14th week of 2009 patent applcation highlights part 57 |
Patent application number | Title | Published |
20090089732 | METHOD AND APPARATUS FOR PERFORMING DUMMY-FILL BY USING A SET OF DUMMY-FILL CELLS - An embodiment performs dummy fill in a design layout to achieve a target density that is within a narrow range of target densities. During operation, the system can receive a design layout that includes a region whose density is not within a desired range of target densities. Next, the system can receive a set of dummy-fill cells which can be used to place a dummy-fill array to fill an arbitrarily sized rectangle. The set of dummy-fill cells may contain assist features and optical proximity corrections which cause the dummy shapes to print properly regardless of the size of the dummy-fill array. The system may then determine a polygon in the design layout to fill with dummy-fill cells. Next, the system may fracture the polygon into a set of rectangles. The system may use the set of dummy-fill cells to place a dummy-fill array that fills a rectangle. | 2009-04-02 |
20090089733 | METHOD FOR AUTOMATICALLY PRODUCING LAYOUT INFORMATION - A method of automatically producing layout information includes receiving first layout information of an integrated circuit; when receiving the first layout information, activating an automated process mechanism to stores the first layout information into a reference database; reading the first layout information from the reference database by the automated process mechanism; and analyzing the first layout information to obtain second layout information by the automated process mechanism. In an exemplary embodiment, the method of the present invention further includes validating accuracy of the first layout information according to the second layout information. | 2009-04-02 |
20090089734 | METHOD FOR FASTER IDENTIFICATION OF AVAILABLE REFERENCE DESIGNATORS IN A DESIGN AUTOMATION SYSTEM - A method, system, and computer program product for a faster identification of available reference designators (ARDs) in a design automation system. An ARD utility detects a selection of one or more selected component types for placement on a circuit schematic. A list containing one or more unavailable reference designators (URDs) is sorted through to identify one or more ARDs from the list of URDs. A list of ARDs is then generated, from which a pre-determined portion of ARDs are reserved. The reserved list of ARDs is then outputted for selection by a user. | 2009-04-02 |
20090089735 | METHOD AND APPARATUS FOR ROUTING - Some embodiments of the invention provide a routing method. The routing method receives a set of nets to route in a region of an integrated circuit (“IC”) layout. The routing method defines routes for the nets in a manner that ensures that each segment of each route is not less than a minimum length that is required for the segment. | 2009-04-02 |
20090089736 | FACILITATING PROCESS MODEL ACCURACY BY MODELING MASK CORNER ROUNDING EFFECTS - An embodiment provides systems and techniques for determining an improved process model which models mask corner rounding (MCR) effects. During operation, the system may receive a mask layout and process data which was generated by applying a photolithography process to the mask layout. The system may also receive an uncalibrated process model which may contain a set of MCR components. Next, the system may identify a set of corners in the mask layout. The system may then modify the mask layout in proximity to the set of corners to obtain a modified mask layout. Alternatively, the system may determine a set of mask layers. Next, the system may determine an improved process model by calibrating the uncalibrated process model using the modified mask layout and/or the set of mask layers, and the process data. | 2009-04-02 |
20090089737 | WORKFLOW SYSTEM AND COMPUTER READABLE MEDIUM - A workflow system includes: a workflow storage that stores workflows built by connecting a plurality of tasks assigned to persons in charge, respectively; a task extracting unit that extracts at least one task from each of two or more of the workflows stored in the workflow storage; a site creation unit that creates a conference site of which an access authority is given to the persons in charge of the tasks extracted by the task extracting unit and in which electronic information is shared; and an access controller that controls access to the conference site created by the site creation unit in accordance with the authority. | 2009-04-02 |
20090089738 | SOFTWARE CUSTOMIZATION SYSTEM AND METHOD - A system and method for the mass customization of software includes a software production line infrastructure, development environment, and actuator. The infrastructure organizes the software production line using a feature declarations component, a product definitions component, an automatons component, and a partition composition component. The development environment browses, displays, organizes, edits, and maintains the infrastructure. The actuator actuates the software production line to produce custom software products. | 2009-04-02 |
20090089739 | INTELLIGENT EDITING OF RELATIONAL MODELS - In one embodiment, receives a user gesture indicating an edit to be performed on a target object within a model. The model is based on an underlying schema including constraints that define relationships between objects in the model, including the target object. The computer system determines that at least one of the constraints in the underlying schema is associated with the indicated edit of the target object and determines that the edit is valid. The valid edit complies with the constraints associated with the indicated edit of the target object. In another embodiment, a computer system receives a user gesture indicating an edit, determines that a constraint in the underlying schema is associated with the indicated edit, and provides an indication of a valid model edit to a computer user. | 2009-04-02 |
20090089740 | System For Generating Linked Object Duplicates - A method of creating, managing, and synchronizing full or partial object copies in a distributed object oriented software system. Copies of an object or another object copy can be made using the same class definition. The copies are kept up to date by the copied object and changes are synchronized on demand back to the copied object. Partial copies retrieve additional object data as requested or needed. | 2009-04-02 |
20090089741 | SERVICE-BASED PROCESSES USING POLICY-BASED MODEL-TO-MODEL CONVERSION AND VALIDATION TECHNIQUES - A modeling tool may be configured to generate a diagrammatic representation of a service-based process, expressed using a diagrammatic modeling language. A model converter may be configured to convert the diagrammatic representation into a formal model of the service-based process, and a model verifier configured to apply constraints to the formal model to verify an operation of the service-based process and output a verified formal model. A code generator may be configured to generate executable code therefrom for executing the service-based process therewith. | 2009-04-02 |
20090089742 | GENERIC XML SCREEN SCRAPING - A method may include creating an Extensible Markup Language (XML) instruction file based on screen shots of a host system, providing the XML instruction file to a screen scraper program, executing screen scraping operations based on the XML instruction file, and outputting a user interface file based on the screen scraping operations that corresponds to extracted data output from the host system. | 2009-04-02 |
20090089743 | Methods and Apparatus for IDE Integration of Database Changes - In one aspect, a method is provided. The method includes (1) generating code in an integrated development environment (IDE), the code including instructions for a database; and (2) receiving feedback in the IDE, the feedback relating to the instructions for the database. | 2009-04-02 |
20090089744 | Method and apparatus for generating error-correcting and error-detecting codes using zero-divisors and units in group rings - A method and apparatus for generating a code having properties specific to its intended use, the method comprising the steps of: selecting a group from a set of groups; selecting a ring from a set of rings; forming a group ring from said select group and selected ring; selecting a generator element from said group ring, wherein said selection is based on the desired properties of the code to be generated; and inputting said selected generator element into a code generation process to obtain a corresponding check element. | 2009-04-02 |
20090089745 | METHOD AND APPARATUS TO AUTOMATICALLY IDENTIFY SPECIFIC CODE CHANGES TO PROBABILISTICALLY EXCLUDE FROM REGRESSION - Techniques for efficiently isolating software regressions are provided. In one embodiment, it is determined that a particular regression is present in a particular build of a software system. A set of candidate code components that may have caused the particular regression is identified. In accordance with an order established based on historical data for the software system, one or more intermediate builds each involving some subsets of the candidate code components may be tested to identify a set of suspect code components that caused the particular regression. For each candidate code component that is not in the set of suspect code component, a likelihood factor associated with that candidate code component is decremented. | 2009-04-02 |
