35th week of 2015 patent applcation highlights part 46 |
Patent application number | Title | Published |
20150242295 | TESTING USING COUPLING EMULATION - An apparatus and method associated with testing are disclosed, where a coupling between a device under test and at least one further device may be emulated. The coupling may be a bus. | 2015-08-27 |
20150242296 | ANALYZING BEHAVIOR OF A DEVICE UNDER TEST - A method of analyzing behavior of a device under test includes obtaining event traces that include a current sequence trace and a reference sequence trace. The event traces include one or more transactions that include one or more properties. A list of relevant properties of one or more transactions is obtained. A first set of n-tuples including values of the relevant properties for the current sequence trace is extracted. A second set of n-tuples including values of the relevant properties for the reference sequence trace is extracted. The first set of n-tuples is compared with the second set of n-tuples to indicate one or more transaction indices corresponding to differences in transactions between the current sequence trace and the reference sequence trace. Transactions corresponding to the transaction indices are annotated to obtain annotated transactions. The current sequence trace and/or the reference sequence trace are displayed with the annotated transactions. | 2015-08-27 |
20150242297 | METHOD AND SYSTEM FOR TESTING OF APPLICATIONS IN ASSET MANAGEMENT SOFTWARE - A method for testing asset management software applications includes: interfacing a user computing device with a computing server, the server being configured to execute an asset management application program; displaying, on the user computing device, a user interface configured to enable a user to perform functions associated with the asset management application program; recording a plurality of user input actions using the interface; generating a program script configured to, upon execution by the computing server, automate performance of each of the recorded plurality of user input actions; executing at least one instance of the generated program script; and measuring one or more performance metrics associated with performance of the computing server during execution of the at least one instance of the generated program script. | 2015-08-27 |
20150242298 | SALVAGING HARDWARE TRANSACTIONS - A transactional memory system salvages a partially executed hardware transaction. A processor of the transactional memory system determines information about an about-to-fail handler for transactional execution of a code region of a hardware transaction. The processor saves state information of the hardware transaction, the state information usable to determine whether the hardware transaction is to be salvaged or to be aborted. The processor detects an about-to-fail condition during the transactional execution of the hardware transaction. The processor, based on the detecting, executes the about-to-fail handler using the information about the about-to-fail handler, the about-to-fail handler determining whether the hardware transaction is to be salvaged or to be aborted. | 2015-08-27 |
20150242299 | Computer Implemented System and Method to Non-Intrusive Sensing and Instrumentation of Work Processes - A method(s) and system(s) provide a non-intrusive sensing and instrumentation of work processes performed in computing environment. The method includes providing a pre-defined collection of work processes covering the entire activities to be performed by the end user on the IT system. Each of the process steps of the work processes are assigned with a meta-data. The method further includes obtaining a plurality of measures for each of the process step and obtaining task performance metrics by analyzing the plurality of measures. Furthermore, the method includes collecting a set of actions being performed by the user on the IT system. The method further includes identifying the work processes performed by the user and subsequently, identifying the task performance measures of the user by comparing the identified work processes with the task performance metrics. | 2015-08-27 |
20150242300 | DIGITAL DEVICE AND METHOD - A digital device comprising a functional unit, a real-time performance information unit, and a monitoring unit is described. The real-time performance information unit provides real-time performance information about the functional unit. The real-time performance information unit enables the local host device to retrieve the real-time performance information from the real-time performance information unit. The monitoring unit retrieves the real-time performance information from the real-time performance information unit. The monitoring unit has a network interface for connecting to a network. The monitoring unit is arranged to upload the real-time performance information to the network via the network interface. A method of operating the digital device is also described. | 2015-08-27 |
20150242301 | METHOD AND SYSTEM FOR OBTAINING RUN-TIME INFORMATION ASSOCIATED WITH EXECUTING AN EXECUTABLE - A method of obtaining run-time information associated with executing an executable is described. The method comprises receiving an external database comprising one or more external debugging information entries, retrieving the one or more external debugging information entries from the external database and storing the one or more external debugging information entries retrieved from the external database in a debugging information entries collection. The method further comprises providing the debugging information entries collection to a debugging information consumer, and obtaining the run-time information from letting the debugging information consumer retrieve run-time values and format the run-time values according to the external debugging information entries in the debugging information entries collection. | 2015-08-27 |
20150242302 | PROACTIVE RISK ANALYSIS AND GOVERNANCE OF UPGRADE PROCESS - An incompatible software level of an information technology infrastructure component is determined by comparing collected inventory information to a minimum recommended software level. If a knowledge base search finds that the incompatible software level is associated with a prior infrastructure outage event, an outage count score is determined for the incompatible software level by applying an outage rule to a historic count of outages caused by a similar incompatible software level, and combined with an average outage severity score assigned to the incompatible software level based on a level of severity of an actual historic failure of the component within a context of the infrastructure to generate a normalized historical affinity risk score. The normalized historical affinity risk score is provided for prioritizing the correction of the incompatible software level in the context of other normalized historical risk level scores of other determined incompatible software levels. | 2015-08-27 |
20150242303 | USER INTERACTION ANALYSIS OF TRACER DATA FOR CONFIGURING AN APPLICATION TRACER - A tracing system may be updated to include, exclude, or modify tracing configurations for functions based on how a user consumes tracing results. The user's interactions with graphical representations, inspections of data, and other interactions may indicate which functions may be interesting and which functions may not be. The user's interactions may be classified by use, such as during debugging, performance testing, and ongoing monitoring, and multiple user's interactions with the same function, library, module, source code file, or other groups of functions may be combined to predict a user's interest in a function. | 2015-08-27 |
20150242304 | COLLABORATIVE COMPUTER AIDED TEST PLAN GENERATION - Arrangements described herein relate to generation of test plans. A list of test case selection criteria can be presented to each of a plurality of stakeholders. At least one user input is received from each of the plurality of stakeholders selecting at least one test case selection criterion from the list of test case selection criteria and, for each selected test case selection criterion, assigning a criterion priority. Test cases, which correspond to the selected test case selection criteria, can be automatically selected to include in a candidate test plan. A candidate priority can be automatically assigned to each test case selected to be included in the candidate test plan. The processor selects the test cases to include in the candidate test plan and assigns the candidate priorities to the selected test cases based on processing the criterion priorities assigned to the selected test case selection criteria by the stakeholders. | 2015-08-27 |
20150242305 | COLLABORATIVE COMPUTER AIDED TEST PLAN GENERATION - Arrangements described herein relate to generation of test plans. A list of test case selection criteria can be presented to each of a plurality of stakeholders. At least one user input is received from each of the plurality of stakeholders selecting at least one test case selection criterion from the list of test case selection criteria and, for each selected test case selection criterion, assigning a criterion priority. Test cases, which correspond to the selected test case selection criteria, can be automatically selected to include in a candidate test plan. A candidate priority can be automatically assigned to each test case selected to be included in the candidate test plan. The processor selects the test cases to include in the candidate test plan and assigns the candidate priorities to the selected test cases based on processing the criterion priorities assigned to the selected test case selection criteria by the stakeholders. | 2015-08-27 |
