-buffering software transactional memory - A method and apparatus for accelerating a software transactional memory (STM) system is described herein. Annotation field are associated with lines of a transactional memory. An annotation field associated with a line of the transaction memory is initialized to a first value upon starting a transaction. In response to encountering a read operation in the transaction, then annotation field is checked. If the annotation field includes a first value, the read is serviced from the line of the transaction memory without having to search an additional write space. A second and third value in the annotation field potentially indicates whether a read operation missed the transactional memory or a tentative value is stored in a write space. Additionally, an additional bit in the annotation field, may be utilized to indicate whether previous read operations have been logged, allowing for subsequent redundant read logging to be reduced. | 10-30-2008 |
20090077339 | OBJECT BASED CONFLICT DETECTION IN A SOFTWARE TRANSACTIONAL MEMORY - Object-based conflict detection is described in the context of software transactional memory. In one example, a pointer is received for a block of instructions, the block of instructions having allocated objects. The lower bits of the pointer are masked if the pointer is in a small object space to obtain a block header for the block, and a size of the allocated objects is determined using the block header. | 03-19-2009 |
20090138681 | SYNCHRONIZATION OF PARALLEL PROCESSES - A speculative execution capability of a processor is exposed to program control through at least one machine instruction. The at least one machine instruction may be two instructions designed to facilitate synchronization between parallel processes. According to an aspect, an instruction set architecture includes circuitry that handles a speculative execution instruction and a speculation termination instruction. The speculative execution instruction may be an instruction that takes first and second operands, causes the processor to speculatively execute additional instructions if a memory location contains a value, and causes the processor to start executing instructions from an address indicated by the second operand if a mis-speculation occurs, and the speculation termination instruction may be an instruction that causes the processor to begin retiring the additional instructions. | 05-28-2009 |
20090172305 | EFFICIENT NON-TRANSACTIONAL WRITE BARRIERS FOR STRONG ATOMICITY - A method and apparatus for providing optimized strong atomicity operations for non-transactional writes is herein described. Locks are acquired upon initial non-transactional writes to memory locations. The locks are maintained until an event is detected resulting in the release of the locks. As a result, in the intermediary period between acquiring and releasing the locks, any subsequent writes to memory locations that are locked are accelerated through non-execution of lock acquire operations. | 07-02-2009 |
20090319753 | HYBRID LINEAR VALIDATION ALGORITHM FOR SOFTWARE TRANSACTIONAL MEMORY (STM) SYSTEMS - A method and apparatus for hybrid validation for a Software Transaction Memory (STM) is herein described. During execution of a transaction, when acquiring ownership of meta-data associated with a data element, the meta-data is updated with an ownership reference to a transaction to enable efficient subsequent ownership tests. However, during validation, for some conditions, meta-data is updated from the ownership reference to a write entry reference to enable efficient validation. | 12-24-2009 |
20100122060 | SYSTEM AND METHOD FOR ALLOCATING AND DEALLOCATING MEMORY WITHIN TRANSACTIONAL CODE - Methods and systems are provided for managing memory allocations and deallocations while in transactional code, including nested transactional code. The methods and systems manage transactional memory operations by using identifiers, such as sequence numbers, to handle memory management in transactions. The methods and systems also maintain lists of deferred actions to be performed at transaction abort and commit times. A number of memory management routines associated with one or more transactions examine the transaction sequence number of the current transaction, manipulate commit and/or undo logs, and set/use the transaction sequence number of an associated object, but are not so limited. The methods and systems provide for memory allocation and deallocations within transactional code while preserving transactional semantics. Other embodiments are described and claimed. | 05-13-2010 |
20100229043 | HARDWARE ACCELERATION FOR A SOFTWARE TRANSACTIONAL MEMORY SYSTEM - A method and apparatus for accelerating transactional execution. Barriers associated with shared memory lines referenced by memory accesses within a transaction are only invoked/executed the first time the shared memory lines are accessed within a transaction. Hardware support, such as a transaction field/transaction bits, are provided to determine if an access is the first access to a shared memory line during a pendancy of a transaction. Additionally, in an aggressive operational mode version numbers representing versions of elements stored in shared memory lines are not stored and validated upon commitment to save on validation costs. Moreover, even in a cautious mode, that stores version numbers to enable validation, validation costs may not be incurred, if eviction of accessed shared memory lines do not occur during execution of the transaction. | 09-09-2010 |
20110197029 | HARDWARE ACCELERATION OF A WRITE-BUFFERING SOFTWARE TRANSACTIONAL MEMORY - A method and apparatus for accelerating a software transactional memory (STM) system is described herein. Annotation field are associated with lines of a transactional memory. An annotation field associated with a line of the transaction memory is initialized to a first value upon starting a transaction. In response to encountering a read operation in the transaction, then annotation field is checked. If the annotation field includes a first value, the read is serviced from the line of the transaction memory without having to search an additional write space. A second and third value in the annotation field potentially indicates whether a read operation missed the transactional memory or a tentative value is stored in a write space. Additionally, an additional bit in the annotation field, may be utilized to indicate whether previous read operations have been logged, allowing for subsequent redundant read logging to be reduced. | 08-11-2011 |
