Patent application number | Description | Published |
20130328667 | REMOTE INTERACTION WITH SIRI - An electronic device is described. When this electronic device receives a command from another electronic device via a connection using an interface circuit on the electronic device, the electronic device provides the command from the interface circuit to a program module that executes on the portable electronic device, and the program module executes the command. The command may include: starting an application on the electronic device, turning off the application, and/or transitioning the application to a modified presentation operation mode. In this way, the other electronic device may remotely interact with the application on the electronic device. | 12-12-2013 |
20130331032 | CONFIGURING A CODEC FOR COMMUNICATING AUDIO DATA USING A BLUETOOTH NETWORK CONNECTION - In the described embodiments, when configuring a Bluetooth network connection between a first electronic device and a second electronic device, the first electronic device sends a configuration message to the second electronic device that indicates that a first codec is preferentially to be used when communicating audio data using the Bluetooth network connection. Upon receiving a response from the second electronic device that indicates that the first codec is permissible to use, the first electronic device configures itself to use the first codec when communicating audio data using the Bluetooth network connection. Otherwise, upon receiving a response from the second electronic device that indicates that the first codec is not permissible to use, the first electronic device configures itself to use a second codec when communicating audio data using the Bluetooth network connection. | 12-12-2013 |
20130331034 | Supplemental Audio Signal Processing for a Bluetooth Audio Link - Providing supplemental audio signal processing for a Bluetooth audio link. A wireless device may establish a bi-directional wireless audio link with a Bluetooth device. An indication may be received that the Bluetooth device supports audio signal processing. A device type of the Bluetooth device may be determined. The wireless device may perform one or more audio signal processing operations on audio data transmitted to and/or received from the Bluetooth device via the bi-directional wireless audio link. The audio signal processing operations may be selected based on the device type of the Bluetooth device, and may be performed in addition to audio signal processing operations which may be performed on the audio data by the Bluetooth device. | 12-12-2013 |
20140219193 | WIFI REAL-TIME STREAMING AND BLUETOOTH COEXISTENCE - A system and method for peer-to-peer communications is disclosed. A first wireless device receives a message from a second wireless device identifying communication requirements of a point-to-point communication involving the second wireless device. The first wireless device determines whether the second wireless device's communication requirements can be satisfied based on communication resources already committed for other communications. When the communication requirements of the second wireless device can be satisfied, the first wireless device generates a time sharing schedule to be used by the first and second wireless devices based on the already-committed communication requirements and the second device's communication requirements. The time sharing schedule may include a first portion for broadcast communication among a group of devices to which the first and second wireless devices belong, and a second portion for the point-to-point communications of the second wireless devices. | 08-07-2014 |
Patent application number | Description | Published |
20110099430 | METHOD AND SYSTEM TO MONITOR A DIVERSE HETEROGENEOUS APPLICATION ENVIRONMENT - A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner. | 04-28-2011 |
20110238838 | WEIGHTED REQUEST RATE LIMITING FOR RESOURCES - Methods and systems to automatically respond to consider the weight of a request when responding to requests associated with resources are described. In one embodiment, an interface module may be configured to receive a request associated with consumer identifier and a resource. A calculator module may be configured to determine a weight of the request and a usage module configured to calculate, using a processor, a usage level associated with the consumer identifier, the usage level based on a usage history associated with the consumer identifier. An enforcer module may also be configured to respond to the request based on the usage level and the weight of the request. In one embodiment, the usage module may also be configured to update the usage level associated with the consumer identifier based on the weight of the request. | 09-29-2011 |
20110264964 | SYSTEM AND METHOD FOR DEFINITION, CREATION, MANAGEMENT, TRANSMISSION, AND MONITORING OF ERRORS IN SOA ENVIRONMENT - A computer-implemented system and method for the definition, creation, management, transmission, and monitoring of errors in a SOA environment. An example embodiment includes: defining a common standard error data structure; automatically generating a unique identifier (ID) for each new error data instance; allowing customization of error data structure through extensions; creation and management of error instances that conform to this structure; ability to group errors across various dimensions; introducing the concept of an error library, the error library including a plurality of localizable error bundles, each of the error bundles including a plurality of error data instances for a particular domain, along with the associated metadata; automatically creating runtime artifacts for each error; ability to transmit errors either as faults or as part of the normal response payload; automatic error metric collection based on various error categories, and finally, tooling to help manage error libraries and reporting errors. | 10-27-2011 |