20150242306 | SYSTEM AND METHOD FOR CREATING CHANGE-RESILIENT SCRIPTS - A method for creating agnostic test automation script commands associated with a specified action and a user interface (UI) is provided. The method may include receiving a target element associated with the specified action. The method may also generate at least one anchor uniquely identifying the target element, wherein the target element is ambiguous. The method may further include generating an agnostic test automation script command based on the received target element and the at least one generated anchor. Additionally, the method may analyze, using the generated agnostic test automation script command, the at least one generated anchor to locate the target element within the user interface (UI), wherein the analyzing is based on an application on which the agnostic test automation script command is to be executed. The method may also include performing, using the generated agnostic test automation script command, the specified action on the located target element. | 2015-08-27 |
20150242307 | SUPPORTING ATOMIC ACCUMULATION WITH AN ADDRESSABLE ACCUMULATOR - Atomically accumulating memory updates in a computer system configured with an accumulator that is memory mapped. The accumulator includes an accumulator memory and an accumulator queue and is configured to communicatively couple to a processor. Included is receiving from the processor, by the accumulator, an accumulation request. The accumulation request includes an accumulation operation identifier and data. Based on determining, by the accumulator, that the accumulator can immediately process the request, immediately processing the request. Processing the request includes atomically updating a value in the accumulator memory, by the accumulator, based on the operation identifier and data of the accumulation request. Based on determining, by the accumulator, that the accumulator is actively processing another accumulation request, queuing, by the accumulator, the accumulation request for later processing. Further included is signaling the processor, by the accumulator, the completion of the accumulation request. | 2015-08-27 |
20150242308 | ACCELERATION SYSTEM IN 3D DIE-STACKED DRAM - Provided is a memory device including a logic layer including at least one of a peripheral device, an interface, and a built-in self-test (BIST) module and a reconfigurable accelerator (RA), and at least one data layer to store data, wherein the RA is positioned in a vacant space of the logic layer and processes at least a portion of a task processed by the memory device. | 2015-08-27 |
20150242309 | SYSTEMS AND METHODS FOR STORAGE COMPRESSION - A compression manager generates a reduced-size data set for a page. The reduced-size data set is stored on a storage medium by a storage module, and unused portions of the page are identified and/or recorded by the storage module. The reduced-size data set may be generated by compressing the page. The reduced-size data set may be written in response to a request from a client, which provides a message that identifies the unused portion(s) of the page. The page may be stored in a file, and the unused portion may correspond to empty portion(s) within the file. The storage module may maintain an index to map the page to the reduced-size data set, such that portions of the page are unmapped. The storage capacity used by the page may correspond to the mapped portion of the page, and exclude portion(s) of the page that are unmapped. | 2015-08-27 |
20150242310 | Data Accessing Method And Data Accessing Apparatus - A data accessing method and a data accessing apparatus are provided. The method includes acquiring a size of a minimum access unit of a storage device; reading first data to be written into the storage device; determining whether a size of the first data is equal to an integer multiple of the size of the minimum access unit; and if the size of the first data is equal to an integer multiple of the size of the minimum access unit, storing the first data into the integer multiple of the minimum access unit in alignment; otherwise, adding padding data to the first data such that the size of the first data is equal to the integer multiple of the size of the minimum access unit, and storing the first data into the integer multiple of the minimum access unit in alignment. | 2015-08-27 |
20150242311 | HYBRID DRAM-SSD MEMORY SYSTEM FOR A DISTRIBUTED DATABASE NODE - In one exemplary aspect, a method includes building a data index from a set of data from a client application in a distributed database system. The data index is optimized for operation in a DRAM data-storage device, and wherein the data index is built to use a set of fix-sized blocks that fit a DRAM device block size. The data index is maintained in the DRAM data-storage device. An SSD data-storage device is used to persistently store the data referenced by the data index in the DRAM data-storage device, and wherein the data and the metadata ate stored in the SSD data-storage device in a log-based format. | 2015-08-27 |
20150242312 | METHOD OF MANAGING MEMORY, COMPUTER, AND RECORDING MEDIUM - A memory use amount used by each object can be calculated for each of a plurality of pieces of generator property information that is information related to generation of data such as user information and request information. A computer for executing a program to generate data executes a step of specifying, from a storage device in which the plurality of pieces of generator property information on the data and identification information that the data has are associated and held, data corresponding to each piece of the generator property information and calculating a memory use amount of the specified data, and a step of outputting the calculated memory use amount to an interface. Further, a data structure of the data has a control area for storing information on control of the data and a data area, and the computer inserts the identification information into the data area. | 2015-08-27 |
20150242313 | FLASH-DRAM HYBRID MEMORY MODULE - A memory module that is couplable to a memory controller hub (MCH) of a host system includes a non-volatile memory subsystem, a data manager coupled to the non-volatile memory subsystem, a volatile memory subsystem coupled to the data manager and operable to exchange data with the non-volatile memory subsystem by way of the data manager, and a controller operable to receive read/write commands from the MCH and to direct transfer of data between any two or more of the MCH, the volatile memory subsystem, and the non-volatile memory subsystem based on the commands. | 2015-08-27 |
20150242314 | MOTION PROCESSING MEMORY ARCHITECTURE - Methods, apparatuses and systems sensed signal processing are disclosed. One apparatus includes a plurality of sensors, code space ROM (read only memory), code space RAM, and data space RAM (random access memory), wherein the data space RAM comprises a reconfigurable pointer table for maintaining a pointer address to instructions of one or more sensor data processing functions within the code space ROM and code space RAM. The apparatus further includes a processor, where the processor operative to receive sensor data from the plurality of sensors, retrieve the one or more sensor data processing functions from the code space ROM and code space RAM as pointed to by the reconfigurable pointer table, and perform processing of the sensor data using the retrieved one or more sensor data processing functions. | 2015-08-27 |
20150242315 | METHD AND APPARATUS FOR CONTENT DERIVED DATA PLACEMENT IN MEMORY - Apparatus and method for placing data based on the content of the data in random access memory such that indexing operations are not required. A strong (e.g., cryptographic) hash is applied to a data element resulting in a signature. A weaker hash function is then applied to the signature to generate a storage location in memory for the data element. The weaker hash function assigns multiple data elements to the same storage location while the signature comprises a unique identifier for locating a particular data element at this location. In one embodiment a plurality of weak hash functions are applied successively to increase storage space utilization. In other embodiments, the assigned storage location can be determined by one or more attributes of the data element and/or the storage technology, e.g, long-lived versus short-lived data and/or different regions of the memory having different performance (e.g., access latency memory lifetime) characteristics. | 2015-08-27 |
20150242316 | ASYNCHRONOUS CLEANUP AFTER A PEER-TO-PEER REMOTE COPY (PPRC) TERMINATE RELATIONSHIP OPERATION - For asynchronous cleanup after a peer-to-peer remote copy (PPRC) terminate relationship operation in a computing storage environment by a processor device, asynchronously cleaning up a plurality of PPRC modified sectors bitmaps using a PPRC terminate-relationship cleanup operation by throttling a number of tasks performing the PPRC terminate-relationship cleanup operation while releasing a plurality of bind segments until completion of the PPRC terminate-relationship cleanup operation. | 2015-08-27 |
20150242317 | MULTI-CORE PROCESSOR SYSTEM, CONTROL PROGRAM, AND CONTROL METHOD - A multi-core processor system includes a memory unit that for each input destination thread defined as a thread to which given data is input, stores identification information of an assignment destination core for the input destination thread; and a multi-core processor that is configured to update, in the memory unit and when assignment of the input destination thread to a multi-core processor is detected, the identification information of the assignment destination core for the input destination thread; detect a writing request for the given data; identify based on the given data for which the writing request is detected, the updated identification information among information stored in the memory unit; and store the given data to a memory of the assignment destination core that is indicated in the updated identification information and among cores making up the multi-core processor. | 2015-08-27 |
