10th week of 2016 patent applcation highlights part 42 |
Patent application number | Title | Published |
20160070606 | MULTIPLATFORM MANAGEMENT SYSTEM AND METHOD FOR MOBILE DEVICES - Systems and methods for managing multiple wireless devices are disclosed. An exemplary system includes multiple domains each having a particular type of wireless device management system and respective (application programming interface) APIs. API call modules corresponding to each domain enable accessing of the APIs exposed by each of the respective domains. A management console enables compiling of a consolidated list of devices and users from each of the device management systems into a single view. An exemplary method includes querying multiple domains to obtain user information, compiling a consolidated list of users, displaying the consolidated list in a user interface, selecting a user from the consolidated list, and submitting a command to either all or a specific domain for the selected user. | 2016-03-10 |
20160070607 | SHARING A PARTITIONED DATA SET ACROSS PARALLEL APPLICATIONS - Provided are techniques for sharing a partitioned data set across parallel applications. Under control of a producing application, a partitioned data set is generated; a descriptor that describes the partitioned data set is generated; and the descriptor is registered in a registry. Under control of a consuming application, the registry is accessed to obtain the descriptor of the partitioned data set; and the descriptor is uses to determine how to process the partitioned data set. | 2016-03-10 |
20160070608 | SHARING A PARTITIONED DATA SET ACROSS PARALLEL APPLICATIONS - Provided are techniques for sharing a partitioned data set across parallel applications. Under control of a producing application, a partitioned data set is generated; a descriptor that describes the partitioned data set is generated; and the descriptor is registered in a registry. Under control of a consuming application, the registry is accessed to obtain the descriptor of the partitioned data set; and the descriptor is uses to determine how to process the partitioned data set. | 2016-03-10 |
20160070609 | AUTOMATICALLY GENERATING EFFICIENT REMOTE PROCEDURE CALL (RPC) CODE FOR HETEROGENEOUS SYSTEMS - In one embodiment, a system includes at least one processor and logic integrated with and/or executable by the processor, the logic being configured to instantiate, using an interface definition language (IDL) on a first server, a remote procedure call (RPC) function to exchange information between the first server and a second server, generate at least one stub on the first server using the RPC, and generate at least one stub on the second server using the RPC, wherein the at least one stub generated on the second server does not perform any marshalling or un-marshaling of data when endianess of the two servers is the same. Other systems, methods, and computer program products for exchanging information between servers using RPCs are described in more embodiments. | 2016-03-10 |
20160070610 | SEMICONDUCTOR DEVICE - A semiconductor device includes a counter configured to increment a counter value each predetermined time period, a register storing values including a first value and a second value that is smaller than the first value, and a comparator configured to compare the counter value with the stored values, output a first signal to an external device if the counter value is greater than the first value when an initialization command is received from the external device, and set a flag in the register if the counter value is greater than the second value and smaller than the first value when the initialization command is received. | 2016-03-10 |
20160070611 | COORDINATED AND DEVICE-DISTRIBUTED DETECTION OF ABNORMAL NETWORK DEVICE OPERATION - Techniques for coordinated and device-distributed detection of abnormal network device operation are provided. In some embodiments, a method may include identifying a suspicious activity condition associated with a suspect network device. The suspicious activity condition may also be associated with the device itself. Activity of the network device may be detected and analyzed, including additional data corresponding to the activity from one or more other network devices in the same network. In response to determining that the suspicious activity condition is satisfied, an alert communication can be transmitted that identifies the suspect network device. When the activity is associated with the device itself, a local operation at the network device may be changed. | 2016-03-10 |
20160070612 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM - An apparatus includes a memory configured to hold a condition for determining whether or not to migrate a virtual machine that runs on a certain information processing apparatus included in a plurality of information processing apparatuses, to other information processing apparatus included in the plurality of information processing apparatuses, and a processor coupled to the memory and configured to when the condition is satisfied in a first information processing apparatus included in the plurality of information processing apparatuses, migrate a first virtual machine that runs on the first information processing apparatus to another information processing apparatus included in the plurality of information processing apparatuses, after migrating the first virtual machine, detect a status of an error occurring in the first information processing apparatus, and change the condition, based on the detected status of the error. | 2016-03-10 |
20160070613 | COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE SAME AND STORAGE MEDIUM - A history of transmission/reception via a line is stored in association with the line, and it is detected whether or not a communication apparatus is physically connected to the line. Then if the line is detected to be disconnected, it is determined whether or not a history of transmission/reception regarding the disconnected line is stored. If it is determined that the history of transmission/reception regarding the disconnected line is stored, notification is given to a user that the line is disconnected. | 2016-03-10 |
20160070614 | IDENTIFYING FAULT CONDITIONS IN COMBINATIONS OF COMPONENTS - A control mechanism in a system monitors inputs and outputs (such as sensor data representing one or more environmental conditions in one or more environments, sub-services in the services, and/or compensation) exchanged among components in combinations that provide the services in the environments, where the components in a given combination include at least one of: environmental monitoring devices in the environments and one or more of the partner electronic devices in the environments and/or service providers. Moreover, the control mechanism stores the monitored inputs and outputs, and analyzes the monitored inputs and outputs based on quality criteria and historical inputs and outputs exchanged within the combinations. Based on the analysis, the control mechanism identifies an instance in the inputs and the outputs of: incorrect sensor data and/or fraudulent compensation. Furthermore, the control mechanism performs a remedial action based on the identified instance. | 2016-03-10 |
20160070615 | FEC CODING/DECODING DATA PROCESSING METHOD AND RELATED APPARATUS - An FEC coding/decoding data processing method and a related apparatus are provided. The method includes: performing, at an FEC coding processing sublayer by using m data code blocks as one group, FEC coding on a data code block sequence output by a physical coding sublayer, to generate n FEC check code blocks; respectively distributing m×t2 data code blocks and n×t2 FEC check code blocks to M virtual channels of a first virtual channel group and N virtual channels of a second virtual channel group; and respectively multiplexing, according to geared speed bit by bit multiplexing, data distributed to the first virtual channel group and data distributed to the second virtual channel group to at most H interfaces of a first physical channel group and at most K interfaces of a second physical channel group, where M is an integral multiple of H, and N is an integral multiple of K. | 2016-03-10 |
20160070616 | OFF-MEMORY-MODULE ECC-SUPPLEMENTAL MEMORY SYSTEM - A system includes off-memory-module ECC-supplemental memory. In a process, an ECC-capable memory controller converts non-ECC data words to ECC data words and distributes each ECC data word between a non-ECC memory module set (of one or more non-ECC memory modules) and the ECC-supplemental memory. A host computer system can include a baseboard on which are mounted an ECC-capable memory controller, off-memory-module ECC-supplemental memory, and sockets for installing non-ECC memory modules. | 2016-03-10 |
20160070617 | MAINTAINING A DESIRED NUMBER OF STORAGE UNITS - A method begins by a processing module of a dispersed storage network (DSN) determining that a set of storage units has less than a desired number of active storage units, where the DSN includes a plurality of storage units that randomly are active or inactive. The method continues with the processing module identifying another active storage unit of the storage units that is not currently part of the set of storage units and adding the other active storage unit to the set of storage units. For encoded data stored by the set of storage units, the method continues with the processing module increasing a pillar width number of a dispersed storage error encoding function, maintaining a decode threshold number of the dispersed storage error encoding function, creating new encoded data slices for the encoded data, and storing the new encoded data slices in the other active storage unit. | 2016-03-10 |