20110271017 | EFFICIENT NON-TRANSACTIONAL WRITE BARRIERS FOR STRONG ATOMICITY - A method and apparatus for providing optimized strong atomicity operations for non-transactional writes is herein described. Locks are acquired upon initial non-transactional writes to memory locations. The locks are maintained until an event is detected resulting in the release of the locks. As a result, in the intermediary period between acquiring and releasing the locks, any subsequent writes to memory locations that are locked are accelerated through non-execution of lock acquire operations. | 11-03-2011 |
20110320776 | MECHANISM FOR IRREVOCABLE TRANSACTIONS - A method and apparatus for designating and handling irrevocable transactions is herein described. In response to detecting an irrevocable event, such as an I/O operation, a user-defined irrevocable designation, and a dynamic failure profile, a transaction is designated as irrevocable. In response to designating a transaction as irrevocable, Single Owner Read Locks (SORLs) are acquired for previous and subsequent reads in the irrevocably designated transaction to ensure the transaction is able to complete without modification to locations read from, while permitting remote resources to load from those locations to continue execution. | 12-29-2011 |
20120066457 | SYSTEM AND METHOD FOR ALLOCATING AND DEALLOCATING MEMORY WITHIN TRANSACTIONAL CODE - Methods and systems are provided for managing memory allocations and deallocations while in transactional code, including nested transactional code. The methods and systems manage transactional memory operations by using identifiers, such as sequence numbers, to handle memory management in transactions. The methods and systems also maintain lists of deferred actions to be performed at transaction abort and commit times. A number of memory management routines associated with one or more transactions examine the transaction sequence number of the current transaction, manipulate commit and/or undo logs, and set/use the transaction sequence number of an associated object, but are not so limited. The methods and systems provide for memory allocation and deallocations within transactional code while preserving transactional semantics. Other embodiments are described and claimed. | 03-15-2012 |
20120089760 | Increasing Functionality Of A Reader-Writer Lock - In one embodiment, the present invention includes a method for accessing a shared memory associated with a reader-writer lock according to a first concurrency mode, dynamically changing from the first concurrency mode to a second concurrency mode, and accessing the shared memory according to the second concurrency mode. In this way, concurrency modes can be adaptively changed based on system conditions. Other embodiments are described and claimed. | 04-12-2012 |
20120297152 | HARDWARE ACCELERATION OF A WRITE-BUFFERING SOFTWARE TRANSACTIONAL MEMORY - A method and apparatus for accelerating a software transactional memory (STM) system is described herein. Annotation field are associated with lines of a transactional memory. An annotation field associated with a line of the transaction memory is initialized to a first value upon starting a transaction. In response to encountering a read operation in the transaction, then annotation field is checked. If the annotation field includes a first value, the read is serviced from the line of the transaction memory without having to search an additional write space. A second and third value in the annotation field potentially indicates whether a read operation missed the transactional memory or a tentative value is stored in a write space. Additionally, an additional bit in the annotation field, may be utilized to indicate whether previous read operations have been logged, allowing for subsequent redundant read logging to be reduced. | 11-22-2012 |
20140025901 | TECHNIQUE FOR USING MEMORY ATTRIBUTES - A technique for using memory attributes to relay information to a program or other agent. More particularly, embodiments of the invention relate to using memory attribute bits to check various memory properties in an efficient manner. | 01-23-2014 |
Patent application number | Description | Published |
20090089418 | METHOD AND SYSTEM TO DETECT A NETWORK DEFICIENCY - A system to detect a network deficiency, in one example embodiment, comprises a receiving module to receive utilization metrics of at least one network resource, wherein the utilization metrics are collected and made available at a network level, an aggregator to aggregate the utilization metrics of at least one network resource with the utilization metrics of a plurality of the network resources, a processing module to determine a level of aggregated utilization metrics of the network resources, and a detecting module to detect a precursor indicative of a network traffic deterioration based on the level of the aggregated utilization metrics. | 04-02-2009 |
20090089419 | METHOD AND SYSTEM FOR INTELLIGENT REQUEST REFUSAL IN RESPONSE TO A NETWORK DEFICIENCY DETECTION - A system for intelligent request refusal in response to a network deficiency detection, in one example embodiment, comprises an aggregator to aggregate revenue generated by a requesting entity with a revenue generated by requesting entities homogenous to the requesting entity, and a filtering module to filter a response to a service request when an aggregated revenue-to-network-resource-utilization ratio is below a second threshold unless utilization of a plurality of network resources drops below a first threshold. | 04-02-2009 |
20090089699 | METHOD AND SYSTEM FOR INTELLIGENT FEATURE DEGRADATION IN RESPONSE TO A NETWORK DEFICIENCY DETECTION - A system for intelligent feature degradation in response to a network deficiency detection, in one example embodiment, comprises a monitoring module to monitor a utilization of a plurality of network resources, a processing module to determine whether the utilization of the plurality of the network resources is above a threshold, to determine a category of an application level using entity, and to determine a revenue generated by the application level using entity, and a degrading module to degrade at least one application level functionality available to the using entity based on the category and the revenue generated by the application level using entity unless the utilization of the plurality of the network resources drops below the first threshold. | 04-02-2009 |
Patent application number | Description | Published |
20110246553 | VALIDATION OF INTERNAL DATA IN BATCH APPLICATIONS - A method and a system provide validated internal data about a running batch application. The validated internal data may be accessed via administrative interface for batch application for monitoring and management. The system comprises a batch host to host an instance of a running batch application. The running batch application comprises an interface to a batch agent. A controller is in communication with the batch agent and requests validated internal data about the running batch application via the batch agent. The controller further receives the validated internal data about the running batch application from the batch agent. | 10-06-2011 |