20110289092 | METHOD AND SYSTEM TO MONITOR A DIVERSE HETEROGENEOUS APPLICATION ENVIRONMENT - In various embodiments, a system and related method for organizing transactional data from a diverse and heterogeneous application environment is disclosed. In an example embodiment, a system includes a file system and one or more daemon indexers in electrical communication with the file system. The file system is arranged as a non-relational and serverless file system to allow for cost-effectiveness with ready scalability. The file system is to receive, in substantially real-time, unsorted transactional data from a publishing module. The one or more daemon indexers are arranged to receive the unsorted transactional data from the file system, organize the unsorted transactional data by operational characteristics, and store the organized transactional data on the file system. | 11-24-2011 |
20120254900 | FLOW TRACING THOUGH DIVERSE LOGICAL AND PHYSICAL APPLICATION AND INFRASTRUCTURE LAYERS/DEPENDENCIES - In various exemplary embodiments, a system and a related method and a related computer-readable medium to perform the method, for tracking numerous software calls in an enterprise environment is provided. The method includes tracking, during a runtime operation of the enterprise environment, layers through which each of the software calls passes. The tracking includes logging each of a multitude of physical components involved in each of the software calls, annotating each of the physical components with associated metadata, logging each of a multitude of logical components involved in the software calls, annotating each of the logical components with associated metadata, and logging a reliance of each of the physical components and the logical components on other physical and logical components. A dependency map is generated indicating the layers tracked in each of the software calls. | 10-04-2012 |
20130290794 | SYSTEM AND METHOD FOR DEFINITION, CREATION, MANAGEMENT, TRANSMISSION, AND MONITORING OF ERRORS IN SOA ENVIRONMENT - A computer-implemented system and method for the definition, creation, management, transmission, and monitoring of errors in a SOA environment. An example embodiment includes: defining a common standard error data structure; automatically generating a unique identifier (ID) for each new error data instance; allowing customization of error data structure through extensions; creation and management of error instances that conform to this structure; ability to group errors across various dimensions; introducing the concept of an error library, the error library including a plurality of localizable error bundles, each of the error bundles including a plurality of error data instances for a particular domain, along with the associated metadata; automatically creating runtime artifacts for each error; ability to transmit errors either as faults or as part of the normal response payload; automatic error metric collection based on various error categories, and finally, tooling to help manage error libraries and reporting errors. | 10-31-2013 |
20150186436 | METHOD AND SYSTEM TO MONITOR A DIVERSE HETEROGENEOUS APPLICATION ENVIRONMENT - In various embodiments, a system and related method for organizing transactional data from a diverse and heterogeneous application environment is disclosed. In an example embodiment, a system includes a file system and one or more daemon indexers in electrical communication with the file system. The file system is arranged as a non-relational and serverless file system to allow for cost-effectiveness with ready scalability. The file system is to receive, in substantially real-time, unsorted transactional data from a publishing module. The one or more daemon indexers are arranged to receive the unsorted transactional data from the file system, organize the unsorted transactional data by operational characteristics, and store the organized transactional data on the file system. | 07-02-2015 |
20150256479 | WEIGHTED REQUEST RATE LIMITING FOR RESOURCES - Methods and systems to automatically respond to consider the weight of a request when responding to requests associated with resources are described. In one embodiment, an interface module may be configured to receive a request associated with consumer identifier and a resource. A calculator module may be configured to determine a weight of the request and a usage module configured to calculate, using a processor, a usage level associated with the consumer identifier, the usage level based on a usage history associated with the consumer identifier. An enforcer module may also be configured to respond to the request based on the usage level and the weight of the request. In one embodiment, the usage module may also be configured to update the usage level associated with the consumer identifier based on the weight of the request. | 09-10-2015 |
20150261595 | SYSTEM AND METHOD FOR DEFINITION, CREATION, MANAGEMENT, TRANSMISSION, AND MONITORING OF ERRORS IN SOA ENVIRONMENT - A computer-implemented system and method for the definition, creation, management, transmission, and monitoring of errors in a SOA environment. An example embodiment includes: defining a common standard error data structure; automatically generating a unique identifier (ID) for each new error data instance; allowing customization of error data structure through extensions; creation and management of error instances that conform to this structure; ability to group errors across various dimensions; introducing the concept of an error library, the error library including a plurality of localizable error bundles, each of the error bundles including a plurality of error data instances for a particular domain, along with the associated metadata; automatically creating runtime artifacts for each error; ability to transmit errors either as faults or as part of the normal response payload; automatic error metric collection based on various error categories, and finally, tooling to help manage error libraries and reporting errors. | 09-17-2015 |
