29th week of 2014 patent applcation highlights part 50 |
Patent application number | Title | Published |
20140201097 | Method and System for Comparing and Advising Individuals and Groups - A system and method for comparing individuals, relationships and partners in a relationship and soliciting relationship advice are provided. It allows for a first user to submit a dating/relationship couple and question(s) through a relationship submission interface. A second user can submit a response to a question about the members of the couple or the couple itself through an answer submission interface. The various submissions are stored and retrieved for users to view the results. | 2014-07-17 |
20140201098 | SYSTEM FOR CANDIDATE AUTHENTICATION AND METHODS THEREOF - Systems and methods for candidate authentication, wherein the system comprises,
| 2014-07-17 |
20140201099 | Continuity of instruction during a socially distancing event - A method wherein live, in-person academic coursework that is cancelled for extended periods due to an exigency, for example a natural disaster, pandemic, or other socially distancing event, can be quickly, efficiently, gracefully, and cost-effectively transitioned into an online environment in order to ensure academic continuity by identifying a triggering event whereby in-person academic coursework is cancelled, initiating an academic continuity process, querying a student information system for data, interfacing this student information system data with a learning management system to populate the learning management system, simultaneously scaling the learning management system utilizing a cloud computing infrastructure, and transitioning the cancelled in-person academic coursework to an online environment. | 2014-07-17 |
20140201100 | CONFIRMATION OF IDENTITY - Among other things, a user of a mobile device who is delivering an ordered product from a store to a customer at a location can confirm that the customer is a proper person to receive the ordered product. | 2014-07-17 |
20140201101 | Method and system for managing a service agreement business - A method and system for managing a service agreement business. First data is received from a first party and second data is received from a second party, wherein the first party and the second party are in a business relationship for providing service according to a service agreement to a customer. The first data and the second data are automatically integrated to generate a combined data pool that is understandable to both the first party and the second party. In response to receiving a request for a report from at least one of the first party, the second party and the customer, a report is generated based on the request and the combined data pool, wherein the request identifies how data of the combined data pool is sorted such that the report facilitates management of the service agreement. | 2014-07-17 |
20140201102 | METHODS AND SYSTEMS FOR AUTOMATIC FORM FILLING AND VALIDATION - The present disclosure discloses a method for filling-out one or more application forms. The method includes receiving an application form, the application form includes one or more fields. The method further includes identifying a type of the application form, and the fields. Further, the method includes detecting a mobile device in a location proximate to a device. Furthermore, the method includes receiving information from the mobile device in a pre-defined format. Moreover, the method includes matching the received information against the one or more fields of the application form. Additionally, the method includes overlaying the received information on the fields of the application form based on the matching. | 2014-07-17 |
20140201103 | SYSTEM FOR RESEARCH AND DEVELOPMENT INFORMATION ASSISTING IN INVESTMENT, AND A METHOD, A COMPUTER PROGRAM, AND A READABLE AND RECORDABLE MEDIA FOR COMPUTER THEREOF - A system for research and development information assisting in investment, and a method, a computer program, and a readable and recordable media for computer thereof are disclosed. The system comprises a processing unit, a database module, an investment analysis subsystem, and an output unit, and provides a method, a computer program or a readable and recordable media for computer. The investment analysis subsystem compares an academic document with a patent document to generate a technical relevancy, providing the user to determine whether a patent document of the target enterprise is forward-looking or whether too many popular patents are owned. Therefore, users can choose to enter the market earlier when the stock price of the enterprise is underestimated or exit earlier before the invested enterprise reduces the turnover and the enterprise value due to a vicious competition and a price reduction strategy of competitors, thereby ensuring investors' profits. | 2014-07-17 |
20140201104 | SYSTEM AND METHOD FOR FACILITATING COLLABORATIVE INVESTMENT BANKING AGREEMENTS - A system and method for facilitating collaborative investment banking agreements is disclosed. In at least one embodiment, a central computing system contains details related to an at least one lead banker, an at least one investment opportunity, and an at least one outside banker with whom the lead banker is desirous of potentially collaborating on the investment opportunity. Each banker is required to separately execute a master subscription agreement setting forth various general terms. The lead banker is then able to create the investment opportunity and present it the outside banker for a potential collaborative investment deal. The lead banker and outside banker are able to negotiate any ancillary terms specific to the investment deal which are not included in the master subscription agreement. Once agreed upon, the parties are legally bound through a third party beneficiary agreement to work the investment deal together and share in the compensation. | 2014-07-17 |
20140201105 | INVESTMENT PORTFOLIO RISK ANALYSIS SYSTEM - A computer-implemented method includes receiving information identifying an investment; receiving information associated with a financial characteristic of the investment; and causing a processor to determine one or more of a range of motion, a portfolio history, an economic value of the tail, an exposure, and points of ruin associated with the investment using the financial characteristic of the investment. The processor can also initiate an alert when one or more conditions are met for the investment based upon the determination of the range of motion, the portfolio history, the economic value of the tail, the exposure, and/or the points of ruin. | 2014-07-17 |
20140201106 | Method and System for Improving Performance of Endowments - A method, system, and computer program product for providing a return on an investment to an endowment that also encourages donations by investing in a vehicles that provide a benefit to the endowed institution. The method includes receiving principal funds from one or more investing entities and receiving data describing an obligation of an endowed institution to pay for goods or services from a supplying entity. The method also includes making a payment to the supplying entity using at least a portion of the principal funds. The method also includes receiving a payment from the endowed institution at a later date for a greater amount than the earlier payment. The payment received from the endowed institution is made at a date later than the payment made to the supplying entity and is an amount that exceeds the payment made to the supplying entity. The method also includes making a payment to an endowment. | 2014-07-17 |
20140201107 | Methods and Apparatus for Improving Factor Risk Model Responsiveness - Construction of factor risk models that better predict the future volatility of returns of a portfolio of securities such as stocks, bonds, or the like is addressed. More specifically, improved factor-factor covariance estimation is made even when the covariances change rapidly over time. Methods and techniques for achieving better accuracy, responsiveness, and stability of factor risk models are addressed. | 2014-07-17 |
20140201108 | METHOD AND APPARATUS FOR CALCULATING A TAX COST DIFFERENCE BETWEEN ACTUAL AND MODEL INVESTMENT PORTFOLIOS - A method and apparatus of a device that computes the total tax cost difference between an actual client portfolio and a model portfolio is described. In an exemplary embodiment, the device receives client data corresponding to the actual portfolio and model data corresponding to the model portfolio. The device further computes the total tax cost difference between the actual portfolio and the model portfolio. To compute the total tax difference, the device computes a plurality of individual tax cost differences during a comparison time period between positions of a plurality of securities in both the actual portfolio and the model portfolio and sums the plurality of individual tax cost differences to give the total tax cost difference. In addition, the device stores the total tax cost difference in storage. | 2014-07-17 |