20090089746 | Method and System for Generating Application Data Editors - A method, computer program product and system for generating an editor to be executed through a graphical user interface of a computer, for editing the persistent data of an application, the persistent data being described and stored in a data object model using a modeling language defining a hierarchical organization of classes, their attributes and the relations between classes, comprising retrieving the root class and starting from the root class, creating a page per class for creating the instances of the class. Each page of a current class comprises an Edit section for editing the attributes of the class, a Table section which lists all the instances of the class when they will be created and a hyperlink section for listing pointers to other pages corresponding to the target classes in relation with the current class. | 2009-04-02 |
20090089747 | METHOD AND SYSTEM FOR MANAGING CONFIGURATION INFORMATION - An approach is provided for managing a software environment. A system file that includes information of a software environment is built. The system file is validated against one or more rules. A script is output and used to generate standardized configuration information for the software environment. | 2009-04-02 |
20090089748 | Accelerated Cached Object Retrieval - Efficiency of cached objects such as singleton objects and other software constructs having a first-invocation cost is improved by replacing the software code for creating a method instance (the “creation code”) with the instance itself. Upon first invocation, the calling method causes the first version of the method to be performed, and also causes the first version to be replaced by the second version. Thus, the invention facilitates creation of singleton objects that run without any branch logic, so as to improve speed and efficiency. The need for locking and exception handling is reduced, resultant code is simplified, and potential for error is reduced. | 2009-04-02 |
20090089749 | Automatically Adding Bytecode to a Software Application to Determine Network Communication Information - A system and method for automatically analyzing virtual machine bytecode of a software application and adding additional bytecode operable to determine information regarding network communication performed by the software application are described. According to one embodiment of the method, program code of a software application may be received, wherein the program code includes bytecode for a virtual machine. The bytecode may be automatically analyzed to detect network communication functionality. The method may operate to automatically add additional bytecode to the bytecode of the software application, where the added bytecode is operable to determine information regarding the network communication. | 2009-04-02 |
20090089750 | METHOD AND SYSTEM OF PERFORMING JAVA LANGUAGE CLASS EXTENSIONS - A method and system of performing Java language class extensions. At least some of the illustrative embodiments are computer-readable mediums storing a program that, when executed by a processor of a host system, causes the processor to identify a first class having a first name, and create a second class based on the first class (the second class is an abstract view of the first class, and the second class has a second name equal to a third name of a third class). | 2009-04-02 |
20090089751 | EXPOSING FEATURES OF SOFTWARE PRODUCTS - The claimed subject matter provides a system and/or a method that facilitates exposing a software feature to increase productivity of performing a task. A software component can include a plurality of software features in which the software component can rank and assign a skill level to an entity utilizing at least one software feature. A smart help component can supply the entity with an informative tip based on the skill level rank, wherein the informative tip can assist in utilizing at least one software feature. | 2009-04-02 |
20090089752 | System and Method for Generating an Application Fragment - Methods, systems, and apparatus, including computer program products, for storing an application fragment. In one aspect, a method includes presenting a component in a donor application window corresponding to a donor application, wherein the donor application is executing in a computing system; receiving input selecting the component in the donor application window for insertion into a file system associated with the computing system; generating an application fragment corresponding to the component; and storing the application fragment in the file system. Further, the method can include inserting the application fragment into a recipient application window associated with a recipient application and activating functionality of the recipient application based on the application fragment. Additionally, the application fragment can be activated in the file system and an application including at least a component based on the application fragment can be generated in response to the activating. | 2009-04-02 |
20090089753 | SOFTWARE PRODUCT LINE ANALYZER - A software-product line analyzer including change history data, a change-history processing unit, a factor analysis unit, a variability analysis unit, and configuration information data, i.e., output data, wherein the change-history processing unit converts the change history data into numerical values, the factor analysis unit performing a factor analysis using inter-products change information as observation data, and, based on each factor and each factor score determined, the variability analysis unit determining variabilities in the software-product line and software components corresponding thereto, and outputting the configuration information data. | 2009-04-02 |
20090089754 | Detecting Plagiarism In Computer Source Code - Plagiarism of software source code is a serious problem in two distinct areas of endeavor—cheating by students at schools and intellectual property theft at corporations. A number of algorithms have been implemented to check source code files for plagiarism, each with their strengths and weaknesses. This invention detects plagiarism by comparing statements within source code of a first program to comments within source code of a second program. | 2009-04-02 |
20090089755 | Method and Apparatus to Increase Efficiency of Automatic Regression In "Two Dimensions" - Techniques for efficiently isolating software regressions are provided. A system test tool determines that a particular regression is present in a particular build of a software system, but not in a baseline build. Using historical data, the tool determines, for each of a plurality of intermediate builds between these two builds, a likelihood that that intermediate build introduced the particular regression. A particular intermediate build can be identified as a build to be tested. Here, the particular intermediate build comprises a plurality of layered putbacks, each of which putbacks comprises one or more code changes in the software system. The tool determines, for each putback, a likelihood that that putback introduced the particular regression. A particular putback in the plurality of putbacks may be selected as a putback to be tested. In some embodiments, the particular putback is the putback that has the greatest likelihood of introducing the particular regression. | 2009-04-02 |
20090089756 | VISUAL DEBUGGER FOR DECLARATIVE/DATA-FLOW APPLICATIONS - A framework is implemented. The framework is configured to execute an application within the framework, the application includes instantiated runtime objects. New instantiated runtime objects may be created and instantiated runtime objects destroyed while the application is executing. The framework is further configured to implement a debugger within the framework. At the debugger, instantiated runtime objects are correlated with lines of code of the application. Some embodiments allow users to debug executing applications. This can be accomplished by a user interacting with the executing application which then causes indications in the debugger or interacting with the debugger and which causes indications on instantiated runtime objects in the application. | 2009-04-02 |
20090089757 | Configurable Web Services System and a Method to Detect Defects in Software Applications - In accordance with a particular embodiment of the present invention, a method is offered that includes detecting one or more defects in a software application composed of heterogeneous languages using a configurable web services architecture. The detecting step further includes: capturing use cases associated with the software application and checking their validity; providing an automatic invocation of property monitors for model checking; and visualizing one or more defects in the software application for diagnosis. The detecting can further include transforming a heterogeneous software application into a homogeneous application. In more specific embodiments, the detecting further includes providing an automatic test generation for a presentation layer associated with the software application. The configuration associated with the software application can be a simple properties file. The detecting further includes simulating user behavior and generating drivers to test business logic from the use cases or scenarios. | 2009-04-02 |
20090089758 | TESTING AND DEBUGGING OF DYNAMIC BINARY TRANSLATION - A method for testing and debugging of dynamic binary translation wherein a dynamic binary translator allows a target binary to be executed transparently on a host machine having a different computer architecture than the target machine involves selecting a minimum set of target machine states for simulation at run-time. A series of target machine instructions from the target binary is translated into a series of host machine instructions. During translation, a plurality of check points are inserted into the series of host machine instructions. During translation, a plurality of verification points are inserted into the series of host machine instructions. The series of host machine instructions, including the check points and verification points, are executed. Execution of a check point determines a simulated target machine state. Execution of a verification point sends information pertaining to simulated target machine states to an external verifier. | 2009-04-02 |
