Patent application number | Description | Published |
20150209400 | COMPOSITION OF OILY, PUNGENT AND ODORIFEROUS SUBSTANCES AND A PROCESS OF PREPARATION THEREOF - A composition of oily, pungent and odoriferous substances and a process for preparation thereof are described, in particular an extended and sustained release of a stable, free flowing, solid composition of one or more of substances such as capsicum, black pepper, ginger, mustard, cinnamon, garlic, onion, paprika, turmeric and the like, extracts thereof, and/or components thereof, and a process for preparation thereof are described. For example, compositions comprise a substance such as capsicum containing capsaicinoid components, which include for example capsaicin, dihydro-capsaicin, and/or nor-dihydro-capsaicin. The composition can eliminate the discomfort by facilitating intestinal absorption of the active ingredient and thereby minimizing/eliminating the discomfort caused by the residual unabsorbed active ingredient, and can be particularly suitable for formulating into consumable dry syrups, tablets, capsules, liquid syrups, health drinks, diet drinks, fruit juices, and/or soft drinks, which can be useful in reduction of body weight. | 07-30-2015 |
Patent application number | Description | Published |
20100329145 | METHOD AND APPARATUS FOR MOBILE FLOW RECORD GENERATION AND ANALYSIS - A method, apparatus, and computer-readable storage medium for generating a mobile flow record for a mobile flow of a mobile node are provided. A method includes receiving information associated with signaling traffic of the mobile node, receiving information associated with bearer traffic of the mobile node, and generating the mobile flow record by correlating the information associated with signaling traffic of the mobile node and the information associated with bearer traffic of the mobile node. The mobile flow record includes IP layer information associated with the mobile flow and wireless layer information associated with the mobile flow. | 12-30-2010 |
20100332755 | METHOD AND APPARATUS FOR USING A SHARED RING BUFFER TO PROVIDE THREAD SYNCHRONIZATION IN A MULTI-CORE PROCESSOR SYSTEM - An apparatus and method for improving synchronization between threads in a multi-core processor system are provided. An apparatus includes a memory, a first processor core, and a second processor core. The memory includes a shared ring buffer for storing data units, and stores a plurality of shared variables associated with accessing the shared ring buffer. The first processor core runs a first thread and has a first cache associated therewith. The first cache stores a first set of local variables associated with the first processor core. The first thread controls insertion of data items into the shared ring buffer using at least one of the shared variables and the first set of local variables. The second processor core runs a second thread and has a second cache associated therewith. The second cache stores a second set of local variables associated with the second processor core. The second thread controls extraction of data items from the shared ring buffer using at least one of the shared variables and the second set of local variables. | 12-30-2010 |
20110194447 | METHOD AND APPARATUS FOR MOBILE FLOW RECORD GENERATION AND ANALYSIS - A method, apparatus, and computer-readable storage medium for generating a mobile flow record for a mobile flow of a mobile node are provided. A method includes receiving information associated with signaling traffic of the mobile node, receiving information associated with bearer traffic of the mobile node, and generating the mobile flow record by correlating the information associated with signaling traffic of the mobile node and the information associated with bearer traffic of the mobile node. The mobile flow record includes IP layer information associated with the mobile flow and wireless layer information associated with the mobile flow. | 08-11-2011 |
Patent application number | Description | Published |
20140112461 | ANALYZING SPEECH APPLICATION PERFORMANCE - A method of analyzing speech application performance can include determining a call path for each of a plurality of calls from a log of an interactive voice response system having a speech application. Each call path can be defined by an ordered set of dialog nodes of the speech application. A number of occurrences of at least one selected type of event for the dialog nodes of the plurality of calls can be counted. At least one call path from the plurality of call paths can be indicated according, at least in part, to the number of occurrences of the selected type of event within the at least one indicated call path. | 04-24-2014 |
20140128111 | CONVERGED DIALOG IN HYBRID MOBILE APPLICATIONS - According to one aspect of the present disclosure a system and technique for converged dialog in hybrid mobile applications is disclosed. The system includes: a processor and a hybrid communications manager executable by the processor. The hybrid communications manager is operable to: responsive to receiving a short message service (SMS) request from an SMS device, determine a data policy corresponding to the request; initiate an SMS communication dialog with the SMS device to collect data corresponding to the data policy; determine whether the data policy indicates a need for a dialog with a hybrid device; and responsive to determining that the data policy indicates a need for a dialog with a hybrid device, initiate a non-SMS communication dialog with a hybrid device corresponding to the collected data. | 05-08-2014 |
20140128112 | CONVERGED DIALOG IN HYBRID MOBILE APPLICATIONS - According to one aspect of the present disclosure, a method and technique for converged dialog in hybrid mobile applications is disclosed. The method includes: responsive to receiving a short message service (SMS) request from an SMS device, determining a data policy corresponding to the request; initiating an SMS communication dialog with the SMS device to collect data corresponding to the data policy; determining whether the data policy indicates a need for a dialog with a hybrid device; and responsive to determining that the data policy indicates a need for a dialog with a hybrid device, initiating a non-SMS communication dialog with a hybrid device corresponding to the collected data. | 05-08-2014 |
20150181555 | CONTEXTUAL PUSH NOTIFICATION SERVICE - A contextual push notification service is provided, including: receiving, by a mobile device, a notification message. The notification message comprises at least one context rule and a notification message. The at least one context rule is compared, on the mobile device, with at least one user context preference. Based on the results of the comparison, a notification action is taken. | 06-25-2015 |
20150181556 | CONTEXTUAL PUSH NOTIFICATION SERVICE - A contextual push notification service is provided, including: receiving, by a mobile device, a notification message. The notification message comprises at least one context rule and a notification message. The at least one context rule is compared, on the mobile device, with at least one user context preference. Based on the results of the comparison, a notification action is taken. | 06-25-2015 |