20150242318 | SYSTEM AND A METHOD FOR DATA PROCESSING WITH MANAGEMENT OF A CACHE CONSISTENCY IN A NETWORK OF PROCESSORS WITH CACHE MEMORIES - A system for data processing with management of a cache consistency in a network of processors including cache memories, the network including plural nodes for access to a main memory interconnected with one another, a set of directories being distributed between nodes of the network, each directory including a table of correspondence between cache lines and information fields on the cache lines. The system includes a first sub-network for interconnection of the nodes with one another, implementing a first message transmission protocol providing read/write access to the directories during any passage in the corresponding nodes of a message passing through the first sub-network, and a second sub-network for interconnection of the nodes with one another, implementing a second message transmission protocol, the second protocol excluding any read/write access to the directories during any passage in the corresponding nodes of a message passing through the second sub-network. | 2015-08-27 |
20150242319 | INVALIDATING STORED ADDRESS TRANSLATIONS - A data processing apparatus and a method of processing data are disclosed, in which address translations between first addresses used in a first addressing system and second addresses used in a second addressing system are locally stored. Each stored address translation is stored with a corresponding identifier. In response to an invalidation command to perform an invalidation process on a selected stored address translation the selected stored address translation is invalidated, wherein the selected stored address translation is identified in the invalidation command by a specified first address and a specified identifier. The invalidation process is further configured by identifier grouping information which associates more than one identifier together as a group of identifiers, and the invalidation process is applied to all stored address translations which match the specified first address and which match any identifier in the group of identifiers to which the specified identifier belongs. | 2015-08-27 |
20150242320 | SYNCHRONIZING ACCESS TO DATA IN SHARED MEMORY - In some embodiments, in response to execution of a load-reserve instruction that binds to a load target address held in a store-through upper level cache, a processor core sets a core reservation flag, transmits a load-reserve operation to a store-in lower level cache, and tracks, during a core reservation tracking interval, the reservation requested by the load-reserve operation until the store-in lower level cache signals that the store-in lower level cache has assumed responsibility for tracking the reservation. In response to receipt during the core reservation tracking interval of an invalidation signal indicating presence of a conflicting snooped operation, the processor core cancels the reservation by resetting the core reservation flag and fails a subsequent store-conditional operation. Responsive to not canceling the reservation during the core reservation tracking interval, the processor core determines whether a store-conditional operation succeeds by reference to a pass/fail indication provided by the store-in lower level cache. | 2015-08-27 |
20150242321 | METHOD AND SYSTEM FOR ENSURING RELIABILITY OF CACHE DATA AND METADATA SUBSEQUENT TO A REBOOT - To ensure that the contents of a non-volatile memory device cache may be relied upon as accurately reflecting data stored on disk storage, it may be determined whether the cache contents and/or disk contents are modified during a power transition, causing cache contents to no longer accurately reflect data stored in disk storage. The cache device may be removable from the computer, and unexpected removal of the cache device may cause cache contents to no longer accurately reflect data stored in disk storage. Cache metadata may be managed during normal operations and across power transitions, ensuring that cache metadata may be efficiently accessed and reliably saved and restored across power transitions. A state of a log used by a file system may be determined prior to and subsequent to reboot of an operating system in order to determine whether data stored on a cache device may be reliably used. | 2015-08-27 |
20150242322 | LOCATING CACHED DATA IN A MULTI-CORE PROCESSOR - Techniques described herein are generally related to managing cached memory addresses in a multi-core processor device that has a plurality of cores and a plurality of caches. Communication between the plurality of caches of and a main memory may be monitored. One or more memory addresses cached by the plurality of cores may be identified based on the monitored communications. A probabilistic memory address distribution table of the locations of the one or more memory addresses cached by the plurality of core may be generated and location of a given memory address can be predicted based upon the probabilistic memory address distribution table. | 2015-08-27 |
20150242323 | SOURCE-TO-SOURCE COMPILER AND RUN-TIME LIBRARY TO TRANSPARENTLY ACCELERATE STACK OR QUEUE-BASED IRREGULAR APPLICATIONS ON MANY-CORE ARCHITECTURES - Systems and methods for system for source-to-source transformation for optimizing stacks and/or queues in an application, including identifying usage of stacks and queues in the application and collecting the resource usage and thread block configurations for the application. If the usage of stacks is identified, optimized code is generated by determining appropriate storage, partitioning stacks based on determined storage, and caching tops of the stacks in a register. If the identifier identifies usage of queues, optimized code is generated by combining queue operations in all threads in a warp/thread block into one batch queue operation, converting control divergence of the application to data divergence to enable warp-level queue operations, determining whether at least one of the threads includes a queue operation, and combining queue operations into threads in a warp. | 2015-08-27 |
20150242324 | SCALE-OUT NON-UNIFORM MEMORY ACCESS - A computing system that uses a Scale-Out NUMA (“soNUMA”) architecture, programming model, and/or communication protocol provides for low-latency, distributed in-memory processing. Using soNUMA, a programming model is layered directly on top of a NUMA memory fabric via a stateless messaging protocol. To facilitate interactions between the application, OS, and the fabric, soNUMA uses a remote memory controller—an architecturally-exposed hardware block integrated into the node's local coherence hierarchy. | 2015-08-27 |
20150242325 | Progressive Pre-Caching - A system includes a computerized appliance connected to a network, a processor, a persistent memory, a dynamic random access memory, and software executing on the processor, the software provides for installing an application, storing data to be used in execution of the application, mapping logical block addresses at which particular data is stored to data in an order of expected use, the data-use profile listing an expected order of data use in execution of the application, configuring the DRAM with a cache of a specific data capacity, transferring a block of data equal to the cache size into the cache according to the order of data in the data-use profile, and as data is used in execution of the application, emptying used data from the cache and transferring not-yet-used data from persistent storage into the cache according to the order of data in the data-use profile. | 2015-08-27 |
20150242326 | System and Method for Caching Time Series Data - The present invention provides a method and system for caching time series data. A computer system for caching time series data is disclosed. The computer system comprises one or more processors, at least one cache, and a computer readable storage medium. The computer readable storage medium contains instructions that, when executed by the one or more processors, causes the one or more processors to perform a set of steps comprising fetching the time series data from a time series data source, calculating one or more expiry timestamps, grouping the plurality of time series datum in to one or more time data chunks based on the one or more expiry timestamps, and storing a copy of the time series data and the one or more expiry timestamps in the at least one cache. | 2015-08-27 |
20150242327 | SYNCHRONIZING ACCESS TO DATA IN SHARED MEMORY - In some embodiments, in response to execution of a load-reserve instruction that binds to a load target address held in a store-through upper level cache, a processor core sets a core reservation flag, transmits a load-reserve operation to a store-in lower level cache, and tracks, during a core reservation tracking interval, the reservation requested by the load-reserve operation until the store-in lower level cache signals that the store-in lower level cache has assumed responsibility for tracking the reservation. In response to receipt during the core reservation tracking interval of an invalidation signal indicating presence of a conflicting snooped operation, the processor core cancels the reservation by resetting the core reservation flag and fails a subsequent store-conditional operation. Responsive to not canceling the reservation during the core reservation tracking interval, the processor core determines whether a store-conditional operation succeeds by reference to a pass/fail indication provided by the store-in lower level cache. | 2015-08-27 |
20150242328 | CLEARING BLOCKS OF STORAGE CLASS MEMORY - An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory. | 2015-08-27 |
20150242329 | COMPUTER SYSTEM, COMPUTER AND METHOD FOR PERFORMING THIN PROVISIONING CAPACITY MANAGEMENT IN COORDINATION WITH VIRTUAL MACHINES - In the computer system, a storage system provides a storage level virtual volume based on thin provisioning technology, to a physical server on which a virtual machine is defined. The storage system releases the area of the logical volume corresponding to the storage level virtual volume accessed by a virtual machine which is specified to be deleted, on the basis of storage level virtual volume conversion information which is managed by the storage system. | 2015-08-27 |