20090089759 | System and Method for Providing Symbolic Execution Engine for Validating Web Applications - In accordance with a particular embodiment of the present invention, a method is offered that includes generating a symbolic string manipulation class library for one or more web applications. The manipulations are generalized into a string manipulation symbolic algebra. The method also includes performing symbolic execution for one or more web applications. Typically, a Java model checker is augmented to check for certain types of requirements or properties in performing the symbolic execution. If an error scenario exists, a solution to a set of symbolic constraints is obtained, and the solution is mapped back to a source code to obtain an error trace and a test case. In still other specific embodiments, requirements or properties are encoded through templates and checked using public domain decision procedures. The properties or requirements can relate to security validation. The symbolic execution can be customized and tuned for Java-based web applications. | 2009-04-02 |
20090089760 | COMPUTER PROGRAM PRODUCT OF CODE COVERAGE UTILIZING EFFICIENT DYNAMIC MUTATION OF LOGIC (EDML) - A computer program product for code coverage utilizing efficient dynamic mutation of logic (EDML) are provided. A source code is read, and instrumentation points are located. Self Modifying Code (SMC) is inserted at the instrumentation points producing instrumented code. Additional functions are inserted in the source code to enable read and/or reset of code coverage statistics. The instrumented code is compiled, and executables are run for a period of time during which zero or more instrumentation points are executed. In response to executing instrumentation points, instructions are executed to record execution of the instrumented code. Instructions of the instrumented code overwrite themselves at certain points so that a next execution of the instrumentation points skips over the instrumented code at the certain points. Code coverage statistics are gathered and recorded. The code coverage statistics are reset to begin another period of time for gathering code coverage statistics. | 2009-04-02 |
20090089761 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR DEBUGGING SOFTWARE APPLICATIONS IN A WEB ENVIRONMENT - A method and system are provided for debugging a software application in a data processing system that includes a server entity and client entities. For at least one of the client entities, a server component of the application running on the server entity is accessed, and a client component of the application is downloaded from the server entity. The client component is executed. Client log information relating to the execution of the client component is saved by invoking a log function provided by the client component; the client log information is saved into a non-persistent memory structure of the client component. The client log information is transmitted for use in the debugging of the application. | 2009-04-02 |
20090089762 | FUNCTION CALL TRANSLATION - Methods and apparatus for using description information about a function to translate a call to the function into a call to a corresponding function in a second language. The methods include processing a definition of a function associated with a first language to create description information sufficient to enable translation of a call to the function into a call to a corresponding function in a second language without requiring processing of the definition of the function. In another aspect, the methods include providing a description file of items, each item including description information about a function associated with a first language, and using the file of description items to translate a first program file from the first language into a second language. In another aspect, the methods include providing a library file including functions defined by a first language; processing the library file to create a function library and a description file, the function library including one or more functions defined by a second language, each function in the function library being a translated version of a function in the library file; and using the description file to translate a program file from the first language into the second language, where each call in the program file to a function in the library file is translated into a call to a corresponding function in the second language. | 2009-04-02 |
20090089763 | SHADER COMPILE SYSTEM AND METHOD - The present disclosure includes a shader compiler system and method. In an embodiment, a shader compiler includes a decoder to translate an instruction having a vector representation to a unified instruction representation. The shader compiler also includes an encoder to translate an instruction having a unified instruction representation to a processor executable instruction. | 2009-04-02 |
20090089764 | Call stack parsing in multiple runtime environments - Where a process in a computing system comprises mixed code, having different sections of code managed by different runtimes, the call stack used to coordinate function invocations may comprise call stack frames created according to multiple calling conventions. In order to analyze this call stack in a stack walk or unwinding, a debugger may be configured to request the runtimes managing the process to claim a particular call stack frame, and to request the runtime that claims it to parse the contents of the frame, or to utilize call stack analysis techniques if the call stack frame was created by unmanaged code. | 2009-04-02 |
20090089765 | CRITICAL SECTION ORDERING FOR MULTIPLE TRACE APPLICATIONS - Critical sections in a programming code may be ordered based at least in part on code motions. A flow graph of the code including the critical section may be generated. Two initiative motions may be performed based on the flow graph to identify possible positions of critical codes in the flow graph. Dependence relationship of critical sections may be determined based on the positions of critical sections. Using the dependence relationship information, the order of critical sections may be determined. The determined order of critical sections may be further used by a compiler to perform optimizations for the code. | 2009-04-02 |
20090089766 | Automatically Modifying a Native Code Module Accessed from Virtual Machine Bytecode to Determine Execution Information - A system and method for automatically modifying a native code module accessed in a user software application are described herein. The user software application may include virtual machine bytecode. Access to the native code module may be detected during execution of the virtual machine bytecode. The native code module may be automatically modified by adding instrumentation code to determine various types of information regarding execution of the native code module, and the access may be directed to the modified native code module. | 2009-04-02 |
20090089767 | METHOD AND SYSTEM FOR IMPLEMENTING A JUST-IN-TIME COMPILER - A method for implementing a just-in-time compiler involves obtaining high-level code templates in a high-level programming language, where the high-level programming language is designed for compilation to an intermediate language capable of execution by a virtual machine, and where each high-level code template represents an instruction in the intermediate language. The method further involves compiling the high-level code templates to native code to obtain optimized native code templates, where compiling the high-level code templates is performed, prior to runtime, using an optimizing static compiler designed for runtime use with the virtual machine. The method further involves implementing the just-in-time compiler using the optimized native code templates, where the just-in-time compiler is configured to substitute an optimized native code template when a corresponding instruction in the intermediate language is encountered at runtime. | 2009-04-02 |
20090089768 | Data management for dynamically compiled software - Method, apparatus and system are described to perform a data management. In some embodiments, a software application is dynamically compiled, data of the dynamically compiled software application is stored in a first region of a memory and instructions of the dynamically compiled software application are stored in a second region of the memory. | 2009-04-02 |
20090089769 | CODE OPTIMIZATION WHEN USING MULTIPLE READER LOCKS AND A NON-READER LOCK - Illustrative embodiments provide a way to use multiple-reader locks for those paths where no writes occur. A computer implemented method, data processing system and computer program product provide a capability where only if one of the writing paths executes will a full writer lock be acquired. Illustrative embodiments may be used to create two copies of the critical section comprising a reading version and a writing version. The default execution leads to the reader version, which only acquires a reader-lock. The reader version of the code executes prior to execution of the writer lock only version, otherwise bypassing the writer lock only version. If the execution leads to a path in which a write would occur, the reader only version branches to the beginning of the writer version. The writer version is identical to the original code and obtains a full writer lock. If execution in the reader lock does not lead to a path that writes, then only the reader lock is acquired. | 2009-04-02 |
