36th week of 2012 patent applcation highlights part 48 |
Patent application number | Title | Published |
20120226893 | Hardware controller to choose selected hardware entity and to execute instructions in relation to selected hardware entity - A hardware controller includes a first hardware interface, a second hardware interface, first hardware logic, and second hardware logic. The first hardware interface is to couple the hardware controller to hardware entities of a hardware device in which the hardware controller is to be included. The second hardware interface is to couple the hardware controller to a memory to receive instructions. The first hardware logic is to choose a selected hardware entity from the hardware entities. The second hardware logic is to execute the instructions in relation to the selected hardware entity. | 2012-09-06 |
20120226894 | PROCESSOR, AND METHOD OF LOOP COUNT CONTROL BY PROCESSOR - The present invention provides a processor comprising: a loop counter that is reset to 0 when a loop instruction for executing a process in a loop from a loop start address to a loop end address is issued; a data memory that receives, from outside, data that is used for executing a process in the loop; a calculator that uses the data transferred to said data memory to execute the process in the loop; a data counter that increments said loop counter by 1 every time a certain amount of data is transferred from outside to said data memory; and a loop controller that decrements said loop counter by 1 and causes said calculator to execute the process in the loop when the loop count value of said loop counter is not 0. | 2012-09-06 |
20120226895 | PROTECTING OPERATING SYSTEM CONFIGURATION VALUES - In a pre-operating system environment on a device prior to loading and running an operating system on the device, a policy identifying configuration settings for the operating system is obtained. The operating system itself is prevented from changing this policy, but the policy can be changed under certain circumstances by components of the pre-operating system environment. The policy is compared to configuration values used by the operating system, and the operating system is allowed to boot with the configuration values if the configuration values satisfy the policy. However, if the configuration values do not satisfy the policy, then a responsive action is taken. | 2012-09-06 |
20120226896 | NETWORK STORAGE TARGET BOOT AND NETWORK CONNECTIVITY THROUGH A COMMON NETWORK DEVICE - The present disclosure includes systems and techniques relating to booting to a network storage target. In general, in one implementation, a bus-to-network device driver is loaded during a machine boot, where the bus-to-network device driver is capable of sending machine bus commands over a network, providing access to the network for a network device driver, and distinguishing between received responses to the machine bus commands and other network traffic corresponding to the network device driver. Loading of the bus-to-network device driver can occur in response to an operating system load of bus drivers. For example, the bus-to-network device driver can be an iSCSI driver, and the operating system load of bus drivers can be the operating system load of SCSI drivers. | 2012-09-06 |
20120226897 | COMPUTER SYSTEM WITH DUAL BIOS - A computer system including a first memory unit, a second memory unit and a switch unit is provided. The first memory unit stores a first BIOS. The second memory unit stores a second BIOS. The switch unit has a first configuration and a second configuration. Upon the computer system being started, the switch unit receives an enable signal. When the switch unit is in the first configuration, the enable signal is provided to the first memory unit to start the first basic input/output system. When the switch unit is in the second configuration, the enable signal is provided to the second memory unit to start the second basic input/output system. | 2012-09-06 |
20120226898 | Apparatus And Methods For Activity-Based Management Of Computer Systems - Apparatus and methods are disclosed for performing computer system management on an activity basis. In one embodiment, computer-system-related items are associated with at least one activity to be performed using the computer system. Then, management procedures are established for the at least one activity. Next, when the computer system is used to perform the at least one activity, the computer-system-related items associated with the at least one activity are managed in accordance with the management procedures established for the at least one activity. In another embodiment, apparatus and methods monitor patterns of use of a computer system. Using information gathered during monitoring operations, activity models are formulated, and for each activity model a management plan is devised. After management plans have been devised for each activity model, the use of the computer system is monitored to identify actions being performed with the computer system. The identified actions are then compared with the activity models to determine which activity model best fits the identified actions. Management of computer-system-related items associated with the activity is then performed using the management plan associated with the activity model that best fits the actions being performed with the computer system. | 2012-09-06 |
