Patent application number | Description | Published |
20100202236 | RAPID SAFEGUARDING OF NVS DATA DURING POWER LOSS EVENT - A method, system, and computer program product for safeguarding nonvolatile storage (NVS) data by a processor in communication with a memory device following a power loss event is provided. A first portion of the NVS data is encrypted using a first buffer module. Subsequently the first portion of the NVS data is transferred to at least one shared storage device, while a second portion of the NVS data is simultaneously encrypted using a second buffer module. The second portion of the NVS data is subsequently transferred to the at least one shared storage device. | 08-12-2010 |
20110261964 | REDUNDANT KEY SERVER ENCRYPTION ENVIRONMENT - Provided are a computer program product, system and method for a redundant key server encryption environment. A key server transmits public keys associated with the key server and at least one device to at least one remote key server. The key server receives from the at least one remote key server public keys associated with the at least one remote key server. The key server receives a request for an encryption key from a requesting device comprising one of the at least one device and generates the encryption key for use by the requesting device to unlock a storage. The key server generates a first wrapped encryption key by encrypting the encryption key with a requesting device public key associated with the requesting device. The key server generates a second wrapped encryption key by encrypting the encryption key with a public key associated with the key server. At least one additional wrapped encryption key is generated for each of the at least one remote key server by encrypting the encryption key with the at least one public key provided by the at least one remote key server. The key server transmits the first, second and the at least one additional wrapped encryption key to the requesting device. | 10-27-2011 |
20120233455 | REDUNDANT KEY SERVER ENCRYPTION ENVIONMENT - Provided are a computer program product, system and method for a redundant key server encryption environment. A key server receives from at least one remote key server public keys associated with the at least one remote key server. The key server receives a request for an encryption key from a requesting device and generates the encryption key for use by the requesting device to unlock a storage. The key server generates a first wrapped encryption key by encrypting the encryption key with a requesting device public key, a second wrapped encryption key by encrypting the encryption key with a public key associated with the key server, and at least one additional wrapped encryption key by encrypting the encryption key with the at least one public key provided by the at least one remote key server. The key server transmits the generated keys to the requesting device. | 09-13-2012 |
20140108724 | PREVENTING ACCESS LOSS WHEN DEVICE ADAPTER AFFINITY TO A NODE CHANGES - Provided are a computer implemented method, computer program product, and system for maintaining state information. An available node affiliated with an unavailable device adapter and an unavailable node affiliated with an available device adapter are identified, wherein the available node is assigned a first subset of disk arrays, and wherein the unavailable node is assigned a second subset of disk arrays. The available device adapter is affiliated with the available node. First state information of the first node that describes a state of the first subset of disk arrays is updated with second state information of the second node that describes a state of the second subset of disk arrays. Access to the first subset of disk arrays and the second subset of disk arrays is provided through the available node and the available device adapter using the updated first state information. | 04-17-2014 |
Patent application number | Description | Published |
20100312604 | TECHNICIAN CONTROL SYSTEM - Technician control, in which a control system is configured to control scheduling and dispatch operations for work orders being handled by technicians. Multiple technician devices are each associated with one or more technicians, are configured to communicate, over a network, with the control system, and also are configured to provide output in response to communications that are received from the control system and that are related to the scheduling and dispatch operations performed by the control system. A set of scheduling configuration options may be pre-defined and user input weighting at least one of the scheduling configuration options relative to other of the scheduling configuration options may be received. A scheduling application used by the control system to perform scheduling operations may be configured based on configuration data that reflects the weighting and scheduling operations may be performed using the configured scheduling application. | 12-09-2010 |
