Patent application number | Description | Published |
20140181395 | VIRTUAL TAPE LIBRARY SYSTEM - A virtual tape library system is used to back up data from a client archive system expecting physical tape operations onto logical data containers and/or a metadata store of a storage service by emulating the physical tape operations. For example, a virtual tape library appliance is installed at a customer premise location to interface with a client archive system. The virtual tape library appliance provides virtual interfaces to appear as physical tape library subsystems, such as tape drives and media changing interfaces. However, these virtual interfaces are supported by logical data containers in a storage service and a metadata store. The virtual tape library system allows the client archive system to make requests to import new virtual tapes, export virtual tapes for archiving, store virtual tapes at a virtual location, load and eject virtual tapes into a virtual tape drive and operate on virtual tapes in a virtual tape drive. | 06-26-2014 |
20140330784 | METHODS AND APPARATUS FOR CONTROLLING SNAPSHOT EXPORTS - Methods, apparatus, and computer-accessible storage media for controlling export of snapshots to external networks in service provider environments. Methods are described that may be used to prevent customers of a service provider from downloading snapshots of volumes, such as boot images created by the service provider or provided by third parties, to which the customer does not have the appropriate rights. A request may be received from a user to access one or more snapshots, for example a request to export the snapshot or a request for a listing of snapshots. For each snapshot, the service provider may determine if the user has rights to the snapshot, for example by checking a manifest for the snapshot to see if entries in the snapshot manifest belong to an account other than the customer's. If the user has rights to the snapshot, the request is granted; otherwise, the request is not granted. | 11-06-2014 |
Patent application number | Description | Published |
20120124064 | TRANSFORMATION OF REGULAR EXPRESSIONS - Techniques to transform regular expressions are described. An apparatus may comprise a processor circuit and a key terms identifying module operative on the processor circuit to generate a set of one or more regular expression key terms from enabled features of a regular expression based on a set of configuration parameters, and filter one or more electronic messages using the set of regular expression key terms. Other embodiments are described and claimed. | 05-17-2012 |
20120215853 | Managing Unwanted Communications Using Template Generation And Fingerprint Comparison Features - Unwanted communication detection and/or management features are providing, including using one or more commonality measures as part of generating templates for fingerprinting and comparison operations, but the embodiments are not so limited. An computing architecture of one embodiment includes components configured to generate templates and associated fingerprints for known unwanted communications, wherein the template fingerprints can be compared to unknown communication fingerprints as part of determining whether the unknown communications are based on similar templates and can be properly classified as unwanted or potentially unsafe communications for further analysis and/or blocking. A method of one embodiment operates to use a number of template fingerprints to detect and classify unknown communications as spam, phishing, and/or other unwanted communications. | 08-23-2012 |
20130339456 | TECHNIQUES TO FILTER ELECTRONIC MAIL BASED ON LANGUAGE AND COUNTRY OF ORIGIN - Techniques to detect spam using language and a country of origin of an e-mail may include receiving an e-mail message for a recipient, detecting a country of origin for the e-mail message and detecting a language of the e-mail message. A technique may further include determining a country frequency with which the recipient communicates with the country of origin by e-mail, and a language frequency with which the recipient communicates in the language by e-mail. A technique may assign a first score to the message according to the country frequency, and a second score to the message according to the language frequency. The scores may used to determine whether the e-mail message is spam. Other embodiments are described and claimed. | 12-19-2013 |
20140006522 | TECHNIQUES TO SELECT AND PRIORITIZE APPLICATION OF JUNK EMAIL FILTERING RULES | 01-02-2014 |
Patent application number | Description | Published |