20110246640 | METHOD AND SYSTEM FOR SYNCHRONOUS AND ASYNCHRONOUS MONITORING - A system and method for synchronous and asynchronous monitoring of network resources is provided. In an example system, an asynchronous monitoring engine is in communication with the network resources and receives asynchronous data from a portion of the network resources. The asynchronous data is collected at an application layer or at an end-user application layer. A synchronous monitoring engine is also in communication with the network resources and accesses synchronous data in the application layer in response to receiving a request from the asynchronous monitoring engine. The system further identifies an anomaly corresponding to the asynchronous characteristic and the synchronous characteristic. | 10-06-2011 |
20120324417 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEVELOPMENT - Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received, in response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries. | 12-20-2012 |
20120324435 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEPLOYMENT - Methods and systems for facilitating incremental software deployment are disclosed. For example, a method can include receiving a command to deploy a second version of software to a computing system for execution on the computing system in response to the command, differences between the second version of the software and a first version of the software being executed on the computing system are determined. Code changes to be made to the first version of the software to produce the second version of the software are determined based on the differences. The code changes to be made to the first version of the software are transmitted to the computing system. | 12-20-2012 |
20140380271 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEVELOPMENT - Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received. In response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries. | 12-25-2014 |
20160048391 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEVELOPMENT - Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received. In response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries. | 02-18-2016 |
Patent application number | Description | Published |
20090249322 | TECHNIQUES FOR UPDATING SOFTWARE - Techniques for updating software include downloading a software image update from a first data structure wherein the software update image includes one or more content identifiers. Content is then downloaded from a second data structure based on the one or more content identifiers. The content may then be output during or after the software update download and installation process. | 10-01-2009 |
20100011404 | TV SOFTWARE UPGRADE USING TV INTERNET ADAPTER - A TV Internet adapter receives an upgrade request for TV software, downloads an updated software image, and then changes mode through software emulation into a mass storage device from which the TV downloads the updated image. | 01-14-2010 |
20110032423 | ADAPTIVE USER PROFILING FOR TV-CENTRIC HOME AUTOMATION SYSTEM - A TV seamlessly connects to and controls home automation equipment such as lighting, audio/video control, climate control, etc. The TV provides users with a friendly UI to control the equipment, and furthermore the TV adapts to observed user behavior to automatically establish and change settings based thereon. In addition, based on the content watched (or mode selection) on the TV, the settings of surrounding lighting, temperature and other controlled appliance would be changed by the TV. | 02-10-2011 |
20110072478 | BANDWIDTH REPORTING FOR TELEVISIONS - Techniques for reporting bandwidth in televisions include displaying bandwidth information for receiving one or more instances of the content and receiving a selection of a given instance of the content in response to the displayed bandwidth information. In addition, the techniques include receiving bandwidth usage history for one or more networks and displaying the bandwidth usage history. | 03-24-2011 |
20110099263 | Automated social networking television profile configuration and processing - Content selected by a user of a web access television (TV) device is monitored via a profile controller associated with the web access TV device. Social network aspects of a web access TV user profile are automatically configured based upon the monitored content selected by the user. Social networking opportunities for the user are managed via the web access TV user profile. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 04-28-2011 |
20110109715 | Automated wireless three-dimensional (3D) video conferencing via a tunerless television device - Automated wireless three-dimensional (3D) video conferencing is provided using a tunerless television device. A 3D video conference is automatically established with a wireless device capable of 3D video conferencing using a wireless communication interface of the tunerless television device. A first and a second two-dimensional (2D) video stream are received, using a camera interface module, from a first and a second video camera associated with the tunerless television device. A merged 3D video stream is created from the first 2D video stream and the second 2D video stream using a 3D video offload processing module operatively coupled to the camera interface module. The merged 3D video stream is sent to the wireless device using the wireless communication interface. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 05-12-2011 |
20110113438 | METHOD AND SYSTEM OF DISPLAYING INFORMATION OF SPECIFIC INTEREST TO A USER ON A TELEVISION - A system and method of displaying information of specific interest to a user includes: rendering content on a television for a user and displaying first information on the television about the content, in response to a request from the user. In response to an additional request from the user, second information is displayed on the television about the first information, wherein the second information is acquired from a real time server conducted search. Purchase information is displayed on the television for products associated with the second information. In response to the user selecting the purchase information, a purchase transaction is initiated on the television. In some embodiments, a server records the purchase transactions and delivers targeted advertising to the television. | 05-12-2011 |