20160048446 | FLOW TRACING OF SOFTWARE CALLS - In various embodiments, a system, method, and a computer-readable medium for performing operations for tracking numerous software calls in an enterprise environment is provided. The method includes tracking, during a runtime operation of an enterprise environment, layers through which software calls pass. The tracking includes logging physical components involved in each of the software calls, annotating each of the physical components with metadata that is directly indicative of each of the physical components, and logging a reliance of each of the physical components on others of the physical components. Other systems and methods are disclosed. | 02-18-2016 |
Patent application number | Description | Published |
20090319029 | DOCKING APPARATUS AND METHODS OF USE - A system for treating an aneurysm in a blood vessel comprises a docking scaffold having with upstream and downstream ends, and a central passageway therebetween. The upstream end engages the blood vessel upstream of the aneurysm. A portion of a first and second scaffolds are slidably received in the central passageway such that an outside surface of the first and second scaffolds engage an inside surface of the docking scaffold. A double-walled filling structure has outer and inner walls and the filling structure is adapted to be filled with a hardenable fluid filling medium so that the outer wall conforms to an inside surface of the aneurysm and the inner wall forms a substantially tubular lumen to provide a path for blood flow therethrough. The double-walled filling structure is coupled with at least one of the first and second leg scaffolds in expanded configuration. | 12-24-2009 |
20100004728 | GRAFT ENDOFRAME HAVING AXIALLY VARIABLE CHARACTERISTICS - A prosthesis comprises a tubular body that is expandable from a contracted configuration to a radially expanded configuration. The tubular body has a total length and comprises a first section, a second section and a central section disposed therebetween. The total length of the tubular body in the expanded configuration is at least 95% of the total length of the tubular body in the contracted configuration. The three sections have a plurality of tubular rings, each with a plurality of struts having a length and coupled together to form a series of peaks and valleys. A connector couples adjacent tubular rings together. The length of the central section struts is different than the length of the other struts and the central section is coupled with both the first and second sections. | 01-07-2010 |
20100036360 | STENT GRAFT DELIVERY SYSTEM - A system for treating an aneurysm comprises an elongate flexible shaft and an expandable member. An expandable scaffold is disposed over the expandable member and may be expanded from a collapsed configuration to an expanded configuration. A double-walled filling structure is disposed over the scaffold and has an outer wall and an inner wall. The filling structure is adapted to be filled with a hardenable fluid filing medium so that the outer wall conforms to an inside surface of the aneurysm and the inner wall forms a substantially tubular lumen to provide a path for blood flow. In the expanded configuration the scaffold engages the inner wall of the filling structure. A tether is releasably coupled with the filling structure and the flexible shaft thereby constraining axial movement of the structures relative to each other. | 02-11-2010 |
20120016456 | Stent Graft Delivery System - A system for treating an aneurysm comprises an elongate flexible shaft and an expandable member. An expandable scaffold is disposed over the expandable member and may be expanded from a collapsed configuration to an expanded configuration. A double-walled filling structure is disposed over the scaffold and has an outer wall and an inner wall. The filling structure is adapted to be filled with a hardenable fluid filing medium so that the outer wall conforms to an inside surface of the aneurysm and the inner wall forms a substantially tubular lumen to provide a path for blood flow. In the expanded configuration the scaffold engages the inner wall of the filling structure. A tether is releasably coupled with the filling structure and the flexible shaft thereby constraining axial movement of the structures relative to each other. | 01-19-2012 |
20150216535 | STENT GRAFT DELIVERY SYSTEM - A system for treating an aneurysm comprises an elongate flexible shaft and an expandable member. An expandable scaffold is disposed over the expandable member and may be expanded from a collapsed configuration to an expanded configuration. A double-walled filling structure is disposed over the scaffold and has an outer wall and an inner wall. The filling structure is adapted to be filled with a hardenable fluid filing medium so that the outer wall conforms to an inside surface of the aneurysm and the inner wall forms a substantially tubular lumen to provide a path for blood flow. In the expanded configuration the scaffold engages the inner wall of the filling structure. A tether is releasably coupled with the filling structure and the flexible shaft thereby constraining axial movement of the structures relative to each other. | 08-06-2015 |
20150312721 | DETERMINING LOCATION BASED ON BOTH A DETECTED LOCATION AND A PREDICTED LOCATION - A system and method is described that computes an estimated current location for a client device based on both the detected current location and the predicted current location of the client device. By utilizing the predicted current location, the system and method may account for and compensate for anomalies and inaccuracies in the detected current location. Accordingly, the system and method provides a more accurate estimation for the current location of the client device based on examination of heuristics and a priori environmental data. In particular, the system and method compensates for detected locations that are impossible or improbable based on previous locations of the client device, the layout of the environment in which the client device is traversing, data describing the user of the client device, and/or data describing the client device. | 10-29-2015 |
