Patent application number | Description | Published |
20100241639 | APPARATUS AND METHODS FOR CONCEPT-CENTRIC INFORMATION EXTRACTION - Disclosed are methods and apparatus for extracting (or annotating) structured information from web content. Web content of interest from a particular domain is represented as one or more tree instances having a plurality of branching nodes that each correspond to a web object such that the tree instances correspond to one or more structured data instances. The particular domain is associated with domain knowledge that includes one or more presentation rulesets that each specifies a particular structure for a set of data instances, a domain-specific concept labeler, one or more specified properties of the web objects in the tree instances, and a concept schema that specifies a representation of the data to be extracted from the web content. A structured data instance that conforms to the concept schema is extracted from the one or more tree instances based on the domain knowledge for the particular domain. Extraction of the structured data instances is accomplished by (i) using the domain-specific concept labeler to annotate a subset of nodes of the tree instances; and (ii) using a locally adaptive concept annotator to extract the structured data instances based on the annotated segments and the local properties associated with such annotated segments. The extracted structured data instance is stored as structured output records in a database. | 09-23-2010 |
20110090816 | FIBRE CHANNEL SWITCH THAT ENABLES END DEVICES IN DIFFERENT FABRICS TO COMMUNICATE WITH ONE ANOTHER WHILE RETAINING THEIR UNIQUE FIBRE CHANNEL DOMAIN_IDs - A Fibre Channel Switch which enables end devices in different Fabrics to communicate with one another while retaining their unique Fibre Channel Domain_IDs. The Switch is coupled to a first fabric having a first set of end devices and a second fabric having a second set of end devices. The Switch is configured to enable communication by the first set of end devices associated with the first fabric with the second set of end devices associated with the second set of end devices using the unique Domain_IDs of each of the first set and the second set of end devices. In one embodiment of the invention, the first and second fabrics are first and second Virtual Storage Array Networks (VSANs) respectively. In an alternative embodiment, the first fabric and the second fabric are separate physical fabrics. | 04-21-2011 |
20130086128 | BUSINESS CONTENT HIERARCHY - A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy. | 04-04-2013 |
20130144870 | RESULTS RETURNED FOR LIST-SEEKING QUERIES - List-based search results are generated. According to one technique, items are extracted from multiple resources deemed relevant to a user-submitted search query, and a comprehensive master list of those items is compiled and returned to the query-submitted user in response to his submission. According to another technique, lists of items are identified within such query-relevant resources. For each list-containing resource deemed to be relevant to the query terms, a list is extract from that resource and included within that resource's abstract on the search results page returned to the user in response to his submission. Additionally, the resources may be re-ranked for generation of the search results page based on the lists contained within those resources in addition to (or regardless of) occurrences of query terms within those resources. | 06-06-2013 |
20150248477 | BUSINESS CONTENT HIERARCHY - A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy. | 09-03-2015 |
Patent application number | Description | Published |
20080294495 | Methods of Processing and Segmenting Web Usage Information - A current behavioral targeting system is first tested using a suite of test data. The output of the test is one or more performance metrics. Next, newly proposed behavioral targeting system created. The newly proposed behavioral targeting system is then evaluated using both the existing source data and a new source data. The evaluation of the newly proposed behavioral targeting system produces one or more performance metrics of the same type earlier calculated. Finally, the two sets of performance metrics are compared. The performance metric difference represents the impact of the new source data. | 11-27-2008 |
20100076815 | STORAGE OPTIMIZATION FOR UPDATED USER BEHAVIORAL PROFILE SCORES - Scores are maintained usable by a behavioral targeting service for providing personalized content, such as advertisements. Event indications are processed, wherein the event indications being processed are indicative of user interaction generally with at least one online. It is determined, based at least in part on detected events (usable for scoring), scoring data indicative of user behavior relative to the at least one online service for each of a plurality of targeting categories. This includes updating the scoring data based on additional event indications being detected as being usable for generating scoring data for behavioral targeting. The updated scoring data is caused to be provided to the data store accessible to the behavioral targeting service when it has been determined that the updated scoring data will change the operation of the behavioral targeting service with respect to personalized content that would be served based on the updated scoring data. | 03-25-2010 |