20150358246 | NETWORK-SPECIFIC DATA DOWNLOADING TO A MOBILE DEVICE - A method, system, and/or computer program product downloads a blob of data onto a mobile device. A blob of data that is to be downloaded from a server to a mobile device via a particular network is identified. A first maximum chunk size for the first network for the particular network is identified, as is a timeout value for the mobile device when downloading a chunk of data. An optimal chunk size for chunking the blob of data is determined based on the timeout value of the mobile device and the maximum chunk size for the first network. The blob of data is partitioned into chunks of data based on the first optimal chunk size, and the chunks of data are transmitted from the server to the mobile device. | 12-10-2015 |
20150358388 | NETWORK-SPECIFIC DATA DOWNLOADING TO A MOBILE DEVICE - A method, system, and/or computer program product downloads a blob of data onto a mobile device. A blob of data that is to be downloaded from a server to a mobile device via a particular network is identified. A first maximum chunk size for the first network for the particular network is identified, as is a timeout value for the mobile device when downloading a chunk of data. An optimal chunk size for chunking the blob of data is determined based on the timeout value of the mobile device and the maximum chunk size for the first network. The blob of data is partitioned into chunks of data based on the first optimal chunk size, and the chunks of data are transmitted from the server to the mobile device. | 12-10-2015 |
Patent application number | Description | Published |
20090094583 | SYSTEM AND METHOD FOR TESTING COMPUTER PROGRAMS - A method for testing computer programs includes the steps of identifying at least one code subsection of a computer program to be tested, ascertaining one or more other code subsections required for executing the identified subsection, determining one or more input arguments required for executing the identified subsection and the other subsections, prompting a developer to provide at least one of the input arguments, and executing the identified subsection using the provided input arguments. | 04-09-2009 |
20090106028 | AUTOMATED TUNING OF SPEECH RECOGNITION PARAMETERS - A method for execution on a server for serving presence information, the method for providing dynamically loaded speech recognition parameters to a speech recognition engine, can be provided. The method can include storing at least one rule for selecting speech recognition parameters, wherein a rule comprises an if-portion including criteria and a then-portion specifying speech recognition parameters that must be used when the criteria is met. The method can further include receiving notice that a speech recognition session has been initiated between a user and the speech recognition engine. The method can further include selecting a first set of speech recognition parameters responsive to executing the at least one rule and providing to the speech recognition engine the first set of speech recognition parameters for performing speech recognition of the user. | 04-23-2009 |
20090111432 | PHONE MESSAGING USING AUDIO STREAMS - A method of phone messaging includes encoding a data packet into an audio stream, said data packet comprising a message addressed to a mobile device operating in a wireless network, placing a call to said mobile device using a voice channel of said wireless network, transmitting said audio stream over said voice channel to said mobile device, and reconstructing said data packet from said audio stream. | 04-30-2009 |
20090265687 | SYSTEM AND METHOD FOR UPDATING INITIALIZATION PARAMETERS FOR APPLICATION SOFTWARE FROM WITHIN A SOFTWARE DEVELOPMENT ENVIRONMENT - A computer implemented method for updating initialization parameters for application software from within a software development environment. The method involves changing a value of at least one initialization parameter contained in a configuration file of a developer computer system. The method also involves starting application software deployed on an application server in response to the value change. Thereafter, the configuration file including the changed value of the initialization parameter is communicated from the developer computer system to the application server. Once the configuration file is received at the application server, the application software is initialized using the configuration file. | 10-22-2009 |
20110016515 | REALTIME MULTICHANNEL WEB PASSWORD RESET - The need for realtime password resetting is providing by using a converged HTTP/SIP container. The container allows interaction between the different protocols of HTTP and SIP. When a user needs to reset a password that would normally require sending a new temporary password through the mail, the user can be appropriately authenticated and provided with a temporary key. After a temporary key is created and sent electronically to the user via the computer system which initiated the request, a telephony application calls the user. The user is prompted for authentication information and then enters the temporary key. The temporary key entered is compared with the temporary key created, and if matched, the user can reset the password in realtime. | 01-20-2011 |
20110307941 | Method and apparatus to implement secured, layered logout from a computer system - A secure, layered logout of a user session is implemented in a web-based management tool, such as a middleware appliance. A logout strategy is provided to include a set of security levels of varying sensitivity, with each security level having a set of permissions associated therewith and that are enforced upon a timeout. Preferably, each succeeding security level in the set of security levels is reached as time increases from an idle time associated with the user session. Upon expiration of a timeout associated with a security level, the set of permissions associated with the security level are then enforced against at least one managed object while the user session continues. As each next security level is reached, the set of permissions associated with the security level are then enforced (with respect to the managed object or against one or more other managed objects), once again while the user session continues. Each of the objects preferably is managed independently of at least one other object; thus, the layered logout may enforce different permissions with respect to different managed objects while at the time maintaining the user session. If the user takes no action, eventually a timeout associated with a final security level of the set of security levels will occur, at which point the user session is finally terminated. | 12-15-2011 |
