20th week of 2010 patent applcation highlights part 33 |
Patent application number | Title | Published |
20100125601 | SYSTEM, METHOD, AND SOFTWARE FOR IDENTIFYING HISTORICALLY RELATED LEGAL CASES - The American legal system, judges and lawyers are continually researching an ever-expanding body of past judicial opinions, or case law, for the ones most relevant to resolution of new disputes. To facilitate these searches, some companies collect and publish the judicial opinions of courts across the United States in both paper and electronic forms, with some of the cases containing references to prior cases from other courts that have previously ruled on all or part of the same dispute. Identifying the prior cases is problematic, because, for example, conventional computer text-matching not only suggests too many non-prior cases, but also misses too many actual prior cases. Accordingly, the present inventors devised systems, methods, and software that generally facilitate identification of one or more documents that are related to a given document, and particularly facilitate identification of prior cases for a given case. One specific embodiment retrieves prior-case candidates based on information extracted from an input case, and then uses a support vector machine to determine which of the prior-case candidates are most probably prior cases for the input case. | 2010-05-20 |
20100125602 | METHOD AND SYSTEM FOR ANNOTATION BASED SECURE CACHING - A method implemented in a computer infrastructure having computer executable code having programming instructions tangibly embodied on a computer readable storage medium. The programming instructions are operable to receive an object from an application server and detect that an object encryption is activated for the object. Additionally, the programming instructions are operable to inspect an annotation for the object and determine that the object or one or more attributes of the object require encryption based on the inspecting. Furthermore, the programming instructions are operable to encrypt the object or the one or more attributes of the object that require encryption based on the determining using an encryption type and serialize and cache the object in a cache storage. | 2010-05-20 |
20100125603 | Method, Apparatus, and Computer Program Product for Determining Media Item Privacy Settings - An apparatus for determining media item privacy settings may include a processor. The processor may be configured to receive media item capture data associated with a media item. The media item capture data may include at least a capture location. The processor may also be configured to identify a privacy context that corresponds to the media item capture data. In this regard, the capture location of the media item capture data may be within a geographic zone of the privacy context. The processor may be further configured to determine a privacy setting for the media item based on the corresponding privacy context, and, in some embodiments, control access to the media item in accordance with the determined privacy setting. Associated methods and computer program products may also be provided. | 2010-05-20 |
20100125604 | SYSTEM AND METHOD FOR URL BASED QUERY FOR RETRIEVING DATA RELATED TO A CONTEXT - A system and method for URL based query for retrieving data related to a context. A request is received over a network from a user for data related to a context, wherein the request is a URL comprising a context query comprising at least one context criteria. The context criteria are parsed and translated and disambiguated. A network data query is formulated based on the context criteria so as to search, via the network, for user profile data, social network data, spatial data, temporal data and topical data that is available via the network and relates to the context query so as to identify at least one data object that relates to context criteria. Permissions relating to the identified data objects are checked and references to the data objects are transmitted over the network to the user. | 2010-05-20 |
20100125605 | SYSTEM AND METHOD FOR DATA PRIVACY IN URL BASED CONTEXT QUERIES - A system and method for data privacy in URL based context queries. A reference to a data object is received from a user. At least one entity that controls the data object is identified via the network. At least one permission for the data object is retrieved via the network, wherein the permission is associated with the entity that controls the data object. It is then determined, via the network, if the user is permitted to access to the data object using the permission for the data object and spatial data, temporal data social data and logical data available to the network that relates to the user and to the permission for the data object. If the user is permitted access to the data object, access is granted to the data object, and if the user is nor permitted access to the data object, access is denied to the data object. | 2010-05-20 |
20100125606 | DATA STRUCTURES AND METHODS OF FORMING THE SAME - Data structures and methods of forming data structures are provided. The data structures may be stored in a suitable memory of a computer system. A data structure may include a first data array and a second data array. The first data array may include respective identifiers of a plurality of data types that are included in the data structure. The second data array may include data formatted in accordance with the plurality of data types. The data structure may facilitate relatively high speed communication of the data included in the data structure. | 2010-05-20 |
20100125607 | DECOMPOSING CONFIGURATION PROBLEMS - An artifact is configured whose constituting components and features are selectable via parameters in an interrelated set of parameters. A range of consistent configurations for the artifact is defined by a set of constraints restricting which variable values that are simultaneously selectable. A proposed storage means stores a problem description in the form of a part-of hierarchy and a list of step definitions. The part-of hierarchy includes at least two different parts and each step definition includes a pointer to a respective part in the part-of hierarchy. A processing means solves constraint satisfaction problems in response to input data designating parameter settings, and an application module creates and executes step instances, which are based on the list of step definitions. The step instances are executed sequentially, and the execution of each step instance involves: creating a CSP based on the part to which the pointer of the corresponding step definition points and any descendents to this part, presenting a range of variables wherein each variable has at least one selectable value assignable via a user-committed setting in the input data, solving the CSP of the step instance based on the user-committed settings and any variable values resulting from any preceding step instances in said sequence, and presenting the set of resulting variable values. The application module repeatedly prompts a user to enter input data to represent user-committed settings until all the step instances in said sequence have been executed. | 2010-05-20 |
20100125608 | ROTATION BASED TRANSFORMATION METHOD AND APPARATUS FOR PRESERVING DATA PRIVACY - The present invention includes a rotation based transformation method for preserving data privacy. A rotation based transformation method according to an embodiment of the present invention divides a given data set into a plurality of data subsets, applies a plurality of different rotation matrixes to the plurality of divided data subsets, respectively, to rotate the plurality of data subsets, and re-concatenates the plurality of rotated data subsets to generate a rotated data set. The rotated data set is released and used for data clustering. The rotation based transformation method is effectively used when the impact of the AK-ICA attack is mitigated. Meanwhile, when the two parties are related to the present invention, the two parties need to agree on parameters, such as the number of data subsets. It is preferable that the data subsets be divided into equal sizes. Further, rotation-unification work that removes relative rotation deviation between the plurality of different rotation matrices can be performed in order to provide valid clustering between the data subsets rotated using the different rotation matrixes. | 2010-05-20 |
20100125609 | Digital Comic and Sequential Art Multimedia File Format - A multimedia file embedded on a computer readable storage medium has a file format comprising a file header section including metadata describing the multimedia file; and a file body section including a frame information section for each frame in a sequence of frames in the multimedia file. | 2010-05-20 |
20100125610 | MULTIMEDIA FILE DROP IN A WIRELESS DEVICE - A mobile communication device may operate with a number of different applications, each having different file types associated therewith. A file analyzer receives data files and analyzes the files to identify a content type and thereafter associates the identified file with the appropriate application or applications. The received data files may be delivered through a wired connection, a wireless connection, or through the introduction of a memory device, such as a removable storage device, to the mobile communication device. The file analyzer may provide the appropriate notification or indication of association or association to the application associated with the identified content type and may further provide user notification of a newly delivered file. The files may be data files, such as text or multimedia files such as audio and/or video files. Files that are incompatible with the wireless communication device may be rejected by the file analyzer or left to the user to make a manual determination of content type and association with the appropriate application. | 2010-05-20 |