20160070618 | RECONSTRUCTION OF DENSE TREE VOLUME METADATA STATE ACROSS CRASH RECOVERY - Embodiments herein are directed to efficient crash recovery of persistent metadata managed by a volume layer of a storage input/output (I/O) stack executing on one or more nodes of a cluster. Volume metadata managed by the volume layer is organized as a multi-level dense tree, wherein each level of the dense tree includes volume metadata entries for storing the volume metadata. When a level of the dense tree is full, the volume metadata entries of the level are merged with the next lower level of the dense tree. During a merge operation, two sets of generation IDs may be used in accordance with a double buffer arrangement: a first generation ID for the append buffer that is full (i.e., a merge staging buffer) and a second, incremented generation ID for the append buffer that accepts new volume metadata entries. Upon completion of the merge operation, the lower level (e.g., level 1) to which the merge is directed is assigned the generation ID of the merge staging buffer. | 2016-03-10 |
20160070619 | METHOD AND APPARATUS FOR CONFIGURING I/O CELLS OF A SIGNAL PROCESSING IC DEVICE INTO A SAFE STATE - A peripheral integrated circuit (IC) device for providing support to a data processing IC device. The peripheral IC device comprises a fault detection component arranged to detect an occurrence of fault conditions within the data processing IC device. The peripheral IC device further comprises a safe state control component. Upon detection of a fault condition occurring within the data processing IC device by the fault detection component, the safe state control component is arranged to cause at least one I/O cell of the data processing IC device to be configured into at least one scan-chain, and cause at least one predefined control signal to be scanned into the at least one scan-chain to configure the at least one I/O cell into a state corresponding to the predefined control signal. | 2016-03-10 |
20160070620 | SYSTEM AND METHOD FOR MAINTAINING A FILE SYSTEM AT A COMPUTING DEVICE - A computing device including a file system in memory is provided. The file system has a plurality of items. Where an item is a file, it has a unique content. Where an item is a folder, it is represented by a plurality of container structures. Each container structure references items in the file system through the use of references such as pointers. Each item can be contained by more than one folder by being referenced by more than one folder. Each item can also include a contained-by structure including references to folders containing that item. Moreover, each item can include relationship structures allowing the items to be organized in accordance with relationships other than contained-by relationships, such as content derivation relationships. The file system can be manipulated through the use of various operations such as “Archive” and “Restore” operations. | 2016-03-10 |
20160070621 | PRUNING UNWANTED FILE CONTENT FROM AN IMAGE BACKUP - Pruning unwanted file content from an image backup. In one example embodiment, a method of pruning unwanted file content from an image backup includes identifying files to be excluded from a base image backup of a source storage, identifying a set of allocated blocks in the source storage at a first point in time, pruning the set of allocated blocks to exclude the allocated blocks that correspond to content of the files to be excluded, backing up the pruned set of allocated blocks, and not backing up the excluded allocated blocks, in the base image backup, and restoring the base image backup to a restore storage, the restoring including pruning file system metadata of a file system of the restore storage prior to exposing the file system to any user such that the files to be excluded are no longer listed as existing within the file system metadata. | 2016-03-10 |
20160070622 | System and method for enhancing availability of a distributed object storage system during a partial database outage - An “operate with missing region” feature allows a cluster to continue servicing reads for available regions even when some regions are missing. Upon a given node failure condition, the cluster is placed in an effective read-only mode for all regions. The node failure condition typically is one where there has been a failure of an authoritative region copy and no backup copy is then available. Typically, “read-only” means no client write or update requests succeed while the cluster is in this state. Those requests should fail with an error message that indicates failure because of the read-only status. Preferably, such requests are re-tried. In this mode, regions are only allowed to perform read operations but the cluster continues to operate with missing regions, and missing regions are entered on a region map. The cluster then automatically recovers returning missing regions, after which it leaves the read-only state. | 2016-03-10 |
20160070623 | HYPERVISOR AGNOSTIC INTERCHANGEABLE BACKUP RECOVERY AND FILE LEVEL RECOVERY FROM VIRTUAL DISKS - Provided are a computer program product, system, and method for hypervisor agnostic interchangeable backup recovery and file level recovery from virtual disks. Data is stored for a first virtual disk that represents data in a first format and metadata for the first virtual disk in a common data format in a storage having a fixed block length. A virtual disk file represents data in a second format that allows variable size blocks. Multiple instances of the fixed block length of blocks of data for the second virtual disk indicated in the virtual disk file are read. Each instance of the read fixed block length of blocks is written to the storage in the common data format with metadata describing the format of the blocks in the second virtual disk, and can be restored to a third virtual disk in the first or second format. | 2016-03-10 |
20160070624 | APPLICATION TRANSPARENT CONTINUOUS AVAILABILITY USING SYNCHRONOUS REPLICATION ACROSS DATA STORES IN A FAILOVER CLUSTER - Disclosed herein is a system and method for automatically moving an application from one site to another site in the event of a disaster. Prior to coming back online the application is configured with information to allow it to run on the new site without having to perform the configuration actions after the application has come online. This enables a seamless experience to the user of the application while also reducing the associated downtime for the application. | 2016-03-10 |
20160070625 | PROVIDING BOOT DATA IN A CLUSTER NETWORK ENVIRONMENT - A computer cluster includes a group of connected computers that work together essentially as a single system. Each computer in the cluster is called a node. Each node has a boot device configured to load an image of an operating system into the node's main memory. Sometimes the boot device of a first node experiences a problem that prevents the operating system from loading. This can affect the entire cluster. Some aspects of the disclosure, however, are directed to operations that determine the problem with the first node's boot device based on a communication sent via a first communications network. Further, the operations can communicate to the first node a copy of boot data from a second node's boot device. The copy of the boot data is sent via a second communications network different from the first communications network. The copy of the boot data can solve the first boot device's problem. | 2016-03-10 |
20160070626 | ASSESSING QUALITY OF SERVICE PROVIDED BY APPLICATIONS BASED ON HOSTING SYSTEM SUPPORT - A system for assessing the quality of a service provided by an application hosted by a hosting system is provided. An assessment system generates a data storage score that indicates the data storage support provided by the hosting system to the application. The assessment system may also generate a computational score that indicates the computational support provided by the hosting system to the application. The assessment system may also generate a security score that indicates the security support provided by the hosting system to the application. The assessment system then generates a service score by combining the data storage score, the computational score, and the security score. The assessment system then provides the service score as an indication or certification of the quality of the service provided by the application that is hosted by the hosting system. | 2016-03-10 |
20160070627 | BACKUP MANAGEMENT CONTROL IN A SERVER SYSTEM - A server rack includes a rack management controller (RMC) configured to manage a first function and a backplane including a backplane controller (BPC). The BPC is configured to monitor the RMC, determine that the RMC is unavailable, and manage the first function, in response to determining that the RMC is unavailable. | 2016-03-10 |
20160070628 | Member Replacement in an Array of Information Storage Devices - An information handling system includes a method for detecting a predictive failure indication for a predictive failure indicated physical disk of a disk group, determining an amount of used storage capacity of a lowest capacity physical disk of the disk group, and comparing a replacement physical disk storage capacity of a replacement physical disk to the used storage capacity. When the replacement physical disk capacity is greater than or equal to the used storage capacity even if the replacement physical disk capacity is less than a lowest storage capacity of the lowest capacity physical disk of the disk group, replacing the predictive failure indicated physical disk with the replacement physical disk. | 2016-03-10 |