20120084837 | Method and apparatus to implement secured, event-based layered logout from a computer system - A secure, layered logout of a user session is implemented in a web-based management tool, such as a middleware appliance. A logout strategy is provided to include a set of security levels of varying sensitivity, with each security level having a set of permissions associated therewith and that are enforced upon occurrence of an event. A succeeding security level in the set of security levels is reached upon occurrence of an event associated with that level, in which case the set of permissions associated with the security level are then enforced against at least one managed object while the user session continues. As each next security level is reached, the set of permissions associated with the security level are then enforced (with respect to the managed object or against one or more other managed objects), once again while the user session continues. Each of the objects preferably is managed independently of at least one other object; thus, the layered logout may enforce different permissions with respect to different managed objects while at the time maintaining the user session. If the user takes no action, and as a result of the occurrence of the events, eventually a final security level of the set of security levels will occur, at which point the user session is finally terminated. | 04-05-2012 |
20120130718 | METHOD AND SYSTEM FOR COLLECTING AUDIO PROMPTS IN A DYMANICALLY GENERATED VOICE APPLICATION - A prompt collecting tool ( | 05-24-2012 |
20120166193 | METHOD AND SYSTEM FOR AUTOMATIC TRANSCRIPTION PRIORITIZATION - A visual toolkit for prioritizing speech transcription is provided. The toolkit can include a logger ( | 06-28-2012 |
20120180026 | SYSTEM AND METHOD FOR UPDATING INITIALIZATION PARAMETERS FOR APPLICATION SOFTWARE FROM WITHIN A SOFTWARE DEVELOPMENT ENVIRONMENT - A computer implemented method for updating initialization parameters for application software from within a software development environment. The method involves changing a value of at least one initialization parameter contained in a configuration file of a developer computer system. The method also involves starting application software deployed on an application server in response to the value change. Thereafter, the configuration file including the changed value of the initialization parameter is communicated from the developer computer system to the application server. Once the configuration file is received at the application server, the application software is initialized using the configuration file. | 07-12-2012 |
20130047222 | Implementing secured, event-based layered logout from a computer system - A secure, layered logout of a user session is implemented in a management tool. A logout strategy is provided to include a set of security levels of varying sensitivity, with each security level having a set of permissions that are enforced upon occurrence of an event. A succeeding security level in the set of security levels is reached upon occurrence of an event associated with that level, in which case the permissions associated with the level are then enforced against at least one object while the user session continues. As each next security level is reached, the set of permissions are then enforced, once again while the user session continues. The layered logout may enforce different permissions with respect to different objects. If the user takes no action, eventually a final security level will occur, at which point the user session is finally terminated. | 02-21-2013 |
Patent application number | Description | Published |
20130136830 | SUPERCRITICAL FLUID EXTRUSION METHOD, APPARATUS AND SYSTEM FOR MAKING A FOOD PRODUCT - A method for making an expanded snack piece using supercritical fluid extrusion is disclosed. A mixture of shear thinning starch and heat-sensitive ingredients are input into an extruder, hydrated, and mixed with supercritical fluid. The extrudate can be subjected to further processing to set or alter its structure. | 05-30-2013 |
20130136834 | FRIED FOOD PRODUCT WITH REDUCED OIL CONTENT - A method and system for producing fried food pieces with reduced oil content is disclosed. The food pieces are immersion fried in hot oil at a first temperature to an intermediate moisture content, and finish fried at a second, higher oil temperature to a final moisture content. | 05-30-2013 |
20130202756 | FRIED FOOD PRODUCT WITH REDUCED OIL CONTENT - A method and system for producing fried food pieces with reduced oil content is disclosed. The food pieces are immersion fried in hot oil at a first temperature to an intermediate moisture content, and finish fried at a second, higher oil temperature to a final moisture content. | 08-08-2013 |
20130266720 | POTATO CHIP - A potato chip that has more oil near its outer surfaces than in its interior and a unique RVA profile is disclosed. The organoleptic properties of the inventive potato chips compare favorably to known and commercially available potato chips. | 10-10-2013 |
20130287922 | SUPERCRITICAL FLUID EXTRUDED FOOD PRODUCT - An expanded food product made using supercritical fluid extrusion is disclosed. The food product comprises particular characteristics that demonstrate a light, porous, crispy texture has been obtained. | 10-31-2013 |
Patent application number | Description | Published |
20120157411 | 2-AMINO-4-ARYLTHIAZOLE COMPOUNDS AS TRPAI ANTAGONISTS - The present invention is related to 2-amino-4-arylthiazole derivatives as TRPA (Transient Receptor Potential subfamily A) modulators. In particular, compounds described herein are useful for treating or preventing diseases, conditions and/or disorders modulated by TRPA1 (Transient Receptor Potential subfamily A, member 1). Also provided herein are processes for preparing compounds described herein, intermediates used in their synthesis, pharmaceutical compositions thereof, and methods for treating or preventing diseases, conditions and/or disorders modulated by TRPA1. | 06-21-2012 |
20140045865 | 2-AMINO-4-ARYLTHIAZOLE COMPOUNDS AS TRPA1 ANTAGONISTS - The present invention is related to 2-amino-4-arylthiazole derivatives as TRPA (Transient Receptor Potential subfamily A) modulators. In particular, compounds described herein are useful for treating or preventing diseases, conditions and/or disorders modulated by TRPA1 (Transient Receptor Potential subfamily A, member 1). Also provided herein are processes for preparing compounds described herein, intermediates used in their synthesis, pharmaceutical compositions thereof, and methods for treating or preventing diseases, conditions and/or disorders modulated by TRPA1. | 02-13-2014 |
20140051667 | 2-AMINO-4-ARYLTHIAZOLE COMPOUNDS AS TRPA1 ANTAGONISTS - The present invention is related to 2-amino-4-arylthiazole derivatives as TRPA (Transient Receptor Potential subfamily A) modulators. In particular, compounds described herein are useful for treating or preventing diseases, conditions and/or disorders modulated by TRPA1 (Transient Receptor Potential subfamily A, member 1). Also provided herein are processes for preparing compounds described herein, intermediates used in their synthesis, pharmaceutical compositions thereof, and methods for treating or preventing diseases, conditions and/or disorders modulated by TRPA1. | 02-20-2014 |
Patent application number | Description | Published |
20120110055 | Building a Cloud Computing Environment Using a Seed Device in a Virtual Computing Infrastructure - A cloud computing environment having a plurality of computing nodes is described. A seed device is connected to a network. From the seed device, a launching of a cloud computing management configuration is initiated. The seed device includes a repository of software. From the seed device, software is installed on one of the plurality of computing nodes to run a cloud computing management system. The software is loaded from one of the plurality of computing nodes onto each of the plurality of nodes. A computing node is selected from the plurality of computing nodes, to designate as a master node. Operations of the cloud computing management system is controlled from the master node. | 05-03-2012 |