20140201109 | Energy distribution system and related methods, devices, and systems - Aspects of the disclosure are directed to an autonomous energy distribution network including a plurality of solar tracker devices configured to receive solar energy and transform the solar energy into electrical energy, where each of the solar tracker devices is directly connected to a node in a power distribution grid. The network also includes a node manager configured to receive status information from the solar trackers, where the status information includes information regarding the state of the node to which each of the solar tracker device are directly connected. | 2014-07-17 |
20140201110 | SERVER DEVICE, ELECTRONIC APPARATUS, COMMUNICATION SYSTEM, AND INFORMATION PROCESSING METHOD - A terminal device that is an electronic apparatus communicates with a server device that communicates with a communication device located at one premises. The terminal device receives, based on obtaining the electricity usage quantity by the one premises from a wireless router, information representing the total quantity of electricity usage quantity and the total figure of the electricity rate by the one premises, and the total quantity of electricity usage quantity and the total figure of the electricity rate by another premises over a predetermined term. The terminal device provides a display based on the received total quantity of electricity usage quantity and the total figure of the electricity rate. Accordingly, the user can readily determine whether electricity is used economically as compared to another premises. | 2014-07-17 |
20140201111 | CONFIDENTIALITY CLASSIFICATION OF FILES - A method for confidentiality classification of files includes vectorizing a file to reduce the file to a single structured representation; and analyzing the single structured representation with a machine learning engine that generates a confidentiality classification for the file based on previous training. A system for confidentiality classification of files includes a file vectorization engine to vectorize a file to reduce the file to a single structured representation; and a machine learning engine to receive the single structured representation of the file and generate a confidentiality classification for the file based on previous training. | 2014-07-17 |
20140201112 | ROBOT TEACHING SYSTEM AND ROBOT TEACHING METHOD - This robot teaching system includes a teaching tool including an operation portion operated by a user to specify teaching positions and specifying the teaching positions, a measuring portion measuring positions and postures of the teaching tool, and a control portion determining the teaching positions for a robot. The robot teaching system is configured to specify the teaching positions continuously while the user operates the operation portion of the teaching tool. | 2014-07-17 |
20140201113 | Automatic Genre Determination of Web Content - A mechanism is provided for automatic genre determination of web content. For each type of web content genre, a set of relevant feature types are extracted from collected training material, where genre features and non-genre features are represented by tokens and an integer counts represents a frequency of appearance of the token in both a first type of training material and a second type of training material. In a classification process, fixed length tokens are extracted for relevant features types from different text and structural elements of web content. For each relevant feature type, a corresponding feature probability is calculated. The feature probabilities are combined to an overall genre probability that the web content belongs to a specific trained web content genre. A genre classification result is then output comprising at least one specific trained web content genre to which the web content belongs together with a corresponding genre probability. | 2014-07-17 |
20140201114 | DEVICE OF MANAGING DISTRIBUTED PROCESSING AND METHOD OF MANAGING DISTRIBUTED PROCESSING - Provided is a device of managing distributed processing, including: a selecting unit that estimates a total execution time on the basis of each of distributed-execution patterns indicating a grouping mode for plural computers and corresponding to the number of computers that are in charge of each of processes having different parameters in plural phases, this total execution time being necessary for the plural computers to execute the plural processes in a distributed manner, thereby selecting a distributed-execution pattern that makes the total execution time minimal, from among the distributed-execution patterns. | 2014-07-17 |
20140201115 | DETERMINING SOFTWARE OBJECT RELATIONS USING NEURAL NETWORKS - A system receives runtime information from a plurality of software objects. The software objects include an executable, a modularization unit, and a data dictionary. The system executes a training phase in a software neural network using the runtime information. The software neural network generates a pattern among the executables, modularization units, and data dictionaries using the software neural network such that a particular executable is pattern-matched with one or more modularization units and one or more data dictionaries. | 2014-07-17 |
20140201116 | OPTIMALLY CONFIGURING AN INFORMATION LANDSCAPE - According to an embodiment of the present invention, a system optimizes an information processing environment, and comprises at least one processor. The system collects information pertaining to operational behavior of the information processing environment and including a plurality of parameters. A neural network structure is established to associate the parameters to a desired operational performance characteristic for the information processing environment. The neural network structure is trained with the collected information from the information processing environment to produce a model for the information processing environment. The model is optimized to determine values for the parameters and the information processing environment is adjusted based on the determined parameter values to attain the desired operational performance of the information processing environment. Embodiments of the present invention further include a method and computer program product for optimizing an information processing environment in substantially the same manner described above. | 2014-07-17 |
20140201117 | USING RADIAL BASIS FUNCTION NETWORKS AND HYPER-CUBES FOR EXCURSION CLASSIFICATION IN SEMI-CONDUCTOR PROCESSING EQUIPMENT - A method and system for analysis of data, including creating a first node, determining a first hyper-cube for the first node, determining whether a sample resides within the first hyper-cube. If the sample does not reside within the first hyper-cube, the method includes determining whether the sample resides within a first hyper-sphere, wherein the first hyper-sphere has a radius equal to a diagonal of the first hyper-cube. | 2014-07-17 |
20140201118 | METHOD FOR THE COMPUTER-ASSISTED MODELING OF A TECHNICAL SYSTEM - Disclosed is a method for the computer-assisted modeling of a technical system. One or more output vectors are modeled dependent on one or more input vectors by the learning process of a neural network on the basis of training data of known input vectors and output vectors. Each output vector comprises one or more operating variables of the technical system, and each input vector comprises one or more input variables that influence the operating variable(s). The neural network is a feedforward network with an input layer, a plurality of hidden layers, and an output layer. The output layer comprises a plurality of output clusters, each of which consists of one or more output neurons, the plurality of output clusters corresponding to the plurality of hidden layers. Each output cluster describes the same output vector and is connected to another hidden layer. | 2014-07-17 |
20140201119 | COMPLEX SITUATION ANALYSIS SYSTEM - Systems, methods, and computer-readable media for generating a data set are provided. One method includes generating a data set based on input data using a plurality of brokers. The method further includes receiving a request from a user and determining whether the request can be fulfilled using data currently in the data set. When the request can be fulfilled using data currently in the data set, the data is accessed using broker(s) configured to provide access to data within the data set. When the request cannot be fulfilled using data currently in the data set, at least one new broker is spawned using existing broker(s) and additional data needed to fulfill the request is added to the data set using the new broker. The method further includes generating a response to the request using one or more of the plurality of brokers. | 2014-07-17 |
20140201120 | GENERATING NOTIFICATIONS BASED ON USER BEHAVIOR - In some implementations, a method for determining behavior associated with a user device includes receiving behavior data of the user device that includes multiple types of behavior data. The behavior data is compared with patterns of behavior data associated with the user device. The behavior-data patterns are generated from previously-received behavior data. A notification is generated based on comparing the behavior data to the behavior-data patterns. | 2014-07-17 |