20100312605 | TECHNICIAN CONTROL SYSTEM - Technician control, in which a control system is configured to control scheduling and dispatch operations for work orders being handled by technicians. Multiple technician devices are each associated with one or more technicians, are configured to communicate, over a network, with the control system, and also are configured to provide output in response to communications that are received from the control system and that are related to the scheduling and dispatch operations performed by the control system. A set of scheduling configuration options may be pre-defined and user input weighting at least one of the scheduling configuration options relative to other of the scheduling configuration options may be received. A scheduling application used by the control system to perform scheduling operations may be configured based on configuration data that reflects the weighting and scheduling operations may be performed using the configured scheduling application. | 12-09-2010 |
20130150983 | TECHNICIAN CONTROL SYSTEM - Technician control, in which a control system is configured to control scheduling and dispatch operations for work orders being handled by technicians. Multiple technician devices are each associated with one or more technicians, are configured to communicate, over a network, with the control system, and also are configured to provide output in response to communications that are received from the control system and that are related to the scheduling and dispatch operations performed by the control system. A set of scheduling configuration options may be pre-defined and user input weighting at least one of the scheduling configuration options relative to other of the scheduling configuration options may be received. A scheduling application used by the control system to perform scheduling operations may be configured based on configuration data that reflects the weighting and scheduling operations may be performed using the configured scheduling application. | 06-13-2013 |
20140172482 | TECHNICIAN CONTROL SYSTEM - Technician control, in which a control system is configured to control scheduling and dispatch operations for work orders being handled by technicians. Multiple technician devices are each associated with one or more technicians, are configured to communicate, over a network, with the control system, and also are configured to provide output in response to communications that are received from the control system and that are related to the scheduling and dispatch operations performed by the control system. A set of scheduling configuration options may be pre-defined and user input weighting at least one of the scheduling configuration options relative to other of the scheduling configuration options may be received. A scheduling application used by the control system to perform scheduling operations may be configured based on configuration data that reflects the weighting and scheduling operations may be performed using the configured scheduling application. | 06-19-2014 |
Patent application number | Description | Published |
20100287033 | Social Network Based Recommendation Method and System - Recommendations for content may be generated based on social networking communities. For example, a user may receive a list of recommended content items based on content that has been viewed by others in the user's social networks. Recommendations may further be based on content information such as reviews, ratings, tags, attributes and the like from various sources internal and external to the user's social networks. Content items may be given a weight that corresponds to a determined level of relevance or interest to a user. Using the weight, a list of recommended items may be sorted or filtered. In one or more configurations, the weight may be modified based on an age of the content item. For example, the relevance, importance or interest of a news report may decline as the news becomes older and older. | 11-11-2010 |
20110271304 | CONTENT NAVIGATION GUIDE - A program guide, such as an electronic program guide (EPG), may be used to display information regarding upcoming scheduled transmissions of content. The display may include thumbnail images for selected groups of programs, and the images may be positioned in a pseudo-random location, and moved along a randomly generated trajectory on the display. | 11-03-2011 |
20140013353 | Social Network Based Recommendation Method and System - Recommendations for content may be generated based on social networking communities. For example, a user may receive a list of recommended content items based on content that has been viewed by others in the user's social networks. Recommendations may further be based on content information such as reviews, ratings, tags, attributes and the like from various sources internal and external to the user's social networks. Content items may be given a weight that corresponds to a determined level of relevance or interest to a user. Using the weight, a list of recommended items may be sorted or filtered. In one or more configurations, the weight may be modified based on an age of the content item. For example, the relevance, importance or interest of a news report may decline as the news becomes older and older. | 01-09-2014 |
20140235205 | Method And Systems For Pairing A Mobile Device With A Wireless Network - Disclosed herein are systems and methods for associating a device with a network, such as a wireless network. One method comprises storing network identifying information for a network in a database, receiving contact information from a computing device, determining whether the contact information is associated with the network identifying information in the database, and coupling the computing device with the network in response to determining that the contact information is associated with the network identifying information. | 08-21-2014 |