20120110056 | Organizing Data in a Virtual Computing Infrastructure - Organizing data in a cloud computing environment having a plurality of computing nodes is described. An authorization to service a request is received. The request may be from a user for launching an instance. In response to receiving the authorization and based on the request, an image list is determined. The image list includes information corresponding to a plurality of machine images. At least one machine image is identified from the image list associated with a functional requirement of the request. The instance is launched at the at least one computing node. The at least one machine image is updated after the instance has been launched. | 05-03-2012 |
20120110180 | Objects in a Virtual Computing Infrastructure - An action is performed on an object in a cloud computing environment having a plurality of computing nodes. A policy path is determined from at least one permission within a policy of a customer. A first delegation path is determined from within the determined policy path. The first delegation path is directed to at least one object permission for the object upon which the action is to be performed. An authorized user is assigned from a second delegation path from within the determined policy path. The second delegation path is directed to at least one user permission for the action to be performed. | 05-03-2012 |
20120110188 | Networking in a Virtual Computing Infrastructure - A cloud computing environment having a plurality of computing nodes is described. Upon receiving authorization, a plurality of virtual machines may be communicated to provide at least one virtual network to service to the plurality of virtual machines. Each of the plurality of virtual machines communicates with a virtual network layer at a virtual interface via at least one virtual Ethernet (vEthernet). An IP gateway to a network is provided to the plurality of virtual machines. Communications between the IP gateway and the network are facilitated. Communications between a network control layer and at least one network are routed. | 05-03-2012 |
20120110636 | Defining an Authorizer in a Virtual Computing Infrastructure - An authorizing entity is allowed to grant permission to a subject to perform an action on an object in a cloud computing environment. An authorizer is defined as the entity having granting authority to delegate a predetermined permission. A subject is defined as a group to whom the permission is being delegated. An object is defined upon which an action is authorized within the cloud computing environment. The action being authorized in the cloud computing environment is defined. Members of the subject group are authorized to perform the permitted action on the object. | 05-03-2012 |
20120110650 | Organizing Permission Associated with a Cloud Customer in a Virtual Computing Infrastructure - Organizing permissions to authorize a subject to perform an action on an object in a cloud computing environment is described. A plurality of permissions associated with a cloud customer is created. A first set of permissions from the plurality of permissions is associated with one or more objects. Each of the first set of permissions describes an action performed on an object. A second set of permissions from the plurality of permissions is associated with one or more users. Each of the second set of permissions describes an action to be performed by one or more users. | 05-03-2012 |
20120110651 | Granting Access to a Cloud Computing Environment Using Names in a Virtual Computing Infrastructure - Access to resources in a cloud computing environment having a plurality of computing nodes is described. A group of users is defined within the cloud computing environment. A first name is assigned to the group. At least one subgroup of users is defined from within the group. A second name is assigned to the at least one subgroup. The second name follows a hierarchical naming structure of the form/group/subgroup. | 05-03-2012 |
20120116937 | Billing Usage in a Virtual Computing Infrastructure - Billing usage of a cloud computing environment is described. Usage is metered of one or more resources within the cloud computing environment by one or more users. The one or more users may be associated with at least one entity. The metered usage of one or more cloud resources is converted to a revenue-generating value. The revenue-generating value is billed to the at least one entity associated with the one or more users. Revenue is collected from the at least one entity for the metered usage of one or more cloud resources. The collected revenue is shared with a plurality of parties. | 05-10-2012 |
20120117229 | Virtualization Layer in a Virtual Computing Infrastructure - A cloud computing environment having a plurality of computing nodes is described. The plurality of computing nodes may be organized into a plurality of clusters, each of the plurality of clusters including a cluster controller. A virtual computing environment is created on each of the plurality of computing nodes. Communication with the virtual computing environment is enabled. An authorization to service a launch plan is received from a user. The launch plan includes at least one instance to launch. Bandwidth information is requested from each of the cluster controllers of the plurality of clusters. A score is computed for each of the plurality of clusters that responded to the requested bandwidth information. The launch plan is assigned to a cluster from the plurality of clusters based on the computed scores. | 05-10-2012 |
20130060839 | Launching an Instance in a Virtual Computing Infrastructure - Launching an instance in cloud computing environment having a plurality of computing nodes is described. At a user's home cloud system, a request is received from the user to launch an instance of an object. At the home cloud system, a designated remote cloud system is determined from a federated plurality of remote cloud systems based on the request. The request is translated into a format suitable for the designated remote cloud system. The translated request is communicated to the designated remote cloud system. The instance of the object is launched at the designated remote cloud. | 03-07-2013 |
20150264121 | ORGANIZING DATA IN A VIRTUAL COMPUTING INFRASTRUCTURE - Organizing data in a cloud computing environment having a plurality of computing nodes is described. An authorization to service a request is received. The request may be from a user for launching an instance. In response to receiving the authorization and based on the request, an image list is determined. The image list includes information corresponding to a plurality of machine images. At least one machine image is identified from the image list associated with a functional requirement of the request. The instance is launched at the at least one computing node. The at least one machine image is updated after the instance has been launched. | 09-17-2015 |
Patent application number | Description | Published |