20120117118 | SEARCH AND DEEP LINKING IN INTERNET-ENABLED TV - An Internet-enabled TV that provides virtual channels to online services that source content responds to a viewer search query by passing the query only to services designated as “searchable” and that thus possess a search application programming interface (API) to return links directly to the content and not just to the hosting services. | 05-10-2012 |
20120136934 | DEVICE, SERVER, AND METHOD FOR SHARING DEEP LINKS OVER SOCIAL NETWORK - An audio video display device (AVDD) includes a display and a processor controlling the display to present an Internet-sourced program. Additionally, the processor causes the display to present a “share” selector element selectable by a user to cause a link associated with the program to automatically be sent to a friend device over a social networking site. | 05-31-2012 |
20120137329 | ENHANCED INFORMATION ON MOBILE DEVICE FOR VIEWED PROGRAM AND CONTROL OF INTERNET TV DEVICE USING MOBILE DEVICE - The user of an Internet TV device can control the Internet TV device using a mobile device such as a smart phone. The smart phone also obtains program information from the Internet TV device and sends the information to a server as a search term, presenting supplemental program information received from the server on the display of the mobile device so that a person can browse the supplemental information without disturbing viewers of the Internet TV device. The mobile device can also grab a link related to the program from the Internet TV device and use that link as a recommendation to friends on social networking sites. | 05-31-2012 |
20120227074 | ENHANCED INFORMATION FOR VIEWER-SELECTED VIDEO OBJECT - The user of an Internet-enabled CE device such as a TV can select an object in a video presented on the display of the CE device by either touch sensitive screen or input device. The processor of the CE device can then determine the boundaries of the object, identify it using face/image recognition software, search for information/websites related to the object, and present those information/websites to the viewer on the display screen. | 09-06-2012 |
20120297400 | METHOD AND SYSTEM FOR INVOKING AN APPLICATION IN RESPONSE TO A TRIGGER EVENT - A method for invoking a software application comprising: executing a first application on a user device; detecting a trigger event on the user device, the trigger event is non-specific and external to the first application and a second application; invoking the second application in response to the trigger event; sending metadata from the first application to the second application; and performing an action in the second application based at least partially on the metadata received from the first application, wherein, the first application and the second application are not operating system processes, and the second application is separate and independent from the first application. | 11-22-2012 |
20130006625 | EXTENDED VIDEOLENS MEDIA ENGINE FOR AUDIO RECOGNITION - A system, method, and computer program product for automatically analyzing multimedia data audio content are disclosed. Embodiments receive multimedia data, detect portions having specified audio features, and output a corresponding subset of the multimedia data and generated metadata. Audio content features including voices, non-voice sounds, and closed captioning, from downloaded or streaming movies or video clips are identified as a human probably would do, but in essentially real time. Particular speakers and the most meaningful content sounds and words and corresponding time-stamps are recognized via database comparison, and may be presented in order of match probability. Embodiments responsively pre-fetch related data, recognize locations, and provide related advertisements. The content features may be also sent to search engines so that further related content may be identified. User feedback and verification may improve the embodiments over time. | 01-03-2013 |
20130024927 | SYSTEM AND METHOD FOR AUTOMATICALLY ESTABLISHING NEW SESSION WITH INTERACTIVE SERVICE AFTER PREVIOUS SESSION EXPIRATION - A system includes a video display and a processor controlling the display. The processor accesses computer readable instructions to cause the processor to access a server associated with the service over a network responsive to viewer selection of a service. The processor then, without any viewer interaction, executes authentication with the server. Thereafter, responsive to successful authentication, the processor provides the service to a viewer at least in part by presenting an image associated with the service on the display. Responsive to the server indicating that a session for which the authentication is valid is expired, the processor automatically and without viewer input executes authentication with the server to establish a new session. | 01-24-2013 |
20130283314 | ENHANCED INFORMATION ON MOBILE DEVICE FOR VIEWED PROGRAM AND CONTROL OF INTERNET TV DEVICE USING MOBILE DEVICE - The user of an Internet TV device can control the Internet TV device using a mobile device such as a smart phone. The smart phone also obtains program information from the Internet TV device and sends the information to a server as a search term, presenting supplemental program information received from the server on the display of the mobile device so that a person can browse the supplemental information without disturbing viewers of the Internet TV device. The mobile device can also grab a link related to the program from the Internet TV device and use that link as a recommendation to friends on social networking sites. | 10-24-2013 |
20140019836 | METHODS FOR HANDLING URLS TO TRIGGER FUNCTIONALITIES - A method of handling Internet links includes providing a link associated with a uniform resource locator (“URL”) including a scheme name that references an application, and a handler-directive that references a functionality to be performed by the application. The link can be provided in an internet browser on a display screen of an electronic device. The method further includes launching the application referenced by the URL in response to a user selecting the URL. The launched application includes a URL handler, which receives the URL and breaks up the URL to separate the handler-directive. The method further includes determining whether the handler-directive is supported in the URL handler. The functionality referenced by the handler-directive is then performed by the application. | 01-16-2014 |