20090089770 | Method and Apparatus for Performing Non Service Affecting Software Upgrades in Place - The invention includes a method and apparatus for dynamically defining and instantiating an undefined portion of a graph, where the graph has a plurality of states and a plurality of state transitions. A method includes executing the graph where the graph comprises a defined portion and an undefined portion and a plurality of tokens traverse the graph executing functions, suspending the one of the tokens in response to the one of the tokens detecting the undefined portion of the graph, generating a new portion of the graph for the undefined portion of the graph, replacing the undefined portion of the graph with the new portion of the graph, and releasing the suspended token. The new portion of the graph is generated by generating at least one definition file for the undefined portion of the graph and executing the at least one definition file to form thereby the new portion of the graph. The at least one definition file is generated by obtaining information adapted for defining the undefined portion of the graph and generating the at least one definition file using the obtained information. | 2009-04-02 |
20090089771 | METHOD OF CODE COVERAGE UTILIZING EFFICIENT DYNAMIC MUTATION OF LOGIC (EDML) - A method and computer program product for code coverage utilizing efficient dynamic mutation of logic (EDML) are provided. A source code is read, and instrumentation points are located. Self Modifying Code (SMC) is inserted at the instrumentation points producing instrumented code. Additional functions are inserted in the source code to enable read and/or reset of code coverage statistics. The instrumented code is compiled, and executables are run for a period of time during which zero or more instrumentation points are executed. In response to executing instrumentation points, instructions are executed to record execution of the instrumented code. Instructions of the instrumented code overwrite themselves at certain points so that a next execution of the instrumentation points skips over the instrumented code at the certain points. Code coverage statistics are gathered and recorded. The code coverage statistics are reset to begin another period of time for gathering code coverage statistics. | 2009-04-02 |
20090089772 | ARRANGEMENT FOR SCHEDULING JOBS WITH RULES AND EVENTS - Arrangements for scheduling execution of jobs on target entities of a data processing system are disclosed. A plan can be stored that defines a flow of execution of a set of jobs. Each job can be executed on a selected target entity or a qualified entity such as a workstation with the appropriate configuration according to the plan. A set of rules may be utilized to invoke one or more actions in response to a detection of an event. Each target entity can detect one or more events. The execution of each action on a corresponding action target entity can be triggered based on a detected event. | 2009-04-02 |
20090089773 | SYSTEM AND METHOD OF DELIVERING SOFTWARE PRODUCT UPDATES VIA A RESPONSE FILE - A method, system, and computer program product for efficiently providing software product updates in a client's computer system. A Software Product Update (SPU) utility initiates the software update process by downloading a response file. The response file comprises scripted code and encoded data for an update of application system files. The SPU utility processes the response file with the aid of a script processing engine (SPE), which is saved, along with installation files, on the client's computer system during an initial software product installation. The SPU utility sets the installation properties within the installation file set to values which allow the SPE to access and run the scripted code. The embedded binary data is decoded with the aid of the running scripted code. The SPU utility completes the update of application system files and the installation properties file, with the aid of the decoded embedded data. | 2009-04-02 |
20090089774 | In-service software upgrade utilizing metadata-driven state translation - A method and apparatus for a metadata-driven upgrade of a network element is described. A network element comprises an active and backup controller card and receives new software to be installed on that network element. In addition, the network element installs the software on the backup controller card and synchronizes the active state of the network element to the backup controller card. Furthermore, the network element uses metadata to translate the active state to the format used by the new software. | 2009-04-02 |
20090089775 | Automated Software Upgrade And Distribution - A method for an automated upgrade of hardware devices of a specialized network, such as wireless communication devices or automated teller machines, with new software programs is described. The upgrade is performed over the network and is controlled by a control center of the network. The control center has an access to a software program repository for storing new programs. The automated upgrade is performed by selecting suitable new software programs from the repository, each of the programs being associated with a validity time window and a threshold hardware profile, performing corresponding checks of upgrade time windows and hardware profiles of the hardware devices being upgraded, and downloading the new software programs to the memory medium of the hardware devices being upgraded. | 2009-04-02 |
20090089776 | Configuration and Change Management System with Restore Points - A configuration and change management system may have installation and configuration processes that include a discovery mechanism for discovering incomplete installations or configuration changes, a cleanup mechanism for placing the system in a state to continue, an installation or configuration mechanism, and a rollback mechanism for rolling back to a defined restore point if a problem is detected. The configuration and change management system may be used for initial installation, as well as configuration changes after installation. The system may be used in a multiple server environment with interdependencies between devices, as well as a multiple services environment with interdependencies between applications and services, including services provided over the Internet. | 2009-04-02 |
20090089777 | MANAGING SOFTWARE UPDATES IN AN AUTOMATION ENVIRONMENT - A scheduling computer receives a plurality of schedules that contain times that a new or different version of a software program will be available, times that one or more machines controlled or monitored by automation computers will be inactive, and times that a necessary resource will be available. The scheduling computer then compares these schedules to determine the time or times when it will be advantageous to install software on the automation computer(s). The scheduling computer then displays these times or time so that software may be installed on the automation computer without disrupting the manufacturing process or inefficiently halting a machine performing a manufacturing step or so that software may be installed on more than one automation computer at substantially the same time. | 2009-04-02 |
20090089778 | USER-SPECIFIED INSTALL LOCATIONS - Computer implemented methods, data processing systems and computer program products install deliverables into user-specified install locations. A user-specified install location is provided. Software virtual product data is extracted from a software bundle. Software virtual product data is stored within the user-specified install location. | 2009-04-02 |
20090089779 | APPARATUS SYSTEM AND METHOD FOR CUSTOMIZING A COMPUTING ENVIRONMENT - An apparatus, system, and method are disclosed for customizing a computing environment. An exportroot image, comprising a base operating system, may be sent to an application provider with a customization script. The customization script allows the application provider to develop a particular application to be used with the exportroot image in a desired computing environment. The provider can modify the customization script to make appropriate customizations to the exportroot image and base operating system as required by the particular application. The customization script is also capable of detecting the hardware architecture of the computer to install appropriate configuration files. The customization script expedites developing a computing environment by eliminating the need to send the exportroot image back to its provider to make modifications. | 2009-04-02 |
20090089780 | METHOD AND APPARATUS TO CONVEY PHYSICAL RESOURCE RELATIONSHIPS - In general, embodiments of the invention relates to a method for conveying hardware resources from a host (OS) executing on a computer system. The method includes obtaining host hardware information by the host OS, wherein the host hardware information specifies a plurality of physical hardware components of the computer system, sending the host hardware information to a guest OS executing within the host OS, generating, by the guest OS, a resource request using the host hardware information, sending, by the guest OS, the resource request to the host OS, and in response to receiving the resource request, allocating, by the host OS, guest hardware resources, where the guest hardware resources include at least one of the physical hardware components in the resource request. | 2009-04-02 |
20090089781 | System for and Method of Migrating One or More Virtual Machines - A logical container may be created to facilitate the quick and efficient migration of one or more virtual machines from a source server to a destination server. The logical container may contain all of the files and state information related to the one or more virtual machines. The one or more virtual machines may be migrated by dismounting the logical container from a source server and mounting the logical container to a destination server. A management service may be include to facilitate batch migration of multiple virtual machines from a source server to a destination server. | 2009-04-02 |