20120199575 | SELF-CONFIGURING FLEXIBLE HEATER - In general, this disclosure describes example techniques for a flexible heater system to automatically configure itself to operate over different input supply voltages. The flexible heater system may include a flexible heater that includes a first heater element and a second heater element. The flexible heater system may also include a switch circuit that may automatically couple the first heater element and the second heater element in a first configuration when an input supply voltage is at a first voltage level. The switch circuit may also automatically couple the first heater element and the second heater element in a second configuration when the input supply voltage is at a second voltage level. | 08-09-2012 |
20120229937 | HIGH CURRENT DC SWITCHING CONTROLLER WITH FAULT MONITORING - A system includes a control switch and a control module. The control switch is configured to drive current through an electrical load in a closed state, and disconnect the electrical load from a power supply in an open state. The control module is configured to connect to a thermostat switch that operates in one of an open state or a closed state based on a temperature of the thermostat switch. The control module is further configured to control a state of the control switch based on a state of the thermostat switch and detect a fault in the control switch based on the state of the thermostat switch and a voltage across the control switch. | 09-13-2012 |
20130021025 | STATIONARY MAGNET VARIABLE RELUCTANCE MAGNETIC SENSORS - A position sensor for sensing whether a rotatable element is in at least a first rotational position or a second rotational position is provided. A rotor is configured to be coupled to the rotatable element for rotation therewith, and is constructed at least partially of a magnetically permeable material and includes a first rotor pole. A stator is non-rotationally mounted, is constructed at least partially of a magnetically permeable material, is spaced apart from the rotor, and comprises a first main pole and a first stealer pole. The first main pole and the first stealer pole are spaced radially apart from each other. A magnet is non-rotationally disposed adjacent to the stator and is spaced apart from the rotor. A first magnetic sensor is non-rotationally mounted between the stator and the rotor, is disposed adjacent the first main pole, and is radially offset from the first stealer pole. | 01-24-2013 |
20130093545 | MAGNETO-RESISTANCE QUADRUPOLE MAGNETIC CODED SWITCH - A quadrupole magnetic coded switch includes a switch housing, an actuator housing, a first pair of actuator dipole magnets, a first pair of switch dipole magnets, and a pair of first magneto-resistance (MR) sensors. The actuator housing is movable relative to the switch housing. The first pair of actuator dipole magnets is coupled to the actuator housing and is movable therewith, and the first pair of switch dipole magnets is coupled to the switch housing. The first pair of actuator dipole magnets and the first pair of switch dipole magnets are arranged to generate a first quadrupole magnetic field. Each of the first MR sensors is disposed within the switch housing and is configured to vary in resistance in response to relative movement of the actuator housing and the switch housing. | 04-18-2013 |
20140375306 | NON-CONTACT SHIFT LEVER POSITION DETECTOR AND HEALTH STATUS MONITORING SYSTEM - A non-contact shift lever position detector includes a housing, a gear position shift lever, a magnet, a plurality of magnetic sensors, and a processor. The gear position shift lever is disposed partially within the housing and is moveable to at least a first position, a second position, and a third position. The magnet is disposed within the housing, and is coupled to the gear position shift lever and is movable therewith. The magnetic sensors are fixedly disposed within the housing and each magnetic sensor is spaced apart from the magnet and is configured to supply an output voltage representative of its proximity to the magnet. The processor is coupled to receive the output voltage supplied from each of the magnetic sensors and is configured, upon receipt thereof, to determine when the gear position shift lever is in the first position, the second position, and the third position. | 12-25-2014 |
Patent application number | Description | Published |
20090089874 | TECHNIQUES FOR VIRTUAL PRIVATE NETWORK (VPN) ACCESS - Techniques for virtual private network (VPN) access are provided. A dynamic determination, in response to privileges, is made as to whether a principal and a device of a principal are to receive a thin client virtual private network (VPN) installation for a thin client VPN session between the principal and a remote site or whether a clientless VPN session is appropriate. Dynamic switching between the clientless VPN session and thin client VPN session is permissible when the principal supplies the appropriate credentials for such a switch. | 04-02-2009 |
20090113528 | TECHNIQUES FOR AUTHENTICATION VIA NETWORK CONNECTIONS - Techniques for authenticating network connections are provided. A client makes a request to connect to a server via a client service. The server delays the request to acquire a signature for the client service from the requesting client's environment. The signature is compared against a known and previously verified signature. When the two signatures match, the server permits the connection between the client and the service via the client service. When the two signatures do not match, the server denies the connection between the client and the server and does not permit the client service to process a request to make that connection. | 04-30-2009 |
20090158420 | SELECTIVE DESKTOP CONTROL OF VIRTUAL PRIVATE NETWORKS (VPN'S) IN A MULTIUSER ENVIRONMENT - Techniques for selective desktop control of virtual private networks (VPN's) in a multiuser environment are provided. A multiuser desktop/workstation includes a first user that establishes a VPN session on the desktop for accessing protected resources. Other users are permitted to simultaneously access non-protected resources of the desktop during the VPN session. Other users are also permitted to log into the desktop during the VPN session. However, if the other users attempt to access the protected resources, the access attempts are denied. | 06-18-2009 |
20110231910 | TECHNIQUES FOR VIRTUAL PRIVATE NETWORK (VPN) ACCESS - Techniques for virtual private network (VPN) access are provided. A dynamic determination, in response to privileges, is made as to whether a principal and a device of a principal are to receive a thin client virtual private network (VPN) installation for a thin client VPN session between the principal and a remote site or whether a clientless VPN session is appropriate. Dynamic switching between the clientless VPN session and thin client VPN session is permissible when the principal supplies the appropriate credentials for such a switch. | 09-22-2011 |
Patent application number | Description | Published |