20140211099 | SYSTEM METHOD FOR SENDING MESSAGES AND COMMANDS TO A DEVICE AT A LOCATION DISTANCED FROM THE SENDING DEVICE - A consumer electronics (CE) device includes at least one processor and at least one computer readable storage medium accessible to the processor. The medium is programmed with instructions that, when executed by the processor, cause the processor to execute logic including detecting the position of the CE device and sending a command to at least one apparatus at a location distanced from the CE device to establish at least one configuration of the apparatus. The command is sent responsive to a determination that the CE device is passing a predefined distance from a location. | 07-31-2014 |
Patent application number | Description | Published |
20130172368 | Methods for Treating Hyperuricemia in Patients with Gout Using Halofenate or Halogenic Acid and A Second Urate-Lowering Agent - Disclosed herein are pharmaceutical compositions, methods and kits for lowering the serum uric acid level of a subject and for the treatment of a condition associated with elevated serum uric acid levels comprising administering a composition comprising a first urate-lowering agent and a second urate-lowering agent. In some aspects the first urate-lowering agent is (−)-halofenate, (−)-halofenic acid, or a pharmaceutically acceptable salts thereof. In some aspects the second urate-lowering agent is an inhibitor of uric acid production, a uricosuric agent, a uricase, or a pharmaceutically acceptable salt thereof. | 07-04-2013 |
20130274331 | Method for Treating Hyperuricemia in Patients with Gout Using Halofenate or Halofenic Acid and an Anti-Inflammatory Agent - Disclosed herein are pharmaceutical compositions, methods and kits for lowering the serum uric acid level of a subject and for the treatment of a condition associated with elevated serum uric acid levels comprising administering a composition comprising a urate-lowering agent and an anti-inflammatory agent. In some aspects the urate-lowering agent is (−)-halofenate, (−)-halofenic acid, or a pharmaceutically acceptable salts thereof. In some aspects the second agent is an anti-inflammatory agent, or a pharmaceutically acceptable salt thereof. | 10-17-2013 |
20130302305 | Methods for Treating Gout in Patients Subpopulations - The present application discloses a method of lowering serum uric acid level in a subject with impaired renal function, comprising administering to the subject a compound of Formula (I), as disclosed herein. | 11-14-2013 |
20140128438 | Methods for Treating Gout Flares - Methods of treating gout flares comprising administering a composition comprising a first urate-lowering agent are disclosed. In some aspects, the first urate-lowering agent is (−)-halofenate, (−)-halofenic acid, or a pharmaceutically acceptable salt thereof. Other aspects provide for methods of reducing the number, duration, frequency or intensity of gout flares experienced by a subject. | 05-08-2014 |
20140128439 | Methods for Treating Gout Flares - Methods of treating gout flares comprising administering a composition comprising a first urate-lowering agent are disclosed. In some aspects, the first urate-lowering agent is (−)-halofenate, (−)-halofenic acid, or a pharmaceutically acceptable salt thereof. Other aspects provide for methods of reducing the number, duration, frequency or intensity of gout flares experienced by a subject. | 05-08-2014 |
20150258053 | Methods for Treating Hyperuricemia in Patients with Gout Using Halofenate or Halofenic Acid and a Second Urate-Lowering Agent - Disclosed herein are pharmaceutical compositions, methods and kits for lowering the serum uric acid level of a subject and for the treatment of a condition associated with elevated serum uric acid levels comprising administering a composition comprising a first urate-lowering agent and a second urate-lowering agent. In some aspects the first urate-lowering agent is (−)-halofenate, (−)-halofenic acid, or a pharmaceutically acceptable salts thereof. In some aspects the second urate-lowering agent is an inhibitor of uric acid production, a uricosuric agent, a uricase, or a pharmaceutically acceptable salt thereof. | 09-17-2015 |
20160051520 | Methods for treating hyperuricemia in patients with gout using halofenate or halofenic acid and a second urate-lowering agent - Disclosed herein are pharmaceutical compositions, methods and kits for lowering the serum uric acid level of a subject and for the treatment of a condition associated with elevated serum uric acid levels comprising administering a composition comprising a first urate-lowering agent and a second urate-lowering agent. In some aspects the first urate-lowering agent is (−)-halofenate, (−)-halofenic acid, or a pharmaceutically acceptable salts thereof. In some aspects the second urate-lowering agent is an inhibitor of uric acid production, a uricosuric agent, a uricase, or a pharmaceutically acceptable salt thereof. | 02-25-2016 |
Patent application number | Description | Published |
20080256079 | LOAD-BASED TECHNIQUE TO BALANCE DATA SOURCES TO DATA CONSUMERS - A system and method is described to determine routing configurations to route data from data producers to data consumers. Each routing configuration corresponds to a time period during which data is routed from the data producers to the data consumers. Data is routed from the data producers to the data consumers according to previously determined data routing configurations during time periods prior to a current time period. Based at least in part on indications of the data load on the data consumers corresponding to actual data routing during the time periods prior to the current time period, a new data routing configuration is determined. During the current time period, data is routed from the data producers to the data consumers according to the determined new data routing configuration. | 10-16-2008 |
20090164482 | METHODS AND SYSTEMS FOR OPTIMIZING PROJECTION OF EVENTS - Systems and methods for optimizing the projection of events are set forth in this disclosure. More specifically, systems and methods for projecting event data from one or more containers are set forth in this disclosure. | 06-25-2009 |
20090164623 | METHODS AND SYSTEMS FOR TRACKING EVENT LOSS - Systems and methods for tracking event loss are set forth in this disclosure. More specifically, systems and methods for tracking event loss within a first time period and second time period are set forth in this disclosure. | 06-25-2009 |
20110177480 | DYNAMICALLY RECOMMENDING LEARNING CONTENT - A method and apparatus for a learning management platform is provided. Based on student profile information and a determination that similarities exist between students, a learning experience engine provides an individualized learning recommendation to a student. | 07-21-2011 |
20110177483 | RECOMMENDING COMPETITIVE LEARNING OBJECTS - A method and apparatus for competitive learning objects in a learning environment is provided. Based on the success that a student has with a particular learning item, a learning recommendation is generated for another student. | 07-21-2011 |