20100125611 | COMMUNITY-DEFINED AND MANAGED COMMUNICATION NETWORK - A method, system, and computer program product for implementing a community-defined and managed communication network are provided. The method includes creating a profile for a user of the network that includes a user-selected attribute. The method also includes identifying a relationship between the attribute in the profile and data external to the profile. The identification includes analyzing user community-generated descriptors of the attribute and searching the external data for common descriptors. The method further includes initiating an activity responsive to the analysis, which includes one or more of: prompting the user to invite a second user who is not a registered member of the communication network to join the communication network; prompting a third user to evaluate the user with respect to the attribute; and prompting the user to initiate a communication with a fourth user who is a registered member of the communication network. | 2010-05-20 |
20100125612 | MULTI-TENANCY USING SUITE OF AUTHORIZATION MANAGER COMPONENTS - Embodiments described herein are directed to implementing a multi-tenancy service component configured to provide multi-tenancy capabilities for submitted services. In one embodiment, a computer system instantiates a hosting service that includes a multi-tenancy component configured to provide resource access to multiple users through a single multi-tenant resource instance. The computer system receives a submitted service submitted to be hosted by the hosting service. The submitted service includes a portion of use information usable to configure parameters of the multi-tenancy component. The computer system configures the multi-tenancy component to provide resource access for multiple users through a single multi-tenant resource instance, where each user provides a resource instance claim indicating a resource instance level authorization for the user. The computer system also provides resource access to each of the users through the single multi-tenant resource instance, based on the resource instance level authorization included in the resource instance claim. | 2010-05-20 |
20100125613 | METHOD AND SYSTEM FOR RAPID AND COST-EFFECTIVE DEVELOPMENT OF USER GENERATED CONTENT - An express content metadata system (“ECM”) may provide functionality for uploading, querying and downloading game content without heavy coding requirements on the part of the developers. The ECM may provide fast indexing, searching and data retrieval of content. The ECM may manage evolving changes to content definitions by providing flexible and efficient versioning control over content definitions that allows multiple versions of game content to coexist and be independently searchable. | 2010-05-20 |
20100125614 | SYSTEMS AND PROCESSES FOR FUNCTIONALLY INTERPOLATED INCREASING SEQUENCE ENCODING - Systems and processes for compressing a plurality of integers are provided. The plurality of integers is accessed. Each integer in the plurality of integers references an address in a record in a plurality of records stored in computer readable memory. The plurality of plurality of integers is fit to a fitting function having a plurality of coefficients thereby establishing a value for each coefficient. A lookup table is built. The table comprises, for each of the integers, other than the first and last integer, a residual that remains when a value of the fitting function is removed from the value of the integer. A representation of the fitting function, the value for each of the one or more coefficients, and the lookup table, are stored, thereby compressing the plurality of integers. | 2010-05-20 |
20100125615 | PROCESSING DRUG DATA - Computer-assisted methods and systems of processing a drug information source. Characterizing the drug by the set comprising: syntax-parsed drug rule elements, adverse event data, mapped terms, and metadata. A method includes: creating a drug rule syntax; extracting metadata from the drug information source; extracting verbatim adverse event data from the drug information source; identifying drug rule content from the drug information source; mapping terms from verbatim data to a reference source; and parsing drug rule elements from at least one identified instance of drug rule content into the drug rule syntax, retaining associations between those drug rule elements that form a drug rule. | 2010-05-20 |
20100125616 | AUTOMATIC GENERATION OF DOCUMENT TRANSLATION MAPS - A method for generating translation maps for converting electronic documents is disclosed. Machine-interpretable encodings of respective source and target documents are used to automatically generate the translation map. Generating the machine-interpretable encodings may involve using semantic analysis to create semantic descriptions of the document formats. The translation map may be cached. The source document is converted to the target document using the translation map. The translation map or the target document may be delivered to a second entity by a first entity. If some portion of the source document is not converted, indication of the unconverted sections may be reported. | 2010-05-20 |
20100125617 | System for Consolidating Business Documents - A system for tracking proprietary data relating to optical recognition technology that matches preprogrammed identifiers on paper documents with electronically entered documents in order to provide seamless association and access. This system for businesses—particularly those that order telecommunications services from a telecommunications company—enables companies to consolidate all telecommunications orders, regardless of document layout/format or document file type, into a central repository for better control over network planning and expense management. | 2010-05-20 |
20100125618 | INTEGRATED SOA DEPLOYMENT AND MANAGEMENT SYSTEM AND METHOD FOR SOFTWARE SERVICES - A method and appertaining system provide that an integrated Service Oriented Architecture (SOA) repository stores functional and non-functional requirements and associated data and results of associated with software services across the software lifecycle, thereby permitting access at a common point or in a common way by a user to all relevant information about the software service at least during the development, testing, and run-time stages of the software service. Thus, all design documents, testing requirements and results, and run-time policies and contracts can be provided in a common location to facilitate development in the service oriented architecture. | 2010-05-20 |
20100125619 | DETERMINISTIC SELECTION OF DOMAIN CONTROLLERS IN A MULTI-MASTER DATABASE DISTRIBUTED DIRECTORY SERVICE - Data is maintained that identifies the available domain controllers for performing management actions with respect to a distributed directory service database. When a request is received to perform a management action on a directory service database object, the particular domain controller that is to perform the management action, called the master domain controller, is selected deterministically. Once the master domain controller has been identified, a request to perform the management action is transmitted to the master domain controller. The failure of a master domain controller will cause the identification of that domain controller to be removed from the data that identifies the available domain controllers and a deterministic failover to be performed to another master domain controller. | 2010-05-20 |
20100125620 | ARITHMETIC PROCESSING DEVICE AND METHODS THEREOF - A device and methods are disclosed for communicating an unrounded result from one arithmetic calculation for use in a second, subsequent calculation. For example, an unrounded result of a first calculation can be forwarded to provide a multiplier, a multiplicand or an addend operand for the subsequent operation. The operand can be forwarded to the input of the same fused multiply addition module (FMAM) that supplied the result, or to another FMAM, and do so without regard to the precision of the forwarded operand, the precision of the subsequent operation, or the native precision of the FMAM. | 2010-05-20 |
20100125621 | ARITHMETIC PROCESSING DEVICE AND METHODS THEREOF - An arithmetic processing unit is disclosed that can perform multiply operations, addition operations, or a combination thereof. The arithmetic processing unit can operate in two modes. The first mode supports one single, double, or extended-precision computation, and the second mode supports two simultaneous single-precision computations using the same exponent and mantissa datapaths. | 2010-05-20 |
20100125622 | MODIFYING VIRTUAL ITEM STATES IN CONJUNCTION WITH DIGITAL BROADCAST - An apparatus and computer implemented method for modifying a state of a virtual item and a corresponding computer-readable medium are disclosed. A receiving device receives information relating to one or more virtual items from a server via a broadcast signal. The information is filtered according to one or more criteria to select a selected virtual item from among the one or more virtual items. The criteria include a physical world location of the receiving device. A state of the selected virtual item is modified from an initial state to a modified state and information relating the modified state back is sent back to the server. | 2010-05-20 |
20100125623 | CROSS-DOMAIN COMMUNICATION TECHNIQUE FOR EXECUTION OF WEB MASHUPS - A system and method is described for communicating requests from a Web mashup being executed within the context of a Web browser to third-party Web services in a manner that does not violate the Same Origin Policy (SOP) observed by many Web browsers. In one embodiment, a workflow engine operating in the context of a Web browser executes a plurality of executable components comprising a Web mashup. The workflow engine transparently redirects Web service requests generated by the executing components to a proxy server that acts as an intermediate between the workflow engine and third-party Web services. The proxy server, which is not subject to SOP, transmits the Web service requests to the third-party Web service and obtains requested data therefrom. The proxy server further returns the requested data in a manner that is useable by the Web mashup components. | 2010-05-20 |