20090327519 | ADDING INDIVIDUAL DATABASE FAILOVER/SWITCHOVER TO AN EXISTING STORAGE COMPONENT WITH LIMITED IMPACT - High availability architecture that employs a mid-tier proxy server to route client communications to active data store instances in response to failover and switchover. The proxy server includes an active manager client that interfaces to an active manager in each of the backend servers. State information and configuration information are maintained separately and according to semantics consistent with needs of corresponding data, the configuration information changing less frequently and more available, the state information changing more frequently and less available. The active manager indicates to the proxy server which of the data storage instances is the currently the active instance. In the event that the currently active instance is inactive, the proxy server selects a different backend server that currently hosts the active data store instance. Client communications are then routed to the different backend server with minimal or no interruption to the client. | 12-31-2009 |
20100228827 | STORAGE MODEL FOR MAINTAINING STRUCTURED DOCUMENT FIDELITY - Architecture that introduces storage of an extra (skeleton) property of a document as well as default document properties on a server. In a specific messaging implementation, a MIME skeleton property is stamped on an arriving MIME messages. An incoming MIME message is shredded and all content that is currently saved to MAPI properties continues to be saved. The remaining message content that is not saved to the MAPI properties is stored in the skeleton property. The skeleton property includes all body part headers and any body part content that was not saved as a property on the item by the server. On retrieval of this message by a MIME client, the MIME message is regenerated in full fidelity by using the default set of properties in combination with the skeleton (or extra) property and the stored body content. | 09-09-2010 |
20110185136 | MOVING LARGE DYNAMIC DATASETS VIA INCREMENTAL CHANGE SYNCHRONIZATION - Incremental change synchronization for moving large data sets may be provided. Source data to be moved may be identified and a snapshot of the data may be created. The data may be moved to a new datastore and a second snapshot may be created. The snapshots may be compared to identify any data elements that have been modified and the modified elements may be copied to the new datastore. | 07-28-2011 |
20120143894 | Acquisition of Item Counts from Hosted Web Services - A web Application Programming Interface (API) server receives a statistics request from a client. The statistics request is a request to invoke an item counting method defined in an API provided by the web API server. The statistics request specifies a keyword string and multiple target data repositories. As a response to the statistics request, the web API server sends a statistics response to the client. The statistics response specifies an item count that indicates how many relevant items are in the target data repositories. Each of the relevant items is associated with at least one keyword in the keyword string. | 06-07-2012 |
20120150917 | USAGE-OPTIMIZED TABLES - Systems and methods are disclosed for employing usage-optimized tables with a computer database system. In one embodiment, the database system stores create, update, and delete database operations in the usage-optimized table. The create, update, and delete database operations remain in the usage-optimized table until a flush condition is reached. When the flush condition is reached, the create, update, and delete operations are transferred to their corresponding real tables. In embodiments, the read operation does not flush the contents of the usage-optimized table to the real table. In such embodiments, the database system modifies read operations to account for data resident on the usage-optimized tables. | 06-14-2012 |
20120331336 | ADDING INDIVIDUAL DATABASE FAILOVER/SWITCHOVER TO AN EXISTING STORAGE COMPONENT WITH LIMITED IMPACT - High availability architecture that employs a mid-tier proxy server to route client communications to active data store instances in response to failover and switchover. The proxy server includes an active manager client that interfaces to an active manager in each of the backend servers. State information and configuration information are maintained separately and according to semantics consistent with needs of corresponding data, the configuration information changing less frequently and more available, the state information changing more frequently and less available. The active manager indicates to the proxy server which of the data storage instances is the currently the active instance. In the event that the currently active instance is inactive, the proxy server selects a different backend server that currently hosts the active data store instance. Client communications are then routed to the different backend server with minimal or no interruption to the client. | 12-27-2012 |