20130318156 | DYNAMIC INFORMATION STREAMS IN A SOCIAL NETWORK PLATFORM - The techniques, methods and systems described herein facilitate the automated discovery and presentation of content created, published or otherwise made public by “experts” and key influencers on particular topics. As such, users that may be interested in particular topics but may not know who to connect with in order to receive the most pertinent information can receive highly-relevant information. Embodiments of the invention use topics of interest identified by the user and/or automatically identifies topics based on previous postings, communication, contacts, etc. Individuals, companies, organizations and other entities that have been recognized as highly influential in those topics are identified and, without explicit actions by the user, adds content generated by the influential entities to the user's content data feed. | 11-28-2013 |
20140040377 | DYNAMIC INFORMATION STREAMS IN A SOCIAL NETWORK PLATFORM - The techniques, methods and systems described herein facilitate the automated discovery and presentation of content created, published or otherwise made public by “experts” and key influencers on particular topics. As such, users that may be interested in particular topics but may not know who to connect with in order to receive the most pertinent information can receive highly-relevant information. Embodiments of the invention use topics of interest identified by the user and/or automatically identifies topics based on previous postings, communication, contacts, etc. Individuals, companies, organizations and other entities that have been recognized as highly influential in those topics are identified and, without explicit actions by the user, adds content generated by the influential entities to the user's content data feed. | 02-06-2014 |
Patent application number | Description | Published |
20100145937 | Interactive peer directory - A system is provided for locating peers having a desired expertise. User profile information is stored in a profiles database. A search engine indexes the profiles database and appends appropriate profile tags to this information. A peer relevancy algorithm searches for candidate peers among the indexed user profile information. Weights are assigned to candidate peers based on different categories of the indexed user profile information, and peer matches are selected based on the assigned weights. In order to provide matches that are most likely to accept a connection request, data is maintained as to which potential peers have a history of accepting requests to connect and which have a history of refusing to connect. Potential matches are biased to favor those that have a tendency to accept connection requests. Contact information of requester and recipients are not disclosed until the recipient accepts the requester's connection request. | 06-10-2010 |
20110191311 | Bi-model recommendation engine for recommending items and peers - A networked peer and item recommendation system makes recommendations to users such as documents of interest and peers with whom the users may want to connect. User profile information is maintained in a profiles database. A log enables the collection of user behavior information. A cluster filtering algorithm determines a cluster that a querying user belongs to. A collaborative filtering algorithm locates other users having implicit and explicit profiles in the database that are similar to the profile of the querying user. A search engine returns items based on a keyword provided by the querying user. A sorting algorithm sorts the items returned by the cluster filtering algorithm, collaborative filtering algorithm and search engine for presentation to the querying user. Potential peers are also presented to the querying user. The items and potential peers presented are those most likely to be of help to the querying user. | 08-04-2011 |
20120272164 | INTERACTIVE PEER DIRECTORY WITH QUESTION ROUTER - A computer network implemented peer forum system and method enabling question and answer rates to be increased by automatically routing questions and receiving answers to and from peers. Information is input into network via a user interface. A peer forum system enables users to ask and answer questions. A forums database captures questions and answers provided via the peer forum system. A stage database pulls and stores questions from the forums database. A question router pulls the questions from the stage database and finds peers who can answer the questions using a peer search module that uses implicit and explicit user profiles to determine the best subject matter experts to answer the questions. A set of throttle rules is associated with the question router for determining if a peer is eligible to answer a question. A delivery system delivers a communication to eligible peers requesting an answer to the question. | 10-25-2012 |
20130159325 | BI-MODEL RECOMMENDATION ENGINE FOR RECOMMENDING ITEMS AND PEERS - A networked peer and item recommendation system makes recommendations to users such as documents of interest and peers with whom the users may want to connect. User profile information is maintained in a profiles database. A log enables the collection of user behavior information. A cluster filtering algorithm determines a cluster that a querying user belongs to. A collaborative filtering algorithm locates other users having implicit and explicit profiles in the database that are similar to the profile of the querying user. A dynamic expert verification algorithm is associated with the collaborative filtering algorithm to verify the qualifications of users and produce bias towards users with higher quality interactions. A search engine returns items based on a keyword provided by the querying user. A sorting algorithm sorts the items returned by the cluster filtering algorithm, collaborative filtering algorithm and search engine for presentation to the querying user. | 06-20-2013 |
20140108395 | METHODS AND SYSTEMS FOR MODIFYING A USER PROFILE FOR A RECOMMENDATION ALGORITHM AND MAKING RECOMMENDATIONS BASED ON USER INTERACTIONS WITH ITEMS - Methods and apparatus for modifying a user profile for a recommendation algorithm are provided. A user is provided with electronic access to an item. The item may comprise one of a document, an article, a chart, a graphic, a report, a web page, or the like. User interaction with the item is enabled. The user interaction with the item is then electronically tracked and stored. The user's user profile used by a recommendation engine is then modified based on the tracked user interactions. The user interaction may comprise at least one of annotating, highlighting, modifying, customizing, adding comments to the item, and the like. The user modified item can be saved and details of the user interaction with the item may be used to modify the user profile. At least one of items or peer recommendations can then be provided to the user based on the modified user profile. | 04-17-2014 |
20140257890 | METHODS AND SYSTEMS FOR IMPROVING ENGAGEMENT WITH A RECOMMENDATION ENGINE THAT RECOMMENDS ITEMS, PEERS, AND SERVICES - Computerized methods and systems for improving engagement with a recommendation engine that recommends items, peers, and services are provided. Stored data of a plurality of users is electronically accessed and analyzed. A respective passive profile is determined for each of the users based on the analyzing of the stored data. The respective passive profiles are then stored for use by the recommendation engine. The recommendation engine can then provide recommendations for at least one of items, peers, and services to a respective user based on at least the respective passive profile. The recommendations may be further based on at least one of an explicit profile comprising information provided by the respective user and an activity profile based on tracked activity of the respective user with regard to prior recommended items. | 09-11-2014 |