20140201121 | Method for Predicting Future Travel Time Using Geospatial Inference - Future travel times of a target vehicle traveling on a route from a starting point to a destination are predicted by first acquiring, by a probe vehicle, real-time probe data to alternative links from the starting point to the destination. Then, the future travel time for each link is predicted using a set of regression functions. | 2014-07-17 |
20140201122 | ELECTRONIC APPARATUS AND METHOD OF CONTROLLING THE SAME - An electronic apparatus and a method of controlling the same, receives a user's current use state information including at least one of current user information and surrounding environment information, determines a user's current state by comparing the received current use state information with intention pattern information in which a user's intention is patterned and previously stored in association with a plurality of functions or information providable by the electronic apparatus, and automatically proposes a function corresponding to the determined user's state among the plurality of functions or information providable by the electronic apparatus. Thus, a user's intention or needs is determined to actively propose a proper function so that a user can conveniently use the function. | 2014-07-17 |
20140201123 | RULE SWAPPING IN A PACKET NETWORK - In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set. | 2014-07-17 |
20140201124 | PROPERTY REACTIVE MODIFICATIONS IN A RETE NETWORK - A processing device executing a Rete rule engine modifies a particular property of an object that has traversed a Rete network. The processing device associates a first data structure with the object, the first data structure indicating that the particular property of the object has been modified. The processing device then determines whether the particular property is a constraint relevant to a node of the Rete network based on comparing the first data structure to a second data structure associated with the node, wherein the second data structure identifies one or more modifiable properties that are constraints relevant to the node. If the particular property is a constraint relevant to the node, the processing device evaluates the object with the node. If the particular property is not a constraint relevant to the node, the processing device determines not to evaluate the object with the node. | 2014-07-17 |
20140201125 | CONVERSATION MANAGEMENT SYSTEMS - Systems and method for conversation management and opinion tracking systems, whereby a conversation management engine can generate on-line conversations based on rules sets such that the generated conversation and the content submitted by participants conforms to a conversation or debate style. The conversation management engine can further implement curation policies that can curate content presented to a conversation such that the presented conversation fits curation rules of the policies. An opinion tracking engine can identify opinions regarding conversation topics based on the submitted contents and detect differences or changes in opinion. | 2014-07-17 |
20140201126 | Methods and Systems for Applications for Z-numbers - Specification covers new algorithms, methods, and systems for artificial intelligence, soft computing, and deep learning/recognition, e.g., image recognition (e.g., for action, gesture, emotion, expression, biometrics, fingerprint, facial, OCR (text), background, relationship, position, pattern, and object), Big Data analytics, machine learning, training schemes, crowd-sourcing (experts), feature space, clustering, classification, SVM, similarity measures, modified Boltzmann Machines, optimization, search engine, ranking, question-answering system, soft (fuzzy or unsharp) boundaries/impreciseness/ambiguities/fuzziness in language, Natural Language Processing (NLP), Computing-with-Words (CWW), parsing, machine translation, sound and speech recognition, video search and analysis (e.g. tracking), image annotation, geometrical abstraction, image correction, semantic web, context analysis, data reliability, Z-number, Z-Web, Z-factor, rules engine, control system, autonomous vehicle, self-diagnosis and self-repair robots, system diagnosis, medical diagnosis, biomedicine, data mining, event prediction, financial forecasting, economics, risk assessment, e-mail management, database management, indexing and join operation, memory management, data compression, event-centric social network, Image Ad Network. | 2014-07-17 |
20140201127 | TRAVEL PROCESS PREDICTION SYSTEM, TRAVEL PROCESS PREDICTION APPARATUS AND NON-TRANSITORY RECORDING MEDIUM - An information acquiring apparatus acquires, when a travel object such as a traveler travels with transportation, passage time at which the travel object passes through each passage point at a departure/arrival facility, transportation specifying information indicating transportation, situation information indicating a situation and so forth. The travel process prediction apparatus stores the acquired information in an associated manner, and obtains a regression equation representing the relationship between items included in the transportation specifying information or situation information and passage time at a specific passage point, elapsed time while the travel object passes through two specific passage points or a result of comparison between the passage time and boarding completion time. The travel process prediction apparatus calculates a predicted value of future passage time, elapsed time or a result of comparison by substituting the content of the expected transportation specifying information or situation information for the regression equation. | 2014-07-17 |
20140201128 | SYSTEM AND METHOD FOR PROCESSING AND/OR ANALYZING OLAP BASED DATA ACCORDING TO ONE OR MORE PARAMETERS - A system and method for processing a base vector derived from data stored in an OLAP cube. The system comprises a component configured for defining a base vector and a comparison vector, wherein the comparison vector comprises one or more dimensions corresponding to dimensions of the base vector. The system includes a component configured for defining a time scope associated with the base vector. The system further comprises a component configured for performing one or more analysis operations on the comparison vector to generate comparison values and a component configured for rendering the base and comparison vectors. According to another aspect, the system includes a component for altering or modifying individual data cells in the base vector and/or parameters associated with the base vector and/or analysis operation. | 2014-07-17 |
20140201129 | EFFICIENT QUERY PROCESSING USING HISTOGRAMS IN A COLUMNAR DATABASE - A probabilistic data structure is generated for efficient query processing using a histogram for unsorted data in a column of a columnar database. A bucket range size is determined for multiples buckets of a histogram of a column in a columnar database table. In at least some embodiments, the histogram may be a height-balanced histogram. A probabilistic data structure is generated to indicate for which particular buckets in the histogram there is a data value stored in the data block. When an indication of a query directed to the column for select data is received, the probabilistic data structure for each of the data blocks storing data for the column may be examined to determine particular ones of the data blocks which do not need to be read in order to service the query for the select data. | 2014-07-17 |
20140201130 | SYSTEM AND METHOD FOR ASSIGNING DATA TO COLUMNAR STORAGE IN AN ONLINE TRANSACTIONAL SYSTEM - A method, apparatus, and computer program product for assigning data to columnar storage is disclosed. In one aspect of the invention, a computer implemented method is provided comprising analyzing, on one or more computers, a database stored in a storage system accessible from the one or more computers. The method also comprises determining, on one or more computers, one or more database elements from the database to be assigned to a columnar storage in the database and assigning, on one or more computers, the one or more database elements to the columnar storage in the database. The one or more database elements to be assigned to the columnar storage is determined based on at least one of a table dimension, entity relationship, compatibility with a specified schema structure, relational data structure of the database, access statistics of the database element or incoming query workload of the database element. | 2014-07-17 |
20140201131 | TECHNIQUES PERTAINING TO DOCUMENT CREATION - Disclosed are techniques pertaining to the creation of a social document through a collaboration. A server executing a social document management application may create a document comprised of content. The social document management application may also create an adhoc workflow process associated with the document in which the workflow process includes steps to create the content of the document. Collaborators may be assigned to work on the steps of the workflow process. In addition, tasks associated with the steps of the workflow process may be assigned to the collaborators and tracked. The tasks may be assigned by selecting content directly within the document and assigning a task pertaining to the selected content. The steps of the workflow process may then be approved. | 2014-07-17 |