20130086381 | MULTI-SERVER AUTHENTICATION TOKEN DATA EXCHANGE - A client is authenticated by a server receiving an initial request from the client at the beginning of a session. The server receiving the initial request generates an authentication token and returns the authentication token to the client in response to the client being authenticated. The user's credentials used to authenticate the client are stored in the authentication token along with other information. After receiving the authentication token from the server that generated the authentication token, the client passes the authentication token with each of the future requests to the pool of servers. Using the client to pass the transferrable authentication token, the servers share the user's identity/credentials in a decentralized manner. Any server from the shared pool of servers that receives a subsequent client request is able to decrypt the token and re-authenticate the user without having to prompt the client for authentication credentials again. | 04-04-2013 |
20130191465 | FACILITATING MESSAGE SERVICES USING MULTI-ROLE SYSTEMS - Systems, methods, and software are provided for facilitating a message service. A multi-role system is identified based on where an active message database associated with a user identity resides. Service communications generated by a messaging client associated with the user identity are directed from an entry system to the multi-role system for handling in the multi-role system by a messaging server and a content server to provide the message service. | 07-25-2013 |
20140133485 | DATA PACKET ROUTING - Among other things, one or more techniques and/or system are provided for routing a data packet. Because the data packet may correspond to a source device having an address on a first network that may be similar to an address of a second device on a second network, the data packet may be translated to create a transformed data packet that may be distinguishable from data packets of the second device. For example, the data packet may be translated from a first address format, such as IPv4, to a second address format, such as IPv6, to create a transformed data packet. The transformed data packet may comprise a prefix that may distinctly identify the source device during routing. In this way, the transformed data packet may be identifiable as corresponding to the source device during routing through a network to a destination device. | 05-15-2014 |
Patent application number | Description | Published |
20090222559 | Address Management in a Connectivity Platform - Disclosed are an approach form managing and assigning addresses in a connectivity platform that allows for proprietary connectivity modules (Providers) to plug into the operating system. In this disclosure, when a user/application/computing device, connects to another user on another computing device an address is generated for that user. However, because of a limited number of addresses that are available in an address space, it is necessary to ensure that a conflicting address is not present. To ensure this the connectivity platform determines if the address assigned is in conflict with another address associated with users that are located on the other computing devices. If an address is found to be in conflict the connectivity platform reassigns the address until a non-conflicting address is found. If a non-conflicting address cannot be found the connectivity platform blocks the connection between the user and the other user. | 09-03-2009 |
20090222568 | Connectivity Platform - Disclosed are a connectivity platform that allows for proprietary connectivity modules to plug into the operating system and also allows the operating system users and various existing networking applications in the operating system that are authorized by those providers to use that connectivity via existing APIs without the need for the applications to change or for extra configuration of the application to be performed. In an example disclosed herein, the providers provide NAT or firewall traversal and implement the appropriate transport mechanism. This allows for applications and computing devices to communicate in environments where connectivity is prevented by intermediate systems. | 09-03-2009 |
20100172358 | Quality of Service Support for A/V Streams - An access control mechanism in a network connecting one or more sink devices to a server providing audio/visual data (A/V) in streams. As a sink device requests access, the server measures available bandwidth to the sink device. If the measurement of available bandwidth is completed before the sink device requests a stream of audio/visual data, the measured available bandwidth is used to set transmission parameters of the data stream in accordance with a Quality of Service (QoS) policy. If the measurement is not completed when the data stream is requested, the data stream is nonetheless transmitted. In this scenario, the data stream may be transmitted using parameters computed using a cached measurement of the available bandwidth to the sink device. If no cached measurement is available, the data stream is transmitted with a low priority until a measurement can be made. Once the measurement is available, the transmission parameters of the data stream are re-set. With this access control mechanism, A/V streams may be provided with low latency but with transmission parameters accurately set in accordance with the QoS policy. | 07-08-2010 |