20110191714 | SYSTEM AND METHOD FOR BACKEND ADVERTISMENT CONVERSION - A system for backend conversion attribution of an advertisement served to a user device. The advertisement server provides an advertisement to the user device. The advertisement server receives user information from the user device. The advertisement server stores attributable event information and the user information into an attributable event record in a data store. Based on a user event, a conversion server receives conversion information and the user information from the user device. The conversion server stores the conversion information and the user information into a conversion record in the data store. An attribution server matches the attributable event record with the conversion record. | 08-04-2011 |
20120164620 | RECOMMENDING COMPETITIVE LEARNING OBJECTS - A method and apparatus for competitive learning objects in a learning environment is provided. Based on the success that a student has with a particular learning item, a learning recommendation is generated for another student. | 06-28-2012 |
20130095461 | COURSE SKELETON FOR ADAPTIVE LEARNING - A method and apparatus for utilizing a course skeleton for adaptive learning is provided. Based on student profile information and course goal information, a query is generated to dynamically determine which learning items should be presented to the student. The query, which is based on a particular learning goal, may differ from student to student, and therefore different students may be presented with different learning items to achieve the same learning goal. In addition, as new learning items is added to the learning item repository, the learning items returned by the query for a particular learning goal may change, even if the query used for the goal does not. | 04-18-2013 |
20130095465 | COURSE SKELETON FOR ADAPTIVE LEARNING - A method and apparatus for utilizing a course skeleton for adaptive learning is provided. Based on student profile information and course goal information, a query is generated to dynamically determine which learning items should be presented to the student. The query, which is based on a particular learning goal, may differ from student to student, and therefore different students may be presented with different learning items to achieve the same learning goal. In addition, as new learning items is added to the learning item repository, the learning items returned by the query for a particular learning goal may change, even if the query used for the goal does not. | 04-18-2013 |
20130266922 | Recommending Competitive Learning Objects - A method and apparatus for competitive learning objects in a learning environment is provided. Based on the success that a student has with a particular learning item, a learning recommendation is generated for another student. | 10-10-2013 |
20130280690 | Course Skeleton For Adaptive Learning - A method and apparatus for utilizing a course skeleton for adaptive learning is provided. Based on student profile information and course goal information, a query is generated to dynamically determine which learning items should be presented to the student. The query, which is based on a particular learning goal, may differ from student to student, and therefore different students may be presented with different learning items to achieve the same learning goal. In addition, as new learning items is added to the learning item repository, the learning items returned by the query for a particular learning goal may change, even if the query used for the goal does not. | 10-24-2013 |
20140255896 | AUTOMATED TESTING AND IMPROVEMENT OF TEACHING APPROACHES - Techniques are provided for testing alternative teaching approaches for specific portions of a curriculum. Test-triggering rules are established, each of which corresponds to a specific target-area. Each test-triggering rule specifies conditions which, if satisfied, indicate that a new teaching approach should be tested for the test-triggering rule's target-area. Once the test-triggering rules are established, the assessment results produced by students in instances of courses that implement the curriculum are monitored. If the assessment results satisfy the conditions, a revised teaching approach is selected for the target-area. The revision is then pushed out in waves where some course takers see the revision and others are held constant (A/B analysis). If a hypothesis is validated, then the appropriate revision can be permanently adopted. | 09-11-2014 |
20140324881 | METHOD AND APPARATUS FOR STRESS MANAGEMENT IN A SEARCHABLE DATA SERVICE - Method and apparatus for stress management in a searchable data service. The searchable data service may provide a searchable index to a backend data store, and an interface to build and query the searchable index, that enables client applications to search for and retrieve locators for stored entities in the backend data store. Embodiments of the searchable data service may implement a distributed stress management mechanism that may provide functionality including, but not limited to, the automated monitoring of critical resources, analysis of resource usage, and decisions on and performance of actions to keep resource usage within comfort zones. In one embodiment, in response to usage of a particular resource being detected as out of the comfort zone on a node, an action may be performed to transfer at least part of the resource usage for the local resource to another node that provides a similar resource. | 10-30-2014 |
20150370795 | METHOD AND APPARATUS FOR STRESS MANAGEMENT IN A SEARCHABLE DATA SERVICE - Method and apparatus for stress management in a searchable data service. The searchable data service may provide a searchable index to a backend data store, and an interface to build and query the searchable index, that enables client applications to search for and retrieve locators for stored entities in the backend data store. Embodiments of the searchable data service may implement a distributed stress management mechanism that may provide functionality including, but not limited to, the automated monitoring of critical resources, analysis of resource usage, and decisions on and performance of actions to keep resource usage within comfort zones. In one embodiment, in response to usage of a particular resource being detected as out of the comfort zone on a node, an action may be performed to transfer at least part of the resource usage for the local resource to another node that provides a similar resource. | 12-24-2015 |