20150312724 | FILTERING OUT ACCESS POINT DATA BASED ON NON-CONFORMITY WITH OTHER ACCESS POINT DATA - Methods and systems are described for filtering out signal strength data associated with access points and a client device using heuristic and intra-access point analysis. The filtered data may be used to approximate the location of the client device. By filtering signal strength values through a heuristic and intra-access point analysis; the systems and methods described eliminate inaccurate or anomalistic values, which may negatively alter the estimated location of the client device. Accordingly, the systems and methods may produce more accurate client device location estimates by intelligently examining detected signal strength values. | 10-29-2015 |
Patent application number | Description | Published |
20100242106 | SYSTEMS AND METHODS FOR USING END POINT AUDITING IN CONNECTION WITH TRAFFIC MANAGEMENT - The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result. | 09-23-2010 |
20110154443 | SYSTEMS AND METHODS FOR AAA-TRAFFIC MANAGEMENT INFORMATION SHARING ACROSS CORES IN A MULTI-CORE SYSTEM - A method for propagating authentication session information to a plurality of cores of a multi-core device includes establishing, by an authentication virtual server executing on a first core of a device intermediary to at least one client and server, a session for a user, the authentication virtual server authenticating the session. A traffic management virtual server executes on a second core of device, and receives a request to access a server via the session. The traffic management virtual server may identify, responsive to a determination that the session is not stored by the second core, from an identifier of the session that the first core established the session. The second core may send to the first core a request for data for the session identified by the identifier. The second core may receive from the first core a response to the second request identifying whether the session is valid. | 06-23-2011 |
20160094539 | SYSTEMS AND METHODS FOR PERFORMING SINGLE SIGN-ON BY AN INTERMEDIARY DEVICE FOR A REMOTE DESKTOP SESSION OF A CLIENT - The present disclosure is directed to systems and methods for performing single sign on by an intermediary device for a remote desktop session of a client. A first device intermediary to a plurality of clients and a plurality of servers authenticates a user and establishes a connection to the user's client device. The device provides a homepage including links to one or more remote desktop hosts associated with the user. The device receives a request to launch an RDP session with a remote desktop host via the homepage and generates RDP content, including a security token, for the user. The device receives a second request that includes the security token to launch the RDP session. The device validates the user using the security token and establishes a connection to the remote desktop host. The device signs into the desktop host using session credentials. | 03-31-2016 |
Patent application number | Description | Published |
20130254614 | SYSTEM AND METHODS FOR ERROR TOLERANT CONTENT DELIVERY OVER MULTICAST CHANNELS - A system and method for error tolerant content delivery is provided. A data file for transmission including metadata and data is received. The metadata includes mandatory portions and optional portions. The file is parsed into packets and transmitted as a data stream to a plurality of receiver devices, which may look for transmission errors in the control data of the data stream. Data streams comprising errors are discarded; otherwise, the receiver device converts the data stream into the native file format and stores it. The system may bifurcate each data file into the common encrypted content and the uniquely encrypted portion. The commonly encrypted portion of the file may be transmitted to a plurality of receiver devices using a multicast transmission medium, and the relatively small uniquely encrypted portions may be transmitted using a unicast method to each receiver individually. The receiver device may then reconstitute the DRM data file. | 09-26-2013 |
20130276065 | SYSTEM AND METHODS FOR RECEIVING AND CORRECTING CONTENT TRANSMITTED OVER MULTICAST CHANNELS - In one embodiment of the invention, a system and method for receiving and correcting content is provided. A receiver receives a plurality of transmission with embedded content key identifiers. Data packets for which the receiver has a corresponding authentication key are authenticated. Non-successful authentications, or data packets without a corresponding authentication key, are ignored by the receiver. The receiver checks if the content is encrypted. If so, the content may also be decrypted using content decryption keys stored within the receiver. Authentication keys and decryption keys may be updated via secure transmissions. The receiver status is monitored for incomplete and/or corrupted content receipt. The failed content may be retransmitted to the receiver over radio transmitters. Failed content may also be supplied to the receiver via the backchannel. Retransmission of the content may be performed according to a content delivery schedule. | 10-17-2013 |