20100125624 | COUPLING STATE AWARE SYSTEMS - A method of coupling asynchronous process interaction between computer systems integrated within an overall system of interconnected systems includes receiving a set of information describing an invocation call for execution of a first process on a first system integrated within the overall system; correlating a first callback argument received upon completion of the first process that includes a first unique identifier for the first process generated by the first system with the set of information according to the first unique identifier for the first process; and sending a notification message to a callback endpoint in a second process implemented to receive notification upon completion of the first process by the first system indicating completion of the first process. The second process executing on a second system integrated within the overall system makes the invocation call. The set of information specifies the first unique identifier and the callback endpoint. | 2010-05-20 |
20100125625 | Method for Restricting Usage of a Mobile Device for Participating in a Session - A method for facilitating a mobile device to participate in a session hosted on a server is disclosed. In the disclosed method, the mobile device requests the server to permit the mobile device to participate in the session. In response to the request, the mobile device receives a set of restrictions. The set of restrictions comprises one or more restrictions that the mobile device requires to impose on one or more applications residing in the mobile device. The mobile device determines whether to accept or reject the received set of restrictions. Upon determining to accept the restrictions, the mobile device sends an acceptance message to the server, and in response, the server allows the mobile device to access the session hosted on the server. | 2010-05-20 |
20100125626 | Systems and Methods for Directing Content Requests to Servers - A method of delivering content to a client includes receiving a request for the content from the client at a first server, determining the size of the content, and determining an optimal server to provide the content. The method further includes redirecting the client to the optimal server when the size of the content is above a threshold. | 2010-05-20 |
20100125627 | DOWNLOAD METHOD TO A SERVER SYSTEM AND THE SYSTEM THEREOF - A download system is disclosed, which includes a server having a download server unit, a network device, and at least one computer. Each computer has a download agent unit respectively, and the computers are communicating with the server via the network device. A download request monitored in the computer is transferred to the server, and the download request is executed in the server. A download method thereof is also disclosed. | 2010-05-20 |
20100125628 | METHOD FOR ASSEMBLING A MULTIMEDA ASSET AND SUBSEQUENT PROVISIONING OF SAID MULTIMEDIA ASSET TO A CLIENT DEVICE, A RELATED SYSTEM, A RELATED MULTIMEDIA ASSET ASSEMBLY DEVICE AND A RELATED CLIENT DEVICE - The present invention relates to a Method for assembling a multimedia asset and subsequent provisioning of said multimedia asset to a client device, a related system, a related multimedia asset assembly device and a related client device for assembling a multimedia asset and subsequent provisioning of the multimedia asset to a client device. This method comprises the step of assembling the multimedia asset by selecting a subset of multimedia fragments from a plurality of multimedia fragments. The fragments of the subset of multimedia fragments are determined based on a personal path through a play-map where the play-map indicates relationships between the multimedia fragments of the plurality of multimedia fragments. The step of determining the personal path through the play-map additionally is based on at least one user signal from the client device. The at least one user signal indicating customer preferences of an end-user of the client device. | 2010-05-20 |
20100125629 | METHODS AND APPARATUSES FOR TRANSFERRING DATA - The present invention provides several methods and apparatuses for transmitting multimedia data using streaming media protocols such as real-time transfer protocols (RTP) and real-time streaming protocols (RTSP) in a computer network environment. A request for RTP data is sent from the caching proxy server to the server. The request may be for one specific type of data or multiple unrelated types of data. The server responds to the request indicating its support for the requested data. The caching proxy server determines whether to proceed or terminate the data transmission process based on the response provided by the server. If it is determined to proceed with the data transmission process, the caching proxy informs the server to send the requested data. The server sends the requested data in a body of a RTP packet. The RTP packet uses a RTP Meta-Info payload format, which includes a body and a field header. The field header includes fields to identify the streaming media data, and the field body includes the requested streaming media data. | 2010-05-20 |
20100125630 | Method and Device to Provide Trusted Recommendations of Websites - In embodiments of the disclosed technology, a plurality of ratings of, for example, websites is received, wherein each rating is associated with a category and a rater, and each rater is associated with at least one group. A selection of a category is received from the user, wherein the user is associated with at least one group. One website location, or a plurality of website locations, is provided in the category to the user, based on at least one rating of the plurality of ratings provided by at least one of the raters, wherein at least one group associated with the rater and at least one group associated with the user are the same group. | 2010-05-20 |
20100125631 | NETWORKING CAPABILITY DETERMINATION MECHANISM - According to one general aspect, a method may include transmitting, from a first network entity to a peer network entity, an offer to perform at least one networking function, wherein the offer includes a set of parameters indicating at least one networking capability that may be employed by the first network entity to perform the networking function. The method may include receiving, from the peer network entity, a set of parameters indicating at least one networking capability that may be employed by the peer network entity to perform the networking function. The method may include determining if at least one networking capability may be employed by both the first network entity and peer network entity to perform the networking function. The method may include selecting at least one networking capability to employ to perform the networking function. The method may include other actions as described herein. | 2010-05-20 |
20100125632 | Matching Social Network Users - Systems and methods are disclosed for matching of individuals to one another using a matching model. The matching model matches social network users based on ratings given by users one to another, as well as, as appropriate and available, explicit attributes indicated by users and other data such as location data and system usage data. | 2010-05-20 |
20100125633 | ON-LINE CONVERSATION SYSTEM, ON-LINE CONVERSATION SERVER, ON-LINE CONVERSATION CONTROL METHOD, AND INFORMATION STORAGE MEDIUM - To make it easier to discern a conversation carried out in a virtual space. An on-line conversation control method comprises a conversation group determination step of determining one or more conversation groups (G | 2010-05-20 |
20100125634 | Autonomous management of a communication network - A method, system, and computer program product for autonomous management of a communication network are provided. The communication network includes a community of registered and unregistered users. The method includes segmenting a body of data according to pre-defined aspects that identify related subject matter and a volume of data stored for each of the segments based on the volume of data. The method also includes classifying each of the registered users according to the segments, and identifying from the classification: a population size of users associated with corresponding segments and a proportion of users to corresponding segments. The method further includes assessing aspects of an unregistered user, based upon a communication, in view of pre-defined growth criteria established for the communication network and, upon determining the aspects fall within limits specified by the pre-defined growth criteria, presenting the unregistered user with an invitation to register with the community. | 2010-05-20 |
20100125635 | USER AUTHENTICATION USING ALTERNATIVE COMMUNICATION CHANNELS - Techniques are provided for authenticating a user to a server (and vice-versa) through an Instant Messaging (IM) communication channel instead of through the primary communication channel, e.g., using a web browser. User/server authentication through an IM channel may occur as part of the login process and/or before any transactions are completed. Thus, a client device sends, via the primary communication channel (e.g., using HTTP) a request for a service provided by a server. After the server receives the request, the server establishes an IM communication channel with the client device. The IM communication channel is different than the primary communication channel. Both the server and the client device execute an IM client. The server then uses the IM communication channel to authenticate a user of the client device. The server completes the request. | 2010-05-20 |
20100125636 | METHOD AND APPARATUS FOR INCORPORATING USER INTERACTION BASED PRESENCE IN EMAIL SYSTEMS - In one embodiment, an apparatus includes a network arrangement and an email arrangement. The network arrangement is configured to enable the apparatus to communicate across a network. The email arrangement cooperates with the network arrangement to send and to receive emails. The email arrangement includes presence logic that monitors user interaction based presence with respect to a first email. | 2010-05-20 |