20160070629 | MOBILE DEVICE AND CHASSIS WITH CONTACTLESS TAGS TO DIAGNOSE HARDWARE AND SOFTWARE FAULTS - Diagnosing faults in a hardware appliance. Information is read by a hand-held reader from one or more contactless tags associated with one or more components in a hardware appliance. One or more component faults and/or issues are identified based on the read information. A query is formed based on the identified one or more component faults and/or issues. A diagnostic database in the hand-held reader is queried, based on the formed query, and one or more query results are displayed in a ranked order on a display of the hand-held reader. In one aspect of the embodiments, the information read from the one or more contactless tags includes a pointer to a datastore in one of the one or more components. An ad hoc wireless network connection is established with the hardware appliance, and information in the datastore is downloaded over the connection. | 2016-03-10 |
20160070630 | DEBUGGING IN A DATA PROCESSING APPARATUS - A data processing apparatus has a debug state in which processing circuitry | 2016-03-10 |
20160070631 | Multiuser-Capable Test Environment for a Plurality of Test Objects - The present invention relates to an arrangement for providing a test environment for testing test objects. The arrangement includes a first test case implementation unit and a second test case implementation unit, as well as a first test object and a second test object. In one embodiment, the test environment is configured such that at least the first test case implementation unit is coupled to at least one of the first test object and the second test object for implementing a test case. | 2016-03-10 |
20160070632 | POWER PROFILING METHOD, POWER PROFILING SYSTEM, AND PROCESSOR-READABLE STORAGE MEDIUM - A power profiling method, a power profiling system, and a processor-readable storage medium are provided. The power profiling method includes collecting power status information indicating software and hardware statuses of a power domain that operates in a target board according to input test control information, and generating analysis information of power that is consumed by the target board using the collected power status information. | 2016-03-10 |
20160070633 | MEMORY LEAK ANALYSIS BY USAGE TRENDS CORRELATION - Tools and techniques assist developers with the detection of memory leaks by using correlation of data type memory usage trends. In particular, investigations of memory leaks can be prioritized without always resorting to the use of bulky and performance-degrading memory dumps, by using these tools and techniques to identify leaky correlated data types. Data about a program's memory usage is processed to identify memory usage trends over time for respective data types, and the trends are searched for significant correlations. Correlated trends (and hence their corresponding data types) are grouped. Memory usage analysis information is displayed for grouped data types, such as the names of the most rapidly leaking data types, the names of correlated data types, leak rates, and leak amounts in terms of memory size and/or data object counts. Memory usage data may also be correlated with processing load requests to indicate which requests have associated memory leaks. | 2016-03-10 |
20160070634 | SYSTEM AND METHOD FOR SYSTEM-ON-A-CHIP SUBSYSTEM TRACE EXTRACTION AND ANALYSIS - Systems and methods for external access detection and recovery in a subsystem of a system-on-a-chip (SoC) in a portable computing device (PCD) are presented. In operation, a subsystem of the SoC is operated independently of the rest of the SoC, such as when the SoC is in a non-functional or low power mode or state. The subsystem comprises a hardware agent in communication with a trace buffer. While the subsystem is operating independently of the rest of the SoC, the trace buffer captures trace data about the operation of the subsystem. During the operation of the subsystem, in response to identifying a trigger event, the trace buffer stops capturing the trace data, and a wake-up notification comprising a signal from the hardware agent to the SoC is communicated. | 2016-03-10 |
20160070635 | MOBILE DEVELOPMENT PLATFORM IN A CLOUD BASED ARCHITECTURE - Embodiments are directed towards mobile application development in a cloud-based architecture. Mobile applications may be designed to communicate with a cloud platform over a network. Mobile application developers may be enabled to submit cloud code to cloud platforms for use by mobile applications. If cloud code is provided to a cloud platform, the cloud platform may perform one or more actions to authenticate the cloud code, such as, ensuring that that the user providing the cloud code is authorized to provide the cloud code. If the cloud code is authenticated the cloud platform may perform one or more actions to validate the cloud code. If validated, the cloud code may be activated for use by mobile applications and/or mobile application developers. | 2016-03-10 |
20160070636 | CONDITIONAL WRAPPER FOR PROGRAM OBJECT - The described technology is directed towards conditional wrapper that wraps part(s) of a selected program object with added logic, such as to perform validation and/or tracing on part(s) the object; the wrapper may be multi-functional in this regard. The wrapper logic is selectively added to one or more selected object parts by the object creator at object creation time based upon conditional data. During runtime, the added logic may be run before the wrapped part of the object (e.g., a function) is executed and/or after execution of the object part. Validation and/or tracing operations may be run before the part of the object is executed as well as after the part of the object is executed. Objects that do not meet the conditional data criteria are created and returned without any added wrapping logic. | 2016-03-10 |
20160070637 | DOCUMENTS FOR HUMAN READABLE DOCUMENTATION AND RUNTIME VALIDATION - The described technology is directed towards having document files (e.g., a JSON object) associated with objects of a computer program. The document files may include validation information that is used during runtime to validate one or more parts of the object via validation code such as a validation function. For example, a function of an object may have one validation function that during runtime validates whether the input parameter(s) are valid (their types and/or values are correct), and another validation function that during runtime validates whether the return values from the function are valid. Also described is processing the document files into more easily readable documentation, e.g., without any source code. | 2016-03-10 |
20160070638 | AUTOMATED DEBUG TRACE SPECIFICATION - Debugging a debug target software by: (i) generating a first log file set, including at least one log file, based upon how the computer hardware set executes the instructions of the computer software set; (ii) responsive to a first error in the execution of the computer software set, examining at least a portion of the first log file set; and (iii) creating, based at least in part upon the examination of the first log file set, augmented logging instructions for generating augmented logging information, which is helpful for debugging. | 2016-03-10 |
20160070639 | METHODS AND SYSTEMS FOR DEBUGGING BYTECODE IN AN ON-DEMAND SERVICE ENVIRONMENT - Described herein are means for debugging byte code in an on-demand service environment system including a system for simulating execution debug in a multi-tenant database environment. Such means may include: receiving a request at a web-server of the system, determining one or more trace preferences are active for the request, sending the request to a logging framework communicatively interfaced to the multi-tenant database implementation, processing the request via the logging framework, and capturing at least a portion of the execution data emitted responsive to execution of the plurality of events for use in simulating execution debug of the events. Other related embodiments are additionally described. | 2016-03-10 |
20160070640 | MOCK OBJECT GENERATION - The disclosure is generally directed towards automatically generating a mock object from a description of a real object, such as for use in testing. Mock object generation logic parses the description to determine interface(s) of the real object, which are replicated in the mock object, and to determine method(s) of the real object, which are simulated in the mock object. The mock object generation logic may generate a description of the mock object that is then compiled into the mock object for execution. Data types may be validated so that the arguments and/or return values from the mock object meet the expectations of a calling object. | 2016-03-10 |
20160070641 | DATA-DRIVEN TESTING FRAMEWORK - An apparatus for testing applications includes a data-processing machine including a memory and a processor operably coupled to the memory. The data-processing machine is configured to implement a data-driven testing framework that includes a data engineering module, a computational environment manager, and a result analysis module. The data engineering module is configured to create engineered test data based at least in part on the application to be tested. The computational environment manager is configured to control a computational environment in which the application is to operate on the engineered test data. The result analysis module is configured to compare engineered test data operated upon by the application with an expected output. | 2016-03-10 |