20100077152 | PRIMARY-SECONDARY CACHING SCHEME TO ENSURE ROBUST PROCESSING TRANSITION DURING MIGRATION AND/OR FAILOVER - Scores are maintained usable by a behavioral targeting service. Each of a plurality of scoring engine partitions is provided events (first events) for at least one of the particular non-overlapping subsets of the users, and at least one particular scoring engine partition is also provided events (second events) for at least an additional one of said particular non-overlapping subsets of the users. The event indications are processed to determine updated scoring data indicative of behavior of the users represented by the detected events relative to the at least one online service and the updated scoring data are written to a persistent scoring engine storage. The particular scoring engine provides updated scores to the persistent scoring engine storage according to a first writeback caching scheme for updated scores determined from the first events and according to a second writeback caching scheme for updated scores determined from the second events. The time-to-live parameters are controlled for the first writeback caching scheme independently of controlling time-to-live parameters for the second writeback caching scheme. | 03-25-2010 |
20100082527 | DATED METADATA TO SUPPORT MULTIPLE VERSIONS OF USER PROFILES FOR TARGETING OF PERSONALIZED CONTENT - Profiles are maintained that are usable by a behavioral targeting service. A profile engine processes event indications that are both indicative of interaction by users generally with at least one online service and are specifically indicative of events usable for generating profile data for behavioral targeting to provide personalized content. It is determined which of a plurality of behavioral models to apply to an event indication based on a time associated with the event indication and time periods associated with the behavioral models. The determined behavioral model is applied to determine at least one updated profile. The behavioral targeting service determines which of the plurality of behavioral models to apply to the updated profile data based on a time associated with the updated profile, and processes the updated profile data provided by the profile engine according to the determined behavioral model and, based at least in part on the further processed updated profile data, causes personalized content to be provided in response to the request. | 04-01-2010 |
Patent application number | Description | Published |
20120078711 | AUTOMATED LOCAL ADVERTISING INTERFACE - Systems, methods, and computer program products for automating local content are described. In some implementations, an ad manager and a business table can be provided by a backend system. The business table can store, for example, user information, user account information including billing information, campaign related information and advertisement data associated with one or more local business advertisers as well as geo-targeting information. Based on the information stored in the business table, the ad manager can tailor a specific online advertising campaign on behalf of a local business advertiser. Where new or updated information is found, the ad manager can initiate campaign management updates to one or more business ad listings associated with the local business advertiser. | 03-29-2012 |
20140365298 | SMART BUDGET RECOMMENDATION FOR A LOCAL BUSINESS ADVERTISER - Spending data for local advertising campaigns for advertisements directed for a specific business location is analyzed in order to classify the campaigns by geographic location and type of each business. The server then determines the average and range of spending for a plurality of geographic and type classifications. This spending and classification data is stored by a server in order to identify reasonable and competitive budgets for other advertising campaigns. When an advertiser is interested in establishing a new campaign for a local business, the server may determine the classification for the business based on the location and type of the business. The server then retrieves the stored data in order to recommend one or more reasonable budgets for the advertiser. | 12-11-2014 |
20140372627 | FAULT-TOLERANT WEB CACHING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for monitoring capability to process web traffic. At various times, a web proxy announces a most specific route that is received by multiple clients configured to send web traffic for an address to a received most specific route to the address. The web proxy processes web traffic received from one of the clients as a result of announcing the route. When the web proxy determines a decrease in processing capability of the web proxy, the web proxy ceases to announce the most specific route such that one or more of the clients direct web traffic for the address to an alternative less specific route. | 12-18-2014 |