20100125637 | METHODS AND SYSTEMS FOR USING A VAULT SERVER IN CONJUNCTION WITH A CLIENT-SIDE RESTRICTED-EXECUTION VAULT-MAIL ENVIRONMENT - Disclosed are methods, media, and vault servers for providing a secure messaging system using vault servers in conjunction with client-side restricted-execution vault-mail environments. Methods include the steps of upon activating a vault-mail message containing sensitive content, removing the content from the vault-mail message; placing the content on a vault server; creating a link in the vault-mail message to the content on the vault server; sending the vault-mail message to a designated recipient; and upon activating the link, allowing the content to be only viewed in a restricted-execution session of a client application, wherein the restricted-execution session does not allow the content to be altered, copied, stored, printed, forwarded, or otherwise executed. Preferably, the activation of the vault-mail message is performed by a network-security gateway, and can be performed on a per-message basis. Preferably, the activation of the link requires user authentication which may be designated during activation of the vault-mail message on a per-message basis based on said content. Preferably, the restricted-execution session enforces a security policy. | 2010-05-20 |
20100125638 | SYSTEMS AND METHODS FOR FACILITATING CREATING CALENDAR ENTRIES IN CLIENT DEVICES - A method for facilitating creating one or more calendar entries in one or more client devices. The method may include includes receiving an iTIP message from a first client device associated with a first user and having a first calendar application. The iTIP message may be addressed to at least a second user, wherein the second user may be associated with a second client device having a second calendar application. The method may also include generating an iMIP message using the iTIP message. The method may also include providing at least one of a copy of the iTIP message and a copy of the iMIP message to a least one of the second client device and a second communication server device connected to the second client device for enabling the second calendar application to generate a calendar entry in the second client device. | 2010-05-20 |
20100125639 | ELECTRONIC DEVICE WITH EMAIL FUNCTION AND METHOD FOR SETTING EMAIL ACCOUNT OF ELECTRONIC DEVICE - A method for setting account of an electronic device is provided. The method includes steps of: receiving emails; reading a received email; detecting whether parameters of the read email are consistent with a predetermined rules; setting the origination email account, which sends the read email, as an available email account of the electronic device if the parameters of the read email are consistent with the predetermined rules. The electronic device with email function is also provided. | 2010-05-20 |
20100125640 | Traffic Management Apparatus - A traffic management apparatus for connection within a data transmission network is disclosed, that is arranged to manage the distribution of data traffic between data serving computers and the data relaying devices by analysing client requests. The apparatus has an input device ( | 2010-05-20 |
20100125641 | METHOD AND APPARATUS FOR VIRTUALIZING RESOURCES - The invention relates to an apparatus and a method for virtualizing resources. The apparatus is configured to store resource descriptions of a number of resources operatively connected to the apparatus, the resource descriptions including resource identification information, generate and store alternative descriptions of received resource descriptions by changing at least part of the identification information of the descriptions, publish at least some of the resource descriptions in a network, and handle resource data requests from the network relating to the resources. | 2010-05-20 |
20100125642 | System And Method For Integrating Electronic Mail Accounts - In accordance with the teachings described herein, systems and methods are provided for integrating a plurality of electronic mail (email) accounts. A plurality of email services may be used to send and receive electronic messages over a wide area network, one of the email services being a preferred email service and another of the email services being a secondary email service. An email integration service may be used that is coupled to the wide area network and that is independent of the plurality of email services. The email integration service may be operable to receive account information regarding the preferred email service and the secondary email service and use the account information to configure a means for forwarding electronic messages from the preferred email service to the secondary email service. | 2010-05-20 |
20100125643 | Interdomain Network Aware Peer-to-Peer Protocol - A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client. | 2010-05-20 |
20100125644 | MANAGING MEDIA CONTENT - A computing device for managing media content and a method of its operation are provided. The computing device may be configured to execute a computer program including a media manager. The media manager may be configured to present a graphical user interface including a static media menu for enabling a user to select one of an automated mode or a manual mode for managing synchronization of static media content; transfer static media content between the computing device and a remote media device according to a user interaction if the manual mode is selected at the static media menu; transfer static media content according to a predefined programmatic process for the static media content if the automated mode is selected at the static media menu; and transfer dynamic media content between the computing device and the remote media device according to a predefined programmatic process for the dynamic media content. | 2010-05-20 |
20100125645 | PROVIDING AGGREGATED DIRECTORY STRUCTURE - In an embodiment, circuitry residing, at least in part, at a first network node may initiate, at least in part, replicating, at least in part, at the first node of a file space at a second network node, may detect, at least in part, modification at the second node of the file space, and may initiate, at least in part, corresponding modification at the first node of a replication of the file space. The circuitry also may generate, at least in part, an aggregated directory structure including, at least in part, the file space and another file space resident, at least in part, remotely from the second node. The directory structure may be provided, at least in part, to the second node prior, at least in part, to completion of the replicating, at least in part, at the first node of the file space. | 2010-05-20 |
20100125646 | System For Enabling Host-Independent Software Portability Of A Self-Contained Device - A system and method that enable placing on an active PMD host software that normally requires installation on a host, and running such software on a host connected to the PMD, without installing the software on the host. In this way, the PMD becomes self-contained, and can connect to any host for the purpose of interaction, manipulation and transfer of content stored on the PMD, without requiring any proprietary software related to the PMD to be pre-installed on the host, and without installing any software on the host during the connection of the PMD to the host. | 2010-05-20 |
20100125647 | SYSTEM AND METHOD FOR LOCATION-SPECIFIC RESOURCE MANAGEMENT - The present invention provides a remotely accessible platform providing predetermined lists of industrial sector options, as well as tailored listings of vendors and/or service providers supplying such options. In particular, the present invention includes a system for facilitating resource identification and selection, including a server coupled to a communication network, the server including a list module having a predefined list of items and a vendor module generating a listing of a plurality of vendors supplying at least one item on the predefined list, where the listing of the plurality of vendors is generated based upon an identified location. | 2010-05-20 |
20100125648 | SYSTEM AND METHOD FOR THE SERVING OF EXTENDED BIT DEPTH HIGH RESOLUTION IMAGES - A novel and useful system and method for the serving and display of extended bit depth (EBD) high resolution images on a web browser using multimedia platform code or code for a graphics framework. To display an EBD image, such as an x-ray or MRI image set, on a web browser, the image data is mapped into a plurality of channels of pixels of a color image which a web browser is able to handle, where each channel holds a portion of the full dynamic range of the original EBD image. At the client, a color transform is applied to the color image data which takes into account the user's desired VOI settings. The resulting display image has the exact values as if the VOI was applied to the original EBD image and is dynamically mapped to the display capabilities of the client viewing framework thus enabling a reviewer to detect any available details of the image. | 2010-05-20 |
20100125649 | Dynamic Image Delivery System - A dynamic image delivery system receives a client request for an image at an image caching server. The image caching server measures the client's network access speed and looks for an appropriate pre-rendered copy of the requested image that is rendered for the client's network access speed in local storage. If the appropriate rendered copy is found, then the image caching server sends the rendered image to the client. If it is not found, then the image caching server dynamically renders a copy of the image and sends it tot he client. | 2010-05-20 |
20100125650 | Method and arrangement for configuring a device in a data network - Methods for the configuration of a device in a data network are provided. According to one method, a domain name is first stored in the device. The device then transfers an inquiry message comprising the domain name to an addressing server that serves for the conversion between the domain name and the associated internet addresses. In a further step, the addressing server transmits an address information of a parameter server associated with said device to the device as a response to said inquiry message. The device establishes a link to the parameter server on the basis of said address information. The parameter server transmits via this link parameters to the device which serve to configure the device. | 2010-05-20 |