20140201132 | STORING A KEY VALUE TO A DELETED ROW BASED ON KEY RANGE DENSITY - In an embodiment, a first key value is received. A plurality of candidate rows are found in a database table, wherein the plurality of candidate rows are deleted. For the plurality of candidate rows, a plurality of respective impacts on a plurality of respective densities of each of other key values that are stored within a first key range of the first key value are calculated. For the plurality of candidate rows, a plurality of function results of the plurality of respective impacts on the plurality of respective densities are calculated. A selected candidate row of the plurality of candidate rows with a smallest function result of the plurality of function results of the plurality of respective impacts on the plurality of respective densities is selected. The first key value is stored to the selected candidate row. | 2014-07-17 |
20140201133 | PATTERN EXTRACTION APPARATUS AND CONTROL METHOD THEREFOR - A pattern extraction apparatus for extracting a pattern of event occurrence from event time-series data generates an adjacent event graph by fetching adjacent events from the event time-series data, representing each of the adjacent events as a node, connecting the nodes by a directed link having a transition direction between the adjacent events and a weight, representing identical events as a single node, and, if there are a plurality of directed links between identical adjacent events, accumulating weights of the directed links into a single directed link. The pattern extraction apparatus cuts a directed link having an evaluation value smaller than or equal to a predetermined value in the generated adjacent event graph, the expected value being obtained based on the weight of the directed link. | 2014-07-17 |
20140201134 | METHOD AND SYSTEM FOR ESTABLISHING USER NETWORK GROUPS - The method and system for establishing user network groups based on commonality is disclosed. When a registered user logs in to the web-based application system, based on common non-user profile attributes, shortlisted common interest user(s) notifications would be displayed. Registered User can see the notifications and can visit those user profiles. User may add those notified common interest user(s) into his group/network. Thus user network groups can be established based on common non-user profile attributes/parameters in any web-based application system. | 2014-07-17 |
20140201135 | Access Control List (ACL) Generation for Replicated Data - In one embodiment, a method replicates data from a first database system to a second database system. A trigger table associated with the first database system is determined. The trigger table includes information for rows in tables of the first database system relevant to authorizations in the first database system. The method generates an access control list (ACL) report from the trigger table. The ACL report includes information for setting ACL rules for the second database system. An access context is determined for an entity from the ACL report. The method then generates an ACL rule based on the access context to restrict access to the replicated data in the second database system to users associated with the access context. | 2014-07-17 |
20140201136 | Process-Oriented Modeling and Flow to Restrict Access to Objects - In one embodiment, a method replicates data from a first database system to a second database system and determines a modeling of a first access context for a table in the replicated data. An ACL rule based on the first access context is generated to restrict access to the replicated data in the second database system to users associated with the first access context. The method receives a request to access the replicated data from a user and determines a second access context for the user. The first access context for the ACL rule and the second access context for the user are compared to determine whether the user is allowed to access the replicated data. Access to the replicated data is allowed when the second access context and the first access context indicate the user is allowed to access the replicated data. | 2014-07-17 |
20140201137 | LOCATION-BASED DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 2014-07-17 |
20140201138 | FUNCTIONALITIES, FEATURES, AND USER INTERFACE OF A SYNCHRONIZATION CLIENT TO A CLOUD-BASED ENVIRONMENT - Embodiments in the present disclosure include systems and methods related to a synchronization client of a cloud-based collaboration platform that runs on a user device for synchronizing folders and files between a location on the cloud-based collaboration platform and a location on the user device. The synchronization client informs a user of the status of synchronization processes and allows a user to choose various options depending on the informed status. | 2014-07-17 |
20140201139 | CORE DATA SYNCHRONIZATION SYSTEMS AND METHODS - To synchronize data between a remote database and a local object-graph-and-persistence-framework, a synchronization framework receives messages from the local object-graph-and-persistence-framework indicating that a locally-managed object has been retrieved from a local datastore and instantiated or that the locally-managed object has been created, modified, or deleted. When the synchronization framework determines that the message was instigated by a local user's activity (as opposed to a background synchronization process), the synchronization framework synchronizes the locally-managed object with the remote database. | 2014-07-17 |
20140201140 | DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 2014-07-17 |
20140201141 | REQUEST-BASED DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 2014-07-17 |
20140201142 | PARTIAL SHARING OF SECONDARY STORAGE FILES IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can allow users to share a portion of a file (e.g., a document) in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The data storage system according to certain aspects can also provide a native view of secondary storage data on a client computer. The index data and/or metadata relating to secondary storage data may be stored in native format (e.g., format of the application(s) that generated the secondary storage data) so that the secondary storage data can be displayed in a native view. The index data and/or metadata may be synchronized on the client without synchronizing the secondary storage data itself. | 2014-07-17 |
20140201143 | METHOD AND APPARATUS FOR STORING AND RETRIEVING PROFILE DATA FOR ELECTRONIC DEVICES - A method and system for backing up and restoring personal data are provided. The method includes communicating with a first communication device over a first communication connection when the first communication device detects changes to personal data stored in a first communication device; receiving the changed personal data over the first communication connection; performing a backup function by receiving the changed personal data from the first communication device; automatically communicating with a second communication device that is associated with a same user account as a user account associated with the first communication device, over a second communication connection upon performing the backup function; and automatically performing a restore function by transmitting the changed personal data to the second communication device over the second communication connection upon performing the backup function. | 2014-07-17 |
20140201144 | CRITERIA-BASED DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 2014-07-17 |
20140201145 | CONFLICT RESOLUTION, RETRY CONDITION MANAGEMENT, AND HANDLING OF PROBLEM FILES FOR THE SYNCHRONIZATION CLIENT TO A CLOUD-BASED PLATFORM - Embodiments of the present disclosure include systems and methods of conflict resolution, retry condition management and/or handling of problem files in the synchronization architecture of the cloud-based platform. One embodiment of the disclosed technology detects conflicts between incompatible changes made on opposite file systems based on file system sync results when executing a sync event on the file system. In one embodiment, the disclosed technology applies self-healing strategies when unexpected failures occur. For example, if a synchronization action fails repeatedly, an external action (e.g., from user, file system, etc.) can return the system back to a consistent state again. | 2014-07-17 |
20140201146 | COMMAND-BASED DATA MIGRATION - A data migration method includes retrieving data having a first data format that is associated with a first system, and generating at least one logical command that is configured to be interpreted by a migration utility. The logical command is translated to one or more equivalent physical commands that are executable by the second system, and is provided to the second system to recreate the data in accordance with a second data format that is associated with the second system. The command can be provided to the second system for execution thereby to define a system state in the second system that is equivalent to a system state of the first system with respect to the data having the first data format. | 2014-07-17 |