20150215388 | ANYCAST BASED, WIDE AREA DISTRIBUTED MAPPING AND LOAD BALANCING SYSTEM - This disclosure provides systems, methods, and apparatus for providing anycast based load balancing for a plurality of servers within a network. The network includes a domain name system (DNS) server that is configured to respond to domain name queries received from one or more clients. The DNS server maintains a set of anycast IP addresses associated with a domain name. The DNS server responds to a client's request with one or more selected anycast IP addresses from the set of anycast IP addresses. The DNS server also instructs a plurality of content servers to advertise all of the anycast IP addresses to the network. The DNS server also receives load information from each of the plurality of content servers, and instructs, based on the load information, one of the plurality of content servers to cease advertising one or more of the previously advertised anycast IP addresses. | 07-30-2015 |
Patent application number | Description | Published |
20120081598 | MEMS ACTUATOR DEVICE DEPLOYMENT - A method for making an actuator device includes forming a substantially planar structure having a stage resiliently supported for movement within a plane of the structure, an actuator coupled to an outer periphery of the stage and operable to apply a force acting in the plane and tangentially to the stage when actuated, the actuator comprising a fixed frame and a moving frame resiliently supported for reciprocal movement relative to the fixed frame by a motion control flexure, and an outer frame surrounding and supporting the stage and the actuator. The moving frame is moved to a deployed position that is coplanar with, parallel to and spaced apart from the fixed frame at a selected distance, and the moving frame is then fixed at the deployed position for substantially rectilinear, perpendicular movement relative to the fixed frame. | 04-05-2012 |
20120119324 | MEMS ISOLATION STRUCTURES - A device may comprise a substrate formed of a first semiconductor material and a trench formed in the substrate. A second semiconductor material may be formed in the trench. The second semiconductor material may have first and second portions that are isolated with respect to one another and that are isolated with respect to the first semiconductor material. | 05-17-2012 |
20120119325 | GUARD TRENCH - A device may comprise a substrate formed of a first semiconductor material, a first trench formed in the substrate, a second trench formed in the substrate proximate the first trench, an oxide layer formed in the first trench and the second trench, and a second semiconductor material formed upon the oxide layer. The oxide layer in the second trench may be adapted to mitigate undercut of the oxide layer in the first trench during an etching process. | 05-17-2012 |
20120119425 | ACTUATOR MOTION CONTROL FEATURES - A method for making a motion control feature for an actuator device of a type that has a moveable component coupled to an opposing fixed component for out-of-plane rotational movement relative thereto includes forming first and second flaps respectively extending from the moveable and fixed components and toward the opposing component and operable to effect one or more of damping movement of the moveable component relative to the fixed component and/or restraining movement of the moveable component relative to the fixed component in a direction substantially perpendicular to the actuator device. | 05-17-2012 |
20120119611 | ELECTRICAL ROUTING - An electronic device may have a MEMS device formed of a first conductive material. A trench may be formed in the MEMS device. A layer of non-conductive material may be formed in the trench. A second conductive material may be formed upon the non-conductive material. | 05-17-2012 |
20120119612 | MOTION CONTROLLED ACTUATOR - A device can have an outer frame and an actuator. The actuator can have a movable frame and a fixed frame. At least one torsional flexure and at least one hinge flexure can cooperate to provide comparatively high lateral stiffness between the outer frame and the movable frame and can cooperate to provide comparatively low rotational stiffness between the outer frame and the movable frame. | 05-17-2012 |
20120120262 | ROTATIONALLY DEPLOYED ACTUATORS - A method for making an actuator includes forming, e.g., using photolithography techniques, a substantially planar actuator device of an electrically conductive material, e.g., a semiconductor, to include an outer frame, a fixed frame coupled to the outer frame for rotational movement relative thereto, a moveable frame coupled to the outer frame for rotational movement relative thereto, and an actuator incorporating a plurality of interdigitated teeth, a fixed portion of which is attached to the fixed frame and a moving portion of which is attached to the moveable frame. The fixed frame is then rotated to a deployed position relative to the outer frame such that the fixed portion of the actuator teeth is disposed at a selected angle relative to the moving portion of the actuator teeth, and the position of the fixed frame relative to the outer frame is then fixed at the deployed position. | 05-17-2012 |
20120120507 | MOUNTING FLEXURE CONTACTS - A device may comprise a flexure formed of a first semiconductor material. A first trench may be formed in the flexure. The first trench may separate the first semiconductor material into a first portion and a second portion thereof. An oxide layer may be formed in the first trench. The oxide layer may extend over a top portion of the first semiconductor material. A second semiconductor material may be formed on the oxide layer. The first trench and the oxide layer may cooperate to electrically isolate the first portion and the second portion from one another. | 05-17-2012 |