20100125651 | Method and System for Establishing a User-Friendly Data Transfer Service Application Executing Within a Heterogeneous Distributed Service Application Execution Environment - Various embodiments of the present invention are directed to methods and systems for data transfer between electronic, hand-held devices, including cell phones, and computer systems, including servers and PCs, as well as component methods and systems of these data-transfer methods and systems. Component methods and systems of the present invention include secure links between various devices, enhancements to electronic hand-held devices that enable service applications to run continuously or intermittently on the devices, deployment of dynamically created service applications to electronic, hand-held devices, and various additional component methods and systems that facilitate the above-mentioned component methods and systems. One embodiment of the present invention is a robust, efficient, secure, and user-friendly method and system for transferring data between cell phones and personal computers. | 2010-05-20 |
20100125652 | Method, Apparatus, and Computer Program for Binding Local Devices to User Accounts - Binding local devices to user accounts may involve receiving a registration message from a local device of a local network via an Internet connection. A public Internet identifier of the local network may be determined based on the Internet connection, and a user login to an account is received. The user login originates via the public Internet identifier of the local network. The local device is bound to the account based on the user login originating from the public Internet identifier of the local network. | 2010-05-20 |
20100125653 | SYSTEM AND METHOD FOR SHARING STORAGE RESOURCES - A network includes a management module with a first root complex, a first server with a first endpoint coupled to the first root complex, and a second server with a second root complex, a second endpoint coupled to the second root complex, a third endpoint coupled to the first root complex, and a bridge coupled to the second endpoint and to the third endpoint. A method includes discovering a PCIe host bridge adapter (PHBA) and a storage resource coupled to multiple storage extents in a PCIe domain, creating a first virtual function on the storage resource and sending a first identifier for the first virtual function to the PHBA. A network interface device includes a PCIe endpoint that is coupleable to a PCIe root complex, another PCIe endpoint that is coupleable to another PCIe root complex, and a bridge that couples the first PCIe endpoint with the second PCIe endpoint. | 2010-05-20 |
20100125654 | Method and Apparatus for Utilizing User Identity - In accordance with an example embodiment of the present invention, an apparatus, comprising a processor configured to receive an input operation related to selecting at least a part of information related to a first user identity and at least a part of information related to a second user identity, utilize information related to the first user identity based at least in part on the input operation, and utilize information related to second user identity based at least in part on the input operation is disclosed. | 2010-05-20 |
20100125655 | METHOD AND SYSTEM FOR CENTRALIZED LOGIC FOR CENTRALLY MANAGED MACHINES - Aspects of a method and system for centralized logic for centrally managed machines are provided. In this regard, a plurality of networking and/or computation units (NCUs) and a central management unit (CMU) may reside in a multi-unit networking system, and information may be communicated between the plurality of NCUs and the CMU such that a console connected to the CMU may be enabled to interface with the plurality of NCUs. At least some hardware that performs management functions, human interface functions, and/or graphics functions may be implemented only once in the multi-unit system and may be implemented on the CMU. Each of the plurality of NCUs and the CMU may be, for example, a blade server or a rack-mount server. | 2010-05-20 |
20100125656 | System and Method for Request Routing Optimization - A system includes a monitoring module, a request allocation module, and a request distribution module. The monitoring module is configured to determine a resource utilization of a preferred server and a non-preferred server. The request allocation module is configured to modify an allocation scheme in response to the resource utilization of the preferred server and the non-preferred server. The request distribution module is configured to distribute a plurality of requests from a plurality of users according to the allocation scheme. | 2010-05-20 |
20100125657 | System for Collecting Computer Application Usage Data from a Plurality of Client Devices - A system and method for collecting computer application usage data from a plurality of client devices. The system may include a monitoring program executable on each of the plurality of client devices. The monitoring program may be configured to receive from a server via a computer network monitoring data including one or more application identifiers, and to identify one or more target application programs executed on the client device as matching one of the identifiers. The monitoring program may further be configured to gather usage data for the target application program over a period of time, and send a message back to the server including the usage data. Reports may be generated based on the usage data. | 2010-05-20 |
20100125658 | METHOD AND SYSTEM FOR MULTIMEDIA CONTENT CONSUMPTION ANALYSIS - A method and system for analyzing consumption of multimedia content provided by a multimedia content delivery network are disclosed. The multimedia content may be selected by a user using an electronic programming guide on customer premises equipment (CPE). A historical log of content selection events may be recorded. The historical log is analyzed to generate consumption statistics and consumption patterns for the user. The consumption statistics may be generated for different content types. The analysis may be performed locally on CPE or by a remote server. The consumption statistics may be compared with a user subscription for multimedia content. A consumption metric may be generated for recommending a more cost-effective subscription package to the user. Consumption data may be provided to third parties for data mining. | 2010-05-20 |
20100125659 | Method and Apparatus Regarding the Automatic Transmission of Operational State Event and Time Information - A network element ( | 2010-05-20 |
20100125660 | RECORDING APPARATUS, METHOD, AND COMPUTER READABLE STORAGE MEDIUM STORING PROGRAM THEREOF - When the communicator sends a communication message for Web access, the monitor suspends the sending process of the communication message in the communicator. The start determiner instructs the operation recorder to start the recording process of data indicative of user operations. The monitor allows the communicator to resume the sending process of the communication message. The operation recorder sets a capture interval to the timer. When the user performs input operations, the operation recorder records the input data. If the remaining time of the timer is 0, the operation recorder captures and records the screen data, and sets the capture interval to the timer. If the end determiner has instructed to end the recording process, the operation recorder closes the file for storing the operation data and stores the file in the operation storage. | 2010-05-20 |
20100125661 | ARRANGEMENT FOR MONITORING PERFORMANCE OF NETWORK CONNECTION - A method, apparatus, system, and computer program for analyzing properties of an application-specific end-to-end communication connection are presented. In a connection performance analysis apparatus, measurement data messages are received from a plurality of traffic-monitoring nodes arranged at selected intermediate points in a plurality of network segments of the application-specific end-to-end communication connection and from at least one end node of the end-to-end communication connection, wherein a measurement data message comprises information related to a travel time of at least one data packet of the end-to-end communication connection to the traffic-monitoring node or to the end node transmitting the respective measurement data message. Then, the connection performance analysis apparatus analyzes the received measurement data messages in order to determine a bottleneck of the end-to-end communication connection. | 2010-05-20 |
20100125662 | Methods, Systems, Devices and Computer Program Products for Protecting a Network by Providing Severable Network Zones - Provided is a computer network that includes computer network devices that are grouped into severable computer network zones and that are operable to detect non-compliant network activity in another of the severable computer network zones. The computer network includes multiple intra-network communication connections that are operable to communicatively couple the severable computer network zones to one another and to be selectively disconnected responsive to the detection of non-compliant network activity in a first zone of the severable computer network zones to isolate the first zone from other of the severable computer network zones. | 2010-05-20 |
20100125663 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 2010-05-20 |
20100125664 | System, Method, and Software for Integrating Cloud Computing Systems - A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Information Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources. | 2010-05-20 |