20090089782 | METHOD AND SYSTEM FOR POWER-MANAGEMENT AWARE DISPATCHER - In general the invention relates to a system. The system includes processors each having a processing state. The system further includes a dispatcher operatively connected to the plurality of processors and configured to: receive a first thread to dispatch, select one of the processors to dispatch the thread to based on the processing state the processors and a power management policy, and dispatch the thread to the selected one of the plurality of processors. | 2009-04-02 |
20090089783 | PARTIAL ORDER REDUCTION USING GUARDED INDEPENDENCE RELATIONS - A system and method for conducting symbolic partial order reduction for concurrent systems includes determining a guarded independence relation which includes transitions from different threads that are independent for a set of states, when a condition or predicate holds. Partial order reduction is performed using the guarded independence relation to permit automatic pruning of redundant thread interleavings when the guarded independence condition holds. | 2009-04-02 |
20090089784 | VARIABLE POLLING INTERVAL BASED ON HISTORICAL TIMING RESULTS - A method, system, and computer program product for computing an optimal time interval between polling requests to determine whether an asynchronous operation is completed, in a data processing system. A Polling Request Interval (PRI) utility determines the optimal time interval between successive polling requests, based on historical job completion results. The PRI utility first determines an average job time for previously completed operations. The PRI utility then retrieves a pair of preset configuration parameters including (1) a first parameter which provides the minimum time interval between successive polling requests; and (2) a second parameter which provides the fraction of the average task time added to the first parameter to obtain the time interval between (successive) polling requests. The PRI utility calculates the optimal time between polling requests based on the average job time and the retrieved configuration parameters. | 2009-04-02 |
20090089785 | SYSTEM AND METHOD FOR JOB SCHEDULING IN APPLICATION SERVERS - A method and a system for job scheduling in application servers. A common metadata of a job is deployed, the job being a deployable software component. An additional metadata of the job is further deployed. A scheduler task based on the additional metadata of the job is created, wherein the task is associated with a starting condition. The scheduler task is started at an occurrence of the starting condition, and, responsive to this an execution of an instance of the job is invoked asynchronously. | 2009-04-02 |
20090089786 | SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE FOR REAL-TIME PROCESSING - A technology capable of efficiently performing the processes by using limited resources in an LSI where a plurality of real-time applications are parallelly processed is provided. To provide such a technology, a mechanism is provided in which a plurality of processes to be executed on a plurality of processing units in an LSI are managed throughout the LSI in a unified manner. For each process to be managed, a priority is calculated based on the state of progress of the process, and the execution of the process is controlled according to the priority. A resource management unit IRM or program that collects information such as a process state from each of the processing units executing the processes and calculates a priority for each process is provided. Also, a programmable interconnect unit and storage means for controlling a process execution sequence according to the priority are provided. | 2009-04-02 |
20090089787 | Method and System for Migrating Critical Resources Within Computer Systems - A method and system for migrating at least one critical resource during a migration of an operative portion of a computer system are disclosed. In at least some embodiments, the method includes (a) sending first information constituting a substantial copy of a first of the at least one critical resource via at least one intermediary between a source component and a destination component. The method further includes (b) transitioning a status of the destination component from being incapable of receiving requests to being capable of receiving requests, and (c) re-programming an abstraction block to include modified addresses so that at least one incoming request signal is forwarded to the destination component rather than to the source component. | 2009-04-02 |
20090089788 | SYSTEM AND METHOD FOR HANDLING RESOURCE CONTENTION - In one aspect, the invention is directed to a method by which a user of a functional resource in a software environment can determine whether any other users are waiting to acquire control of the functional resource. The functional resource has associated therewith, a placeholder resource that is a placeholder for users waiting to acquire control of the functional resource. The method includes inquiring by the user of the functional resource whether the placeholder resource is available for exclusive control by the user of the functional resource. If the placeholder resource is available for exclusive control, then no other users are waiting for control of the functional resource and so the current user can keep control of it. If, however, the placeholder resource is not available, that indicates to the user of the functional resource that at least one other user is waiting for control of the functional resource and so the user of the functional resource may release control of the functional resource. | 2009-04-02 |
20090089789 | Method to allocate inter-dependent resources by a set of participants - The object of the present invention is a method that allows a group of independent participants to coordinate decisions with respect to the allocation of interdependent resources, while maintaining certain privacy guarantees. | 2009-04-02 |
20090089790 | METHOD AND SYSTEM FOR COORDINATING HYPERVISOR SCHEDULING - A method for executing an application on a plurality of nodes, that includes synchronizing a first clock of a first node of the plurality of nodes and a second clock of a second node of the plurality of nodes, configuring a first hypervisor on the first node to execute a first application domain and a first privileged domain, wherein configuring the hypervisor comprises allocating a first number of cycles of the first clock to the first privileged domain, configuring a second hypervisor on the second node to execute a second application domain and a second privileged domain, wherein configuring the second hypervisor that includes allocating the first number of cycles of the first clock to the second privileged domain, and executing the application in the first application domain and the second application domain, wherein the first application domain and the second application domain execute semi-synchronously and the first privileged domain and the second privileged domain execute semi-synchronously. | 2009-04-02 |
20090089791 | RESOURCE ALLOCATION UNIT QUEUE - Provided is a system, deployment and program for resource allocation unit queuing in which an allocation unit associated with a task is classified. An allocation unit freed as the task ends is queued for use by another task in a queue at a selected location within the queue in accordance with the classification of said allocation unit. In one embodiment, an allocation unit is queued at a first end of the queue if classified in a first class and is queued at a second end of the queue if classified in said second class. Other embodiments are described and claimed. | 2009-04-02 |
20090089792 | METHOD AND SYSTEM FOR MANAGING THERMAL ASYMMETRIES IN A MULTI-CORE PROCESSOR - In general, the invention relates to a system that includes a multi-core processor and a dispatcher operatively connected to the multi-core processor. The dispatcher is configured to receive a first plurality of threads during a first period of time, dispatch the first plurality of threads only to a first core of the plurality of cores, receive a second plurality of threads during a second period of time, dispatch the second plurality of threads only to a second core of the plurality of cores, migrate to the second core any of the first plurality of threads that are still executing on the first after the first period of time has elapsed. The duration of the first period of time and the duration of the second period of time are determined using a thread migration schedule, and thread migration schedule is determined using at least one thermal characteristic of the multi-core processor. | 2009-04-02 |
20090089793 | Method and Apparatus for Performing Load Balancing for a Control Plane of a Mobile Communication Network - The invention includes a method and apparatus for providing load balancing of control traffic received by a mobility home agent implemented using multiple control elements. A method includes receiving, from a node, a control message intended for the network element, performing a load-balancing operation to select one of the control elements to handle the control message, and propagating the control message toward the selected one of the control elements. The load-balancing operation is performed using at least two load-balancing metrics comprising a first metric and a second metric. The load-balancing operation is performed in a manner for maintaining a context between the node from which the control message is received and the selected one of the control elements, such that subsequent control messages received from the node are propagated to the selected one of the control elements. | 2009-04-02 |