20130036592 | MEMS Deployment Flexures - A flexure assembly can have a stage that is deployed to a desired position by attachment of the flexure assembly to a housing. For example, a frame can be configured to be held in position by one portion of the housing and a deployment pad can be configured to be held in position by another portion of the housing. A deployment flexure can be configured to facilitate positioning of the frame and the deployment pad out-of-plane with respect to one another. The deployment flexure and a motion control flexure can facilitate movement of the stage with respect to the housing. In this manner, the position of the stage and the preload of the stage are determined by the housing. | 02-14-2013 |
20130077168 | MULTIPLE DEGREE OF FREEDOM ACTUATOR - A multiple degree of freedom actuator can have at least one first MEMS actuator configured to move a platform in translation and at least one second MEMS actuator configured to move the platform in a different direction, e.g., tangentially. The first MEMS actuator(s) can facilitate autofocus and/or zoom, for example. The second MEMS actuator(s) can facilitate optical image stabilization (OIS), for example. | 03-28-2013 |
20130215325 | ARCUATE MOTION CONTROL IN ELECTROSTATIC ACTUATORS - In one embodiment, an actuator includes a moving frame coupled to a fixed frame by a plurality of elongated parallel motion flexures for generally parallel motion relative to the fixed frame and between an as-fabricated position and a deployed position. The flexures are disposed at a first angle relative to a line extending perpendicularly to both the moving frame and the fixed frame when the moving frame is disposed in the as-fabricated position, and at a second angle relative to that same line when the moving frame is disposed in the deployed position, Arcuate movement of the first frame relative to the second frame is controlled by constraining the first angle to a value of less than about half of the sum of the first and second angles. | 08-22-2013 |
20140036342 | Electrical Routing - An electronic device may have a MEMS device formed of a first conductive material. A trench may be formed in the MEMS device. A layer of non-conductive material may be formed in the trench. A second conductive material may be formed upon the non-conductive material. | 02-06-2014 |
20140097723 | MOUNTING FLEXURE CONTACTS - A device may comprise a flexure formed of a first semiconductor material. A first trench may be formed in the flexure. The first trench may separate the first semiconductor material into a first portion and a second portion thereof. An oxide layer may be formed in the first trench. The oxide layer may extend over a top portion of the first semiconductor material. A second semiconductor material may be formed on the oxide layer. The first trench and the oxide layer may cooperate to electrically isolate the first portion and the second portion from one another. | 04-10-2014 |
20140116163 | MOTION CONTROLLED ACTUATOR - A device can have an outer frame and an actuator. The actuator can have a movable frame and a fixed frame. At least one torsional flexure and at least one hinge flexure can cooperate to provide comparatively high lateral stiffness between the outer frame and the movable frame and can cooperate to provide comparatively low rotational stiffness between the outer frame and the movable frame. | 05-01-2014 |
20150146312 | MEMS ELECTRICAL CONTACT SYSTEMS AND METHODS - A microelectromechanical systems (MEMS) device may be provided with one or more sintered electrical contacts. The MEMS device may be a MEMS actuator or a MEMS sensor. The sintered electrical contacts may be silver-paste metalized electrical contacts. The sintered electrical contacts may be formed by depositing a sintering material such as a metal paste, a metal preform, a metal ink, or a metal powder on a wafer of released MEMS devices and heating the wafer so that the deposited sintering material diffuses into a substrate of the device, thereby making electrical contact with the device. The deposited sintering material may break through an insulating layer on the substrate during the sintering process. The MEMS device may be a multiple degree of freedom actuator having first and second MEMS actuators that facilitate autofocus, zoom, and optical image stabilization for a camera. | 05-28-2015 |
Patent application number | Description | Published |
20120287290 | System and Method for Pairing Hand-Held Devices Utilizing a Front-Facing Camera - A hand-held wireless communications device includes a camera integrated within a housing of the wireless communications device, a front-facing lens assembly to focus light onto the camera, a display, and a controller connected to the camera and the display. The controller controls the camera to capture an image of another device that is in front of its display. The device can then analyze the image to extract information specific to the other device, and utilize that information to identify and authenticate the other device. Once identified and authenticates, the devices are able to share data and information with each other. | 11-15-2012 |