20100125665 | SYSTEM AND METHOD FOR PERFORMANCE DATA COLLECTION IN A VIRTUAL ENVIRONMENT - A system and method can deploy and manage software services in virtualized and non-virtualized environments. The system provides a data consumer that manages a plurality of data collectors, wherein each data collector resides on one of the plurality of virtualized and non-virtualized machines in the computing environment and extracts performance data from a set of Virtual Machines running on a specific compute resource using an operating contract. The operating contract includes one or more metric descriptors, wherein each metric descriptor specifies one or more resources associated with the set of Virtual Machines. In addition, a push manager allows the data consumer to register performance data items that need to be handled, wherein the push manager calls the data consumer to process the performance data items at each time the periodic interval elapse. | 2010-05-20 |
20100125666 | SERVICE FACADE DESIGN AND IMPLEMENTATION - In one embodiment, a computer system receives registration information for available services provided by a service provider. The registration information includes information identifying functionality provided by the available services, and the registration information is used to register the available services with the intermediary service. The computer system receives a service request from a client computer system identifying a function that is to be performed by at least one of the available services registered at the intermediary service. The computer system determines which of the registered available services is configured to provide the functionality requested by the client and processes the received service request using various system functionality components, so that the service request is configured for service-specific processing provided by a registered available service. The computer system also sends the processed service request to the registered service determined to be configured to provide the functionality requested by the client. | 2010-05-20 |
20100125667 | DYNAMIC CONFIGURATION OF VIRTUAL MACHINES - A computer implemented method for configuring virtual internal networks for testing is provided. The method includes deploying a virtual firewall and deploying a public switch enabling access to an external local area network through a first interface of the virtual firewall. A private switch enabling access to a plurality of virtual machines through a second interface of the virtual firewall is provided. The plurality of virtual machines define a private network behind the firewall. A network address is assigned to the virtual firewall and a private address is assigned to each of the virtual machines. The plurality of virtual machines are then tested through a test launcher in communication with the public switch. | 2010-05-20 |
20100125668 | Methods, Systems, and Computer Program Products for Enhancing Internet Security for Network Subscribers - A network communication system includes a connection server that assigns a network address within a data communication network to a subscriber terminal. The connection server receives outgoing communications from the subscriber terminal and transmits the outgoing communications to a network access point and receives incoming communications from the network access point and transmits the incoming communications to the subscriber terminal. The connection server intercepts a tracking cookie received from a remote server in the data communications network and intended for the subscriber terminal and stores the tracking cookie at the connection server so that the tracking cookie can be used to support a communication session between the subscriber terminal and the remote server without the tracking cookie being stored at the subscriber terminal. | 2010-05-20 |
20100125669 | System, Method, and Software for Object-Based Cloud Computing Management - A method for managing cloud computing systems includes establishing a connection between a cloud computing interface and cloud computing systems. Each of the cloud computing systems includes computing resources accessible by a proprietary interface. The cloud computing interface includes object methods that abstract the proprietary interface of each of the cloud computing systems. The method further includes receiving a request to perform an operation on one or more of the cloud computing systems. The method further includes provisioning at least one object method to implement the request. | 2010-05-20 |
20100125670 | SYSTEMS AND METHODS FOR DATA AUTHORIZATION IN DISTRIBUTED STORAGE NETWORKS - Storage authorization and access control of data stored on a peer-to-peer overlay network is provided. A publishing node stores data on a storage node in the overlay network. The publishing node is adapted to facilitate data storage authorization by generating a resource identifier as a function of a usage string associated with a data type to be stored. A storage request is generated that includes the resource identifier and data to be stored. The storage request may be sent to the storage node. The storage device receives the storage request sent by a publishing node, including a resource identifier and data to be stored. Independent storage authorization is performed by the storage node at an overlay level by verifying the resource identifier. The data in the storage request is stored at the storage node if the resource identifier is successfully verified. | 2010-05-20 |
20100125671 | DYNAMICALLY ACTIVATING BUFFERED DATA PUBLISHERS IN SENSOR NETWORKS - In one embodiment, a node in a computer network may receive data of a particular type at a first frequency (e.g., a sensor in a sensor network), and may correspondingly determine whether there is at least one interested subscriber for the data of the particular type, where the interested subscriber desires the data at a second frequency. If there is an interested subscriber, buffered data publishing may be dynamically activated at the node in response to a ratio between the second and first frequencies being less than a configured threshold. In particular, buffered data publishing comprises buffering the received data and transmitting a latest received data to the interested subscriber at the second frequency. | 2010-05-20 |
20100125672 | PERSONAL BROADCAST AND CONTENT DELIVERY ENGINE - A communication system that enables a specified end-user device to obtain a media file corresponding to a delayed-play entry of a content-definition table prior to the scheduled play time. To deliver the media file to the end user, a service provider requests and receives the corresponding content from a content provider, generates the media file based on the received content, and temporarily stores the media file in a storage unit associated with the service provider. The service provider then breaks the media file into a plurality of data frames and transmits them to the end-user device during an appropriate delivery-opportunity window for storage in local storage unit (e.g., a hard drive) associated with the end-user device. At the play time, the service provider transmits to the end-user device a media-activation packet to initiate rendering thereat a copy of the media file assembled from the data frames stored in the local storage unit. | 2010-05-20 |
20100125673 | REQUEST ROUTING UTILIZING CLIENT LOCATION INFORMATION - A system, method, and computer-readable medium for request routing based on client location information are provided. A content delivery network service provider receives a DNS query from a client computing device. The DNS query corresponds to a resource identifier for requested content from the client computing device. The content delivery network service provider transmits an alternative resource identifier in response to the client computing device DNS query. The alternative resource identifier is selected as a function of client location information. The client location information is obtained from information corresponding to a mapping of at least partial IP addresses to known locations. The client computing device then issues a second DNS query to the same content delivery network service provider. The content delivery network service provider can then either resolve the second DNS query with an IP address of a cache component or transmit another alternative resource identifier that will resolve to the content delivery network service provider. The process can repeat with the content delivery network service provider's network until a DNS server resolves a DNS query from the client computing device. | 2010-05-20 |
20100125674 | SELECTIVE A PRIORI REACTIVE ROUTING - In one embodiment, a more capable device (MCD) in a computer network may determine one or more a critical destinations (CDs), and may transmit an unsolicited reactive routing route request (RREQ) message to each CD. The MCD may then receive a route reply (RREP) message from the CDs having a route from the MCD to the CD, and may store the route at the MCD. Subsequently, the MCD may transmit a RREP message of its own to one or more less capable devices (LCDs) to provide the route from each respective LCD to the CD via the MCD. | 2010-05-20 |
20100125675 | UPDATING ROUTING INFORMATION BASED ON CLIENT LOCATION - A system, method, and computer-readable medium for updating request routing information associated with client location information are provided. A content delivery network service provider receives a DNS query from a client computing device. The DNS query corresponds to a resource identifier for requested content from the client computing device. The content delivery network service provider obtains a query IP address corresponding to the client computing device. Based on routing information associated with the query IP address, the content delivery network service provider routes the DNS query. The process further includes monitoring performance data associated with the transmission of the requested resource and updating routing information associated with the query IP address based on the performance data for use in processing subsequent requests form the client computing device. | 2010-05-20 |
20100125676 | Distributing Traffic To Multiple GNS Devices - In one embodiment, a system for communicating traffic comprises a plurality of global namespace (GNS) devices and a network switch. The GNS devices aggregate mount points of file systems as an aggregated mount point. The network switch has a host-side interface, a storage-side interface, and a load balancer. The host-side interface has one or more host-side ports that communicate with a computing host. The storage-side interface has a plurality of storage-side ports that communicate with the GNS devices. The load balancer presents a virtual address to the computing host, and distributes traffic from the computing host to the GNS devices through the storage-side ports. | 2010-05-20 |