20140280983 | Methods And Systems For Pairing Devices - Disclosed herein are methods and systems for pairing devices such as control devices and user devices, by determining location information relating to one or more of the control devices and the user devices. Location information can be used to identify at least one user device proximate to the control device. The method and system then identifies a selected user device to be paired with the control device. The control device is then paired with the selected user device. | 09-18-2014 |
20140282122 | SUPPLEMENTAL SERVICES INTERFACE - Examples are described for integrating interface functionality with other experiences. For example, if a user is interested in a particular item of scheduled or on-demand content (e.g., a television series episode), the user may also be interested in a web page devoted to the television series and/or other extras such as cast interviews, news, related theme apps, and the like. These types of experiences may be integrated into an interface by presenting the experiences as supplemental services that may be presented and/or selected. | 09-18-2014 |
Patent application number | Description | Published |
20110185401 | REAL-TIME ADJUSTMENTS TO AUTHENTICATION CONDITIONS - Embodiments of the invention provide for adjusting authentication conditions in real-time. A graph-theoretic data structure is dynamically constructing, having nodes corresponding to received valid and invalid authentication credentials used in attempts to access a system. Based on the graph-theoretic data structure, embodiments compute a probability of an invalid credential being an authentication attempt by a particular type of user. If the probability is beyond a threshold probability, embodiments trigger a security event is to adjust an authentication condition of the system, e.g., to increase or decrease a maximum permissible number of failed login attempts within a certain period of time. | 07-28-2011 |
20140195941 | MANAGING DISPLAY ON A COMPUTING SYSTEM - A system and a computer program product displays information associated with one or more desired contexts on a computing system. The disclosure enables defining of the one or more desired contexts. One or more active applications on the computing system are tracked and filtered based upon the one or more desired contexts. Information associated with the one or more desired contexts is displayed, and information not associated with the one or more desired contexts is concealed. | 07-10-2014 |
20140195942 | MANAGING DISPLAY ON A COMPUTER SYSTEM - A method, a system and a computer program product displays information associated with one or more desired contexts on a computing system. The disclosure enables defining of the one or more desired contexts. One or more active applications on the computing system are tracked and filtered based upon the one or more desired contexts. Information associated with the one or more desired contexts is displayed, and information not associated with the one or more desired contexts is concealed. | 07-10-2014 |
Patent application number | Description | Published |
20100299017 | METHODS AND SYSTEMS FOR PROVIDING VEHICLE INFORMATION - In an exemplary embodiment a system provides vehicle information to an operator of a vehicle having a plurality of components. The system comprises an onboard database configured to store vehicle-specific data and behavior-specific data and an operator interface. The system includes an onboard processor coupled to the onboard database, the plurality of components, and the operator interface. The onboard processor is configured to provide requested vehicle-specific data to the operator in response to an operator request via the operator interface. The onboard processor is also configured to receive operator-behavioral data from the plurality of components, recognize patterns of operation from the operator-behavioral data, and provide the behavior-specific data to the operator in response to the recognized patterns in the operator-behavioral data. | 11-25-2010 |
20100324816 | PRESENTATION OF NAVIGATION INSTRUCTIONS USING VARIABLE LEVELS OF DETAIL - A navigation system is provided for instructing an operator of a vehicle. The navigation system includes a navigation processor configured to obtain a destination location, and to generate a proposed route to the destination location. The navigation system also includes a presentation element coupled to the navigation processor, the presentation element configured to provide navigation instructions to the operator. A selection module is coupled to or incorporated into the navigation processor, and the selection module is configured to select a cartographic resolution from a plurality of different cartographic resolutions, resulting in a selected cartographic resolution. The presentation element provides navigation instructions for at least a portion of the proposed route, using the selected cartographic resolution. | 12-23-2010 |