20130117446 | ADDRESS MANAGEMENT IN A CONNECTIVITY PLATFORM - Disclosed are an approach form managing and assigning addresses in a connectivity platform that allows for proprietary connectivity modules (Providers) to plug into the operating system. In this disclosure, when a user/application/computing device, connects to another user on another computing device an address is generated for that user. However, because of a limited number of addresses that are available in an address space, it is necessary to ensure that a conflicting address is not present. To ensure this the connectivity platform determines if the address assigned is in conflict with another address associated with users that are located on the other computing devices. If an address is found to be in conflict the connectivity platform reassigns the address until a non-conflicting address is found. If a non-conflicting address cannot be found the connectivity platform blocks the connection between the user and the other user. | 05-09-2013 |
20140369358 | CONNECTIVITY PLATFORM - Disclosed are a connectivity platform that allows for proprietary connectivity modules to plug into the operating system and also allows the operating system users and various existing networking applications in the operating system that are authorized by those providers to use that connectivity via existing APIs without the need for the applications to change or for extra configuration of the application to be performed. In an example disclosed herein, the providers provide NAT or firewall traversal and implement the appropriate transport mechanism. This allows for applications and computing devices to communicate in environments where connectivity is prevented by intermediate systems. | 12-18-2014 |
Patent application number | Description | Published |
20110024630 | System, Device, and Methods for Real-Time Screening of Live Cells, Biomarkers, and Chemical Signatures - An ATR-FTIR device and system are described that defect live-cell responses to stimuli and perturbations in real-time. The system and device can monitor perturbations resulting from exposures to various physical, chemical, and biological materials in real-time, as well as those sustained over a long period of time, including those associated with stimuli having unknown modes-of-action (e.g. nanoparticles). The device and system can also be used to identify specific chemical species or substances that profile cellular responses to these perturbations. | 02-03-2011 |
20110033613 | Method and Composition for Protection of Refractory Materials in Aggressive Environments - A method and composition are disclosed that provide protection of refractory materials used, e.g., in kiln and slagging coal-gasifier operations. Inert high-temperature melting crystalline compounds and glasses are used to fill defects on the surface and/or interior of the refractory material. At the operation temperatures, the inert crystalline compound mixes with slag and increases the viscosity and melting point temperature, reducing the ability of the slag to penetrate into the refractory, which minimizes breakdown of the refractory material. The same scheme can potentially be applied to sealing of geological formations, e.g., for CO | 02-10-2011 |
20110155720 | Directed Energy Melter - Directed energy melter. The melter includes a vessel and structure for introducing waste material into the vessel. Waveguide structure is provided for introducing millimeter wave electromagnetic radiation into the vessel to heat the waste material. A gyrotron is a preferred source for the millimeter wave electromagnetic radiation. | 06-30-2011 |
Patent application number | Description | Published |
20090311539 | WEAR-RESISTANT COATING FOR POLYMERIC TRANSPARENCIES - A coating and associated method for coating is disclosed. The coating provides a hard, transparent coating to a substrate. A soft coating is first deposited upon the substrate, and a hard coating is then deposited upon the soft coating layer. The soft and hard coating layers both have the general composition SiO | 12-17-2009 |
20100116045 | BARRIER COATINGS FOR POLYMERIC SUBSTRATES - An exemplary embodiment provides coated polymeric substrates that have a polymeric substrate body with a coated surface. The surface coating includes more than one pair of coating layers. Each pair of coating layers includes a first applied coating layer and a second applied coating layer. In addition, an indicator, applied on top of or between coating layers, provides an indication of wear of the coating. | 05-13-2010 |
20100196621 | HYBRID COATINGS AND ASSOCIATED METHODS OF APPLICATION - A hybrid coating including a mixture of an organosilane component, a metal alkoxide component and a surfactant component. | 08-05-2010 |