20160070642 | MEMORY CONTROL AND DATA PROCESSING USING MEMORY ADDRESS GENERATION BASED ON DIFFERENTIAL ADDRESSES - A memory control device that transfers data from an external memory to a data processing unit having plural processing mechanisms, includes an absolute address storage unit that stores an absolute address serving as a common reference value in a given data transfer period; a differential address storage unit that stores plural differential addresses therein; a differential address selection unit that selects any one of the plurality of differential addresses in a given order; a memory address generation unit that combines any differential address selected by the differential address selection unit with the absolute address to generate a memory address; and a data transfer unit that inputs the memory address generated by the memory address generation unit to the external memory, reads the data from the memory address, and transfers the data to the data processing unit. | 2016-03-10 |
20160070643 | SYSTEM AND METHOD OF COUNTING PROGRAM/ERASE CYCLES - A method includes, in a data storage device that includes a memory, detecting an operation associated with a block of the memory. The operation is associated with a program/erase cycle. The method further includes, responsive to detecting the operation, performing a comparison between a random number and at least one value of a set of values. The method includes selectively adjusting a value of a counter associated with the block based on the comparison. | 2016-03-10 |
20160070644 | OFFSET RANGE OPERATION STRIPING TO IMPROVE CONCURRENCY OF EXECUTION AND REDUCE CONTENTION AMONG RESOURCES - An offset range striping technique increases concurrency of operation execution directed to metadata managed by a volume layer of a storage input/output (I/O) stack, while reducing contention among resources of one or more nodes of a cluster. A logical unit (LUN) may be apportioned into multiple volumes, each of which may be partitioned into multiple regions, wherein each region is represented by a dense tree. The technique increases concurrency of operation execution (e.g., modifications to the metadata at the offset ranges), while reducing contention among the resources (e.g., CPUs and NVLogs) by distributing the offset range operations among the regions and mapping the regions to services and NVLogs. Such increased concurrency and reduction of contention may be achieved by implementation of the technique to (i) apportion each region into disjoint chunks (i.e., stripes) of contiguous offset ranges; (ii) organize a plurality of regions into one or more zones and populate a first zone before allocating a second zone; and (iii) stagger the mapping of services to starting regions of the volumes. | 2016-03-10 |
20160070645 | ALLOCATION ENFORCEMENT IN A MULTI-TENANT CACHE MECHANISM - Cache optimization. Cache access rates for tenants sharing the same cache are monitored to determine an expected cache usage. Factors related to cache efficiency or performance dictate occupancy constraints. A request to increase cache space allocated to a first tenant is received. If there is a second cache tenant for which reducing its cache size by the requested amount will not violate the occupancy constraints for the second cache tenant, its cache is decreased by the requested amount and allocated to satisfy the request. Otherwise, the first cache size is increased by allocating the amount of data storage space to the first cache tenant without deallocating the same amount of data storage space allocated to another cache tenant from among the plurality of cache tenants. | 2016-03-10 |
20160070646 | METHOD AND SYSTEM FOR REMOVAL OF A CACHE AGENT - A method for removal of an offlining cache agent, including: initiating an offlining of the offlining cache agent from communicating with a plurality of participating cache agents while a first transaction is in progress; setting, based on initiating the offlining, an ignore response indicator corresponding to the offlining cache agent on each of the plurality of participating cache agents; offlining, based on setting the ignore response indicator, the offlining cache agent; and ignoring, based on setting the ignore response indicator, a first response to the transaction from the offlining cache agent. | 2016-03-10 |
20160070647 | MEMORY SYSTEM - According to one embodiment, a memory system includes a non-volatile memory, a read control unit, a read-ahead unit, a buffer memory, and a resource management unit. The read control unit is configured to perform a sequential read of two threads from the non-volatile memory. The read-ahead unit is configured to perform read-ahead to the non-volatile memory for each thread. The buffer memory is configured to include two read-ahead buffers. The respective read-ahead buffers hold data which is read-ahead from the non-volatile memory. The data held by the respective read-ahead buffers belong to threads different from each other. The resource management unit is configured to obtain a peak request amount from outside for each thread and adjust a size of each read-ahead buffer based on the obtained peak request amount for each thread. | 2016-03-10 |
20160070648 | DATA STORAGE SYSTEM AND OPERATION METHOD THEREOF - A data storage system and an operation method thereof are provided. The data storage system includes a data storage module, a cache module and a data accessing module. The data accessing module is coupled to the data storage module and the cache module. When the data accessing module receives a data-write command from a host, the data accessing module is configured to reply a writing-completed command to the host after storing writing-data of the data-write command into the cache module, arrange the data-write command into a data-writing schedule table, and write the writing-data read from the cache module into the data storage module according to the data-writing schedule table. | 2016-03-10 |
20160070649 | CACHE UNIT AND PROCESSOR - According to an embodiment, a cache unit includes: a first memory configured to temporarily hold data and an address of the data, a second memory configured to temporarily hold an address of particular data set in advance, and a controller configured to, when an instruction to load the data is made for a first specified address, search for a storage destination of the first specified address, output the data of the first specified address if the storage destination is the first memory, and output the particular data if the storage destination is the second memory. | 2016-03-10 |
20160070650 | RESETTING MEMORY LOCKS IN A TRANSACTIONAL MEMORY SYSTEM - A method for resetting of memory locks in a transactional memory system. The method includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The method further includes determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register. | 2016-03-10 |
20160070651 | INSTRUCTION AND LOGIC FOR A CACHE PREFETCHER AND DATALESS FILL BUFFER - A processor includes a cache hierarchy and an execution unit. The cache hierarchy includes a lower level cache and a higher level cache. The execution unit includes logic to issue a memory operation to access the cache hierarchy. The lower level cache includes logic to determine that a requested cache line of the memory operation is unavailable in the lower level cache, determine that a line fill buffer of the lower level cache is full, and initiate prefetching of the requested cache line from the higher level cache based upon the determination that the line fill buffer of the lower level cache is full. The line fill buffer is to forward miss requests to the higher level cache. | 2016-03-10 |
20160070652 | GENERALIZED STORAGE VIRTUALIZATION INTERFACE - A storage system implements a sparse, thinly provisioned logical-to-physical translation layer. The storage system may perform operations to modify logical-to-physical mappings, including creating, removing, and/or modifying any-to-any and/or many-to-one mappings between logical identifiers and stored data (logical manipulation operations). The storage system records persistent metadata to render the logical manipulation (LM) operations persistent and crash-safe. The storage system may provide access to LM functionality through a generalized LM interface. Clients may leverage the LM interface to efficiently implement higher-level functionality and/or offload LM operations to the storage system. | 2016-03-10 |
20160070653 | Methods for Scheduling Read Commands and Apparatuses using the Same - A method for scheduling read commands, performed by a processing unit, including at least the following steps. Logical read commands are received from a master device via a first access interface, where each logical read command requests to read data of a logical address. First physical storage locations of mapping segments associated with the logical addresses are obtained from a high-level mapping table, and a second access interface is directed to read the mapping segments from the first physical storage locations of a storage unit. Second physical storage locations associated with the logical addresses are obtained from the mapping segments, and the second access interface is directed to read data from the second physical storage locations of the storage unit. The first access interface is directed to clock the data of the logical addresses out to the master device. | 2016-03-10 |