20100324817 | MULTIPLE ROUTE PRE-CALCULATION AND PRESENTATION FOR A VEHICLE NAVIGATION SYSTEM - A navigation system and related operating methods are provided for instructing an operator of a vehicle. The navigation system obtains a destination location and generates a proposed route to the destination location. The proposed route is defined by one or more driver decision points and associated driving maneuvers. Before the vehicle reaches an approaching driver decision point, the navigation system pre-calculates alternate routes between the approaching driver decision point and the destination location, and saves the alternate routes for subsequent activation. Pre-calculated alternate routes can also be used to determine and indicate the relative importance of an approaching driving maneuver. The driver can consider the importance of driving maneuvers when deciding whether or not to follow the recommended route. | 12-23-2010 |
20100324818 | PRESENTATION OF NAVIGATION INSTRUCTIONS USING VARIABLE CONTENT, CONTEXT AND/OR FORMATTING - A navigation system is provided for instructing an operator of a vehicle. The navigation system includes a navigation processor configured to obtain a destination location, and to generate a proposed route to the destination location. The navigation system also includes a presentation element coupled to the navigation processor, the presentation element configured to provide navigation instructions to the operator. The navigation system also has a selection module coupled to or incorporated into the navigation processor. The selection module is configured to select a designated navigation instruction scheme from a plurality of different navigation instruction schemes. For a given navigation instruction, the plurality of different navigation instruction schemes provide different instruction content. During operation, the presentation element provides navigation instructions for the proposed route, using the designated navigation instruction scheme. | 12-23-2010 |
20110218711 | INFOTAINMENT SYSTEM CONTROL - An embodiment an infotainment system for an automobile includes a navigation system, an entertainment system, an audio output device and a control system coupled to the navigation system, the entertainment system and the audio output device. The control system controls access by the navigation system and the entertainment system to the audio output device and includes a conversation recognizer that determines if a conversation is being conducted. The control system of this embodiment varies operation of the audio output device in the event a conversation is being conducted. | 09-08-2011 |
20110238752 | VEHICLE BASED SOCIAL NETWORKING - A social networking hub located in an automobile that provides updates to a social networking site includes an information gathering module that receives and stores information from one or more information sources. The hub also includes an update manager that receives information from the information gathering module and provides some or all of the information to the social networking site through an internet connection. | 09-29-2011 |
Patent application number | Description | Published |
20120102317 | SECURE CONTENT DISTRIBUTION - In an example, a method of securing content is described. The method may include instantiating a content server on a client device. The method may also include operating the content server to retrieve content identified by a Uniform Resource Identifier (URI). The method may also include serving the content from the content server to a content renderer on the client device. The content renderer may be configured to render the content at the client device and to prohibit saving the content in the clear on the client device. | 04-26-2012 |
20120102329 | CONTENT DISTRIBUTION AND AGGREGATION - In an example, a method for secure publication of content is described. The method may include encrypting content with a media key. The method may also include providing the encrypted content to a client device associated with a private key and a public key. The private key may be stored at the client device. The method may also include encrypting the media key with the public key. The method may also include providing the encrypted media key to the client device. | 04-26-2012 |
20140208122 | SECURE CONTENT DISTRIBUTION - In an example, a method of securing content is described. The method may include instantiating a content server on a client device. The method may also include operating the content server to retrieve content identified by a Uniform Resource Identifier (URI). The method may also include serving the content from the content server to a content renderer on the client device. The content renderer may be configured to render the content at the client device and to prohibit saving the content in the clear on the client device. | 07-24-2014 |
20140270331 | CONTENT WATERMARKING - In an embodiment, a method of watermarking a video includes generating three or more pilot signals. The method also includes generating a watermark. The method also includes embedding the three or more of the pilot signals in first frames of the video. The method also includes embedding the watermark in second frames of the video according to a watermarking just-noticeable-difference (JND) model. The second frames may be non-overlapping with the first frames. | 09-18-2014 |