20090089794 | APPARATUS, SYSTEM, AND METHOD FOR CROSS-SYSTEM PROXY-BASED TASK OFFLOADING - An apparatus, system, and method are disclosed for offloading data processing. An offload task | 2009-04-02 |
20090089795 | Information processing apparatus, control method of information processing apparatus, and control program of information processing apparatus - According to an embodiment of the invention, a computer readable storage medium that stores a software program causing a computer system to perform a scheduling process for executing a plurality of application programs in every processor cycles, the scheduling process includes: allocating, during a current processor cycle, processor times of a next processor cycle to each of the application programs to be executed in the next processor cycle; storing the allocated processor times of the next processor cycle; determining whether or not the application programs executed in the current processor cycle include an uncompletable application program; calculating processor idle time of the next processor cycle; and allocating an additional processor time of the next processor cycle to the uncompletable application program, the additional processor time being set not to exceed the calculated processor idle time of the next processor cycle. | 2009-04-02 |
20090089796 | APPLICATION ASSOCIATING BASED ON CRYPTOGRAPHIC IDENTIFICATION - As each application is loaded for use by an operating system, a message handling application within the operating system associates the applications with relativity metrics for later use in handling interprocess messages. A cryptographic identifier associated with each application is verified and, based on the verifying, each application is associated with a relativity metric. The message handling application receives a message from an origin process. The message handling application then determines a destination process for the message, a relativity metric for the origin process, and a relativity metric for the destination process. Based on an analysis of the relativity metrics of the origin process and the destination process, the message handling application determines whether to forward the message to the destination process. | 2009-04-02 |
20090089797 | SYSTEM AND METHOD FOR AUTOMATICALLY GENERATING COMPUTER CODE FOR MESSAGE FLOWS - Computer-executable code is automatically generated for a message flow in a message queuing infrastructure by determining a type of the message flow, inputting message flow parameters, and generating the computer-executable code based on the type of the message flow and the message flow parameters. The generation of code can also implement a design pattern, which is input based on the determined type of message flow. The computer-executable code can be, for example, Extended Structured Query Language (ESQL) code. The type of the message flow can identify, for example, a transformation requirement of the message flow. The transformation requirement can be, for example, one of (i) transformation from a first Extensible Markup Language (XML) message to a second XML message, (ii) transformation from an XML message to a Message Repository Manager (MRM) message, and (iii) transformation from a first MRM message to a second MRM message. | 2009-04-02 |
20090089798 | ELECTRONIC MAIL INBOX WITH FOCUSED E-MAILS ACCORDING TO CATEGORIES - Focusing electronic mail messages in a list of messages. Category information is received for classifying particular e-mail messages or senders of the messages in the list of e-mail messages according to a category. The method also includes setting a status data associated with each of the particular messages. The status data indicates the category classified by the user. A first instruction is received from the user for focusing the particular messages according to the category. The particular messages having the status data therewith in the list are focused collectively without altering a preexisting order of the messages in the list. | 2009-04-02 |
20090089799 | PROGRAMMABLE LOGIC CONTROLLER WITH QUEUE FUNCTION AND METHOD FOR THE SAME - A programmable logic controller (PLC) with queue function and method for the same receives a first input command from one of plurality of operation ends by a command receiving/sending unit. The command receiving/sending unit judges whether the PLC is processing a command at that moment. The processor processes the first input command and sends back reply when there is no command under processing. When the processor is processing the first input command, the command-receiving unit places a second input command into a command queue and gives a priority setting to the second input command. When the PLC finishes its current task, the PLC further processes a command in the queue with highest processing priority. Therefore, the PLC processors can process every command from the operation ends in sequential manner. | 2009-04-02 |
20090089800 | Method and Apparatus for Compensating for Instrumentation Overhead Using Execution Environment Overhead - A computer implemented method, apparatus, and computer program code for profiling an application. Execution of an application is monitored. A set of metrics relating to execution of the application occurring during monitoring execution of the application are collected to form a set of observed metrics. An execution environment overhead occurring with respect to the set of observed events is identified to form an identified execution environment overhead. The set of observed metrics is adjusted using the identified execution environment overhead to form a set of calibrated metrics. | 2009-04-02 |
20090089801 | Method and Apparatus for Compensating for Instrumentation Overhead Using Sequences of Events - A computer implemented method, apparatus, and computer program product for processing events. Events occurring during execution of an application are monitored to form monitored events. A plurality of sequences of method types and transition types from the monitored events are identified to form an identified plurality of sequences of method types and transitions types. Overhead compensation values are identified for the identified plurality of sequences of method types and transitions types to form identified overhead compensation values. Observed metrics for the monitored events are adjusted using the identified overhead compensation values. | 2009-04-02 |
20090089802 | Method and Apparatus for Reduction of Event Notification Within a Web Service Application of a Multi-Functional Peripheral - Techniques are provided for reducing the amount of event notifications within a Web Service Application (WSA) of a device such as a multi-functional peripheral (MFP). In one technique, a Subscription ID is linked with a Job ID within a reduced notification table. When an event occurs related to a specific job, an event notification is sent only to the subscriber associated with that job. | 2009-04-02 |
20090089803 | Notifying a User of Access to Information by an Application - Functionality is described for detecting an application's access to a user's information (or the application's request to access the user's information). The functionality sends a notification to the user which alerts the user to the access that has already taken place (or is pending approval). The functionality detects the current point of presence of the user, and based thereon, sends the notification to the user in an appropriate manner. Upon receipt of the notification, the user may optionally retrieve additional information regarding the application's access activity, modify the access rights of the application, and so on. | 2009-04-02 |
20090089804 | PRIORITIZATION FOR ONLINE CONTACT STATUS UPDATES - Communicating information about a contact, such as presence status, may be regulated in accordance with priority values associated with contacts. Various parameters about contacts with respect to a particular environment may be collected and utilized to assign priority values to the contacts. Flow of information about the contacts is regulated based on the assigned priority values. Information about contacts with higher priority values may be communicated more frequently to client devices from one or more servers than those contacts with lower priority values. In addition, information about contacts associated with priority values that satisfy one or more criteria may be prefetched from a server to a client device. | 2009-04-02 |
20090089805 | Profiling techniques and systems for computer programs - Profiling techniques and systems for analyzing a computer program at runtime produce profiles that attribute performance characteristics to specific sets of instructions invoked via generically-named native-code functions or virtual machine dispatch functions (“generic functions”). The computer program is instrumented at various points, such as upon entry into and/or exit from generic functions, to provide a parameter to the profiling system. Each parameter represents a particular specific set of instructions to be executed via the particular generic function. Receipt of a parameter triggers the addition of an attribution event record into an event log. The profiling system identifies within records within the event log for each unique combination of a parameter and a generic function address, and outputs a profile such as a call graph, which attributes performance characteristics (such as execution time or frequency) to the specific sets of instructions invoked via the generic functions. | 2009-04-02 |
20090089806 | Method and system for dynamic context based contact service - A method, system, and computer readable medium, the method including monitoring an application for the occurrence of a predetermined event associated with the application; collecting, in response to the occurrence of the predetermined event, contact information associated with the application; associating the collected contact information with an entry of a contact list; and placing a call by using the contact list entry. | 2009-04-02 |