20160070654 | EVICTING CACHED STORES - A tool for determining eviction of store cache entries based on store pressure. The tool determines, by one or more computer processors, a count value for one or more new store cache entry allocations. The tool determines whether a new store cache entry allocation limit is exceeded. Responsive to determining the new store cache entry allocation limit is exceeded, the tool determines an allocation value for one or more existing store cache entries, the allocation value indicating an allocation class for each of the one or more existing store cache entries. The tool determines based, at least in part, on the allocation value for the one or more existing store cache entries, at least one allocation class for eviction. The tool program determines an eviction request setting for evicting the one or more existing store cache entries. | 2016-03-10 |
20160070655 | SYSTEM AND METHOD FOR INTERCEPT OF UEFI BLOCK I/O PROTOCOL SERVICES FOR BIOS BASED HARD DRIVE ENCRYPTION SUPPORT - An information handling system and method performs Unified Extensible Firmware Interface (UEFI) interception and pre-processing of data associated with block input/output (I/O) commands targeting encrypted storage devices. A UEFI interceptor block (IB) I/O driver intercepts each block I/O command targeting block addresses on a storage device and identifies whether any of the target block addresses is encrypted. In response to identifying an encrypted block address among the target block addresses, the UEFI IB I/O driver forwards data associated with the encrypted block address to an encryption-decryption module to perform one of an encryption and a decryption of the data. Final handling of the block I/O command is performed using a block I/O driver chained to the UEFI IB I/O driver. Data associated with I/O commands targeting encrypted block addresses is first processed by the encryption-decryption module before final handling of the I/O command is performed by the block I/O driver. | 2016-03-10 |
20160070656 | WRITE PROTECTION MANAGEMENT SYSTEMS - Write protection management systems are disclosed. In this regard, in one exemplary aspect, a security control system is provided to authorize and write a specified number of data blocks to a write-protected region in a storage device. In another exemplary aspect, a write control system is provided to keep track of data blocks written to the write-protected region. The write control system automatically re-enables write protection on the write-protected region after the specified number of data blocks has been written to the write-protected region. By automatically protecting the write-protected region after writing the specified number of data blocks, it is possible to prevent unauthorized attempts to write to the write-protected region, thus ensuring data security and integrity in the write-protected region. | 2016-03-10 |
20160070657 | Electronic Apparatus and Management Method Thereof - An electronic apparatus operating with a memory includes an operating module, a management module, a database and a filtering module. When the operating module needs to use the memory for performing a task, the operating module issues a memory request. The management module determines whether the memory request is to be permitted. When the memory request is permitted, the management module generates a requested data chunk according to the memory request. The filtering module receives the requested data chunk from the management module, and determines whether to store the requested data chunk into the data base according to a predetermined filtering condition. | 2016-03-10 |
20160070658 | MULTI-LEVEL, HARDWARE-ENFORCED DOMAIN SEPARATION USING A SEPARATION KERNEL ON A MULTICORE PROCESSOR WITH A SHARED CACHE - A separation kernel isolating memory domains within a shared system memory is executed on the cores of a multicore processor having hardware security enforcement for static virtual address mappings, to implement an efficient embedded multi-level security system. Shared caches are either disabled or constrained by the same static virtual address mappings using the hardware security enforcement available, to isolate domains accessible to select cores and reduce security risks from data co-mingling. | 2016-03-10 |
20160070659 | Concurrently Executing Critical Sections in Program Code in a Processor - In the described embodiments, entities in a computing device selectively write specified values to a lock variable in a local cache and one or more lower levels of a memory hierarchy to enable multiple entities to enable the concurrent execution of corresponding critical sections of program code that are protected by a same lock. | 2016-03-10 |
20160070660 | RESETTING MEMORY LOCKS IN A TRANSACTIONAL MEMORY SYSTEM - A system and computer program product for resetting of memory locks in a transactional memory system. The system includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The system further includes the processor determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register. | 2016-03-10 |
20160070661 | Flexible PCIe Routing - In some implementations, a riser card can be configured to connect to multiple PCIe connectors on a motherboard of a computing device. The riser card can be configured to route signals from an accessory installed in the riser to the CPU of the computing device through multiple PCIe connectors. The riser card can be configured to connect to a PCIe connector on the motherboard using cabling. | 2016-03-10 |
20160070662 | Reordering a Sequence of Memory Accesses to Improve Pipelined Performance - Techniques are disclosed relating to reordering sequences of memory accesses. In one embodiment, a method includes storing a specified sequence of memory accesses that corresponds to a function to be performed. In this embodiment, the specified sequence of memory accesses has first memory access constraints. In this embodiment, the method further includes reordering the specified sequence of memory accesses to create a reordered sequence of memory accesses that has second, different memory access constraints. In this embodiment, the reordered sequence of memory accesses is usable to access a memory to perform the function. In some embodiments, performance estimates are determined for a plurality of reordered sequences of memory accesses, and one of the reordered sequences is selected based on the performance estimates. In some embodiments, the reordered sequence is used to compile a program usable to perform the function. | 2016-03-10 |
20160070663 | SEQUENTIAL MEMORY ACCESS OPERATIONS - Methods of operating a memory include performing a memory access operation, obtaining an address corresponding to a subsequent memory access operation prior to stopping the memory access operation, stopping the memory access operation, sharing charge between access lines used for the memory access operation and access lines to be used for the subsequent memory access operation, and performing the subsequent memory access operation. | 2016-03-10 |
20160070664 | MEMORY MAPPING IN A PROCESSOR HAVING MULTIPLE PROGRAMMABLE UNITS - The disclosure includes, in general, among other aspects, an apparatus having multiple programmable units integrated within a processor. The apparatus has circuitry to map addresses in a single address space to resources within the multiple programmable units where the single address space includes addresses for different ones of the resources in different ones of the multiple programmable units and where there is a one-to-one correspondence between respective addresses in the single address space and resources within the multiple programmable units. | 2016-03-10 |
20160070665 | PORTABLE ELECTRONIC DEVICE AND USER DATA ACCESS METHOD THEREFOR - A portable electronic device with user data access method. The disclosed portable electronic device includes a first non-volatile memory, a central processing unit, an interface and a connector. The first non-volatile memory is configured to store first data. The central processing unit is powered with an operating voltage and is configured to run an operating system. The interface controller is electrically coupled to the first non-volatile memory. The connector is electrically coupled to the interface controller and configured to connect with a host device. When the central processing unit crashes or is not powered with the operating voltage, the interface controller is configured to read the first data stored in the first non-volatile memory and transmit the first data to the host device via the connector. | 2016-03-10 |
20160070666 | METHOD OF CONTROLLING DIRECT MEMORY ACCESS OF A PERIPHERAL MEMORY OF A PERIPHERAL BY A MASTER, AN ASSOCIATED CIRCUITRY, AN ASSOCIATED DEVICE AND AN ASSOCIATED COMPUTER PROGRAM PRODUCT - A method of controlling direct memory access of a peripheral memory of a peripheral by a master is described. The method includes checking whether there is a pending request from the peripheral for a direct memory access service, establishing whether an access condition is satisfied in dependence on at least whether there is a pending request, and, if the access condition is satisfied, granting access to the master. Also, an associated device and an associated computer program product are described. | 2016-03-10 |
20160070667 | SYSTEM FOR DESIGNING NETWORK ON CHIP INTERCONNECT ARRANGEMENTS - A system for designing Network-on-Chip interconnect arrangements includes a Network-on-Chip backbone with a plurality of backbone ports and a set of functional clusters of aggregated IPs providing respective sets of System-on-Chip functions. The functional clusters include respective sub-networks attachable to any of the backbone ports and to any other functional cluster in the set of functional clusters independently of the source map of the Network-on-Chip backbone. | 2016-03-10 |