20150058380 | IMPLICIT PROFILE FOR USE WITH RECOMMENDATION ENGINE AND/OR QUESTION ROUTER - Methods and systems for creating an implicit profile for use by a recommendation engine or a question router is provided. User behavior on at least one of one or more electronic devices and an electronic communications network is tracked. User-related information relating to the user behavior is analyzed to extract or derive key words therefrom. The key words are stored in a profiles database as the implicit profile and used by the recommendation engine or question router to characterize user interests, expertise, and skills when matching a request from a querying user to a potential user or group of users having the relevant background to respond to the request. | 02-26-2015 |
Patent application number | Description | Published |
20120099538 | SYSTEM AND METHOD FOR PROVISIONING FLOWS IN A MOBILE NETWORK ENVIRONMENT - An example method is provided and includes receiving a request from a mobile node for an Internet protocol (IP) address and establishing a point-to-point (PPP) link for the mobile node. The method also includes provisioning a first tunnel associated with a first communication flow for the mobile node, and provisioning a sub-tunnel with the first tunnel for a second communication flow. The second communication flow is associated with a high priority type of data to be transported on the sub-tunnel. In more specific embodiments, a call admission control (CAC) mechanism is used to establish the sub-tunnel with the first tunnel for the second communication flow. Additionally, an inner label is installed in a header of a packet associated with the second communication flow in order to identify the sub-tunnel. | 04-26-2012 |
20120106507 | SYSTEM AND METHOD FOR MANAGING FLOWS IN A MOBILE NETWORK ENVIRONMENT - An example method is provided and includes establishing a session for a mobile node, and evaluating a plurality of label switched paths (LSPs) in response to the mobile node experiencing a handoff between a source packet data serving node (SPDSN) and a target PDSN (TPDSN). The method can also include provisioning a sub-tunnel with a first tunnel, which is associated with a selected label switched path. The selected label switched path is associated with a high priority type of data having a low latency characteristic. | 05-03-2012 |
20140043971 | SYSTEM AND METHOD FOR PROVISIONING FLOWS IN A MOBILE NETWORK ENVIRONMENT - An example method is provided and includes receiving a request from a mobile node for an Internet protocol (IP) address and establishing a point-to-point (PPP) link for the mobile node. The method also includes provisioning a first tunnel associated with a first communication flow for the mobile node, and provisioning a sub-tunnel with the first tunnel for a second communication flow. The second communication flow is associated with a high priority type of data to be transported on the sub-tunnel. In more specific embodiments, a call admission control (CAC) mechanism is used to establish the sub-tunnel with the first tunnel for the second communication flow. Additionally, an inner label is installed in a header of a packet associated with the second communication flow in order to identify the sub-tunnel. | 02-13-2014 |
Patent application number | Description | Published |
20090199047 | EXECUTING SOFTWARE PERFORMANCE TEST JOBS IN A CLUSTERED SYSTEM - Using a testing framework, developers may create a test module to centralize resources and results for a software test plan amongst a plurality of systems. With assistance from the testing framework, the test module may facilitate the creation of test cases, the execution of a test job for each test case, the collection of performance statistics during each test job, and the aggregation of collected statistics into organized reports for easier analysis. The test module may track test results for easy comparison of performance metrics in response to various conditions and environments over the history of the development process. The testing framework may also schedule a test job for execution when the various systems and resources required by the test job are free. The testing framework may be operating system independent, so that a single test job may test software concurrently on a variety of systems. | 08-06-2009 |
20090199160 | CENTRALIZED SYSTEM FOR ANALYZING SOFTWARE PERFORMANCE METRICS - Using a testing framework, developers may create a test module to centralize resources and results for a software test plan amongst a plurality of systems. With assistance from the testing framework, the test module may facilitate the creation of test cases, the execution of a test job for each test case, the collection of performance statistics during each test job, and the aggregation of collected statistics into organized reports for easier analysis. The test module may track test results for easy comparison of performance metrics in response to various conditions and environments over the history of the development process. The testing framework may also schedule a test job for execution when the various systems and resources required by the test job are free. The testing framework may be operating system independent, so that a single test job may test software concurrently on a variety of systems. | 08-06-2009 |
20090327274 | PREFETCHING DATA FOR DOCUMENT RANKING - The subject matter disclosed herein relates to prefetching data for use in ranking of electronic documents via a document ranking component. | 12-31-2009 |
20090328014 | COMPILER BASED CODE MODIFICATION FOR USE IN DOCUMENT RANKING - The subject matter disclosed herein relates to alter an expression of executable instructions via a compiler component for use in ranking of electronic documents. | 12-31-2009 |
20100023474 | Decision Tree Coalescing for Document Ranking - Machine-learned ranking algorithms, e.g. for ranking search results, often use a sequence of decision trees involving decision nodes based on threshold values of features. Modules, systems and methods of optimizing such algorithms involve analyzing threshold feature values to determine threshold intervals for each feature and grouping decision trees according to the feature used in a root decision node. Then coalescing the decision trees within each group to form a coalesced group tree for each group and finally coalescing the coalesced group trees to form a coalesced tree that implements the algorithm. | 01-28-2010 |