20140192726 | SCANNING OF CHANNELS BASED ON CHANNEL AVAILABILITY INFORMATION - A user device comprising a communication interface; one or more memories to store instructions; and one or more processors to execute the instructions to receive channel-availability information that indicates one or more channels supported by and available to the user device; store the channel-availability information; scan one or more channels indicated in the channel-availability information; and connect to a network using one of the one or more channels. | 07-10-2014 |
20150106869 | METHOD AND SYSTEM FOR DISTRIBUTING SECRETS - Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data. | 04-16-2015 |
20150106939 | METHOD AND SYSTEM FOR DYNAMIC AND COMPREHENSIVE VULNERABILITY MANAGEMENT - One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken. | 04-16-2015 |
20150128130 | METHOD AND SYSTEM FOR PROVIDING AND DYNAMICALLY DEPLOYING HARDENED TASK SPECIFIC VIRTUAL HOSTS - Virtual host creation data used to instantiate a hardened task specific virtual host in a first computing environment is generated including hardening logic for providing enhanced security and trust for the hardened task specific virtual host and internal task specific logic for directing and/or allowing the hardened task specific virtual host to perform a specific function assigned to the hardened task specific virtual host. When task data is received indicating a task to be performed in the first computing environment requires the performance of the specific function assigned to the hardened task specific virtual host, the hardened task specific virtual host is automatically instantiated and/or deployed in the first computing environment. | 05-07-2015 |
20150128295 | METHOD AND SYSTEM FOR VALIDATING A VIRTUAL ASSET - Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data. | 05-07-2015 |
Patent application number | Description | Published |
20140006818 | System and Method For Adaptive Thermal Management In A Portable Computing Device | 01-02-2014 |
20140163765 | SYSTEM AND METHOD FOR ESTIMATING AMBIENT TEMPERAURE FROM A PORTABLE COMPUTING DEVICE - Various embodiments of methods and systems for estimating environmental ambient temperature of a portable computing device (“PCD”) from temperature measurements taken within the PCD are disclosed. In an exemplary embodiment, it may be recognized that the PCD is in an idle state, thus producing little or no thermal energy. Temperature measurements are then taken from temperature sensors within the PCD and used to estimate the environmental ambient temperature to which the PCD is exposed. Certain embodiments may simply render the estimated ambient temperature for the benefit of the user or use the estimated ambient temperature as an input to a program or application running on the PCD. It is envisioned that certain embodiments of the systems and methods may use the estimated ambient temperature to adjust temperature thresholds in the PCD against which thermal management policies govern thermally aggressive processing components. | 06-12-2014 |
20140240031 | SYSTEM AND METHOD FOR TUNING A THERMAL STRATEGY IN A PORTABLE COMPUTING DEVICE BASED ON LOCATION - Various embodiments of methods and systems for tuning a thermal strategy of a portable computing device (“PCD”) based on PCD location information. In an exemplary embodiment, it may be recognized that the PCD is in an active state and producing thermal energy, or that one or more thermally aggressive components of the PCD are operating near temperature thresholds for efficient operation. The PCD location information is used to estimate the environmental ambient temperature to which the PCD is exposed. Certain embodiments may simply render the estimated ambient temperature for the benefit of the user or may use the estimated ambient temperature as an input to a program, application, or algorithm running on the PCD. It is envisioned that certain embodiments of the systems and methods may use the estimated ambient temperature to adjust temperature thresholds in the PCD against which thermal management policies govern thermally aggressive PCD components. | 08-28-2014 |
20140245029 | SYSTEM AND METHOD FOR MANAGING A THERMAL POLICY OF A RECEIVING DEVICE THAT COUPLES TO A PORTABLE COMPUTING DEVICE - A method and system for managing a thermal policy of a receiving device that couples to a portable computing device (PCD) includes automatically detecting a presence of the PCD. After detecting the presence of the PCD, a command to deactivate a thermal sensor and to deactivate a power supply within the PCD may be issued. The thermal policy manager module of the receiving device may issue a command to adjust an operating condition of a processor within the PCD if a temperature value reaches a predetermined value. The thermal policy manager module may also adjust operation of an active cooling device if the temperature value sensed by a sensor within the PCD reaches a predetermined value. The receiving device may include at least one of a docking station, a tablet personal computer, a laptop personal computer, a desktop personal computer, a portable media player, a portable television, and a printer. | 08-28-2014 |