20160070668 | QUASI-OPTIMIZED INTERCONNECTION NETWORK FOR, AND METHOD OF, INTERCONNECTING NODES IN LARGE-SCALE, PARALLEL SYSTEMS - A plurality of data links interconnects a number (N) of nodes of a large-scale, parallel system with minimum data transfer latency. A maximum number (K) of the data links connect each node to the other nodes. The number (N) of the nodes is related to the maximum number (K) of the data links by the expression: N=2 | 2016-03-10 |
20160070669 | MULTI-PORT TRANSMITTER DEVICE FOR TRANSMITTING AT LEAST PARTLY REDUNDANT DATA, AN ASSOCIATED CONTROL SYSTEM, AN ASSOCIATED METHOD AND AN ASSOCIATED COMPUTER PROGRAM PRODUCT - A multi-port transmitter device for transmitting at least partly redundant data is described. The multi-port transmitter device comprises at least two transmitters comprising respective transmitter buffers. One transmitter is a master transmitter that issues a request to the processor to provide a data block when the transmitter buffer of the master transmitter has free space to store a data block. The processor is arranged to copy at least one data block of data stored in an external memory from the external memory to respective positions in a local buffer. The processor is arranged to, in accordance with a predefined sequence, sequentially initiate transfer of the data block from the respective position of the data block in the local buffer to the transmitter buffers of the at least two transmitters in response to a request from the master transmitter to provide a data block. | 2016-03-10 |
20160070670 | WIRELESS DOCKING DEVICE - In a wireless docking system a dockee device ( | 2016-03-10 |
20160070671 | COMMUNICATING A MESSAGE REQUEST TRANSACTION TO A LOGICAL DEVICE - A general input/output communication port implements a communication stack that includes a physical layer, a data link layer and a transaction layer. The transaction layer includes assembling a packet header for a message request transaction to one or more logical devices. The packet header includes a format field to indicate the length of the packet header and to further specify whether the packet header includes a data payload, a subset of a type field to indicate the packet header relates to the message request transaction and a message field. The message field includes a message to implement the message request transaction. The message includes at least one message that is selected from a group of messages. The group of messages to include a message to unlock a logical device, a message to reset a logical device, a message to indicate a correctable error condition, a message to indicate an uncorrectable error condition, a message to indicate a fatal error condition, a message to report a bad request packet, a message to indicate power management and a message to emulate an interrupt signal. | 2016-03-10 |
20160070672 | SLAVE DEVICE FOR A SERIAL SYNCHRONOUS FULL DUPLEX BUS SYSTEM - A slave device for a serial synchronous full duplex bus system, which has a data input stage, a clock input stage, an interface logic, a synchronization delay flip-flop, and a data output stage. The slave device is manufactured using nanometer technologies. Also, a method for operating the slave device. | 2016-03-10 |
20160070673 | EVENT-DRIVEN SPATIO-TEMPORAL SHORT-TIME FOURIER TRANSFORM PROCESSING FOR ASYNCHRONOUS PULSE-MODULATED SAMPLED SIGNALS - A method of processing asynchronous event-driven input samples of a continuous time signal includes calculating a short-time Fourier transform (STFT) output based on the event-driven input samples. The STFT output may be calculated by expressing an encoding pulse and an STFT window function as a sum of complex weighted causal complex exponentials. The method further includes interpolating output between events. | 2016-03-10 |
20160070674 | METHODS AND APPARATUSES FOR ELIMINATING A MISSILE THREAT - Embodiments of a method and apparatus for eliminating a missile threat are generally described herein. In some embodiments, the method includes identifying a vulnerability associated with the missile threat. The method can further include identifying a technique for exploiting the vulnerability to generate a vulnerability-technique (VT) pair. The method can further include applying a stochastic mathematical model (SMM) to generate a negation value, the negation value being representative of a probability that the technique of the respective VT pair will eliminate the threat by exploiting the vulnerability. The method can further include providing a recommendation for implementation the technique to eliminate the missile threat responsive to receiving a user selection of the technique, the user selection being selected based on the generated negation value. Other example methods, systems, and apparatuses are described. | 2016-03-10 |
20160070675 | CALIBRATION METHOD FOR THE PROSPECTIVE CALIBRATION OF MEASURING EQUIPMENT - A method for operating measuring equipment for detecting at least one analyte in a bodily fluid by means of at least one continuously measuring blood glucose sensor. At least one calibration method is carried out for the prospective calibration of the measuring equipment. At least three calibration points are detected in the calibration method, wherein each calibration point comprises at least one measurement signal from the measuring equipment and at least one reference value of an associated reference measurement. A plurality of possible slopes are established between the calibration points. At least one robust estimation method, more particularly using a formation of at least one median, is used to determine at least one probable slope from the plurality of possible slopes. Furthermore, at least one measurement is carried out. During the measurement and using the probable slope, a concentration of the analyte in the bodily fluid is deduced from at least one measurement signal from the measuring equipment and the probable slope. | 2016-03-10 |
20160070676 | SERVER SIDE DOCUMENTS GENERATED FROM A CLIENT SIDE IMAGE - A client receives a request for a report in a browser window. The client obtains data from a server to include in the report in view of the request and presents a graphical chart build from the obtained data in the browser window. The client receives a request for a printable version of the report while the graphical chart is being displayed in the browser window. The printable version of the report comprises a printable version of the graphical chart. The client encodes the graphical chart to a text string to send to the server for generating the printable version of the report. After sending the request for the printable report to the server, the client receives the printable version of the report from the server for presentation in the browser window. | 2016-03-10 |
20160070677 | ASSISTIVE TECHNOLOGY FOR THE VISUALLY IMPAIRED - Disclosed are methods and apparatus for generating accessible documents. In one embodiment, an initial document in a print format is obtained. The print format of the initial document is identified as one of a plurality of print formats. A parser corresponding to the one of the plurality of print formats is applied such that the initial document is parsed according to the print format of the initial document. An intermediate document that conforms to an intermediate format is generated based upon results obtained from applying the parser. A template for converting the intermediate document into an accessible document is obtained. The template is then such that an accessible document corresponding to the initial document is generated, wherein the accessible document includes a plurality of tags that designate an order of a plurality of regions of the accessible document. | 2016-03-10 |
20160070678 | MANAGING A PRESENTATION - Managing a presentation includes identifying audience member interactions with a plurality of presentation pages. Each of the plurality of presentation pages is associated with data indicative of the audience member interactions. That data is processed to identify an action plan specifying an update to the presentation. That update is based on identified audience member interactions with at least one of the plurality of presentation pages. The action plan is implemented to update the presentation. | 2016-03-10 |
20160070679 | KERNEL BASED STRING DESCRIPTORS - An aspect of generating a descriptor representative of a text unit includes receiving as input a text string into a memory accessible to a processor and parsing the text string into words. For each word in the text string, a word is selected to form a selected word and, for each character in the selected word, a selected mapping is applied to a character of the selected word to create a mapped value, the mapped value is normalized to create a normalized value, and a numeric descriptor is generated using the normalized value. The numeric descriptors are collected for the selected word to create a word descriptor and the collected numeric descriptors are saved in a storage device by the processor. | 2016-03-10 |
20160070680 | SYSTEMS AND METHODS FOR A METADATA DRIVEN USER INTERFACE FRAMEWORK - A method and system for providing a metadata driven user interface for a web application are disclosed. A system includes a host component, a metadata interpreter, a rendering engine, and a response component. The host component is configured to receive, from a client, a request for at least a portion of a web application. The metadata interpreter is configured to retrieve metadata describing a user interface of the web application. The rendering engine is configured to render an initial screen based on the metadata. The initial screen is for display by the client in relation to an activity of the web application. The response component is configured to send the metadata and the initial screen to the client. | 2016-03-10 |