20100070457 | Efficient Data Layout Techniques for Fast Machine Learning-Based Document Ranking - A computer readable medium stores a program for optimization for a search, and has sets of instructions for receiving a first decision tree. The first decision tree includes several nodes, and each node is for comparing a feature value to a threshold value. The instructions are for weighting the nodes within the first decision tree, determining the weighted frequency of a first feature within the first decision tree, and determining the weighted frequency of a second feature within the first decision tree. The instructions order the features based on the determined weighted frequencies, and store the ordering such that values of features having higher weighted frequencies are retrieved more often than values of features having lower weighted frequencies within the first decision tree. | 03-18-2010 |
Patent application number | Description | Published |
20110125729 | ANALYZING XML DATA - Embodiments of the invention disclose a method, a system and a computer program product of discovering automated insights in XML data by generating a query result in response to querying data using a query, wherein the data is in a markup language format, and identifying a pattern associated with the query result, wherein the data in the markup language format is used for pattern identification. | 05-26-2011 |
20110191781 | RESOURCES MANAGEMENT IN DISTRIBUTED COMPUTING ENVIRONMENT - A method, system and a computer program product for determining resources allocation in a distributed computing environment. An embodiment may include identifying resources in a distributed computing environment, computing provisioning parameters, computing configuration parameters and quantifying service parameters in response to a set of service level agreements (SLA). The embodiment may further include iteratively computing a completion time required for completion of the assigned task and a cost. Embodiments may further include computing an optimal resources configuration and computing at least one of an optimal completion time and an optimal cost corresponding to the optimal resources configuration. Embodiments may further include dynamically modifying the optimal resources configuration in response to at least one change in at least one of provisioning parameters, computing parameters and quantifying service parameters. | 08-04-2011 |
20110270808 | Systems and Methods for Discovering Synonymous Elements Using Context Over Multiple Similar Addresses - A clustering-based approach to data standardization is provided. Certain embodiments take as input a plurality of addresses, identify one or more features of the addresses, cluster the addresses based on the one or more features, utilize the cluster(s) to provide a data-based context useful in identifying one or more synonyms for elements contained in the address(es), and standardize the address(es) to an acceptable format, with one or more synonyms and/or other elements being added to or taken away from the input address(es) as part of the standardization process. | 11-03-2011 |
20120078929 | Utilizing Metadata Generated During XML Creation to Enable Parallel XML Processing - A method, computer program product, and system for enabling parallel processing of an XML document without pre-parsing, utilizing metadata associated with the XML document and created at the same time as the XML document. The metadata is used to generate partitions of the XML document at the time of parallel processing, without requiring system-intensive pre-parsing. | 03-29-2012 |
20120123987 | SYSTEMS AND METHODS FOR DYNAMICALLY RECONFIGURING PREDICTIVE ANALYTICS WITHIN WORKFLOWS USING SELECTIVE USER FEEDBACK - Methods and arrangements for managing and enhancing workflow. A work item is accepted and the is routed from a first node to a second node based on a predictive analytics model. The predictive analytics model is validated, and is reconfigured responsive to the validating. | 05-17-2012 |
20120158619 | OPTIMAL RULE SET MANAGEMENT - Systems, methods, and computer products for optimally managing large rule sets are disclosed. Rule dependencies of rules within a set of rules may be determined as a function of rules execution frequency data generated from applying the rules over a data set. The rules within the set of rules may be clustered into rules clusters based on the determined rule dependencies, in which the rules clusters comprise disjoint subsets of the rules within the set of rules. Cluster frequency data for the rules clusters may be used to arrive at an optimal ordering. | 06-21-2012 |
20120166460 | Utilizing Metadata Generated During XML Creation to Enable Parallel XML Processing - A method, computer program product, and system for enabling parallel processing of an XML document without pre-parsing, utilizing metadata associated with the XML document and created at the same time as the XML document. The metadata is used to generate partitions of the XML document at the time of parallel processing, without requiring system-intensive pre-parsing. | 06-28-2012 |
20120259836 | Analyzing XML Data - Embodiments of the invention disclose a method, a system and a computer program product of discovering automated insights in XML data by generating a query result in response to querying data using a query, wherein the data is in a markup language format, and identifying a pattern associated with the query result, wherein the data in the markup language format is used for pattern identification. | 10-11-2012 |
20120259837 | Analyzing XML Data - Embodiments of the invention disclose a method, a system and a computer program product of discovering automated insights in XML data by generating a query result in response to querying data using a query, wherein the data is in a markup language format, and identifying a pattern associated with the query result, wherein the data in the markup language format is used for pattern identification. | 10-11-2012 |
20120323835 | DYNAMICALLY RECONFIGURING PREDICTIVE ANALYTICS WITHIN WORKFLOWS USING SELECTIVE USER FEEDBACK - Methods and arrangements for managing and enhancing workflow. A work item is accepted and the is routed from a first node to a second node based on a predictive analytics model. The predictive analytics model is validated, and is reconfigured responsive to the validating. | 12-20-2012 |
20130006992 | Adapting Data Quality Rules Based Upon User Application Requirements - During application of data quality rules to a data set obtained from a data source, data is retrieved from the data source along with a common set of rules configured to format the retrieved data in a manner in accordance with one or more predefined data quality rules of the common set of rules. At least one predefined data quality rule is adjusted utilizing at least one editable widget to form a modified set of data quality rules adapted for use with a specified application. The modified set of data quality rules is applied to the retrieved data. | 01-03-2013 |
20130007629 | Adapting Data Quality Rules Based Upon User Application Requirements - During application of data quality rules to a data set obtained from a data source, data is retrieved from the data source along with a common set of rules configured to format the retrieved data in a manner in accordance with one or more predefined data quality rules of the common set of rules. At least one predefined data quality rule is adjusted utilizing at least one editable widget to form a modified set of data quality rules adapted for use with a specified application. The modified set of data quality rules is applied to the retrieved data. | 01-03-2013 |