20160100311 | SECURE BROADCAST BEACON COMMUNICATIONS - Using various embodiments, methods and systems for secure Bluetooth Low Energy communications, in an unconnected state, are described herein. In one embodiment, conventional BLE transmitting device data can be supplemented with authentication information, including a message authentication field which enables receivers to determine if the received beacon/transmitted BLE peripheral data is genuine. In another embodiment, the authentication data can also include a time varying value field in order to prevent unintentional acceptance of transmitting device data from unauthorized replicated BLE peripherals. In one embodiment, the transmitting device computes an authentication tag using at least a secret key known to the receiving device and transmits the authentication tag to the receiving device. The receiving device can compute an authentication value using the secret key and other transmitting device information and determine if the transmitting device data is genuine by comparing the computed authentication value and the received the authentication tag. | 04-07-2016 |
Patent application number | Description | Published |
20110045841 | MATCHING A LOCATION OF A CONTACT WITH A TASK LOCATION - An alert system is provided. The alert system includes a processor and a memory coupled to the processor. The memory is computer-readable storage media configured to store instructions that are operable to be executed by the processor. The memory stores instructions that may be executed to determine a physical location of a contact in a contact list or a user managing the contact list; determine a physical location associated with a task in a task list; compare the physical location of the contact with the physical location associated with the task; determine when the physical location of the contact matches the physical location associated with the task; and transmit an alert message indicating the contact and the task. | 02-24-2011 |
20140146127 | Capturing Video through a Display - An image is displayed from a transparent display according to a first signal. Light passing through the display is received, and a second signal is generated from the received light. A third signal is generated from the first signal and the second signal by eliminating data in the second signal corresponding to the image. | 05-29-2014 |
20150350845 | Indoor Location Survey - Methods, systems, and computer program product for generating location fingerprint data for a venue are described. A sampling device surveying a venue can move inside the venue. While the sampling device moves, the sampling device can record environmental readings including, for example, strengths of signals from multiple radio signal sources. The sampling device can take the recording at fixed or various time intervals. Meanwhile, the sampling device can determine, based on a starting point and motion sensor readings, an estimated location of the mobile device for each time the sampling device takes the recordings. The sampling device can display a motion path of the estimated locations and a user interface item for receiving a user input for correcting the estimated locations. The sample device can tag the recorded environmental readings with the corrected locations, and submit the tagged readings to a server for determining a location fingerprint for the venue. | 12-03-2015 |
Patent application number | Description | Published |
20100030798 | Systems and Methods for Tagging Emails by Discussions - The invention provides for techniques to process and produce email documents. The techniques provide for organizing a first plurality of email documents into a plurality of document groups, reviewing a document group from the plurality of document groups, and associating a review content with the document group. The techniques provide for ways to propagate the review content to one or more email documents associated with the document group and producing a second plurality of email documents. The techniques provide for annotating one or more email documents in accordance with the review content. Depending on the embodiment, review content may include text, graphics, audio, tag, and multimedia information. Produced documents can be searched and browsed in accordance with information in the review content. Email documents can be grouped by information in meta information and/or header information associated with the email documents into various groups, including threads or conversations, for example. | 02-04-2010 |
20120158728 | SYSTEMS AND METHODS FOR TAGGING EMAILS BY DISCUSSIONS - The invention provides for techniques to process and produce email documents. The techniques provide for organizing a first plurality of email documents into a plurality of document groups, reviewing a document group from the plurality of document groups, and associating a review content with the document group. The techniques provide for ways to propagate the review content to one or more email documents associated with the document group and producing a second plurality of email documents. The techniques provide for annotating one or more email documents in accordance with the review content. Depending on the embodiment, review content may include text, graphics, audio, tag, and multimedia information. Produced documents can be searched and browsed in accordance with information in the review content. Email documents can be grouped by information in meta information and/or header information associated with the email documents into various groups, including threads or conversations, for example. | 06-21-2012 |
Patent application number | Description | Published |
20100299312 | Write interceptor for tracking changes to a disk image - Changes are tracked by tracking a change request which when performed by a disk driver changes a portion of disk storage. The change request is allowed to pass to the disk driver to be performed by the disk driver. Information associated with the change request is stored in an operating system's persistent storage. A differential backup is performed using the information associated with the change request stored in the operating system's persistent storage after a system, which includes the disk driver and the disk storage, has shut down and restarted. | 11-25-2010 |