20160070681 | PRE-CHILDREN IN A USER INTERFACE TREE - The described technology is directed towards a pre-child user interface element in a user interface tree that draws before the parent element draws, (and thus before any conventional child element of the parent draws). For example, based upon current state data such as whether the parent element has focus, the pre-child may draw a highlight or the like before (so as to be beneath) drawing the representation of the parent element, to indicate the focused state (or and/or other current state or states). The user interface tree maintains a property that it is composable because the parent user interface element code is independent of what any of its pre-child element or pre-children elements do when invoked. | 2016-03-10 |
20160070682 | PLATFORM ABSTRACTION OF GRAPHICS - The described technology is directed towards a graphics platform abstraction layer that couples an application program's user interface objects to any of a variety of underlying platforms, including browsers that host the application program or the operating system's UI objects. The graphics platform abstraction layer loads an appropriate implementation for calling objects of the underlying platform, and interfaces the application program to the implementation, whereby the application program may be independent of any underlying platform. The graphics platform abstraction layer also may load code that deals with quirks of a given browser/version and/or other vendor-specific details. | 2016-03-10 |
20160070683 | ACTIVITY BASED TEXT REWRITING USING LANGUAGE GENERATION - A system and method include determining an amount of time available to a user to read a document. For example, a user device may collect sensor data about the user, identify, based on the sensor data, at least one of a location or an activity associated with the user; and determine the amount of time available to the user based on the location or the activity. A request for the document is generated, and the request includes data identifying the amount of time available to the user. The document is generated based on the amount of time available to the user and is present for display to the user. The document may be generated to include text associated with the location or the activity. | 2016-03-10 |
20160070684 | ONLINE METHOD FOR ACCESSING AND ASSESSING DOCUMENT, IMAGE, AUDIO AND VIDEO - Disclosed is a method for accessing, accessing and editing a document over a social networking platform. The method comprises the steps of creating a document through a personal device in an online or offline mode and uploading the created document over a timeline of the social networking platform. The uploading document is stamped with a date and a time of uploading. The method further comprises parsing the uploaded document, saving the parsed document and viewing the saved document in an online mode over document viewer web application. The document viewer web application opens in an additional tab on clicking over the saved document. The document viewer web application allows a person to edit a document online without downloading over a device memory. The edited document is saved over the timeline. | 2016-03-10 |
20160070685 | Lossless Web-Based Editor For Complex Documents - Lossless web-based editing for XML documents is provided. A method for editing a document over the Internet includes receiving a request on a server over the Internet to edit a document. The server extracts content from the document to form a modified version of the document in XML format and transmits the modified version of the document to the client over the Internet. The client edits the modified version of the document using a web browser editor and transmits changes to the modified version of the document to the server. The server merges the original document and the changes made by the client to form an edited version of the document that updates the document with the client changes and that leaves the remainder of the document intact. | 2016-03-10 |
20160070686 | COLLECTING ANNOTATIONS FOR A DOCUMENT BY AUGMENTING THE DOCUMENT - Annotation methods and systems for supporting the annotation of documents in the format of a rendering engine are provided. The annotation system allows for the adding of annotations to documents, the displaying of annotations over content of the documents, and the displaying of annotations in an annotation pane. To provide annotation support for a document, the annotation system augments the document with elements including an element with annotation engine code and elements to support the collecting and displaying of annotations. When the rendering engine renders the document, it executes the annotation engine code to effect the collecting and displaying of the annotations. | 2016-03-10 |
20160070687 | CREATING AN ANNOTATION PANE FOR A DOCUMENT BY AUGMENTING THE DOCUMENT - Annotation methods and systems for supporting the annotation of documents in the format of a rendering engine are provided. The annotation system allows for the adding of annotations to documents, the displaying of annotations over content of the documents, and the displaying of annotations in an annotation pane. To provide annotation support for a document, the annotation system augments the document with elements including an element with annotation engine code and elements to support the collecting and displaying of annotations. When the rendering engine renders the document, it executes the annotation engine code to effect the collecting and displaying of the annotations. | 2016-03-10 |
20160070688 | DISPLAYING ANNOTATIONS OF A DOCUMENT BY AUGMENTING THE DOCUMENT - Annotation methods and systems for supporting the annotation of documents in the format of a rendering engine are provided. The annotation system allows for the adding of annotations to documents, the displaying of annotations over content of the documents, and the displaying of annotations in an annotation pane. To provide annotation support for a document, the annotation system augments the document with elements including an element with annotation engine code and elements to support the collecting and displaying of annotations. When the rendering engine renders the document, it executes the annotation engine code to effect the collecting and displaying of the annotations. | 2016-03-10 |
20160070689 | METHODS AND SYSTEMS FOR ANNOTATING A DASHBOARD - A dashboard generation system generates a dashboard that displays an annotation to key performance indicator information. The dashboard generation system uses a business database, an intermediate table, an annotation associated with a dimension category, and formatting data to generate a dashboard. The dashboard generator determines a dimension category and renders the intermediate values and annotations in the corresponding desired graphical format. | 2016-03-10 |
20160070690 | DISPLAY OF USER COMMENTS TO TIMED PRESENTATION - A method and system to dynamically display a presentation of a time duration are described. The system includes a processor to receive comments associated with the presentation, the comments arranged in a first ordering, to identify a time reference comment among the comments, the time reference comment including a time reference referencing a time instant within the time duration of the presentation, and to dynamically change an ordering of the comments from the first ordering to a second ordering at the time instant. The system also includes a display device to display the presentation with the comments, the comments arranged according to the ordering. | 2016-03-10 |
20160070691 | METHOD AND SYSTEM FOR AUTO-POPULATING ELECTRONIC FORMS - An autofill system is described for auto-populating electronic forms with data stored by an on-line social networking system. When a member of an on-line social network system accesses, via a web browser, an autofill-enabled web page, the autofill system determines an identification of the member, scrapes the member's profile to obtain member's information, assembles the member's profile information as member data, and communicates the member data to the web browser together with a script for presenting an autofill button on the web page. | 2016-03-10 |
20160070692 | DETERMINING SEGMENTS FOR DOCUMENTS - A document is received for segmentation. The document includes multiple atomic textual units in a sequence. These units may correspond to sentences, phrases, paragraphs, concept phrases, chapters, etc. A distance function is selected that determines a distance between one set of atomic textual units and another set of atomic textual units. The distance between the sets is large for sets that are dissimilar, and small for sets that are similar. The distance function is applied to the atomic textual units to separate each of the atomic textual units into multiple segments, while maintaining the sequence of the atomic textual units. | 2016-03-10 |
20160070693 | Optimizing Parsing Outcomes of Documents - A mechanism is provided for optimizing parsing of grammatical prose in a multi-prose electronic document. A received multi-prose electronic document is partitioned into a set of text segments of homogenous prose. A set of predefined Natural Language (NL) parsers is executed on each text segment in order to discern and measure a quality of parses by each NL parser throughout the multi-prose electronic document. A cross-parse analysis of the multi-prose electronic document and an aggregation of adjacent clauses or sentences of poor quality parses are performed. For each text segment, aggregation patterns yielding a best semantic role match are identified from one of the set of predefined NL parsers. Then, a parsed electronic document is generated using the set of predefined NL parsers such that each text segment is parsed by a NL parser that has the best semantic role match to that text segment. | 2016-03-10 |