20150242330 | GUEST-PROGRAMMABLE LOCATION OF ADVANCED CONFIGURATION AND POWER INTERFACE (ACPI) TABLES IN VIRTUALIZED SYSTEMS - A system and method are disclosed for guest-programmable relocation of system tables in a virtualized computer system. In accordance with one embodiment, a hypervisor that is executed by a computer system obtains a first base address of a first portion of memory, where the first base address is in an address space of a guest of a virtual machine, and where the first base address is for a set of one or more system tables that is currently exposed by the hypervisor at a second portion of memory having a second base address in the address space of the guest. The hypervisor then generates a new version of the set of one or more system tables that is exposed to the guest at the first base address. | 2015-08-27 |
20150242331 | CONTROLLING ACCESS TO A MEMORY - A memory protection device for controlling access to a memory and a method of controlling access to a memory are disclosed. A memory status value held by latch circuitry in the memory protection device determines whether the memory is an enabled or a disabled state. After power-up, a power-on-reset signal causes the memory status value to indicate the enabled state. In response to the assertion from a received control signal a memory kill signal is generated by the memory protection device which causes the memory status value to switch to its disabled state and the memory status value then cannot be changed back to the enabled state without a power reset. The memory status value being in the disabled state causes enable signal generation circuitry of the memory to openly be able to generate its read enable signal and write enable signal in a disabled state, thus preventing access to the memory. | 2015-08-27 |
20150242332 | SELF-ENCRYPTING FLASH DRIVE - A method comprises receiving a plaintext message (m), encrypting the plaintext message and generating a cipher text (c) and authentication data (t), storing the cipher text in a user data portion of a data storage device, and storing the authentication data in a meta data portion of the data storage device. | 2015-08-27 |
20150242333 | INCREASING VIRTUAL-MEMORY EFFICIENCIES - Embodiments of techniques and systems for increasing efficiencies in computing systems using virtual memory are described. In embodiments, instructions which are located in two memory pages in a virtual memory system, such that one of the pages does not permit execution of the instructions located therein, are identified and then executed under temporary permissions that permit execution of the identified instructions. In various embodiments, the temporary permissions may come from modified virtual memory page tables, temporary virtual memory page tables which allow for execution, and/or emulators which have root access. In embodiments, per-core virtual memory page tables may be provided to allow two cores of a computer processor to operate in accordance with different memory access permissions. In embodiments, a physical page permission table may be utilized to provide for maintenance and tracking of per-physical-page memory access permissions. Other embodiments may be described and claimed. | 2015-08-27 |
20150242334 | INTERRUPTIBLE STORE EXCLUSIVE - In one example, there is disclosed herein a processor configured for interruptible atomic exclusive memory operations. For example, a load exclusive (LDEX) may be followed by a store exclusive (STREX), with the two together forming an atom. To facilitate timely handling of interrupts, the STREX operation is split into two parts. The STREX_INIT is not interruptible but has a determinate execution time because it takes a fixed number of clock cycles. The STREX_INIT sends the value out to the memory bus. It is followed by a STREX_SYNC operation that polls a flag for whether a return value is available. STREX_SYNC is interruptible, and methods are disclosed for determining whether, upon return from an interrupt, atomicity of the operation has been broken. If atomicity is broken, the instruction fails, while if atomicity is preserved, the instruction completes. | 2015-08-27 |
20150242335 | METHOD OF OPERATING STORAGE DEVICE INCLUDING NONVOLATILE MEMORY AND MEMORY CONTROLLER - Provided is a method for operating a storage device including a nonvolatile memory and a memory controller controlling the nonvolatile memory. The method include receiving a kill request by the memory controller, performing authentication based on the received kill request by the memory controller, and entering a locked state, by the memory controller, according to the kill request when the authentication is successfully performed. In the locked state, the memory controller denies a request for access to a selected area of the nonvolatile memory. | 2015-08-27 |
20150242336 | Storing Data in a Memory of an Electronic Device - Data, such as usage restriction data ( | 2015-08-27 |
20150242337 | SYSTEM AND METHOD FOR VALIDATION OF CACHE MEMORY LOCKING - A cache lock validation apparatus for a cache having sets of cache lines and coupled to a cache controller. The apparatus includes a memory coupled to a processor. The memory includes test case data related to an architecture of the cache. The processor selects a first set of the sets of cache lines and generates a corresponding first group of addresses and an overflow status address. The processor instructs the cache controller to sequentially lock the first group of addresses and the overflow status address. The processor checks a status of an overflow bit in a status register of the cache controller upon locking the overflow status address, and generates a FAIL status signal when the overflow bit is reset. | 2015-08-27 |
20150242338 | MEMORY DEVICE AND METHOD ENABLING PERFORMANCE OF SPECIAL OPERATIONS BY APPLICATION OF MEMORY DEVICE - A memory device and a method of enabling performance of special operations by an application specific to the memory device are provided. The method includes performing at least one of a first authentication operation and a second authentication operation of the memory device using at least one normal command received from the application according to at least one predefined rule, respectively, the first and second authentication operations indicating whether the memory device includes a plurality of special operations; and receiving from the application a first normal command with a starting logical sector number of a dummy file and a second normal command with a last logical sector number of the dummy file, enabling determination of whether the at least one of the first authentication operation and the second authentication operation of the memory device is successful. | 2015-08-27 |
20150242339 | MANAGEMENT OF WRITES IN A TIERED STORAGE SYSTEM - Embodiments of the present disclosure may relate to methods and a computer program product for allowing writes based on a granularity level. The method for a storage server may include receiving a received granularity level for a particular volume of a storage device of a client computer including an effective duration for the received granularity level. The method may include receiving an anticipated write to the particular volume at an anticipated write granularity level. The method may include verifying whether the anticipated write granularity level substantially matches the received granularity level at the effective duration. The method may also include writing, in response to the anticipated write granularity level substantially matching the received granularity level at the effective duration, the anticipated write to the particular volume for the received granularity level. | 2015-08-27 |
20150242340 | ELECTRONIC APPARATUS AND LINKED OPERATION METHOD - There is provided an electronic apparatus that performs a linked operation with an information processing device via first driver software that is installed in the information processing device and also performs a linked operation with an external device that performs a linked operation with the information processing device via second driver software that is installed in the information processing device. A linked operation is performed with the external device when only the first driver software and second driver software are installed in the information processing device. The first driver software includes a software portion that serves as application software capable of being invoked by the second driver software. | 2015-08-27 |
20150242341 | METHOD, COMPUTER SYSTEM, AND APPARATUS FOR ACCESSING PERIPHERAL COMPONENT INTERCONNECT EXPRESS ENDPOINT DEVICE - Embodiments of the present invention relate to a peripheral component interconnect express endpoint device accessing method, a computer system, and an apparatus. A state of an access request sent by a processor is monitored, and a simulation response message for the access request is sent to the processor when it is determined that the PCIe endpoint device sends no response message for the access request. Therefore, according to the simulation response message, the processor can confirm completion of the procedure corresponding to the previously sent access request, and shut down a timer for timing the access request and clear the buffered access request, thereby keeping normal processing in the processor and avoiding the MCE resetting problem that arises from accumulation of access requests in the processor. | 2015-08-27 |
20150242342 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a first memory, and a processor coupled to the first memory and configured to: specify a number of virtual machines executed on each node of a plurality of nodes on an information processing system that performs as a plurality of virtual machines, and calculate a value indicating a degree of deviation of the number of the virtual machines between the plurality of nodes. | 2015-08-27 |
20150242343 | SYSTEM ON CHIP AND METHOD OF OPERATING A SYSTEM ON CHIP - A system on chip, SoC, comprising two or more data sources, a memory unit, a memory control unit, and a processing unit. Each of the data sources is capable of providing a data stream. The memory control unit is arranged to maintain, for each of the data streams, a buffer in the memory unit and to route the respective data stream to the processing unit via the respective buffer. Each of the buffers has buffer characteristics which are variable and which comprise at least the amount of free memory of the respective buffer. The memory control unit is arranged to allocate and de-allocate memory regions to and from each of the buffers in dependence of the buffer characteristics of the respective buffer, thereby allowing for re-allocation of memory of the memory unit among the buffers. | 2015-08-27 |