20140201147 | Migration of Feedback Data to Equivalent Digital Assets - Methods and systems for managing for migrating feedback data from one digital asset to another digital asset are disclosed. Typically, the one digital asset is available for distribution from a network-based media distribution system, but then subsequently is removed from distribution for any of a number of reasons. However, since the one digital asset has been in use at the network-based media distribution system, it has accumulated feedback data. Hence, if the another digital asset serves (e.g., due to equivalency) to replace the one digital asset, then the accumulated feedback data from the one digital asset can be transferred to the another digital asset. As a result, the another digital asset can benefit from the feedback data that was previously associated with the one digital assert. | 2014-07-17 |
20140201148 | INFORMATION PROCESSING APPARATUS, METHOD AND MEDIUM - Provided is an information processing apparatus including: a setting unit that sets, for electronic documents, a document ID by which an older version or a newer version can be determined among a plurality of sequential electronic documents; a linking unit that links attachment information to an electronic document; a request accepting unit that accepts a request for an electronic document; an attachment information acquiring unit that, in response to acceptance of the request for the electronic document, acquires the attachment information linked to an electronic document of which version is older than the electronic document related to this request based on the document ID; and a response outputting unit that outputs the electronic document related to the request and the acquired attachment information. | 2014-07-17 |
20140201149 | CONSISTENT BOOKMARK - A request to generate a snapshot of the master file system for replication is received. The master file system is frozen and a freeze callback function is invoked to generate a consistent point in time. The freeze callback function initiates generation of a bookmark event based on a current time. The bookmark event indicates the consistent point in time for generation of the snapshot. The freeze callback function also initiates capturing I/O events intended for the master file system in order and suspending journal flushing to data storage so as to avoid deadlock of the master file system. The freeze callback function is forwarded and used to generate the snapshot by indicating the consistent point in time to start generation of the snapshot. | 2014-07-17 |
20140201150 | SINGLE SNAPSHOT FOR MULTIPLE AGENTS - A data storage system according to certain aspects can share a single snapshot for multiple applications and/or agents. For example, the data storage system can receive snapshot commands from multiple applications and/or agents, and can group them for a single snapshot (e.g., based on time of receipt of the snapshot commands). Data associated with the multiple applications and/or agents may reside on a single LUN or volume. The data storage system can take a single snapshot of the LUN or volume, and generate metadata regarding which portion of the snapshot is related to which application. The single snapshot can be stored in one or more secondary storage devices. The single snapshot may be partitioned into portions relating to different applications and stored separately. | 2014-07-17 |
20140201151 | SYSTEMS AND METHODS TO SELECT FILES FOR RESTORATION FROM BLOCK-LEVEL BACKUP FOR VIRTUAL MACHINES - A data storage system receives a user instruction through a user interface to restore a specific virtual machine file from a block-level backup. The system accesses a file index which is created during the block-level backup by accessing the file allocation table of the underlying host system and associating the blocks with the file location information of the virtual machine files stored in the file allocation table. The system further creates a file level table based at least in part on the virtual machine file information stored in the file index, displays a listing of the virtual machine files from the file level table, and receives a user selected virtual machine file to restore. | 2014-07-17 |
20140201152 | SYSTEMS AND METHODS TO PROCESS BLOCK-LEVEL BACKUP FOR SELECTIVE FILE RESTORATION FOR VIRTUAL MACHINES - A data storage system protects virtual machines using block-level backup operations and restores the data at a file level. The system accesses the virtual machine file information from the file allocation table of the host system underlying the virtualization layer. A file index associates this virtual machine file information with the related protected blocks in a secondary storage device during the block-level backup. Using the file index, the system can identify the specific blocks in the secondary storage device associated with a selected restore file. As a result, file level granularity for restore operations is possible for virtual machine data protected by block-level backup operations without restoring more than the selected file blocks from the block-level backup data. | 2014-07-17 |
20140201153 | PARTIAL FILE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement partial file restore, where only a portion of the secondary copy of a file is restored. Such portion may be designated by one or more application offsets for the file. The system may provide an in-chunk index that includes mapping information between the application offsets and the secondary copy offsets. Chunks may refer to logical data units in which secondary copies are stored, and the in-chunk index for a chunk may be stored in secondary storage with the chunk. Because the mapping information may not be provided at a fixed interval, the system can search through application offsets in the in-chunk index to locate the secondary copy offset corresponding to the portion application offset(s). In this manner, the system may restore the designated portion of the secondary copy in a fast and efficient manner by using the in-chunk index. | 2014-07-17 |
20140201154 | SHARING OF SECONDARY STORAGE DATA - An information management system according to certain aspects allows users to share a portion of a file (e.g., a document) stored in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The system according to certain aspects provides a native view of secondary storage data on a client computing device. The index data and/or metadata relating to secondary storage data may be stored in native application format for access via the native source application. | 2014-07-17 |
20140201155 | PARTIAL FILE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement partial file restore, where only a portion of the secondary copy of a file is restored. Such portion may be designated by one or more application offsets for the file. The system may provide an in-chunk index that includes mapping information between the application offsets and the secondary copy offsets. Chunks may refer to logical data units in which secondary copies are stored, and the in-chunk index for a chunk may be stored in secondary storage with the chunk. Because the mapping information may not be provided at a fixed interval, the system can search through application offsets in the in-chunk index to locate the secondary copy offset corresponding to the portion application offset(s). In this manner, the system may restore the designated portion of the secondary copy in a fast and efficient manner by using the in-chunk index. | 2014-07-17 |
20140201156 | VIRTUAL MACHINE FILE-LEVEL RESTORATION - Disclosed is a method and system for selectively restoring file-level data from a disk image backup. In embodiments, a virtual machine backup may be performed by dividing a virtual machine virtual disk file into a plurality of discrete fixed-sized data blocks sharing a common index file that is stored on a backup medium, such as a hard drive, to form a backup set. The index file is referenced to determine which fixed-sized block contains volume information, such as a partition table, of the backed-up virtual machine file. The individual blocks are processed as a virtual filesystem which is mounted and presented to an access module, which traverses the filesystem and provide access to individual files in the image backup to a client process. The restore files may be delivered to the client in a container file, which may be compressed to increase transfer speed. The container file may include executable instructions for automatically restoring the files to a desired location. | 2014-07-17 |