20160055229 | METHOD AND APPARATUS FOR STRESS MANAGEMENT IN A SEARCHABLE DATA SERVICE - Method and apparatus for stress management in a searchable data service. The searchable data service may provide a searchable index to a backend data store, and an interface to build and query the searchable index, that enables client applications to search for and retrieve locators for stored entities in the backend data store. Embodiments of the searchable data service may implement a distributed stress management mechanism that may provide functionality including, but not limited to, the automated monitoring of critical resources, analysis of resource usage, and decisions on and performance of actions to keep resource usage within comfort zones. In one embodiment, in response to usage of a particular resource being detected as out of the comfort zone on a node, an action may be performed to transfer at least part of the resource usage for the local resource to another node that provides a similar resource. | 02-25-2016 |
Patent application number | Description | Published |
20130163363 | SYSTEMS AND METHODS OF NON-VOLATILE MEMORY SENSING INCLUDING SELECTIVE/DIFFERENTIAL THRESHOLD VOLTAGE FEATURES - Systems and methods are disclosed for providing selective threshold voltage characteristics via use of MOS transistors having differential threshold voltages. In one exemplary embodiment, there is provided a metal oxide semiconductor device comprising a substrate of semiconductor material having a source region, a drain region and a channel region therebetween, an insulating layer over the channel region, and a gate portion of the insulating layer. Moreover, with regard to the device, the shape of the insulating layer and/or the shape or implantation of a junction region are of varied dimension as between the gate-to-drain and gate-to-source junctions to provide differential threshold voltages between them. | 06-27-2013 |
20140293724 | SYSTEMS AND METHODS OF NON-VOLATILE MEMORY SENSING INCLUDING SELECTIVE/DIFFERENTIAL THRESHOLD VOLTAGE FEATURES - Systems and methods are disclosed for providing selective threshold voltage characteristics via use of MOS transistors having differential threshold voltages. In one exemplary embodiment, there is provided a metal oxide semiconductor device comprising a substrate of semiconductor material having a source region, a drain region and a channel region therebetween, an insulating layer over the channel region, and a gate portion of the insulating layer. Moreover, with regard to the device, the shape of the insulating layer and/or the shape or implantation of a junction region are of varied dimension as between the gate-to-drain and gate-to-source junctions to provide differential threshold voltages between them. | 10-02-2014 |
20150084108 | TRANSISTOR STRUCTURE AND METHOD WITH AN EPITAXIAL LAYER OVER MULTIPLE HALO IMPLANTS - A transistor structure having an epitaxial layer deposited over an implanted substrate in order to reduce process variability. The epitaxial layer is able to be deposited doped, un-doped or lightly doped via up-diffusion from the implanted substrate, and used to form the channel for the transistor structure. As a result, this use of un-doped epitaxial layer provides the benefit of reducing process variability (e.g. random dopant fluctuation) and thus the transistor performance variability despite the small physical size of the transistors. | 03-26-2015 |
Patent application number | Description | Published |
20140285326 | COMBINATION SPEAKER AND LIGHT SOURCE RESPONSIVE TO STATE(S) OF AN ORGANISM BASED ON SENSOR DATA - Techniques associated with a combination speaker and light source (“speaker-light device”) responsive to states of an organism based on sensor data are described, including generating motion sensor data in response to a movement captured using a motion sensor, deriving movement data using a motion analysis module configured to determine the movement to be associated with one or more of a gesture, an identity, and an activity, using the motion sensor data, generating acoustic sensor data in response to sound captured using an acoustic sensor, deriving audio data using a noise removal module configured to subtract a noise signal from the acoustic sensor data, detecting a radio frequency signal using a communication facility, the radio frequency being associated with a personal device, obtaining state data from the personal device, and determining a desired light characteristic using the state data and one or both of the movement data and the audio data. | 09-25-2014 |
20140285999 | COMBINATION SPEAKER AND LIGHT SOURCE POWERED USING LIGHT SOCKET - Techniques associated with a combination speaker and light source powered using a light socket are described, including a housing comprising a plate coupled to a substantially hemispherical enclosure, a platform configured to couple a light source to a terminal configured to receive a light control signal, the light control signal configured to modify a light characteristic, a speaker coupled to the housing and configured to project audio in a direction, a light socket connector coupled to the housing and configured to provide power to the speaker and the light source when the light socket connector is coupled with a light socket, an acoustic sensor disposed on a surface of the housing, and a light sensor located within the housing, the light sensor facing away from the light source. | 09-25-2014 |
20140327515 | COMBINATION SPEAKER AND LIGHT SOURCE RESPONSIVE TO STATE(S) OF AN ORGANISM BASED ON SENSOR DATA - Techniques associated with a combination speaker and light source responsive to states of an organism based on sensor data are described, including receiving state data from a wearable device configured to generate the state data using sensor data, generating light data using the state data, generating audio data using the state data, providing the light data and the audio data to a controller configured to generate one or more control signals using the light data and the audio data, the one or more control signals configured to adjust a light source and a speaker, the light source and the speaker implemented in a combination speaker and light source device. | 11-06-2014 |
20140334653 | COMBINATION SPEAKER AND LIGHT SOURCE RESPONSIVE TO STATE(S) OF AN ORGANISM BASED ON SENSOR DATA - Techniques associated with a combination speaker and light source (“speaker-light device”) responsive to states of an organism based on sensor data are described, including generating chemical sensor data in response to one or more chemicals sensed by one or more chemical sensors in the same or different speaker-light devices. A scent generator may be activated to counter an odor caused by a chemical detected by the chemical sensor(s). The speaker-light device may activate an air mover operative to circulate ambient air over the chemical sensor. The speaker-light device may take an appropriate action in response to detected chemicals that affect states of the organism. Some or all of the actions taken may be taken by other devices in communication with the speaker-light device(s). An action may include generating and presenting a path or route to be taken by a user to an area of safety or reduced chemical concentration. | 11-13-2014 |