20150242344 | DELAYING FLOATING INTERRUPTION WHILE IN TX MODE - A computer implemented method and system for delaying a floating interruption while a processor is in a transactional-execution mode. A floating interruption mechanism can detect a floating interruption request for one or more floating interruption eligible processors. Based on each eligible processor being in TX mode, the method and system can delay, using a predetermined period of time, performing the floating interruption at a selected processor of the one or more of the processors. A first processor of the one or more processors can be selected based on the first processor exiting the transactional execution mode within the predetermined period of time. Based on the predetermined period of time expiring, the method and system can cause an interrupt to one of the plurality of processors, and the interrupt can cause the processor to abort a transaction. | 2015-08-27 |
20150242345 | SYSTEM OF DATA HANDLING BASED ON PERIODIC INTERRUPTIONS TO ELECTRICITY SUPPLY - An approach to data handling based upon the temporal extents of the interruptions to supply of electricity to selected components is provided. At present, digital electronics and computing is primarily based on the binary system, with fixed time duration in and between the two electricity states in components. Considering the limitations posed, the present innovation employs instruments that utilise the no electricity temporal extents in the selected components, or parts thereof, in the data handling system ( | 2015-08-27 |
20150242346 | SEMICONDUCTOR DATA PROCESSING DEVICE, TIME-TRIGGERED COMMUNICATION SYSTEM, AND COMMUNICATION SYSTEM - The variation of the timing of starting interrupt processing in response to a timer interrupt request is reduced regardless of the condition of processing of other interrupts. A semiconductor data processing device incorporated in each of plural electronic control devices coupled to a network for time-triggered communication system is provided with a central processing unit, a communication control circuit and an interrupt control circuit. The communication control circuit has a local time timer for use in time-triggered communication and issues, based on time counting by the local time timer, a timer interrupt request for time-triggered communication. When a timer interrupt request for time-triggered communication is received, the interrupt control circuit performs control to cause the central processing unit to delay, by a predetermined reservation time, starting the interrupt processing to be performed in response to the timer interrupt request. | 2015-08-27 |
20150242347 | EVADING FLOATING INTERRUPTION WHILE IN THE TRANSACTIONAL-EXECUTION MODE - A computer implemented method and system for evading a floating interruption while a processor is in a transactional-execution (TX) mode. A floating interruption request can be detected, by a floating interrupt control mechanism, for a plurality of processors for execution by any one of the plurality of processors. An evasive action can be initiated for at least one of the plurality of processors in a transactional-execution mode, for evading the floating interruption such that another one of the plurality of processors can execute the floating interruption. | 2015-08-27 |
20150242348 | CLOCKLESS SERIAL SLAVE DEVICE - Various methods and devices involving a slave device are discussed. The slave device, which may be without a clock input, receives a clock message and generates a clock based on the received clock message. In some embodiments, the slave device receives a further clock message and transmits a confirmation message simultaneously with receiving the further clock message. In other embodiments, determining a clock may comprise sampling the clock message with an internal system clock and providing the clock based on located edges. Other techniques are also discussed. | 2015-08-27 |
20150242349 | APPARATUS FOR TRANSMITTING AND/OR RECEIVING MEASUREMENT DATA OF A FIELD DEVICE AS WELL AS SYSTEM - A system for communication with a field device, comprising: an apparatus which includes a communication module and an adapter. The communication module includes a connection region and a communication area. The communication area includes at least one communication interface for communication for the field device. A first connecting structure is provided on the connection region, and a second connecting structure provided on an adapter, wherein the second connecting structure is embodied complementary to the first connecting. The adapter includes an interface, and the adapter is embodied passively A display/servicing device, wherein the interface is embodied for connection to the display/servicing device, wherein the display/servicing device is embodied as a portable mobile device, wherein the mobile device is embodied for single-use battery- or rechargeable battery operation, and wherein the first connecting, the second connecting structure and the interface are embodied as plug contacts. | 2015-08-27 |
20150242350 | TABLET CASE WITH ON-THE-GO USB PORT - A tablet cover ( | 2015-08-27 |
20150242351 | STORAGE SYSTEM, CONTROL APPARATUS, AND COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN CONTROL PROGRAM - By including an abnormality detection unit that detects an occurrence of an abnormality in any one of a plurality of paths; a specifying unit that specifies an abnormal place based on the number of communication abnormalities and the number of IOs when the occurrence of the abnormality is detected in the path; and a switching control unit that causes any one of a plurality of higher-level apparatuses and a relay apparatus to execute path switching for switching a data communication path from the path in which the occurrence of the abnormality is detected to another path among the plurality of paths in accordance with the specified abnormal place, effective path switching according to the place at Which the path abnormality occurs is performed. | 2015-08-27 |
20150242352 | SEMICONDUCTOR MEMORY DEVICE, MEMORY SYSTEM, AND METHOD USING BUS-INVERT ENCODING - A semiconductor memory device comprises a memory cell array and a data inversion circuit. The data inversion circuit is configured to receive a first unit data and a second unit data stored in the memory cell array through different first data lines, determine, while the first unit data is transmitted to a data input/output (I/O) buffer through a second data line, whether to the invert the second unit data based on a Hamming distance between the first unit data and the second unit data, and transmit the inverted or non-inverted second unit data to the data I/O buffer through the second data line. | 2015-08-27 |
20150242353 | DATA TRANSFER APPARATUS, HOST APPARATUS, DATA TRANSFER SYSTEM, AND COMMUNICATION MODE SETTING METHOD - A device apparatus carries out data transfer between a host-side device communication unit that supports a plurality of host-side communication modes and that communicates with a host apparatus and a device communication unit that supports a plurality of network-side communication modes respectively matching communication speeds of the plurality of host-side communication modes and that communicates with a communication device and switches a host-side communication mode that is used by the host-side device communication unit, in response to switching of a network-side communication mode that is used by the device communication unit. | 2015-08-27 |
20150242354 | REDUNDANT STORAGE ENCLOSURE PROCESSOR (SEP) IMPLEMENTATION FOR USE IN SERIAL ATTACHED SCSI (SAS) ENVIRONMENT - An information handling system includes a storage enclosure operable to communicate with a storage initiator. The storage enclosure includes a first controller corresponding to a first storage domain for enabling access between the storage initiator and a plurality of storage targets using a storage protocol. A second controller of the system, corresponding to a second storage domain, is operable to enable access between the storage initiator and the plurality of storage targets. A second storage enclosure subsystem is part of the second controller and a second configurable extra-protocol interconnection between the second storage enclosure subsystem and the first controller enables the second storage enclosure subsystem to function as a storage enclosure subsystem for the first controller. | 2015-08-27 |
20150242355 | BACKPLANE CONTROLLER CAPABLE OF TRANSFERRING AND RECEIVING DATA THROUGH USB INTERFACE - Present disclosure relates to backplane controller configured as human interface device (HID) device to communicate with host computer through USB interface. Backplane controller includes: processor, memory, HID universal serial bus (USB) interface, and non-volatile memory. Non-volatile memory stores certain USB descriptors, drive management module, USB HID device driver, and firmware of the backplane controller. Firmware performs one or more of following operations: (a) connecting to host computer through USB interface, (b) sending USB descriptors to host computer to act as specific HID device, (c) instructing USB HID device driver of backplane controller to generate first USB HID report, (d) sending USB HID report to host computer through USB interface, (e) receiving second USB HID report from host computer through USB interface, (f) instructing USB HID device driver to retrieve and process report data from second USB HID report. USB interface includes HID USB interface, USB interface bus, host USB interface. | 2015-08-27 |