20110173159 | DATA MOVER DISCOVERY OF OBJECT EXTENT - Performing data backup for a client includes receiving, at a host other than the client, volume information including data indicating a physical data storage location of at least a part of a volume comprising one or more stored objects associated with the client; and determining at the host, based at least in part on the volume information, a stored object information for a stored object included in the volume, the stored object information including data associated with a physical data storage location of the stored object. | 07-14-2011 |
20110307447 | Inline Wire Speed Deduplication System - Systems for performing inline wire speed data deduplication are described herein. Some embodiments include a device for inline data deduplication that includes one or more input ports for receiving an input data stream containing duplicates, one or more output ports for providing a data deduplicated output data stream, and an inline data deduplication engine coupled to said one or more input ports and said one or more output ports to process input data containing duplicates into output data which is data deduplicated, said inline data deduplication engine having an inline data deduplication bandwidth of at least 4 Gigabytes per second. | 12-15-2011 |
20120303587 | BACKUP INFORMATION MANAGEMENT - Information management is disclosed. A file output from an application to an operating system is intercepted before the file output arrives at the operating system. The file output is directed towards protected data. The intercepted file output is analyzed to determine whether a predetermined type of version of the protected data has been created. In the event it is determined that the predetermined type of version of the protected data has been created at least in part because the analyzed intercepted file output includes a modification to the protected data, the protected data automatically backed up, including by storing at least a portion of the file output as a backup version of the protected data. In the event it is determined that the predetermined type of version of the protected data has not been created, the protected data is not backed up. | 11-29-2012 |
20130173550 | FILE SYSTEM QUIESCING DRIVER - A technique is disclosed for quiescing a file system. The technique includes holding a change request, flushing the file system, and releasing the change request. Flushing may include sending a flush request, determining whether a cache associated with the file system is flushed, and in the event that the cache is not flushed, resending the flush request and determining whether the cache is flushed. | 07-04-2013 |
20130318051 | SHARED DICTIONARY BETWEEN DEVICES - In one embodiment, a system and method for managing a network deduplication dictionary is disclosed. According to the method, the dictionary is divided between available deduplication engines (DDE) in deduplication devices that support shared dictionaries. The fingerprints are distributed to different DDEs based on a hash function. The hash function takes the fingerprint and hashes it and based on the hash result, it selects one of the DDEs. The hash function could select a few bits from the fingerprint and use those bits to select a DDE. | 11-28-2013 |
20160026654 | DATA MOVER DISCOVERY OF OBJECT EXTENT - Performing data backup for a client includes receiving, at a host other than the client, volume information including data indicating a physical data storage location of at least a part of a volume comprising one or more stored objects associated with the client; and determining at the host, based at least in part on the volume information, a stored object information for a stored object included in the volume, the stored object information including data associated with a physical data storage location of the stored object. | 01-28-2016 |
Patent application number | Description | Published |
20150161048 | System and Method for Maintaining Cache Coherency - A cache manager maintains coherency of cached objects used by applications in a computing system. The cache manager maintains a cache memory of objects as they are accessed by an application. The cache manager tracks cached objects on a per-application basis using a cache database, storing for each object metadata comprising the generation number of the application using the cached object, and the file generation number of the file from which the object was read. The cache manager determines whether cached objects are valid and can be used by the application, or are stale and must be reloaded, by using these generation numbers when an application attempts to use a file or object. In this fashion, cache coherency is maintained even in a distributed environment without the centralized cache management bottlenecks of prior approaches and without the need to eagerly purge the cache of stale versions of objects. | 06-11-2015 |
20150358417 | Systems and Methods to Manage Write Commands in a Cache - When a virtual machine sends a write command to a host operating system, a cache system stores the record included in the write command and later sends the write command to a storage system. Systems and methods store an indication of when the write command was received along with the received records in the cache. The cache system determines an order of the records from the indication. In some instances, records received at the same time are serialized and/or assigned record numbers. The simultaneously received records can be assigned a batch number. According to the determined order, the records are retrieved from the cache memory and included in write commands sent to the storage system. In some instances, checkpoints can be stored to prevent records from being re-sent to the storage system following a failure. | 12-10-2015 |