20150216475 | DETERMINING PHYSIOLOGICAL STATE(S) OF AN ORGANISM BASED ON DATA SENSED WITH SENSORS IN MOTION - Embodiments of the invention relate generally to electrical and electronic hardware, computer software, wired and wireless network communications, and wearable computing devices for facilitating health and wellness-related information. More specifically, disclosed are electrodes and methods to determine physiological states using a wearable device (or carried device) and one or more sensors that can be subject to motion. In one embodiment, a method includes receiving a sensor signal including data representing physiological characteristics in a wearable device from a distal end of a limb and a motion sensor signal. The method includes decomposing at a processor the sensor signal to determine physiological signal components. A physiological characteristic signal is generated that includes data representing a physiological characteristic, which can form a basis to determine a physiological state based on, for example, bioimpedance signals originating from the distal end of the limb. | 08-06-2015 |
20150230756 | DETERMINING PHYSIOLOGICAL CHARACTERISTICS FROM SENSOR SIGNALS INCLUDING MOTION ARTIFACTS - Embodiments relate generally to electrical and electronic hardware, computer software, wired and wireless network communications, and wearable computing devices in capturing and deriving physiological characteristic data. More specifically, disclosed are one or more electrodes and methods to determine physiological characteristics using a wearable device (or carried device) and one or more sensors that can be subject to motion. In one embodiment, a method includes receiving a sensor signal during one or more portions of a time interval in which the wearable device is in motion, and receiving a motion sensor signal. The method includes decomposing at a processor the sensor signal to determine physiological signal components. An analysis of the physiological signal components can yield a physiological characteristic, whereby a physiological characteristic signal that includes data representing the physiological characteristic can be generated during at least one of the one or more portions of the time interval. | 08-20-2015 |
20150264459 | COMBINATION SPEAKER AND LIGHT SOURCE RESPONSIVE TO STATE(S) OF AN ENVIRONMENT BASED ON SENSOR DATA - Techniques associated with a combination speaker and light source responsive to states of an environment based on sensor data are described, including a housing, a light source disposed within the housing and configured to be powered using a light socket connector coupled to the housing, a speaker coupled to the housing and configured to output audio, and a sensor device comprising a light and speaker controller, the sensor device configured to determine an environmental state and to generate environmental state data associated with the environmental state, the light and speaker controller configured to send a control signal to one or both of the light source and the speaker. | 09-17-2015 |
Patent application number | Description | Published |
20090006996 | Updating Content Within A Container Document For User Groups - A system and method for authenticating a user based on the user's association with a user group, enabling the user to configure a container document associated with the user group, receiving input from the user regarding configuring the container document associated with the user group, and providing an actual representation of the container document to the user based on the received input. | 01-01-2009 |
20090037935 | Updating The Configuration of Container Documents - A system and method for registering components of a user interface, registering events regarding configuration of a container document, associating registered components with registered events, receiving information associated with registered event that has occurred for one of the registered components, and providing the information associated with registered event to all other associated components. | 02-05-2009 |
20120222128 | DISTRIBUTION OF CONTENT DOCUMENT WITH SECURITY, CUSTOMIZATION AND SCALABILITY - A computer-implemented system and method to distribute a content document with security, customization, and scalability is provided. One or more servers provides a customizable content document associated with a first entity, enables a second entity to specify content to be included for users associated with the entity in the customizable content document, and delivers the customized content document incorporating the specified content in a secure manner to users associated with the second entity. | 08-30-2012 |
20130018997 | Distribution of Content Document to Varying Users with Security, Customization and Scalability - A system and method for receiving a request for a container document, determining whether the request is for a container document associated with a user group, determining whether a requestor of the request is associated with a level of status within the user group among a plurality of levels of status within the user group, determining the level of status of the requestor based on a determination that the requestor is associated with a level of status within the user group, requesting configuration information based on a determination that the container document is associated with a user group and the level of status, receiving the configuration information, and serving the container document using the configuration information. | 01-17-2013 |
20150058951 | Distribution of Content Document to Varying Users with Security, Customization and Scalability - A system and method for receiving a request for a container document, determining whether the request is for a container document associated with a user group, determining whether a requestor of the request is associated with a level of status within the user group among a plurality of levels of status within the user group, determining the level of status of the requestor based on a determination that the requestor is associated with a level of status within the user group, requesting configuration information based on a determination that the container document is associated with a user group and the level of status, receiving the configuration information, and serving the container document using the configuration information. | 02-26-2015 |