20150242356 | PCI Express Expansion System - Expansion boxes have been traditionally used to provide additional expansion slots to those that are provided in the computer system. As the speed of expansion busses has increased, it has become increasingly difficult to provide an expansion box and interconnect to that expansion box that is reliable and low cost. For example, PCI Express Gen 3 provides a very high speed interconnect, allowing data rates up to 32 GBytes/sec in some configurations. Various techniques to maintain the signal integrity of this expansion bus, even over distances greater than 1 meter, are disclosed. Some of these techniques include proper selection of cable impedance, proper selection of PC board materials, and specific PC layout guidelines. | 2015-08-27 |
20150242357 | MONITORING AND MANAGING STORAGE DRIVES AND PERFORMING BACKPLANE CONTROLLER FIRMWARE USING A USB INTERFACE - Certain aspects relate to monitoring and managing storage drives installed on a backplane and performing backplane controller firmware update through a universal serial bus (USB) interface. When the backplane controller is connected to a host computer via the USB interface, the backplane controller sends USB descriptors to the host computer through the USB interface such that the host computer recognizes the backplane controller as a specific human interface device (HID) device based on the USB descriptors. Thus, the backplane controller and the host computer may transmit backplane drive management messages, such as the result to monitor and manage the storage drives, or the control commands and control data to monitor and manage the storage drives and to update the firmware of the backplane controller, as USB HID reports in a predefined format based on the USB descriptors. | 2015-08-27 |
20150242358 | UNIVERSAL SERIAL BUS REPEATER - A method and system for communicating data between two devices are described herein. The method detects an electrical signal of a first protocol from a first device in a repeater, wherein the first protocol comprises single-ended signaling. The method also determines the speed of the electrical signal. Additionally, the method converts the electrical signal of the first protocol into an electrical signal of a second protocol based on the speed of the electrical signal. The second protocol comprises differential signaling. Furthermore, the method sends the electrical signal of the second protocol to a second device. In addition, the method stops the electrical signal of the second protocol to the second device when the electrical signal of the second protocol indicates an end of data flow. | 2015-08-27 |
20150242359 | VERIFICATION OF DISTRIBUTED SYMMETRIC MULTI-PROCESSING SYSTEMS - A method, apparatus and product useful for verifying Distributed Symmetric Multi-Processing systems (DSMPs). The method comprising: determining one or more sub-systems of a DSMP, wherein each sub-system is a Symmetric Multi-Processing System (SMP) which comprises a shared memory and a set of processing entities that have the same access permissions to the shared memory; and verifying the DSMP using a verification tool designed to verify an SMP, wherein said verifying is performed by verifying each sub-system. | 2015-08-27 |
20150242360 | NUMERICAL SCALING METHOD FOR MATHEMATICAL PROGRAMS WITH QUADRATIC OBJECTIVES AND/OR QUADRATIC CONSTRAINTS - A method for a quadratic program or quadratically constrained program stored in a non-transitory computer readable medium, includes receiving input for coefficients of a quadratic problem or a quadratically constrained problem by a computer for storage in the non-transitory computer readable medium, determining scaling factors by a processor by using the input in the quadratic program or quadratically constrained program configured for optimality conditions by considering a symmetric N×N matrix Q | 2015-08-27 |
20150242361 | ZONE EXTENSION SYSTEMS AND METHODS - Wavefront measurements of eyes are often taken when the pupil is in a first configuration in an evaluation context. The results can be represented by a set of basis function coefficients. Prescriptive treatments are often applied in a treatment context, which is different from the evaluation context. Hence, the patient pupil can be in a different, second configuration, during treatment. Systems and methods are provided for determining a transformed set of basis function coefficients, based on a difference between the first and second configurations, which can be used to establish the vision treatment. | 2015-08-27 |
20150242362 | TEMPERATURE MODELING CONSTRAINED ON GEOPHYSICAL DATA AND KINEMATIC RESTORATION - A method is disclosed for the estimation of subsurface temperature distributions from a 3-dimensional heat conductivity model for a geological formation. The method may be characterized by the following steps: (a) obtaining measured data corresponding to a geological subsurface formation of interest including seismic survey data, in-well temperature, seafloor or surface heat flux measurements and laboratory-based measurements of core porosity, (b) estimating a relationship between seismic velocity and heat conductivity, wherein seismic velocity is linearly dependent on porosity and heat conductivity is exponentially or linearly dependent on porosity, and (c) calibrating the model to the measured in-well data and laboratory-based measurements of core porosity. | 2015-08-27 |
20150242363 | PROCESSING OF LINEAR SYSTEMS OF EQUATIONS - A method for processing linear systems of equations and finding a nx1 vector x satisfying Ax=b where A is a symmetric, positive-definite nxn matrix corresponding to nxn predefined high-precision elements and b is an n1 vector corresponding to n predefined high-precision elements. A first iterative process generates n low-precision elements corresponding to an nx1 vector x1 satisfying A1x1=b1 where A1, b1 are elements in low precision. The elements are converted to high-precision data elements to obtain a current solution vector x. A second iterative process generates n low-precision data elements corresponding to an nx1 correction vector dependent on the difference between the vector b and the vector product Ax. Then there is produced from the n low-precision data elements of the correction vector respective high-precision data elements of an nx1 update vector u. The data elements of the current solution vector x are updated such that x=x±u. | 2015-08-27 |
20150242364 | EVOLVED TRANSFORM FOR PROCESSING DATA - Methods and systems for processing data are disclosed. An example method can comprise receiving first data. The method can comprise applying a first transform to the first data. The first transform can be evolved from a second transform. The first transform can be based on first coefficients and the second transform can be based on second coefficients. The first transform can be evolved without constraining a count of the first coefficients to be equal to a count of the second coefficients. The method can comprise providing the transformed first data. | 2015-08-27 |
20150242365 | Method and Apparatus of a Fully-Pipelined FFT - A plurality of three bit units (called triplets) are permuted by a shuffler to shuffle the positions of the triplets into different patterns which are used to specific the read/write operation of a memory. For example, the least significant triplet in a conventional counter can be placed in the most significant position of a permuted three triplet pattern. The count of this permuted counter triplet generates addresses that jump 64 positions each clock cycle. These permutations can then be used to generate read and write control information to read from/write to memory banks conducive for efficient Radix-8 Butterfly operation. In addition, one or more triplets can also determine if a barrel shifter or right circular shift is required to shift data from one data lane to a second data lane. The triplets allow efficient FFT operation in a pipelined structure. | 2015-08-27 |
20150242366 | Designing A Physical System Constrained By Equations - The invention notably relates to a computer-implemented method for designing a physical system constrained by a system of equations involving variables, the method comprising the steps of partitioning the variables involved in the equations into fixed variables and unfixed variables, thereby setting the system to a restricted system with a degree of freedom equal to 1, computing a parameterized curve of solutions of the restricted system in the domain of the unfixed variables, for at least one pair of unfixed variables, displaying the projection of the curve in the product of the domains of the pair, and navigating the solutions on the parameterized curve and representing, real-time, the current navigation position on the projection of the curve. Such a method improves the design of a physical system constrained by equations involving variables. | 2015-08-27 |
20150242367 | SYSTEMS AND METHODS FOR THE COMPARISON OF SELECTED TEXT - Systems and methods are disclosed for comparing selections of text to show differences between the two selections. The text may be selected from the same source or from two different sources. In one implementation, a system receives a first selection of text for comparison and places the selection in a first buffer. The system receives a second selection of text for comparison and places the second selection in a second buffer. The system compares the first buffer and the second buffer to determine differences and displays the differences. In some embodiments, the system may allow a user to choose two buffers from among a plurality of buffers for comparison. | 2015-08-27 |
20150242368 | METHOD AND DEVICE FOR REPRODUCING A CONTENT ITEM - A method of reproducing a content item includes monitoring an input operation. At the input operation, it is decided whether to update a resume position, based on a reproduction progress, the reproduction progress being determined with respect to a reference position. The method further includes determining whether the input operation corresponds to a linear or to a non-linear event, and updating the reference position if the input operation is a non-linear event. | 2015-08-27 |