20100125677 | Cache Stashing Processor Control Messages - A system and method have been provided for pushing cacheable control messages to a processor. The method accepts a first control message, identified as cacheable and addressed to a processor, from a peripheral device. The first control message is allocated into a cache that is associated with the processor, but not associated with the peripheral device. In response to a read-prompt the processor reads the first control message directly from the cache. The read-prompt can be a hardware interrupt generated by the peripheral device referencing the first control message. For example, the peripheral may determine that the first control message has been allocated into the cache and generate a hardware interrupt associated with the first control message. Then, the processor reads the first control message in response to the hardware interrupt read-prompt. Alternately, the read-prompt can be the processor polling the cache for pending control messages. | 2010-05-20 |
20100125678 | ELECTRONIC DEVICE AND RELATED METHOD FOR CONTROLLING A PERIPHERAL DEVICE - An electronic device for controlling a peripheral device includes a data processing unit for receiving a control command and transforming the control command into a first command, a command processing unit coupled to the data processing unit, for decoding the first command to obtain a task of the peripheral device and encoding the task to generate a second command, and a transformation unit coupled to the command processing unit and the peripheral device, for transforming the second command into a third command of a consumer electronic control format, for controlling operations of the peripheral device. | 2010-05-20 |
20100125679 | COMPUTER AND METHOD FOR DIRECTLY ACCESSING COMPUTER HARDWARE BY VIRTUAL SYSTEM - A computer and method for directly accessing computer hardware by a virtual system are provided. The computer comprises a hardware platform having a first-type device, a second-type device and a third-type device provided thereon; a virtual machine managing module; a first operating module; a second operating module; wherein the virtual machine managing module comprises a first-type device configuration module for directly configuring the first type device to be used by the main operating system; a second-type device configuration module for directly configuring the second-type device to be used by the guest operating system; and a third-type device configuration module for virtualizing the third-type device on the hardware platform to generate a virtualized third-type device and configuring the virtualized third-type device to be used by the main operating system and the guest operating system, respectively. The present invention considers the distribution and use of the devices as a whole in combination with the use of BIOS in the main board. Therefore, the incompatibility problem between hardware and software of the virtual system can be solved. | 2010-05-20 |
20100125680 | APPARATUS AND METHOD FOR SELECTING WIRELESS CONNECTIVITY IN A WIRELESS COMMUNICATION TERMINAL - An apparatus and a method for providing an interworking service with a peripheral device in a Mobile Station (MS) supporting one or more wireless connectivity protocols are provided. Information on an execution environment of an application program for the interworking service is checked when the application program for performing the interworking service with the peripheral device is executed. A wireless connectivity protocol is selected from among the one or more wireless connectivity protocols for performing the interworking service with the peripheral device using the information on the execution environment of the application program. | 2010-05-20 |
20100125681 | INTELLIGENT MEMORY BUFFER - A technique reduces cost, complexity and/or power consumption of a memory system by including intelligence in a memory buffer circuit of the memory system. An apparatus includes a memory buffer circuit configured to selectively operate in one of a plurality of modes. In a first mode, the memory buffer circuit is configured to interface to a first type of memory device, is configured to enable an input circuit of the memory buffer circuit, and is configured to drive on a terminal of a memory interface of the memory buffer circuit a version of a signal received by the input circuit during a memory operation. In a second mode, the memory buffer circuit is configured to interface to the first type of memory device, is configured to disable the input circuit, and is configured to drive a signal on the terminal during the memory operation. | 2010-05-20 |
20100125682 | DYNAMIC REASSIGNMENT OF DEVICES ATTACHED TO REDUNDANT CONTROLLERS - A method for dynamically assigning a plurality of storage devices to a plurality of controllers within a storage unit, the method including: sensing each storage device from the plurality of storage devices; assigning each one of the storage devices to a respective controller from the plurality of controllers; monitoring at least one of each storage device, each controller, and a link between each storage device and the respective controller; upon a failure of at least one of the link, one of the storage devices and one of the controllers, generating a list of components; transmitting the list to another controller; and establishing a new assignment for each of the components on the list. A storage unit and a computer program product are provided. | 2010-05-20 |
20100125683 | METHOD OF MONITORING DEVICE FORMING INFORMATION PROCESSING SYSTEM, INFORMATION APPARATUS AND INFORMATION PROCESSING SYSTEM - A monitoring apparatus communicatively coupled to one or more devices forming an information processing system manages each of the devices by setting the device to be in any one of monitoring states including a monitoring target to be always monitored, a semi-monitoring target to be determined if there is a change in resources and a non-monitoring target being neither the monitoring target nor the semi-monitoring target. The monitoring apparatus newly acquires resource information on a device whose monitoring state is currently set to be the monitoring target or the semi-monitoring target, and determines if any of the resources of the device is changed on the basis of the newly acquired resource information, the resource information acquired last time, and a determination condition. When determining that any of the resources has been changed, the monitoring apparatus outputs a screen prompting a change of the monitoring state of the device. | 2010-05-20 |
20100125684 | Data Output System for Mobile Device and Data Output Method Thereof - A data output system for a mobile device and an associated method for outputting data of a mobile device are provided. The data output system for a mobile device can deliver data output from the mobile device to an embedded system, and display the data on a display screen of the embedded system. When the data output system is implemented in a mobile phone, a navigation map of the mobile phone can be shown by a large screen of the embedded system, and the embedded system can be utilized as a phone interface. | 2010-05-20 |
20100125685 | STORAGE APPARATUS AND OUTPUT SIGNAL GENERATION CIRCUIT - According to one embodiment, a storage apparatus configured to connect to other apparatus through a communication interface, includes: a memory device; an analysis object data writing module configured to write, when a predetermined event occurs, analysis object data corresponding to the event in the memory device; a response data generator configured to generate response data corresponding to a request input through the communication interface; and a data output module configured to output the response data through the communication interface when the response data exist, and output the analysis object data stored in the memory device through the communication interface by using a non-transmission time interval of the response data. | 2010-05-20 |
20100125686 | ELECTRONIC APPARATUS HAVING SWITCHING UNIT - An electronic apparatus having switching unit is described. The electronic apparatus includes a first peripheral device, a second peripheral device and a switching unit. The first peripheral device communicates with the host unit. The second peripheral device communicates with the host unit and the first peripheral device, respectively. The switching unit switches to the host unit and the first peripheral device for allowing the host unit to access the first peripheral device via a first path. The switching unit switches to the host unit and the second peripheral device for allowing the host unit to access the second peripheral device via a second path. The switching unit switches to the first peripheral device and the second peripheral device for allowing the first peripheral device to access the second peripheral device via a third path. | 2010-05-20 |
20100125687 | SYSTEM HAVING PROCESSOR AND I/O CONTROLLER - A method of controlling an apparatus including a processor and an I/O controller includes storing execution information, receiving a first and a second requests successively, determining whether initiation of each execution of the first and the second requests is to be supervised by either of the processor and the I/O controller in reference to the execution information, transmitting the first request to the processor from the I/O controller, and upon completion of execution of the first request at the processor, transmitting the second request to the processor from the I/O controller when the initiations of executions of the first and second request is supervised by the I/O controller, and transmitting the first and second requests to the processor regardless of completion of execution of the first request by the processor when the initiations of executions of the first and second requests is supervised by the processor. | 2010-05-20 |