20140201157 | SYSTEMS AND METHODS FOR RULE-BASED VIRTUAL MACHINE DATA PROTECTION - A data storage system backs up or protects virtual machines. For instance, the system identifies the different virtual machines executing in the system and provides a number of factors that can be used to create a backup policy. The system further creates specific rules for virtual machine backup policies using a user interface with drop down boxes of relevant criteria and Boolean operators. A preview of included virtual machines allows the rule to be refined. Particular virtual machines can be excluded during the preview. The system further dynamically updates the list of virtual machines satisfying the rules at time of backup. | 2014-07-17 |
20140201158 | METHODS FOR PRESERVING GENERATION DATA SET SEQUENCES - Methods for automating the processing of generation data groups as groups prior to data recovery are described. The generation data groups to be recovered may correspond with a data storage volume that has been taken offline or has suffered a hardware failure. Prior to data recovery, a table of data sets associated with the data to be recovered may be created and then sorted based on the base names, creation dates and generation numbers of the data sets. The sorted table may be used to identify a particular sequence of generation data sets associated with a particular generation data group to be recovered. The generation data sets corresponding with the particular generation data group to be restored may be selected based on a catalog status of the particular generation data group and whether the particular generation data group is in a rolled-off or wrapped state. | 2014-07-17 |
20140201159 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 2014-07-17 |
20140201160 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 2014-07-17 |
20140201161 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 2014-07-17 |
20140201162 | SYSTEMS AND METHODS TO RESTORE SELECTED FILES FROM BLOCK-LEVEL BACKUP FOR VIRTUAL MACHINES - A data storage system restores selected virtual machine files from a block-level backup without restoring blocks associated with files other than the selected virtual machine file. The system identifies the one or more blocks associated with a selected file from a file index that is created during the block-level backup of the virtual machine by accessing the file allocation tables of the underlying host system and associating the locations of the blocks with the file information from the file allocation table for the virtual files of the virtual machine. The system further restores the identified blocks without restoring blocks associated with files other than the selected file and/or file version, recreates the selected file from the restored blocks, and presents the restored file to the user. | 2014-07-17 |
20140201163 | HANDLING FILE SYSTEM CORRUPTION - Aspects of the subject matter described herein relate to file system technology. In aspects, a mechanism is described that allows a file system to handle corrupted file system metadata in a way that provides high availability. When corrupted metadata is detected, the corrupted metadata may be deleted while the file system remains online and available to service file input/output operations that involve non-corrupted metadata. | 2014-07-17 |
20140201164 | VALIDATION AND DELIVERY OF DIGITAL ASSETS - Systems and methods for determining ownership of an asset and providing access to alternate versions of the asset are provided. A system and method can include associating a unique identifier with an asset stored in one or more locations, receiving a request for an asset interaction, validating the request using the unique identifier, determining an asset storage location, identifying whether an enhanced version of the asset is available, and granting the request for an asset interaction when the unique identifier is validated and when the asset storage location is a local storage location. In one aspect, the asset interaction can be with an enhanced version of the asset when an enhanced version of the asset is available. | 2014-07-17 |
20140201165 | REWRITING RELATIONAL EXPRESSIONS FOR DIFFERENT TYPE SYSTEMS - A computer determines that the type of one or more of a relational operator and operands of a relational expression originated in a first type system, and determines the sign of at least one of the operands. The computer rewrites the relational expression based on the sign of at least one of the operands, sends the rewritten relational expression for evaluation in a second type system, and receives the evaluated rewritten relational expression after evaluation in the second type system. The computer can rewrite the relational expression by generating a group of terms joined disjunctively, as well as by generating a group of conjunctive terms joined disjunctively. | 2014-07-17 |
20140201166 | REWRITING RELATIONAL EXPRESSIONS FOR DIFFERENT TYPE SYSTEMS - A computer determines that the type of one or more of a relational operator and operands of a relational expression originated in a first type system, and determines the sign of at least one of the operands. The computer rewrites the relational expression based on the sign of at least one of the operands, sends the rewritten relational expression for evaluation in a second type system, and receives the evaluated rewritten relational expression after evaluation in the second type system. The computer can rewrite the relational expression by generating a group of terms joined disjunctively, as well as by generating a group of conjunctive terms joined disjunctively. | 2014-07-17 |
20140201167 | SYSTEMS AND METHODS FOR FILE SYSTEM MANAGEMENT - A method may include in response to receiving a command to delete data on a storage resource, determining, whether a storage unit has an area to delete responsive to the command that is not aligned with boundaries of the storage unit. The method may also include in response to determining that the storage unit has an area to delete responsive to the command that is unaligned with boundaries of the storage unit, determining whether the entire storage unit, other than the area to delete responsive to the command that is unaligned with boundaries of the storage unit, is marked for unmapping. The method may further include in response to determining that the entire storage unit, other than the area to delete responsive to the command that is unaligned with boundaries of the storage unit, is marked for unmapping, unmapping the storage unit from a logical-to-physical map for the storage resource. | 2014-07-17 |
20140201168 | DEDUPLICATION IN AN EXTENT-BASED ARCHITECTURE - A request is received to remove duplicate data. A log data container associated with a storage volume in a storage server is accessed. The log data container includes a plurality of entries. Each entry is identified by an extent identifier in a data structures stored in a volume associated with the storage server. For each entry in the log data container, a determination is made if the entry matches another entry in the log data container. If the entry matches another entry in the log data container, a determination is made of a donor extent and a recipient extent. If an external reference count associated with the recipient extent equals a first predetermined value, block sharing is performed for the donor extent and the recipient extent. A determination is made if the reference count of the donor extent equals a second predetermined value. If the reference count of the donor extent equals the second predetermined value, the donor extent is freed. | 2014-07-17 |
20140201169 | DATA PROCESSING METHOD AND APPARATUS IN CLUSTER SYSTEM - In embodiments of the present invention, when a duplicate data query is performed on a received data stream, a first physical node which corresponds to each first sketch value and is in a cluster system is identified according to a first sketch value representing the data stream, and then the first sketch value representing the data stream is sent to the identified physical node for the duplicate data query, and a procedure of the duplicate data query does not change with an increase of the number of nodes in the cluster system; therefore, a calculation amount of each node does not increase with an increase of the number of nodes in the cluster system. | 2014-07-17 |
20140201170 | HIGH AVAILABILITY DISTRIBUTED DEDUPLICATED STORAGE SYSTEM - A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable. | 2014-07-17 |
20140201171 | HIGH AVAILABILITY DISTRIBUTED DEDUPLICATED STORAGE SYSTEM - A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable. | 2014-07-17 |
20140201172 | Using Flow Space Alignment to Distinguish Duplicate Reads - Systems and method for identifying duplicate reads can receive first and second reads, determine if the first and second reads have a same start and end position, determine a binary flow difference, and identify the second read as a duplicate of the first read when the binary flow difference exceeds a threshold. | 2014-07-17 |
20140201173 | FILE-BASED SOCIAL RECOMMENDATIONS IN A SOCIAL NETWORK - Example embodiments relate to file-based social recommendations. In example embodiments, a system may search a social network to identify uploaded files that are similar to a file from a user and then identify unconnected users that uploaded the uploaded files, where the unconnected users are not connected to the user in the social network. In response to identifying the unconnected users, the system may then communicate a user recommendation that at least one unconnected users be added to the social context. | 2014-07-17 |