20150242369 | DOCUMENT DISTRIBUTION SERVER AND PROGRAM - A document data distribution server includes a storage unit, a communication unit configured to receive document data of a document, image data of an image added to the document, and a request for integrated document data, and a control unit. The control unit is configured to compress the document data and control the storage unit to store the compressed document data when the communication unit receives the document data, control the storage unit to store the image data when the communication unit receives the image data, generate, as the integrated document data, data of a first layer that includes the compressed document data and data of a second layer to be superimposed on the first layer, that includes the image data of the added image, and control the communication unit to output the integrated document data, when the communication unit receives the request. | 2015-08-27 |
20150242370 | METHOD AND APPARATUS FOR PROCESSING DATA - An apparatus and a method for controlling an electronic device are provided. The method includes executing a first program, providing first clip data based on the first program, converting the first clip data into second clip data associated with a second program, and processing the second clip data based on the second program. | 2015-08-27 |
20150242371 | UNIVERSAL MOBILE DOCUMENT VIEWER WITH HIGH FIDELITY, EFFICIENT ARCHITECTURE AND EDITING - Embodiments are directed to processing documents on a computer. A document may received on a computer over a platform specific interface. The document may be provided to a platform independent engine where parser may be configured to parse the document based on a page description language (PDL) that comprises the document. A plurality of feature objects may be generated based on feature information. Intermediate documents may be generated based on the plurality of feature objects. The intermediate documents may be stored on a data store for various reasons including, backups, archiving, sharing, or the like. A preview document may be generated from the at least one intermediate document arranged such that the preview document may displayable on the computer. A user may be further enabled to provide edit information that may be used for generating an updated preview document. | 2015-08-27 |
20150242372 | SYSTEM, APPARATUS AND METHOD FOR LAYOUT OF INFORMATION FROM DIFFERENT CONTENT SOURCES ONTO A PAGE - tools (for example, a system, an apparatus, application software, a method, etc.) can be provided to allow a user of a terminal apparatus to assemble information from different content sources information onto a single layout page. | 2015-08-27 |
20150242373 | ONLINE DISPLAYING A DOCUMENT - Embodiments of the present disclosure provide a method and apparatus for online displaying a document. In one embodiment of the present disclosure, there is provided a method for online displaying a document, comprising: extracting a plurality of data objects from the document; obtaining sizes of corresponding data objects among the plurality of data objects by constructing a document object model associated with the plurality of data objects; generating a layout repository based on the sizes; and rendering the plurality of data objects based on the layout repository, so as to online display the document. In one embodiment of the present disclosure, there is provided an apparatus for online displaying a document. By means of the method and apparatus of the present disclosure, the efficiency of online displaying documents can be increased and thereby user experience can be improved. | 2015-08-27 |
20150242374 | AUTOMATIC LAYOUT TECHNOLOGY - Described are devices, methods, and non-transitory computer readable media for automatically configuring a layout of content for online publishing or display on an electronic device in a visually pleasing and professional manner The described techniques allow the content to be organized and displayed in a magazine-style layout and design, without a need for high level programming skills or special tools. A layout engine receives content selected by a user for display, configures a first level layout of the content based on a first set of attributes of the content, which includes determining a number of story containers needed to display the stories in the content, and configures a second level layout of a respective story in the content based on a second set of attributes of the respective story in the content. The first level layout determines the high level configuration of the entire display page (e.g., a page layout), and the second level layout determines the lower level configuration for each story container on the display page (e.g., a story layout). | 2015-08-27 |
20150242375 | Maltweb multi-axis viewing interface and higher level scoping - A method, apparatus and computer program product for navigating in a multi-dimensional space containing an electronic publication formed from predefined portions of text-based data encoded using a markup language are disclosed. A selected predefined portion is displayed in a first display region. A point on a primary axis of the multi-dimensional space corresponding to the displayed pre-defined portion is also displayed. Also, a method, apparatus and computer program product for publishing an electronic publication formed from predefined portions of text-based data encoded using a markup language are also disclosed. Predefined portions are stored in terminal nodes. Higher level nodes are provided for organising the terminal nodes into an hierarchical structure embodied in said electronic publication. Each higher level node contains the identity of a parent node, a position indicator for the higher level node and an associated identifier. | 2015-08-27 |
20150242376 | Publishing Information Technology Data As A Newsfeed - Data from applications is published using a web feed document such as according to the Really Simple Syndication (RSS) protocol. The applications can be information technology (IT) services, such as an Application Performance Management program and a Service Desk program, which are used by an organization. A user may subscribe to receive periodically-updated data regarding selected parameters of the applications. A received web feed document can be displayed using a feed reader of a web browser or a native application of a client computing device. The user can request additional details regarding a parameter, such as historical data values, by selecting a hyperlink in the web feed document. The user provides login credentials so that the delivery of the additional detailed information is secure. A default display format can be set for the additional details. | 2015-08-27 |
20150242377 | LOGICAL STRUCTURE-BASED DOCUMENT NAVIGATION - Embodiments include a method for navigating an electronic document. The method includes displaying a navigation pane that includes a group of logical document elements associated with the electronic document. The method also includes detecting a first user input. The method further includes determining that the first user input is configured to select a first logical document element included in the group of logical document elements. The method also includes selecting the first logical document element based on the first user input. The method further includes navigating to a portion of the document associated with the first logical document element. Embodiments also include a system and a computer-readable medium for navigating an electronic document. | 2015-08-27 |
20150242378 | Meta Tag Ownership and Control - Personalized metadata may be selected from a group of tags, where the tags include annotations, synopsis, references, etc. and owner controlled rules for visibility and control options such as removal, combining, weighting, adding, sharing, privatizing, assigning etc. are provided. | 2015-08-27 |
20150242379 | MEASURING WEB PAGE RENDERING TIME - A method in a network setup that includes a client entity and a network for handling a data flow to the client entity. The method estimates a screen rendering time of content at the client entity. The method includes the steps of observing the data flow to the client entity, estimating a screen area at the client entity based on the observed data flow, determining, from the data flow, content data associated with rendering content in the screen area, extracting at least data items from the determined content data, and estimating, as the screen rendering time, the time required to render the content in the screen area at the client entity based on the extracted data items. | 2015-08-27 |
20150242380 | CHECKING TESTING COVERAGE - Checking testing coverage. In response to testing a function of a widget, changes of DOM nodes of the widget are recorded. Description of a DOM structure corresponding to the function is obtained. The recorded changes of DOM nodes and the obtained description of the DOM structure are compared. Testing coverage condition for the function according to a comparison result is then determined. | 2015-08-27 |
20150242381 | DATA TRANSITION PROCESSING METHOD AND ELECTRONIC DEVICE SUPPORTING THE SAME - An electronic device and method for data conversion processing are disclosed. The electronic device includes a communication interface configured to communicatively couple with an external server, and a control module. The control module may implement the method, which includes receiving a request to display content that is at least one of unoptimized or incompatible with data processing functionality of the electronic device, in response to the request, transmitting to the external server the content and at least one of a desired data type and a configuration setting of the electronic device, receiving from the external server a converted content optimized or compatible with the data processing functionality, converted by a renderer of the external server utilizing the at least one of the desired type and the configuration setting, and displaying the converted content on the display. | 2015-08-27 |