20160041916 | Systems and Methods to Manage Cache Data Storage - Systems and methods for managing records stored in a storage cache are provided. A cache index is created and maintained to track where records are stored in buckets in the storage cache. The cache index maps the memory locations of the cached records to the buckets in the cache storage and can be quickly traversed by a metadata manager to determine whether a requested record can be retrieved from the cache storage. Bucket addresses stored in the cache index include a generation number of the bucket that is used to determine whether the cached record is stale. The generation number allows a bucket manager to evict buckets in the cache without having to update the bucket addresses stored in the cache index. Further, the cache index can be expanded to accommodate very small records, such as those generated by legacy systems. | 02-11-2016 |
Patent application number | Description | Published |
20150039606 | SEARCH PHRASE MODIFICATION - A user may submit a search string to a system. Before processing the search, the system may analyze the search string and modify it. For example, the search string may be modified by treating some terms as a phrase, by dropping some terms, by treating some terms as attributes, or any suitable combination thereof. The modification of the search string may be based on an analysis of prior search strings and user actions. The results of a search based on the modified search string may be returned to the user. | 02-05-2015 |
20150081662 | CATEGORY CONSTRAINED QUERIES - A user may submit a search query to a search engine. The search engine may process the search query and generate a set of results. Each of the items searched by the search engine may have been pre-assigned to a category in a category tree. Previous interactions by other users with the items after similar queries may have been recorded. The search engine may identify categories based on the distribution of the interacted-with results among the categories. The category tree may be analyzed at different levels, based on the entropy observed at each level. A level with low entropy may be chosen, and categories at that level used to constrain the query. | 03-19-2015 |
20150081679 | FOCUSED SEARCH TOOL - A user may select text, an image, or other content being displayed on a device. The device may generate a search query based on the selection and transmit the search query to a server. Based on the search query, the server may generate multiple search options. The server may rank the generated search options and transmit some or all of the generated search options to the user device. The user device may receive the transmitted search options and present one or more of them in a user interface. The user may activate a search option. The user device may transmit the activated search option to the server, which may respond with search results for the activated search option. The user device may then display the search results to the user. | 03-19-2015 |
Patent application number | Description | Published |
20150098392 | MULTIDIMENSIONAL ALGORITHM FOR ROAMING - Methods, devices, and apparatuses are described for wireless communications using a multidimensional algorithm for roaming. In one aspect, an initial set of candidate access points (APs) is produced by a station using a roaming scan. The initial set may be identified based at least in part on an initial metric (e.g., beacon signal strength). A probe signal may be transmitted by the station to at least one of the candidate APs in the initial set and information may be received in response to the probe signals. The station may then identify a reduced set from the initial set based at least in part on the received information, where the reduced set is used to select a target AP. At least one additional metric may be identified and the probe signal may be configured to obtain information corresponding to the additional metrics. This information may be used by the station to select the candidate APs in the reduced set. | 04-09-2015 |
20150338512 | ROUND TRIP TIME ACCURACY IMPROVEMENT IN VARIED CHANNEL ENVIRONMENTS - Methods, systems, and devices are described that provide for wireless ranging. The methods, systems, and/or devices may include tools and techniques that provide for determining a range based on a TOD and a TOA that is adjusted based on a mean FAC. A probe may be transmitted from a transmitter to a receiver. The transmitter may receive a response, from the receiver. A strongest path within the response may be identified. A threshold may be determined. A plurality of FAC values may be identified, which exceed the threshold and precede the strongest path within the response. After the plurality of FAC values are identified, a mean FAC may be determined based at least in part on the plurality of FAC values. A TOA of the response may be adjusted based on the mean FAC. A range to the receiver may be determined based on a TOD and the adjusted TOA. | 11-26-2015 |
20160057656 | DELAY SPREAD ESTIMATION AND UTILIZATION - Methods, systems, and devices are described for wireless communication at a wireless communication device. A wireless communication device may receive a data frame and use it to estimate a residual channel length (RCL). The device may then modify a finite impulse response (FIR) filter based on the estimated RCL. For example, the device may add additional taps to the FIR filter. The device may continue to adjust the FIR filter until the RCL is at or near zero. In some cases, the wireless communication device may send an indication to the transmitting device to adjust an FIR filter based on the estimated RCL. In some cases, the length of a guard interval may also be adjusted based on the estimated RCL. | 02-25-2016 |