20100239742 | DURABLE TRANSPARENT INTELLIGENT COATINGS FOR POLYMERIC TRANSPARENCIES - A hard, transparent coating for a substrate and associated method for coating is disclosed. The coating includes alternating layers of a soft coating and a hard coating. The coating further includes a sensor. The electrical resistivity of the sensor may be measured to determine if the coating has been degraded. The coating may further include a hydrophobic outer layer. | 09-23-2010 |
20100239870 | DURABLE UV BLOCKING TRANSPARENT COATING - A coating and associated method for coating is disclosed. The coating provides a hard, transparent, UV blocking coating for a substrate. A UV blocking layer is first deposited upon the substrate, and a hard coating is deposited above the UV blocking layer. A soft coating layer may be deposited between the UV blocking layer and the hard coating. The soft and hard coating layers may both have the general composition SiO | 09-23-2010 |
20100279027 | System And Method For Applying Abrasion-Resistant Coatings - A method for applying an abrasion-resistant coating to a substrate including the steps of generating an atmospheric plasma, introducing a precursor to the atmospheric plasma, the precursor being selected to form the abrasion-resistant coating, and positioning the substrate relative to the atmospheric plasma such that the atmospheric plasma deposits the abrasion-resistant coating onto the substrate. | 11-04-2010 |
20110117347 | BARRIER COATINGS FOR POLYMERIC SUBSTRATES - An exemplary embodiment provides coated polymeric substrates that have a polymeric substrate body with a coated surface. The surface coating includes more than one pair of coating layers. Each pair of coating layers includes a first applied coating layer and a second applied coating layer. In addition, an indicator, applied on top of or between coating layers, provides an indication of wear of the coating. The first and second applied coating layers have a thickness between about 3 to about 10 nanometers. The coating exhibits a Hall-Petch effect. | 05-19-2011 |
20130029139 | Durable Transparent Coatings for Aircraft Passenger Windows - A duplex coating scheme and associated method of formation, which includes a siloxane based soft coating and a plasma based SiOxCy hard coating used in combination to improve the durability of acrylic substrates used in aircraft window applications. | 01-31-2013 |
20130249572 | DURABLE TRANSPARENT INTELLIGENT COATINGS FOR POLYMERIC TRANSPARENCIES - A hard, transparent coating for a substrate and associated method for coating is disclosed. The coating includes alternating layers of a soft coating and a hard coating. The coating further includes a sensor. The electrical resistivity of the sensor may be measured to determine if the coating has been degraded. The coating may further include a hydrophobic outer layer. | 09-26-2013 |
20140065395 | BARRIER COATINGS FOR POLYMERIC SUBSTRATES - An exemplary embodiment provides coated polymeric substrates that have a polymeric substrate body with a coated surface. The surface coating includes more than one pair of coating layers. Each pair of coating layers includes a first applied coating layer and a second applied coating layer. In addition, an indicator, applied on top of or between coating layers, provides an indication of wear of the coating. The first and second applied coating layers have a thickness between about 3 to about 10 nanometers. The coating exhibits a Hall-Petch effect. | 03-06-2014 |
20140162037 | DURABLE UV BLOCKING TRANSPARENT COATING - A coating and associated method for coating is disclosed. The coating provides a hard, transparent, UV blocking coating for a substrate. A UV blocking layer is first deposited upon the substrate, and a hard coating is deposited above the UV blocking layer. A soft coating layer may be deposited between the UV blocking layer and the hard coating. The soft and hard coating layers may both have the general composition SiO | 06-12-2014 |
20140193645 | HYBRID COATINGS AND ASSOCIATED METHODS OF APPLICATION - A hybrid coating composition including an organosilane component, a metal alkoxide component and a surfactant component, with the metal alkoxide component present in the composition at a molar ratio of about 75:1 with respect to the surfactant component. The hybrid coating composition once cured on a transparent substrate has an initial clarity greater than 98. Transparent members are also disclosed that include a transparent substrate having the hybrid coating composition cured on a first major surface thereof. | 07-10-2014 |
20140322433 | DURABLE TRANSPARENT INTELLIGENT COATINGS FOR POLYMERIC TRANSPARENCIES - A hard, transparent coating for a substrate and associated method for coating is disclosed. The coating includes alternating layers of a soft coating and a hard coating. The coating further includes a sensor. The electrical resistivity of the sensor may be measured to determine if the coating has been degraded. The coating may further include a hydrophobic outer layer. | 10-30-2014 |