20150242382 | DYNAMIC PREVIEW OF ELECTRONIC SIGNATURE APPEARANCE - Methods and apparatus, including computer program products, implementing and using techniques for signing an electronic document, including establishing an electronic signature appearance for an electronic signature, determining a bounding region on the electronic document for the display of the electronic signature appearance, at the time of signing an electronic document, previewing the electronic signature appearance in the bounding region and signing the electronic document with an electronic signature, the electronic signature associated with the electronic signature appearance. The electronic signature appearance can be configured at the time of signing the electronic document. | 2015-08-27 |
20150242383 | METHODS AND SYSTEMS FOR CAPTURING, SHARING, AND PRINTING ANNOTATIONS - Embodiments of the disclosure disclose methods, and systems for capturing, sharing and printing annotations. The method includes receiving a physical document including hand-written annotation, the hand-written annotation is made by a user corresponding to at least a portion of the physical document. The method further includes capturing the hand-written annotation and corresponding position information of the hand-written annotation, wherein capturing further includes capturing position information of the at least portion of the physical document. Further, the method includes storing the captured hand-written annotation, position information of the hand-written annotation and position information of the at least portion of the physical document. Moreover, the method includes associating the hand-written annotation to the at least portion of the physical document. Additionally, the method includes sharing the hand-written annotation with other users. | 2015-08-27 |
20150242384 | METHOD AND APPARATUS FOR ANNOTATING A GRAPHICAL OUTPUT - Various methods are provided for generating and annotating a graph. One example method may include determining one or more key patterns in a primary data channel, wherein the primary data channel is derived from raw input data in response to a constraint being satisfied. A method may further include determining one or more significant patterns in one or more related data channels. A method may further include generating a natural language annotation for at least one of the one or more key patterns or the one or more significant patterns. A method may further include generating a graph that is configured to be displayed in a user interface, the graph having at least a portion of the one or more key patterns, the one or more significant patterns and the natural language annotation. | 2015-08-27 |
20150242385 | METHODS AND SYSTEMS FOR GENERATION OF FLEXIBLE SENTENCES IN A SOCIAL NETWORKING SYSTEM - Some embodiments include a computer-implement method of producing a flexible sentence syntax to facilitate one or more computer applications to generate and publish sentence expressions. For example, the method can include providing a developer interface to define a flexible sentence syntax that controls one or more sentences publishable by an application service. A developer of the application service can customize the flexible sentence syntax including selecting at least one of selectable tokens that is associated with a specific sentence element to incorporate in the flexible sentence syntax. Based on the selected token, a computing device can generate and publish a target sentence according to the flexible sentence syntax on the application service's behalf. | 2015-08-27 |
20150242386 | USING LANGUAGE MODELS TO CORRECT MORPHOLOGICAL ERRORS IN TEXT - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for recognizing speech in an utterance. The methods, systems, and apparatus may include actions of obtaining a candidate transcription including a sequence of words and generating morphological variants of one or more of the words from the candidate transcription. Additional actions may include, for each morphological variant, generating one or more additional candidate transcriptions that each include the morphological variant. Further actions may include generating respective language model scores for the candidate transcription and the one or more additional candidate transcriptions. Additional actions may include selecting a particular transcription from among the candidate transcription and the one or more additional candidate transcriptions, based on the language model scores. | 2015-08-27 |
20150242387 | AUTOMATED TEXT ANNOTATION FOR CONSTRUCTION OF NATURAL LANGUAGE UNDERSTANDING GRAMMARS - Aspects described herein provide various approaches to annotating text samples in order to construct natural language grammars. A text sample may be selected for annotation. A set of annotation candidates may be generated based on the text sample. A classifier may be used to score the set of annotation candidates in order to obtain a set of annotation scores. One of the annotation candidates may be selected as a suggested annotation for the text sample based on the set of annotation scores. A grammar rule may be derived based on the suggested annotation, and a grammar may be configured to include the annotation-derived grammar rule. | 2015-08-27 |
20150242388 | METHOD AND APPARATUS FOR IDENTIFYING A LANGUAGE USED IN A DOCUMENT AND PERFORMING OCR RECOGNITION BASED ON THE LANGUAGE IDENTIFIED - A method and apparatus for identifying a language used in a document based on a number of strokes per character is provided herein. Once identified, character recognition may take place based on the language identified. In one embodiment, a character recognition engine is utilized for character recognition, wherein the character recognition engine is specifically tailored to the identified language. | 2015-08-27 |
20150242389 | TECHNIQUES TO IDENTIFY USER INTERFACE ELEMENTS ASSOCIATED WITH MODEL VIOLATION EVENTS - Techniques to identify user interface elements associated with model violation events. These techniques may involve a user interface component configured to perform client-side validation of data objects that are generated by an application running on a client device. This application may communicate with another application operative on a server and the client device. The application may generate a user interface to facilitate user inputs into user interface elements. The server may provide the client device with validation logic that is operative to process any input data directed towards the application via the user interface and identify any violation event of a model shared between the server and the client device. | 2015-08-27 |
20150242390 | APPARATUS, METHOD AND COMPUTER READABLE MEDIUM FOR A MULTIFUNCTIONAL INTERACTIVE DICTIONARY DATABASE FOR REFERENCING POLYSEMOUS SYMBOL - An embodiment of the present application is directed to an apparatus, method, and or computer readable medium for effectively storing an interactive dictionary database in a memory. The interactive dictionary database includes a plurality of symbol sequences, each of the plurality of symbol sequences including at least one polysemous symbol and each of the plurality of symbol sequences being stored in association with at least one word, sentence, phoneme, message, letter, number, morpheme, command and/or phrase. The method includes providing, in the interactive dictionary database, information useable to assign at least a subset of the plurality of symbol sequences at least one of an active and an inactive status. | 2015-08-27 |
20150242391 | CONTEXTUALIZATION AND ENHANCEMENT OF TEXTUAL CONTENT - This document describes techniques for contextualization and enhancement of textual content. In one or more implementations, textual content is analyzed to determine whether the textual content is appropriate for an intended context. The intended context corresponds to an intended mood, emotion, tone, or sentiment of the textual content. If it is determined that the textual content does not conform to the intended context, suggestions are generated to modify the textual content to conform to the intended context. | 2015-08-27 |
20150242392 | INTERNATIONAL KEYBOARD FOR IN-CAR COMMUNICATION AND ENTERTAINMENT SYSTEM - An in-car communication and entertainment system including an international keyboard having a key (e.g., an ABC key) located on a display/screen (e.g., touch screen) enabling a user to toggle through multiple pages of characters, for example accented or special characters associated with a particular language. The key also includes jewels/indicators representing the amount of pages of characters associated with a particular keyboard wherein each jewel or indicator is lit or highlighted to indicate the specific page. Additionally, another key (e.g., a Globe key) enables the user to change the typing language without changing the system language. In this manner, the international keyboard enables users to interface and communicate with the system in a number of different languages. | 2015-08-27 |
20150242393 | System and Method for Classifying Text Sentiment Classes Based on Past Examples - A passage sentiment classifier that can be used to assign a score that indicates the polarity and magnitude of sentiment expressed by a piece of text using information about similar passages. A passage of text may be a few words, a sentence, a paragraph or an entire document. The invention described classifies automatically passages by first looking up the most similarly classified passage in a storage system, which contains passages that have been classified manually by a human. | 2015-08-27 |
20150242394 | DEVICE AND METHOD FOR CHANGING LIP SHAPES BASED ON AUTOMATIC WORD TRANSLATION - Disclosed are a device and method for changing lip shapes based on automatic word translation. When a user takes a video of his or her own face and inputs his or her voice through a microphone, the device and method for changing lip shapes based on automatic word translation separates an area in which the user's lips are located from a video taken by the camera; recognizes the user's voice; inserts a partial video to the area in which the user's lips are located, the partial video representing a lip shape for a word obtained when a specific word corresponding to the recognized voice is translated to a different language. Consequently, when the word input by the user's voice is translated to the different language, the lip shape may be automatically changed to accord with the language. | 2015-08-27 |