20140201174 | ENCODING AND DECODING DELTA VALUES - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for encoding and decoding delta values. In one aspect, a method includes accessing a compression buffer having a start position, a sentinel position, and a data storage region; obtaining a first value; determining that a second value stored in the sentinel position does not match a first sentinel value; determining that a third value stored in the start position matches a second sentinel value; and storing the first value at the start position of the compression buffer. | 2014-07-17 |
20140201175 | STORAGE APPARATUS AND DATA COMPRESSION METHOD - A storage apparatus includes a data storage unit, management information storage unit, compression judgment unit, and compression control unit. The data storage unit stores the data of files. The management information storage unit stores management information on the files. The compression judgment unit evaluates compression effectiveness for a file at prescribed execution timing and determines whether the compression of the file is appropriate or not. The compression control unit updates the management information so as to reflect the determination result obtained by the compression judgment unit, and then stores the compressed data of the file in a compressed format in the data storage unit if the determination result indicates that the compression is appropriate, and stores the uncompressed data of the file in an uncompressed format in the data storage unit if the determination result indicates the compression is inappropriate. | 2014-07-17 |
20140201176 | FILE SYSTEM WITH PER-FILE SELECTABLE INTEGRITY - A file system uses data integrity techniques that are a selectable attribute of a file system object. Some file system objects have integrity on for various accesses, while other file system objects do not. Different default settings can be provided for different file system objects. Such a setting for a file system object can be changed to and from having integrity on. Given a file system object with an attribute, the file system provides file system operations for which the data integrity operation used on the file system object depends on this attribute. Such operations include, but are not limited to, operations for changing the attribute, creating file system objects with such attributes, providing and changing default settings for such attributes, and writing data to and reading data from files, which use different data integrity techniques based on this attribute. | 2014-07-17 |
20140201177 | ACCESSING A FILE SYSTEM USING A HARD LINK MAPPED TO A FILE HANDLE - A server computer system receives a request for access to an object in a file system. The object is a file or a directory. The server computer system identifies an object handle in the request. The object handle is an identifier of the object. The server computer system identifies an object link that is associated with the object handle. The object link is a hard link to the file or a relative symbolic link to the directory. The server computer system accesses the object using the object link that is associated with the object handle. | 2014-07-17 |
20140201178 | GENERATION OF RELATED CONTENT FOR SOCIAL MEDIA POSTS - Architecture presents in a display related content in association with (an annotation) a social media post, as derived from post information of the social media post itself. The related content can be presented in the user interface proximate the social media post or elsewhere in the user interface. The related content can be presented as search engine queries, images, videos, and/or links to related websites. More specifically, the disclosed architecture facilitates the automated annotation of a social media post with related content derived from: post information such as a URL (uniform resource locator) referred to in the social media post, post information such as the text, image(s), and/or video content in a social media post itself, and post information such as content linked-to by a URL referred to in a social media post. | 2014-07-17 |
20140201179 | INDEXING APPLICATION PAGES OF NATIVE APPLICATIONS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for indexing application pages of native applications that operate independent of a browser application on a user device. In one aspect, a method includes instantiating a virtual machine emulating an operating system of a user device; instantiating, within the virtual machine, a native application that generates application pages for display on a user device within the native application; accessing, within the virtual machine, application pages of the native application, and for each of the application pages: generating application page data describing content of the application page, the content described by the application page data including text that a user device displays on the application page when the user device displays the application page; and indexing the application page data for the native application in an index that is searchable by a search engine. | 2014-07-17 |
20140201180 | Intelligent Supplemental Search Engine Optimization - In accordance with one embodiment, an intelligent supplemental search engine optimization tool may generate keywords relating to content based on additional content collected from one or more data sources, wherein the data sources are selected based on initial input relating to the initial content. Data sources may include one or more third-party resources. A variety of processes may be employed to recommend keywords, including frequency-based and probabilistic-based recommendation processes. | 2014-07-17 |
20140201181 | SELECTING AND PRESENTING CONTENT RELEVANT TO USER INPUT - Methods, systems, and apparatus, including computer programs encoded on computer storage media are provided. An example method includes receiving user input in a control, for example, one associated with a search engine. The user input includes a series of input characters that when completed would form a completed user request. The method further includes, while receiving the user input, evaluating the characters to identify completions for the completed request. The method further includes identifying, by one or more processors, a content item associated with the one or more completions and identifying display data associated with the content item for transmission to the user along with one or more completions in response to receiving the user input. | 2014-07-17 |
20140201182 | MOBILE COMMUNICATIONS DEVICE WITH ELECTRONIC NOSE - Systems and methods for a mobile electronic system that gathers and analyzes odors, airborne chemicals and/or compounds. A signature or representation of the odors, airborne chemicals and/or compounds can be generated. Extrinsic data associated with the odors, airborne chemicals and/or compounds or capturing the odors, airborne chemicals and/or compounds can be identified. A model can be generated based on the representation and the extrinsic data. Filters can be generated based on the extrinsic data. The model can be searched for candidate matches, solutions, or other results based on the representation and the filters. Results can be generated based on the search and candidate matches. | 2014-07-17 |
20140201183 | Personalized Content Delivery System and Method - A system and method are provided to deliver personalized content to a user. The system includes a memory for storing computer executable instructions and a processing unit for accessing the memory and executing the computer executable instructions. The computer executable instructions include an engine to apply content extraction rules based on at least one pre-determined delivery schedule to extract content of interest pointed to by links in user-selected sections of at least one content portal of at least one web page regardless of changes in the links in the at least one content portal. The computer executable instructions also include a module to compose the extracted content in a layout format to provide personalized content. The system includes computer executable instructions to deliver the personalized content to at least one pre-determined destination according to the at least one pre-determined delivery schedule. | 2014-07-17 |
20140201184 | SEARCH ENGINE AND METHOD FOR PERFORMING A SEARCH FOR OBJECTS THAT CORRESPOND TO A SEARCH REQUEST - A search engine for finding objects that correspond to a search request, including an input module for receiving a keyword query from a user, and a search module being configured to map the keyword query to the identifiers of objects that semantically match the keyword or the plurality of keywords contained in the keyword query, and to generate a search result that contains a listing of matching object identifiers, is characterized in that the search module is further configured to generate the search result by considering network layer information about the user within the process of mapping the keyword query to identifiers of matching objects, wherein the network layer information include sophisticated information the search module receives from a dedicated entity. | 2014-07-17 |