Patent application number | Description | Published |
20110145921 | OBFUSCATED MALWARE DETECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obfuscated malware. In one aspect, a method includes executing from a binary executable a call instruction and a plurality of instruction subsequent to a target of the call instruction, determining if the value identified by the stack pointer of the call stack is equal to a default value stored in the call stack prior to emulation, determining if there is a non-obfuscation signal resulting from the execution of the call instructions and the plurality of instructions, and if the value identified by the stack pointer is the default value and there is no obfuscation signal, identifying the call instruction as a possibly obfuscated call instruction; Additionally, the method includes determining that if the number of call instructions identified as possibly obfuscated call instructions exceeds a threshold number, identifying the binary executable as an obfuscated executable. | 06-16-2011 |
20110283358 | METHOD AND SYSTEM TO DETECT MALWARE THAT REMOVES ANTI-VIRUS FILE SYSTEM FILTER DRIVER FROM A DEVICE STACK - A method for detecting removal of a filter driver includes performing an operation on an element of a kernel mode of an operating system, the operation initiated by a user mode entity, obtaining the result of performing the operation, and comparing the result of performing the operation against an expected result of the operation. If the result of performing the operation matches the expected result of the operation, it is determined that a file system filter driver in the kernel mode of the operating system is working correctly. If the result of performing the operation does not match the expected result of the operation, it is determined that a file system filter driver in the kernel mode of the operating system has been compromised by malware. | 11-17-2011 |
20120198554 | Obfuscated Malware Detection - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting obfuscated malware. In one aspect, a method includes identifying call instructions in a binary executable; executing the call instruction; executing instructions subsequent to a target of the call instruction; determining that an address identified by a stack pointer is different from the return address; in response to the determination that the address is different, determining if there is a non-obfuscation signal; if there is a non-obfuscation signal, identifying the call instruction as a non-obfuscated call instruction; if there is not a non-obfuscation signal, identifying the call instruction as a possibly obfuscated call instruction; determining whether the call instructions identified as possibly obfuscated call instructions exceeds a threshold; in response to the determination that the call instructions identified as possibly obfuscated call instructions exceeds the threshold, identifying the executable as an obfuscated executable. | 08-02-2012 |
20130247182 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING HIDDEN OR MODIFIED DATA OBJECTS - A system, method, and computer program product are provided for detecting hidden or modified data objects. In use, a first set of data objects stored in a device is enumerated, where the enumeration of the first set of data objects is performed within an operating system of the device. Additionally, a second set of data objects stored in the device is enumerated, where the enumeration of the second set of data objects is performed outside of the operating system of the device. Further, the first set of data objects and the second set of data objects are compared for identifying hidden or modified data objects. | 09-19-2013 |
20150180883 | CONTROL FLOW GRAPH REPRESENTATION AND CLASSIFICATION - A software sample is identified that includes code and a control flow graph is generated for each of a plurality of functions included in the sample. Features are identified in each of the functions that correspond to instances of a set of control flow fragment types. A feature set is generated for the sample from the identified features. | 06-25-2015 |
Patent application number | Description | Published |
20120101843 | SYSTEM AND METHOD FOR ANONYMIZING PATIENT DATA - A system and method for managing healthcare information is disclosed. The data servers each include a data manager that comprises a controller, a scrubber module and a user interface engine. The controller manages the core functions and the transmission of data between data manager components. The scrubber module manages the pseudoanonymization of data and the collection of data for clinical trials. The user interface engine generates user interfaces for displaying the applications and collecting clinical trial data. | 04-26-2012 |
20120101849 | VIRTUAL CARE TEAM RECORD FOR TRACKING PATIENT DATA - A system and method for managing healthcare information is disclosed. The data servers each include a data manager that comprises a controller, applications, an application manager, a virtual care team module, and a user interface engine. The controller manages the core functions and the transmission of data between data manager components. The applications are applications that are created by the user or downloaded as third-party applications. The application manager manages the creation and communication between applications. The virtual care team module manages the transmission of patient data between data servers. The user interface engine generates user interfaces for displaying the applications and collecting clinical trial data. | 04-26-2012 |