20160070694 | PARALLEL XML PARSER - An XML document is stored in a file that is divided into file partitions. Each file partition is assigned to a process of a set processes to search for one or more separate target elements. The target elements are identified by a target element name. Each process scans an assigned file partition for the beginning of a target element. When a target element is found, an XML parser is invoked to parse the target element. | 2016-03-10 |
20160070695 | Method And Apparatus For A Multi I/O Modality Language Independent User-Interaction Platform - Automated user-machine interaction is gaining attraction in many applications and services. However, implementing and offering smart automated user-machine interaction services still present technical challenges. According to at least one example embodiment, a dialogue manager is configured to handle multiple dialogue applications independent of the language, the input modalities, or output modalities used. The dialogue manager employs generic semantic representation of user-input data. At a step of a dialogue, the dialogue manager determines whether the user-input data is indicative of a new request or a refinement request based on the generic semantic representation and at least one of a maintained state of the dialogue, general knowledge data representing one or more concepts, and data representing history of the dialogue. The dialogue manager then responds to determined user-request with multi-facet output data to a client dialogue application indicating action(s) to be performed. | 2016-03-10 |
20160070696 | TASK SWITCHING IN DIALOGUE PROCESSING - Disclosed methods and systems are directed to task switching in dialogue processing. The methods and systems may include activating a primary task, receiving, one or more ambiguous natural language commands, and identifying a first candidate task for each of the one or more ambiguous natural language commands. The methods and system may also include identifying, for each of the one or more ambiguous natural language commands and based on one or more rules, a second candidate task of the plurality of tasks corresponding to the ambiguous natural language command, determining whether to modify at least one of the one or more rules-based task switching rules based on whether a quality metric satisfies a threshold quantity, and when the second quality metric satisfies the threshold quantity, changing the task switching rule for the corresponding candidate task from a rules-based model to the optimized statistical based task switching model. | 2016-03-10 |
20160070697 | LANGUAGE MODEL WITH STRUCTURED PENALTY - A penalized loss is optimized using a corpus of language samples respective to a set of parameters of a language model. The penalized loss includes a function measuring predictive accuracy of the language model respective to the corpus of language samples and a penalty comprising a tree-structured norm. The trained language model with optimized values for the parameters generated by the optimizing is applied to predict a symbol following sequence of symbols of the language modeled by the language model. In some embodiments the penalty comprises a tree-structured l | 2016-03-10 |
20160070698 | Database Management System Tools for An Automated Work to Stage Process - A computer compares an old database source file and new database source file to identify one or more changes between the old and the new database source files. Then, the computer generates one or more keys for each identified change. The keys are sorted into files that are then used to build a first dataset that includes at least one or more execution members. The execution members are initially grouped into one or more groups based on an order of execution of jobs associated with the one or more execution members. Then, within each group, the computer separates execution members that executable in parallel. Further, the computer builds a second dataset that includes at least a submit member for each group of execution members that executable in parallel. The submit member comprises a set of instructions to submit, for execution, all execution members of a group in parallel. | 2016-03-10 |
20160070699 | CREATION OF A HIERARCHICAL DICTIONARY - A method of creating a hierarchical dictionary comprises, with a processor, extracting a number of symbols from a first image, constructing a number of refinement dictionary entries based on the symbols, the refinement dictionary entries forming a refinement dictionary, grouping a number of the refinement dictionary entries into clusters to form a number of refinement dictionary entry clusters, and constructing a number of direct dictionary entries for each of the refinement dictionary entry clusters, the direct dictionary entries forming a direct dictionary. | 2016-03-10 |
20160070700 | TRANSACTION SUPPORT USING INTRUSIVE HASH TABLES - Disclosed herein are system, method, and computer program product embodiments for utilizing an intrusive data hash table to support processing transactions. An embodiment operates by receiving a transaction comprising a plurality of operations. Responsive to the receiving, the transaction is verified by verifying the validity of the plurality of operations. Responsive to verifying the transaction, the transaction is applied to the intrusive hash table. | 2016-03-10 |
20160070701 | INDEXING ACCELERATOR WITH MEMORY-LEVEL PARALLELISM SUPPORT - According to an example, an indexing accelerator with memory-level parallelism (MLP) support may include a request decoder to receive indexing requests. The request decoder may include a plurality of configuration registers. A controller may be communicatively coupled to the request decoder to support MLP by assigning an indexing request of the received indexing requests to a configuration register of the plurality of configuration registers. A buffer may be communicatively coupled to the controller to store data related to an indexing operation of the controller for responding to the indexing request. | 2016-03-10 |
20160070702 | METHOD AND SYSTEM TO ENABLE USER RELATED CONTENT PREFERENCES INTELLIGENTLY ON A HEADPHONE - A Method and System to enable user related content preferences intelligently on a headphone is disclosed. The embodiments relate generally to the field of user related content preferences. The embodiments are directed at controlling the content preference data so that a music cortex functions as a data agency to provide the music devices, music applications and streaming services smarter choices and intelligent recommendations. | 2016-03-10 |
20160070703 | DISTANCE BASED ADJUSTMENTS OF SEARCH RANKING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for processing local search results. In one aspect, a method includes receiving data specifying a set of documents ranked according to a first order based on search scores; determining a density score that is based on a number of local documents in the set of documents; determining for each local document: a proximity measure based on the geographic location of the user device and a geographic location specified for the local document and a distance factor based on the proximity measure for the local document and the density score for the set of documents; and adjusting, based at least in part on the distance factors of the local documents, a position of at least one of the local documents in the first order. | 2016-03-10 |
20160070704 | Mobile Application Search Ranking - Disclosed is a technique for providing a linkage between applications, or other digital content, of an application store by assigning values to users of the digital content with respect to a particular user who is submitting a query for particular digital content. The technique involves receiving a query and identifying a subset of digital content based on the query and a word matching technique. For each identified digital content, users who have installed or downloaded the digital content may be determined. A reputation score, corresponding to a user's influence, and a trust score, corresponding to a degree of separation between the user who submitted the query and other users who have installed the digital content, may be computed for each of the users. A list of recommended applications may be generated based on the word matching technique, the reputation score, and the trust score. | 2016-03-10 |
20160070705 | INTERACTIVE FEEDBACK FOR CHANGES IN SEARCH RELEVANCY PARAMETERS - Techniques are disclosed relating to providing interactive feedback based on changes in search parameters. A computing system may receive user input specifying adjustment of a relevancy parameter from a first value to a modified value. The relevancy parameter may be usable to determine ordering of results for search queries. In response to the input, the system may cause information to be displayed that indicates a value of a search metric, and the value may be based on one or more prior search queries using the adjusted relevancy parameter. The system may additionally or alternatively cause first and second sets of ordered search results to be displayed, where the first set is based on the first value of the relevancy parameter and the second set is based on the modified value of the relevancy parameter. | 2016-03-10 |