20140201185 | HYBRID METHOD OF BUILDING TOPIC ONTOLOGIES FOR PUBLISHER AND MARKETER CONTENT AND AD RECOMMENDATIONS - Systems and methods are discussed to automatically create a domain ontology that is a combination of ontologies. Some embodiments include systems and methods for developing a combined ontology for a website that includes extracting collocations for each webpage within the website, creating first and second ontologies from the collocations, and then aggregating the ontologies into a combined ontology. Some embodiments of the invention include unique ways to calculate collocations, to develop a smaller yet meaningful document sample from a large sample, to determine webpages of interest to users interacting with a website, and to determine topics of interest of users interacting with a website. Various other embodiments of the invention are disclosed. | 2014-07-17 |
20140201186 | SYSTEM AND METHOD FOR PROVIDING EXTENDING SEARCHES - The present invention generally relates to computer and web-based contact searches. Specifically, this invention relates to systems and methods for extending contact searches to include contacts beyond those of the user initiating the search. Embodiments of the present invention allow users to search for indirect contacts beyond their direct contacts by providing the user results that include the contacts of their contacts and so on to a specified depth level and restricted by security implementations selectable by the indirect contacts. | 2014-07-17 |
20140201187 | System and Method of Search Indexes Using Key-Value Attributes to Searchable Metadata - Systems, methods, and computer program products for searching objects, metadata associated with the objects, and attributes assigned to or associated with the metadata. Referring to herein as metadata for the metadata, these attributes may be associated with one or more metadata field values of a metadata field name which, in turn, may be associated with an object being or already indexed in a search index of a search system. Each attribute may be optional, dynamically created, indexed, and searchable via the search index. There can be multiple attributes associated with the same metadata field value, each being represented as a key-value pair. This metadata for the metadata approach can be highly efficient. For example, the ability to search multiple attributes associated with the same metadata field can eliminate the potential need to create multiple metadata fields for the same value in different languages, countries, etc. | 2014-07-17 |
20140201188 | SYSTEM AND METHOD FOR SEARCH DISCOVERY - A search system as disclosed analyzes a file name to identify any potential tokens or words that might be relevant, and creates supplementary information for the file name. The supplementary information is indexed and searchable, thereby significantly improving the ability of a search engine to discover and return successful search hits. | 2014-07-17 |
20140201189 | SYSTEM AND METHOD FOR EXECUTING QUERIES - There is provided a computer-implemented method of executing a query plan against a database. An exemplary method comprises accessing a first subset of rows of a database table using a direct access method for an index. The query plan may comprise the direct access method. The exemplary method also comprises determining a processing cost of accessing the first subset of rows. The exemplary method further comprises modifying the direct access method for the index in response to determining that the processing cost exceeds a specified threshold. Additionally, the exemplary method comprises accessing a second subset of rows of the database table using the modified direct access method. | 2014-07-17 |
20140201190 | Method and system to provide composite view of components - Systems and methods for defining a composite view and using the definition of the composite view to obtain, aggregate, analyze, and present data from a variety of data sources to a user. These systems and methods may allow for the definition of a visual framework to aggregate and display related data. This visual framework, or composite view, may in turn be composed of a master view and a set of subviews, each of which may display data collected from a particular data source according to a particular format. By interacting with the master view data from a variety of data sources can be displayed. | 2014-07-17 |
20140201191 | METHOD AND SYSTEM FOR INTERACTIVE GEOMETRIC REPRESENTATIONS, CONFIGURATION AND CONTROL OF DATA - In one exemplary embodiment, a computer-implemented method includes obtaining a data set from a data source. The data set is prepared for an analysis operation according to a problem type. A result is generated from an interactive geometric node based a geometric property of the data set. A specified condition is determined with the result from the interactive geometric node based on a query to the interactive geometric node. A system's geometric configuration is determined. A geometric control criterion is determined. | 2014-07-17 |
20140201192 | AUTOMATIC DATA INDEX ESTABLISHMENT METHOD - An automatic data index establishment method includes the steps of comparing a data index existed in at least one table when a database inquires at least one query to obtain the data index correspondingly and directly uses the data index to search related data. If the query has no corresponding data index, a Where Condition field, a Sorting field and a Group By field of the query are recorded and integrated to automatically generate the newly established data index and fill the data index into the table correspondingly. Therefore, the database has intelligent functions with automatic analysis to automatically generate, update, and delete the data index, so as to achieve the effects of enhancing the accuracy and execution efficiency of the data management and reducing the manpower of data managers effectively. | 2014-07-17 |
20140201193 | INTELLECTUAL PROPERTY ASSET INFORMATION RETRIEVAL SYSTEM - An approach for automatically retrieving information corresponding to intellectual property (IP) assets in a networked computing environment is provided. In general, a user will submit search input (e.g., keywords, patent numbers, etc.), that is used to search an intellectual property databases (e.g., USPTO) to generate a set of matching results. IP identifier information will then be extracted from the set of results and matched against a set of tables containing deterministic (e.g., legal/litigation) information corresponding to a set of IP assets (e.g., patents, trademarks, copyrights, etc.). Any deterministic information corresponding to IP assets that match the IP identifier information extracted from the set of results may then be outputted for the user. Thus, the user may see any deterministic information that corresponds to an IP asset in which the user may be interested. | 2014-07-17 |
20140201194 | SYSTEMS AND METHODS FOR SEARCHING DATA STRUCTURES OF A DATABASE - Method and systems may be used to provide search results in response to plain language queries from a database. A search query may be received and a database may be queried. A metadata search of the database data structures may be performed to determine a search set based on the search query. Using the search set, a data search may be performed to determine the database data structures for a result set. Result data structures may be generated based on the result set. The result data structures may be iteratively provided to a client to display the search results responsive to the search query quickly. The relevant data may be retrieved from the database in response to a selection. In some instances, the results retrieved from the database in response to a selection of a result data structure may be limited based on a count parameter. | 2014-07-17 |
20140201195 | UNIFIED SEARCHABLE STORAGE FOR RESOURCE-CONSTRAINED AND OTHER DEVICES - The present disclosure describes a data indexing and search service that resides locally on a computing device (e.g., a mobile phone) and that can host data for multiple applications on the device. By centralizing the storage of data as well as the search and query functions, unified search queries can be performed by the service. | 2014-07-17 |
20140201196 | ENABLING BUSINESS INTELLIGENCE APPLICATIONS TO QUERY SEMANTIC MODELS - Provided are a computer implemented method, computer program product, and system for generating a combined report. One or more queries are constructed using a Business Intelligence (BI) metadata model and one or more query declarations. The one or more queries are executed on a semantic model to obtain one or more semantic result sets. One or more data source result sets are received from one or more data sources. The one or more semantic result sets and the one or more data source result sets are combined to construct one or more combined result sets. The one or more combined result sets are rendered to form a combined report. | 2014-07-17 |