20120102502 | MANAGING HEALTHCARE INFORMATION IN A DISTRIBUTED SYSTEM - A system and method for managing healthcare information is disclosed. The data servers each include a data manager that comprises a controller, a grid engine, applications, an application manager and a user interface engine. The controller manages the core functions and the transmission of data between data manager components. The grid engine manages information sent between data servers. The applications are applications that are created by the user or downloaded as third-party applications. The application manager manages the creation and communication between applications. The user interface engine generates user interfaces for displaying the applications and collecting clinical trial data. | 04-26-2012 |
20120239413 | Sending Healthcare Information Securely - A health information services provider (HISP) application includes a controller, a transaction engine, a data encryption engine, an authentication engine, a user interface engine and a registration engine. The controller manages the core functions and transmission to the different components of the HISP application. The transaction engine routes messages and requests for joining a grid. The data encryption engine encrypts or decrypts messages. The authentication engine verifies messages. The user interface engine generates a user interface for exchanging healthcare information between providers. The registration engine registers providers to exchange healthcare information with other providers. | 09-20-2012 |
20140215490 | Managing Healthcare Information in a Distributed System - A system and method for managing healthcare information is disclosed. The data servers each include a data manager that comprises a controller, a grid engine, applications, an application manager and a user interface engine. The controller manages the core functions and the transmission of data between data manager components. The grid engine manages information sent between data servers. The applications are applications that are created by the user or downloaded as third-party applications. The application manager manages the creation and communication between applications. The user interface engine generates user interfaces for displaying the applications and collecting clinical trial data. | 07-31-2014 |
Patent application number | Description | Published |
20100048386 | Novel Blended Hydrous Kaolin Clay Product - The disclosed invention relates to a blended hydrous kaolin clay product comprising a platy coarse kaolin clay and a fine, hydrous kaolin clay. The blended kaolin clay product is suitable for use as a raw material component in the formation of cordierite products. | 02-25-2010 |
20100160526 | METHODS FOR STABILIZING HYDROUS KAOLIN - This invention is directed to a method of stabilizing high solid slurries, like kaolin slurries, the method comprises causticizing the sodium polycrylate or polyacrylic acid used in a dispersant blend to a pH of above 9. The method comprises a homogeneous dispersant blend of sodium carbonate, sodium polyacrylate, sodium silicate, and sodium hydroxide. | 06-24-2010 |
20100192807 | NOVEL BLENDED HYDROUS KAOLIN CLAY PRODUCT - The disclosed invention relates to a blended hydrous kaolin clay product comprising a platy coarse kaolin clay and a fine, hydrous kaolin clay. The blended kaolin clay product is suitable for use as a raw material component in the formation of cordierite products. | 08-05-2010 |
20110046284 | Novel Treated Mineral Pigments for Aqueous Based Barrier Coatings - This invention is directed to novel pigments, pigment systems (including components not classified as pigments) and formulations for use in an aqueous coating system applied onto cellulosic (paper and/or paperboard) and non-cellulosic substrates (polyethylene (PE), polylactic acid (PLA), polyvinyl acetate (PVAc), etc.) to impart barrier properties. | 02-24-2011 |
20120135253 | GLOSSING SYSTEM FOR PAPER AND PAPERBOARD COATING - This invention is directed to a paper coating or binding formulation, comprising an aqueous emulsion which comprises a copolymer derived from one or more monomers, and an ultra fine kaolin pigment. In certain embodiments, this invention is directed to a blend of high T9 latex (substantially non-film forming) and ultrafine kaolin. This invention is also directed to a paper comprising a fiber matrix and a coating or binding composition comprising an aqueous emulsion which comprises a copolymer deviced from one or more monomers, and an ultrafine kaolin pigment. | 05-31-2012 |
20130225744 | ENHANCED PERFORMANCE OF MINERAL BASED AQUEOUS BARRIER COATINGS - A method for preparing an aqueous based coating system, and coating systems made thereby, for coating onto paper and/or paperboard for providing barrier to liquid, moisture vapor, oil and grease including a pigment and a polymer emulsion system or natural based binding system. One alternative of the method includes surface treating a pigment to form a pigment system and mixing a polymer emulsion system or natural based binding system with the pigment system. Another alternative of the method includes mixing a pigment and polymer emulsion system or natural based binding system and hydrophobizing the polymer emulsion system or natural based binding system by adding silanes, siloxanes, siloxane/silicone resin blends, or their carbon based analogs. | 08-29-2013 |