20090089807 | JEK CLASS LOADER NOTIFICATION - A method and system for performing class loader notification. At least some of the illustrative embodiments are methods comprising raising a notification during execution of a first method (the notification based on an event), identifying the first method, and invoking a second method based on the identification of the first method in response to the notification. | 2009-04-02 |
20090089808 | METHODS AND ARRANGEMENTS FOR EFFECTING SUPPLEMENTARY MAIL TRANSFER OR MANAGEMENT - Arrangements for permitting incoming mail to be transferred from a WAN Drive to a notebook computer hard drive under conditions that are not stressful to the hard drive. Preferably, a WAN card is configured to wake a notebook when mail capacity is full or close to full. Mail is then preferably moved from the flash drive to the hard drive, subject to verification that this will not overly stress the hard drive. In a variant embodiment, the WAN card may preferably be configured to wake a notebook when mail is received at all. Again, mail is then preferably moved from the flash drive to the hard drive, subject to verification that this will not overly stress the hard drive. Once mail is moved to the hard drive, the system preferably runs an embedded email program that allows the user to employ an existing VPN infrastructure. | 2009-04-02 |
20090089809 | AUTOMATIC GENERATION OF PARALLELIZABLE APPLICATION UNITS SYSTEM AND METHOD - A system and method for automatic generation of parallelizable application units is disclosed. In one embodiment, a method includes executing application binaries and dependencies having a hooked application method on a computer node of a cluster of a network, receiving a context of the hooked application method from a client of the network upon reaching a hook of the hooked application method during execution of the application binaries and the dependencies, executing the context of the hooked application method on the computer node, and generating results of the hooked application method on the computer node. The method may further include serializing the results on the computer node, and transmitting, via the network, the serialized results to the client. In addition, the method may include executing two or more hooked application methods in parallel. | 2009-04-02 |
20090089810 | System and a Method for Generating a Closed Homogeneous Non-Distributed Application from an Open Heterogeneous Distributed Application - In accordance with a particular embodiment of the present invention, a method is offered that includes executing processing on an open heterogeneous distributed application, whereby the application is partially written in Java code. The method further includes generating a closed homogeneous non-distributed Java application based on the open heterogeneous distributed application. In more specific embodiments, in generating the closed homogeneous non-distributed Java application, drivers and stubs are generated. Once drivers and stubs are generated, they are combined with an original code base to produce the closed homogeneous non-distributed Java application. Driver generation produces a Java implementation of a user component, along with setting up an event-handling mechanism of the application, which is done at deployment, whereby the stub generation replaces a database and various libraries (e.g., J | 2009-04-02 |
20090089811 | Persistent per URL print settings - The present invention improves the economy of repetitively printing Web pages by automatically storing and recalling persistent “per URL” print settings. An exemplary method comprises the steps of receiving from a user a first request to print a web page, selecting by the user print settings for the first request, persistently storing as default print settings for the web page in association with at least a portion of a URL of the web page the print settings selected for the first request, receiving from the user a second request to print the web page and retrieving the default print settings using at least a portion of the URL. | 2009-04-02 |
20090089812 | System and method for controlling synchronization of media and multi-devices for single-media multi-device media service - Provided is a system and method for controlling synchronization of media and multi-devices for an SMMD media service. The system includes a metadata managing unit and a synchronization controlling unit. The metadata managing unit analyzes ne-media to extract metadata. The synchronization controlling unit constructs a synchronization information table to store control data extracted from the metadata, and controls one or more devices for media reproduction on the basis of the synchronization information table. Optimal connectable devices are mapped according to device attributes and synchronization information extracted from metadata of ne-media and the results are controlled according to the contents of media, thereby maximizing the effect of vivid media reproduction. | 2009-04-02 |
20090089813 | Method and system for dynamic audio stream redirection - There is provided a method of redirecting an audio stream from a first audio endpoint to a second audio endpoint in a computer operating system. The method includes directing the audio stream from a client application through a first audio resource stack to the first audio endpoint; creating an audio endpoint bridge to provide a path for the audio stream from the first audio resource stack through a second audio resource stack connected to the second audio endpoint; and redirecting the audio stream to the second audio endpoint using the audio endpoint bridge. The audio endpoint bridge can be created by forming a bridging application so as to activate the second audio stack. The bridging application can be hooked into a Windows audio engine in the second audio resource stack. | 2009-04-02 |
20090089814 | METHODS AND SYSTEMS FOR CONFIGURING A SPECIFIC-USE COMPUTING SYSTEM - Systems and methods for configuring a specific-use computing system are disclosed. A computing system may comprise a first set of predetermined application programs and a processor limited to executing the first set of predetermined application programs and pre-approved application programs received from a pre-approved computing device. The computing system may also include a communication interface configured to enable communication between the first computing system and the pre-approved computing device. Exemplary methods and computer-readable media are also enclosed. | 2009-04-02 |
20090089815 | METHOD AND SYSTEM FOR PERFORMING I/O OPERATIONS USING A HYPERVISOR - A method for installing a device driver for a device in a guest domain, that includes obtaining a first device driver for the device by a hypervisor, installing, by the hypervisor, the first device driver into memory allocated to the guest domain, and notifying an operating system in the guest domain of the first device driver after installing the device driver, wherein the operating system communicates with the device using the first device driver. | 2009-04-02 |
20090089816 | DEVICE AND METHOD FOR EXECUTING KERNEL API INTERACTIVELY - Provided are a device and method for executing a kernel application program interface (API) interactively in a Linux system, wherein a kernel API is independently operated in a user region to confirm an operation result. The device includes: a device interface unit for receiving a command from a user, and outputting an execution result corresponding to the command to the user; a kernel API command analysis unit for receiving the command from the device interface unit, analyzing the command, and generating kernel API execution information; and a kernel API command execution unit for executing a kernel API corresponding to the command using the kernel API execution information, and transmitting the execution result to the device interface unit. Thus, a kernel API can be applied using a simple process with reduced time and effort, instead of repeating the entire kernel program development process for a Linux system. | 2009-04-02 |
20090089817 | DESIGN STRUCTURE FOR MULTI-THREADED PROCESSING - A design structure embodied in a machine readable storage medium designing, manufacturing, and/or testing a design that includes a multi-threaded processor that executes an instruction of a process of an executing program is provided. The multi-threaded processor includes at least a first and a second thread. First and second sets of source registers are respectively allocated to the first and second threads, and first and second sets of destination registers are respectively allocated to the first and second threads. A resource prefix configuration register includes mappings between each of the source and destination registers and the threads. The multi-threaded processor, during execution of the instruction by one of the first or the second threads of execution, accesses the source and destination registers based on the mapping, wherein at least one of the accessed registers is allocated to the other of the first or the second thread of execution. | 2009-04-02 |
20090089818 | DETERMINING THE CONTEXT OF A COMPUTING DEVICE - In some embodiments a remote request is received relating to a context of a computer after the computer has been powered off. A sensor of the computer is turned on to obtain context information of the computer from the sensor. The obtained context information is provided from the computer to a remote device while the computer is still powered off. Other embodiments are described and claimed. | 2009-04-02 |