20140245032 | SYSTEM AND METHOD FOR THERMAL MANAGEMENT IN A PORTABLE COMPUTING DEVICE USING THERMAL RESISTANCE VALUES TO PREDICT OPTIMUM POWER LEVELS - Various embodiments of methods and systems for thermal energy management in a portable computing device (“PCD”) based on power level calculations are disclosed. An exemplary method includes tracking instantaneous operating temperatures and active power supply levels to one or more components. With an estimate or measurement of ambient temperature, the instantaneous operating temperature values and active power supply level values can be used to calculate an instantaneous thermal resistance value. In the event that thermal energy generation should be managed, a target operating temperature may be used with the ambient temperature and the instantaneous thermal resistance value to solve for an optimum power supply level. The active power supply level may then be adjusted based on the calculated optimum power supply level. | 08-28-2014 |
20140262160 | Vapor Chambers Based Skin Material for Smartphones and Mobile Devices - An apparatus for managing heat generated by at least one electronic component of a mobile device, the apparatus comprising: a housing for containing the electronic component of the mobile device; and a vapor chamber arranged in the housing, the vapor chamber having a cavity defined by a front wall and a rear wall opposite the rear wall, the front wall for receiving heat generated by the electronic component of the mobile device to evaporate fluid in the cavity into a vapor, the rear wall for receiving the vapor to allow the vapor to condense to liquid thereby cooling the rear wall of the vapor chamber; wherein an outer surface of the housing comprises at least a portion of the rear wall of the vapor chamber. | 09-18-2014 |
20140371944 | SYSTEM AND METHOD FOR ESTIMATING AMBIENT TEMPERATURE OF A PORTABLE COMPUTING DEVICE USING A VOICE COIL - Various embodiments of methods and systems for estimating environmental ambient temperature of a portable computing device (“PCD”) from electrical resistance measurements taken voice coils in a speaker or microphone component are disclosed. In an exemplary embodiment, it may be recognized that the PCD is in an idle state, thus producing little or no thermal energy. Electrical resistance measurements are taken from a voice coil and used to estimate the environmental ambient temperature to which the PCD is exposed. Certain embodiments may simply render the estimated ambient temperature for the benefit of the user or use the estimated ambient temperature as an input to a program or application running on the PCD. It is envisioned that certain embodiments of the systems and methods may use the estimated ambient temperature to adjust temperature thresholds in the PCD against which thermal management policies govern thermally aggressive processing components. | 12-18-2014 |
20150026495 | SYSTEM AND METHOD FOR IDLE STATE OPTIMIZATION IN A MULTI-PROCESSOR SYSTEM ON A CHIP - Various embodiments of methods and systems for idle state optimization in a portable computing device (“PCD”) are disclosed. An exemplary method includes comparing an aggregate power consumption level for all processing cores in the PCD to a power budget and, if there is available headroom in the power budget, transitioning cores operating in a first idle state to a different idle state. In doing so, the latency value associated with bringing the transitioned cores out of an idle state and into an active state, should the need arise, may be reduced. The result is that user experience and QoS may be improved as an otherwise idle core in an idle state with a long latency time may be better positioned to quickly transition to an active state and process a workload. | 01-22-2015 |
20150043156 | Thermal Mitigation Adaptation for a Mobile electronic device - The various embodiments provide methods and systems for adjusting the thermal mitigation system of a mobile electronic device when an add-on outer casing is attached. The mobile electronic device determine whether an add-on outer case is attached to the mobile electronic device and change a thermal mitigation parameter of a thermal mitigation process implemented on the mobile electronic device in response. The determination may be via a sensor or a user input. A changed thermal mitigation parameter may be stored in memory, or input by a user or in a communication from the add-on case. The changed thermal mitigation parameter may be determined based on a particular make, model or properties of the add-on case, and/or may be obtained from a database stored in the device or accessed via a network. Removal of the case may be detected and the thermal mitigation parameter returned to an initial value. | 02-12-2015 |
20150220125 | SYSTEM AND METHOD FOR THERMAL MANAGEMENT IN A PORTABLE COMPUTING DEVICE USING THERMAL RESISTANCE VALUES TO PREDICT OPTIMUM POWER LEVELS - Various embodiments of methods and systems for thermal energy management in a portable computing device (“PCD”) based on power level calculations are disclosed. An exemplary method includes tracking instantaneous operating temperatures and active power supply levels to one or more components. With an estimate or measurement of ambient temperature, the instantaneous operating temperature values and active power supply level values can be used to calculate an instantaneous thermal resistance value. In the event that thermal energy generation should be managed, a target operating temperature may be used with the ambient temperature and the instantaneous thermal resistance value to solve for an optimum power supply level. The active power supply level may then be adjusted based on the calculated optimum power supply level. | 08-06-2015 |