Patent application number | Description | Published |
20130152097 | Resource Health Based Scheduling of Workload Tasks - A computer-implemented method for allocating threads includes: receiving a registration of a workload, the registration including a workload classification and a workload priority;
| 06-13-2013 |
20130159497 | Heuristic-Based Rejection of Computing Resource Requests - A computing system includes an authentication layer, the authentication layer being programmed to receive a request for resources of the computing system and to authenticate an identity of a user requesting the resources, and a command layer, the command layer being programmed to execute one or more commands from the request for resources, wherein the command layer logs characteristics associated with one or more of the commands, wherein the computing system monitors each logged command to determine when a threshold is met, and wherein the computing system blocks a subsequent request for resources from the user when the threshold is met. | 06-20-2013 |
20130185427 | TRAFFIC SHAPING BASED ON REQUEST RESOURCE USAGE - A current request for a server to perform work for a user profile can be received and processed at the server. It can be determined whether server usage by the profile exhibits a sufficient trend toward a threshold value to warrant performing traffic shaping for the user profile. If so, then a delay time can be calculated based on, or as a function of, server resources used in processing the current request, and a response to the current request can be delayed by the delay time. | 07-18-2013 |
20130198363 | TECHNIQUES FOR TRACKING RESOURCE USAGE STATISTICS PER TRANSACTION ACROSS MULTIPLE LAYERS OF PROTOCOLS - Techniques to track resource usage statistics per transaction across multiple layers of protocols and across multiple threads, processes and/or devices are disclosed. In one embodiment, for example, a technique may comprise assigning an activity context to a request at the beginning of a first stage, where the activity context has an initial set of properties. The values of the properties may be assigned to the properties in the initial set during the first stage. The value of a property may be stored on a data store local to the first stage. The activity context may be transferred to a second stage when the request begins the second stage. The transferred activity context may include a property from the initial set of properties. The stored values may be analyzed to determine a resource usage statistic. Other embodiments are described and claimed. | 08-01-2013 |
20140196048 | IDENTIFYING AND THROTTLING TASKS BASED ON TASK INTERACTIVITY - The described implementations relate to processing of electronic data. One implementation is manifest as a system that can include logic and at least one processing device configured to execute the logic. The logic can be configured to receive a first task request to execute a first task that uses a resource when performed. The first task can have an associated first level of interactivity. The logic can also be configured to receive a second task request to execute a second task that also uses the resource when performed. The second task can have an associated second level of interactivity. The logic can also be configured to selectively throttle the first task and the second task based upon the first level of interactivity and the second level of interactivity. | 07-10-2014 |
Patent application number | Description | Published |
20110022628 | Matching Merchant Names from Transaction Data - A computer system processes a merchant name from transaction data to determine a matched merchant name. The computer system retrieves a retrieved merchant name from transaction data, obtains a processed merchant name from the retrieved merchant name, and matches the processed merchant name to one of a collection of standard merchant names, where the retrieved merchant name may be a name variation of a standard merchant name. At least one character of the retrieved merchant name may be altered to obtain the processed merchant name. For example, characters may be deleted from the accessed merchant name or characters may be ignored from a portion of the retrieved merchant name. | 01-27-2011 |
20120290355 | Identification of Customer Behavioral Characteristic Data - Systems and methods for identifying one or more customer behavioral characteristics based on data received from one or more sources is provided. The system and method include receiving customer data from a first source which may include a current access parameter and a plurality of previous access parameters. A pattern may be identified in the current access parameter and previous access parameters. The system and method may include receiving customer data from a second data source different from the first data source. A second current access parameter and second plurality of previous parameters may be received and a pattern may be identified between the second current access parameter and the second previous parameters. The identified patterns may be compiled to identify one or more customer behavioral characteristics. | 11-15-2012 |