20100125688 | EXTERNAL DEVICE HAVING A VIRTUAL STORAGE DEVICE - An external device includes a bridge and a storage device. The bridge is connected to a host according to a first data transmission interface so as to convert data of the host from the first data transmission interface to a second data transmission interface. The bridge includes a memory unit and a control unit. The memory unit stores a virtual device datum. The control unit generates a virtual storage device in the host according to the virtual device datum. The storage device is connected to the bridge for storing the data of the host according to the second data transmission interface. | 2010-05-20 |
20100125689 | ELECTRONIC APPARATUS CAPABLE OF RECEIVING DIFFERENT TYPES OF MEMORY CARDS - The invention provides an electronic apparatus capable of receiving a first-type memory card or a second-type memory card. In one embodiment, the electronic apparatus comprises a socket, a controller circuit, and an interface circuit. The socket is coupled to the first-type memory card through a set of first pins and is coupled to the second-type memory card with a set of second pins. The controller circuit accesses the first-type memory card or the second-type memory card via a plurality of input/output (IO) pins, and determines which of the first-type memory card and the second-type memory card is inserted into the socket according to the voltage of a target IO pin selected from the IO pins. The interface circuit sets the voltage of the target pin to different values according to whether the first-type memory card or the second-type memory card is inserted into the socket. | 2010-05-20 |
20100125690 | USB MEMORY CARD READER HAVING MEMORY CARD IDENTIFICATION - A memory card reader is disclosed that includes a memory card slot adapted to allow insertion and extraction of a memory card, a universal serial bus port, and a communication controller adapted for electrical communication with a memory card in the memory card slot and the universal serial bus port. The communication controller is responsive to a command message received in a command descriptor packet at the universal serial bus port to query the memory card in the memory card slot for information uniquely identifying the memory card. The communication controller is further adapted to generate an information descriptor packet including information uniquely identifying the memory card for provision at the universal serial bus port. | 2010-05-20 |
20100125691 | METHOD FOR POWERLESS IDENTIFICATION OF SERVER I/O SLOTS - A switch is provided that detects when a computer expansion card has been added, removed or changed. During operation, the switch is held in a depressed position by contact with a card. If the card is removed, the switch is raised and, when a second card is installed in the same slot, the switch is again depressed. The depression of the switch triggers a change signal that initiates the introduction of power to the slot for a period of time long enough for the hypervisor to detect the new device. A delay between a release and subsequent depression of the switch is measured such that when the switch is released enough time is provided to firmly seat a different card in the planar device. Following the delay, power is supplied to the slot so that the hypervisor detects the card and updates the current configuration parameters. | 2010-05-20 |
20100125692 | COMPUTER INTERFACE KIT AND COMPUTER INTERFACE DEVICE THEREOF - A computer interface kit is provided for communication between a computer and a peripheral device. The computer interface kit includes a computer interface device and a cable. The computer interface device includes an ExpressCard connector connected to the computer, an I/O interface unit connected to the peripheral device, and a circuit unit connecting the ExpressCard connector to the I/O interface unit. The cable electrically connects a DC port of the I/O interface unit with an internal USB port of the computer, whereby the I/O interface unit is powered by a DC voltage from the internal USB port. | 2010-05-20 |
20100125693 | Memory module for improving signal integrity and computer system having the same - A memory module includes a plurality of buses and a plurality of memory chips arranged close to each other along each of the plurality of buses. An N-th memory chip, where N is an integer, of the plurality of memory chips is connected to any one of the plurality of buses, and each of the other memory chips of the plurality of memory chips, except for the N-th memory chip, is connected to the other one of the plurality of buses. | 2010-05-20 |
20100125694 | MEMORY DEVICE AND MANAGEMENT METHOD OF MEMORY DEVICE - A memory device and a method for managing the memory device is provided. The memory device includes a flash memory including a plurality of pages, a non-volatile RAM storing a first mapping table between a physical page address and a logical page address for each page of the plurality of pages, and a volatile RAM storing a second mapping table between the physical page address and the logical page address for each page of the plurality of pages. | 2010-05-20 |
20100125695 | NON-VOLATILE MEMORY STORAGE SYSTEM - The present invention discloses a flash memory storage system, comprising at least one RAID controller; a plurality of flash memory cards electrically connected with the RAID controller; and a cache memory electrically connected with the RAID controller and shared by the RAID controller and the flash memory cards. The cache memory efficiently enhances the system performance. The storage system may comprise more RAID controllers to construct a nested RAID architecture. | 2010-05-20 |
20100125696 | Memory Controller For Controlling The Wear In A Non-volatile Memory Device And A Method Of Operation Therefor - A memory controller controls the operation of a non-volatile memory device. The memory device has a data storage section and an erased storage section. The data storage section has a first plurality of blocks and the erased storage section has a second plurality of blocks. Each of the first and second plurality of blocks has a plurality of non-volatile memory bits that are erased together. Further, each block has an associated counter for storing the number of times the block has been erased. The memory controller has program instructions which are to scan the counters associated with the blocks of the first plurality of blocks based upon the count contained in each of the counters associated therewith to select a third block, and to scan the counters associated with the blocks of the second plurality of blocks based upon the count contained in each of the counters associated therewith to select a fourth block. The program instructions are further configured to transfer data from the third block to the fourth block, and associating said fourth block with said first plurality of blocks. Finally the program instructions are configured to erase said third block and incrementing the counter associated with said third block, and associating said third block with said second plurality of blocks. The present invention is also a method of operating a non-volatile memory device in accordance with the above described steps. | 2010-05-20 |
20100125697 | COMPUTING DEVICE HAVING STORAGE, APPARATUS AND METHOD OF MANAGING STORAGE, AND FILE SYSTEM RECORDED RECORDING MEDIUM - A storage management apparatus and a file system for a storage device are provided. The storage management apparatus allocates a portion of storage for writing a file to the storage, including a table storing unit storing an allocation unit table that includes information of a unit of allocation of the storage according to a file extension of a file to be written. A storage management unit manages the storage based on the allocation unit table. | 2010-05-20 |
20100125698 | RECORDABLE MEMORY DEVICE - A recordable memory device includes a nonvolatile semiconductor memory, and a controller controlling the nonvolatile semiconductor memory based on a recordable system. The nonvolatile semiconductor memory has a user area capable of directly making an access from a host, and a system area managed by the controller. A data writing to the reformatted user area of the nonvolatile semiconductor memory executes from a start point which is an unused area after the final physical address of old recordable data recorded in the user area before the reformat. The data writing executes from a start point which is a top physical address in the user area, when the start point exceeds the final physical address in the user area. | 2010-05-20 |
20100125699 | Flash memory device and reading method thereof - Provided are a flash memory device and a reading method of the flash memory device. A multi-level cell flash memory device includes: a memory cell array comprising main memory cells storing main data, and indicator cells storing indicate data indicating one of a first mode and a second mode in which the main data of the main memory cell, to which the indicate cells correspond, is written; and an output unit outputting in response to a control signal corresponding to the indicate data, one of main data read from the memory cell array and forced data forcing some bit values of the main data to bit values of mode specific data, as reading data. | 2010-05-20 |
20100125700 | DISK DRIVE AND METHOD OF CHANGING A PROGRAM THEREFOR - A method of changing a program for controlling a disk drive that includes an EEPROM. The method includes storing a program block to a disk area such that the program block is associated with a second area for storing the program block that is not utilized for a read operation from the disk area. The method also includes storing a program block that is associated with a first area to an area that includes at least a portion of the second area in the EEPROM such that the first area contained a program block that is utilized for a read operation from the disk area. In addition, the method includes changing the program block in the first area after storing to the second area. Moreover, the method includes storing to the second area the program block that is not utilized for a read operation from the disk area after storing to the first area. | 2010-05-20 |