20090089819 | Disk loading mechanism and disk device - A disk stopper ( | 2009-04-02 |
20090089820 | OPTICAL DISC APPARATUS - According to one embodiment, an optical disc apparatus includes a main frame, a medium drive unit, and an ascent/descent retaining member which supports the medium drive unit for ascent and descent. The ascent/descent retaining member includes a pair of arm portions, a connecting portion, and pivotal portions supported on the sidewalls, individually. One of the front wall of the main frame and the connecting portion integrally has a guide boss projecting toward the other of them and a press projection which is elastically deformable in a direction in which the connecting portion extends. The other of the front wall and the connecting portion has a guide groove which extends in the ascent and descent direction and is engaged with the guide boss, and a guide rib having a guide surface for deforming the press projection to generate an elastic force and provided adjacent to the guide groove. | 2009-04-02 |
20090089821 | LIMITED PLAY OPTICAL ARTICLE - An optical article for playback in a player includes at least one sector comprising a first control logic configured to set the value of a first register, the first register having a default value before it is set, and a non-default value after it is set, and a first command to be read sequentially after the sector. The first command is configured to direct the player to play a first content on the article if the first register is set to the default value and to direct the player to play a second content on the article if the first register is set to the non-default value. The optical article includes a mark containing an optical state change material disposed on the sector, wherein the mark is in one of a first optical state or a second optical state, and wherein the first control logic can be read only when the mark is in the second optical state. | 2009-04-02 |
20090089822 | ELECTRONIC APPARATUS AND SCENE-TYPE DISPLAY METHOD - According to one embodiment, an electronic apparatus includes a storage device configure to store cheer level information which indicate a time change of a cheer level included in video content data and applause level information which indicate a time change of applause level included in the video content data, and video content information displaying module configure to display two types of graphs of a cheer graph showing a time change of the cheer level in accordance with the cheer level information and an applause graph showing a time change of the applause level in accordance with the applause level information in a volume level indication area in a two-dimensional display area. | 2009-04-02 |
20090089823 | METHODS AND APPARATUS TO COLLECT MEDIA MONITORING INFORMATION - Example methods, apparatus, and articles of manufacture to collect metering information associated with media presented media presentation devices are disclosed. A disclosed example system for collecting metering information includes a media meter to generate media monitoring information in response to media presented by a media presentation device. The example system also includes a peripheral memory device removably couplable by an audience member to the media meter to receive the media monitoring information. | 2009-04-02 |
20090089824 | Methods and Systems for Providing Synchronized Display of Content - Systems and methods may include receiving a device identifier that identifies a first device, the first device being capable of causing display of first content at a first display device, and communicating a synchronization request that includes the device identifier via a network. Systems and methods may further include receiving an event message from the first device via the network, the event message identifying the first content the first device is causing display at the first display device, wherein the event message is useable to synchronize second content a second device causes display at a second display device with the first content the first device is causing display at the first display device. | 2009-04-02 |
20090089825 | CONTROL OF ACCESS TO MULTIMEDIA CONTENT - A disclosed method of enabling a subscriber to control access to multimedia content received from a multimedia distribution network includes provisioning the network with an access control application. The application is operable to respond to an invocation by a member of a subscriber class by enabling at least one subscriber class function, wherein the subscriber class function enables the subscriber class member to define an access restriction for members of a controlled class. The application responds to an invocation by a member of the controlled class by enabling the controlled class member to access content not subject to the defined restrictions permitting the controlled class member to define preferences from content not subject to the defined restrictions. The definable preferences may include TV channel preferences and interactive games preferences. Restrictions may be defined based on channel identification, a rating associated with requested content, an elapsed viewing time, and a monetary charge. | 2009-04-02 |
20090089826 | SYSTEMS AND METHODS FOR MANAGING PARENTAL CONTROL INFORMATION IN MULTIPLE ENTERTAINMENT DEVICES - Parental control settings may be managed between multiple entertainment devices, such as digital televisions (DTVs). A system includes a first entertainment device and a second entertainment device. The first entertainment device is configured to selectively block content based on a first set of parental control settings, and the second entertainment device configured to selectively block content based on a second set of parental control settings. The first entertainment device is configured to receive a parental control modification command from the second entertainment device; invoke a security mechanism in response to the parental control modification command such that the parental control modification command is authenticated or unauthenticated; and modify the first set of parental control settings consistent with the parental control modification command if the parental control modification command is authenticated. | 2009-04-02 |
20090089827 | SYSTEM FOR SPECIFIC SCREEN-AREA TARGETING FOR PARENTAL CONTROL VIDEO BLOCKING - There is provided a system and/or method of displaying video content. More specifically, in one embodiment, there is provided a method comprising receiving input regarding a type of potentially objectionable video content (POC) that is to be filtered when displaying video content, receiving a video signal containing an indication of a display location of POC in the video content and a type of POC at that display location, and filtering display of content identified by the indication of the display location of the POC and the type of the POC if the type of POC corresponds to the type of POC that is to be filtered when displaying the video content. | 2009-04-02 |
20090089828 | BROADCAST TELEVISION PARENTAL CONTROL SYSTEM AND METHOD - There is provided a system and/or method of displaying video and/or audio content. An exemplary method comprises receiving input regarding a type of potentially objectionable content that is to be filtered from display of the video content, receiving a video signal containing an indication marking an occurrence of potentially objectionable video content in the video signal and a type of the potentially objectionable video content, and filtering the video signal at the occurrence if the type of the potentially objectionable video content corresponds to the type of potentially objectionable video content that is to be filtered when displaying the video content. | 2009-04-02 |
20090089829 | METHOD AND SYSTEM FOR BLOCKING HAZARDOUS INFORMATION - A method for blocking objectionable information on a terminal. The method includes receiving header information corresponding to a particular multimedia content, extracting grade information from the header, determining if the extracted grade information is an allowable grade indicating that the particular multimedia content can be received by the terminal, receiving the particular multimedia content if the determining step determines the extracted grade information is the allowable grade, comparing the received multimedia content with objectionable information determination data stored in the terminal to determine if the multimedia content is objectionable, and assigning an objectionable grade to the header of the multimedia content when the comparing step determines the received multimedia content is objectionable. | 2009-04-02 |
20090089830 | VARIOUS METHODS AND APPARATUSES FOR PAIRING ADVERTISEMENTS WITH VIDEO FILES - An advertisement player is described that embeds on a web page having a video player, which is hosted on a first server. The advertisement player is configured to make a call to and send information associated with a video file about to be played on the web page across a network to a contextual engine hosted on a second server. The contextual engine analyses the content of the video file to be played on the video player and content of two or more advertisements from two or more advertisement networks and sends back one or more advertisements to display with the video file as the video player plays the video file on the web page. The contextual engine pairs the one or more advertisements with the video file based on at least a best match of relevance of the one or more advertisements to content in the video file. | 2009-04-02 |
20090089831 | Method and Apparatus for Pop Screen Dialog for Roving Devices With Terrestrial Broadcast Receiver - There are provided a method and apparatus for generating pop screen dialog for roving devices with a terrestrial broadcast receiver. The apparatus includes a dialog generator ( | 2009-04-02 |