20120290398 | Content Distribution Utilizing Customer Behavioral Characteristic Data - Systems and methods for providing content to a user at an account accessing device is described A first user input may be received at a first account processing device. A type of channel between the user and the account accessing device, a temporal parameter associated with the first access, user used financial entity services associated with at least one account of the user and current allowable actions on the first account by the user may be determined. A second user input may be received indicating an action, of the current allowable actions, of the user at the first account accessing device. Content for output to the user upon another occurrence of the user accessing the first account accessing device may be determined. The content may be based upon at least one behavioral characteristic of the user and may be an offer for at least one user unused financial entity service. | 11-15-2012 |
Patent application number | Description | Published |
20140172866 | SYSTEM FOR STORAGE, QUERYING, AND ANALYSIS OF TIME SERIES DATA - A system for storing time series data includes an ingester that prepares metadata indices associated with blocks of incoming time series data and stores the blocks of data in a time series database and the indices in a separate index database. The time series database distributes storage of the data blocks among multiple data nodes. A query layer receives queries and uses the index database to determine which data blocks are needed to process the query, and then requests only those data blocks from the time series database. Processing of the query is performed within the time series database only on those data nodes that contain relevant data, and partial results are passed to an output layer for formation into a final query result. | 06-19-2014 |
20140172867 | METHOD FOR STORAGE, QUERYING, AND ANALYSIS OF TIME SERIES DATA - A method for performing queries on a distributed time series data storage system is presented. The time series data storage system has a time series database that stores data blocks containing time stamped data across a plurality of computing devices. The system also includes an index database that stores an index associated with the time stamped data in each data block. The method includes the steps of sending a query, requesting indices, returning the indices, preparing a sub-query, forwarding the sub-query to an evaluator, evaluating the sub-query, performing a logical operation on each sub-query's result, receiving the sub-results at an output handler, and combining the sub-results. | 06-19-2014 |
20140172868 | SYSTEM AND METHOD FOR STORAGE, QUERYING, AND ANALYSIS SERVICE FOR TIME SERIES DATA - A service for storing time series data provides a data pipe for receiving time series data, a query pipe for making requests to the service, and a result pipe for receiving output from the service. Data sent to the query pipe is processed by an ingester that prepares metadata indices associated with blocks of incoming time series data and stores the blocks of data in a time series database and the indices in a separate index database. A query layer receives queries from the query pipe and uses the index database to determine which data blocks are needed to process the query, and then requests only those data blocks from the time series database. Processing of the query is performed within the time series database only on those data nodes that contain relevant data, and partial results are passed to an output layer for formation into a final query result which is sent out by the results pipe. | 06-19-2014 |
20140358968 | METHOD AND SYSTEM FOR SEAMLESS QUERYING ACROSS SMALL AND BIG DATA REPOSITORIES TO SPEED AND SIMPLIFY TIME SERIES DATA ACCESS - Included herein is a method for providing seamless access to time series data located in multiple time series data storage units. A user makes a data query without knowing where the data is stored or in what format. The data request is received and parsed by a query interface and the data interface formulates one or more data requests for the specific time series data storage device where the queried data are stored. The time series data received from the data storage device is assembled by the query interface and displayed to the user. | 12-04-2014 |
20150242412 | SYSTEM AND METHOD FOR ENHANCED PROCESS DATA STORAGE AND RETRIEVAL - The subject matter relates to data storage, and more particularly, a system and method to enhance data storage and retrieval. A method of assigning data to at least one region of a data storage device includes monitoring whether an apparatus has generated data. The method includes assigning one of a plurality of system configurations to the data based on at least one criterion. Each of the plurality of system configurations may define different storage locations for data. The method includes acquiring the data and sending the data to be stored on at least one of a plurality of storage devices according to the assigned system configuration. | 08-27-2015 |