20160088567 | ADAPTING BLIND RECEPTION DURATION FOR RANGE AND CONGESTION - Methods, systems, and devices are described for adapting blind reception duration for range and congestion. A wireless station may measure channel conditions (e.g., range to an access point (AP) and channel congestion), and adjust one or more sleep timers based on the conditions. The sleep timers may each be associated with a window for reception of an expected transmission. If the transmission is not received in the window, the station may enter a sleep state to conserve power. In one example, a beacon miss timer is adjusted, and the expected wireless transmission is a delivery traffic indication message (DTIM). In another example, a content after beacon (CAB) timer is adjusted and the expected wireless transmission is the CAB. In some cases, the station may measure a delay for a number of beacons and determine the adjustment based on the delays. | 03-24-2016 |
Patent application number | Description | Published |
20120190341 | Enhanced Manageability in Wireless Data Communication Systems - A cellular network system comprises a device identifier comparator and a connection enable indicator. A device identifier comparator for comparing a received device identifier with one of a plurality of stored device identifiers, wherein the one of the stored plurality of stored device identifiers is associated with a stored subscriber identifier. A connection enable indicator for indicating whether a connection from a cellular device associated with the received device identifier to a data network associated with the cellular network system should be enabled. | 07-26-2012 |
20140155034 | ENHANCED MANAGABILITY IN WIRELESS DATA COMMUNICATION SYSTEMS - A cellular network system comprises a device identifier comparator and a connection enable indicator. A device identifier comparator for comparing a received device identifier with one of a plurality of stored device identifiers, wherein the one of the stored plurality of stored device identifiers is associated with a stored subscriber identifier. A connection enable indicator for indicating whether a connection from a cellular device associated with the received device identifier to a data network associated with the cellular network system should be enabled. | 06-05-2014 |
20140241169 | CONNECTIVITY MANAGEMENT AND DIAGNOSTICS FOR CELLULAR DATA DEVCIES - A cellular network device comprises a data network indicator and an automatic network reconfiguration module. A data network indicator provides an indication when data network connectivity associated with a cellular network does not meet performance or configuration criteria. An automatic network reconfiguration module automatically reconfigures network data connectivity in the event that an indication has been provided that data network connectivity does not meet performance or configuration criteria. A cellular network device comprises a data network indicator and a management channel. A data network indicator for providing an indication when data network connectivity associated with a cellular network does not meet performance or configuration criteria. A management channel for enabling automatic access in the event that an indication is received that data network connectivity does not meet performance or configuration criteria, wherein the management channel enables automatic access to the cellular network device for administrative maintenance or reporting. | 08-28-2014 |
20150071086 | CONNECTIVITY MANAGEMENT AND DIAGNOSTICS FOR CELLULAR DATA DEVICES - A cellular network device comprises a data network indicator and an automatic network reconfiguration module. A data network indicator provides an indication when data network connectivity associated with a cellular network does not meet performance or configuration criteria. An automatic network reconfiguration module automatically reconfigures network data connectivity in the event that an indication has been provided that data network connectivity does not meet performance or configuration criteria. A cellular network device comprises a data network indicator and a management channel. A data network indicator for providing an indication when data network connectivity associated with a cellular network does not meet performance or configuration criteria. A management channel for enabling automatic access in the event that an indication is received that data network connectivity does not meet performance or configuration criteria, wherein the management channel enables automatic access to the cellular network device for administrative maintenance or reporting. | 03-12-2015 |
20150126161 | ENHANCED MANAGEABILITY IN WIRELESS DATA COMMUNICATION SYSTEMS - A cellular network system comprises a device identifier comparator and a connection enable indicator. A device identifier comparator for comparing a received device identifier with one of a plurality of stored device identifiers, wherein the one of the stored plurality of stored device identifiers is associated with a stored subscriber identifier. A connection enable indicator for indicating whether a connection from a cellular device associated with the received device identifier to a data network associated with the cellular network system should be enabled. | 05-07-2015 |
20150333961 | CONNECTIVITY MANAGEMENT AND DIAGNOSTICS FOR CELLULAR DATA DEVCIES - A cellular network device comprises a data network indicator and an automatic network reconfiguration module. A data network indicator provides an indication when data network connectivity associated with a cellular network does not meet performance or configuration criteria. An automatic network reconfiguration module automatically reconfigures network data connectivity in the event that an indication has been provided that data network connectivity does not meet performance or configuration criteria. A cellular network device comprises a data network indicator and a management channel. A data network indicator for providing an indication when data network connectivity associated with a cellular network does not meet performance or configuration criteria. A management channel for enabling automatic access in the event that an indication is received that data network connectivity does not meet performance or configuration criteria, wherein the management channel enables automatic access to the cellular network device for administrative maintenance or reporting. | 11-19-2015 |