20120226899 | METHOD AND APPARATUS FOR ADAPTING SETTINGS FOR REQUESTING CONTENT SEGMENTS BASED ON CONTEXTUAL CHARACTERISTICS - An apparatus may include a registrar configured to register settings for requesting content segments. The settings may be configured to apply to requests for content segments from all of the content providers of a content channel or one or more individual content providers. A contextual characteristic determiner may be configured to determine contextual characteristics of the user and/or the apparatus. A settings manager may be configured to adapt the settings based on the contextual characteristics determined by the contextual characteristic determiner. Thereby, update settings, operational settings, and/or other settings may be adapted. Further, a content requestor may be configured to build a content request package based on the settings. Accordingly, content providers and/or a content recommender may recommend content based on the content request package. | 2012-09-06 |
20120226900 | ENFORCING SOFTWARE UPDATES IN AN ELECTRONIC DEVICE - A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and processing circuitry coupled to the communication interface and to the memory. The STB is operable to receive a digital message, extract a key portion from the digital message, extract a rights portion from the digital message, determine a code version based upon the rights portion, read a stored code version from the memory, and compare the code version to the stored code version to validate the software instructions. Upon an unfavorable comparison of the code version to the stored code version, initiates an error action that may include sending a message to a service provider device for software instruction reloading, rebooting, and/or disable decryption of the digital content. Extracting the rights portion from the digital message may include decrypting the key portion to produce a decrypted result and decrypting the rights portion using the decrypted result to produce the decrypted rights portion. | 2012-09-06 |
20120226901 | System, Method and Apparatus For Secure Telecommunications In A Home Area Network - Secure message transfer is provided in a network including at least a Home Area Network (HAN) having network devices A, B and C. The Home Area Network is capable to connect domains having different transmission formats and includes a secure communication protocol. Device A is capable to communicate at least one message to the device C according to the secure communication protocol, and device B is capable to receive at least one message from device A sent for reception and decryption by device C. A device D controls the secure message transfer and selectively disables device B from decrypting the message received by device B that is sent from device A to device C for decryption. | 2012-09-06 |
20120226902 | APPARATUS AND METHOD FOR ACCESS CONTROL OF CONTENT IN DISTRIBUTED ENVIRONMENT NETWORK - An apparatus for generating a key for access control of content in a distributed environment network is provided. The apparatus includes a first key distributor configured to generate first encrypted keys by encrypting a first key corresponding to a key for write authorization using each public key of members having write authorization among members included in an access control list including information of at least one user and distribute the access control list and information about access authorization and the first encrypted keys to the members having write authorization, and a second key distributor configured to generate second encrypted keys by encrypting a second key corresponding to a key for read authorization using the first key using each public key of members having read authorization among members included in the access control list and distribute the access control list and second encrypted keys to the members having read authorization. | 2012-09-06 |
20120226903 | SECURE PLATFORM VOUCHER SERVICE FOR SOFTWARE COMPONENTS WITHIN AN EXECUTION ENVIRONMENT - Apparatuses, articles, methods, and systems for secure platform voucher service for software within an execution environment. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by authenticated, authorized and verified software components. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy to receive verification for any component. The verification or voucher helps assure to the remote entity that no malware running in the platform or on the network will have access to provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the software component. | 2012-09-06 |
20120226904 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data that may be communicated using multiple communications paths. | 2012-09-06 |
20120226905 | Method and System for Discovering, Authenticating and Accessing Multiple Computing Devices - The system and methods disclosed allows devices, possibly on different networks, to discover, access and authenticate one another. When the target device is on the same network as the source device (or is otherwise directly addressable by the source device), the system provides a mechanism by which the source device can connect directly to the target device; otherwise, the system provides a mechanism by which the source and target devices may communication with one another using a commonly accessible computing device as a proxy. In the latter case, the mechanism is such that it is not technologically feasible for the proxy device to decipher communications between the source and target devices. The system accommodates dynamic change in network location (e.g. IP address) without requiring reconfiguration by the user, and mitigates problems introduced by the existence of firewalls. | 2012-09-06 |
20120226906 | Protocol And Method For Client-Server Mutual Authentication Using Event-Based OTP - A method of authenticating and encrypting a client-server communication is provided. Two one-time passwords (OTP | 2012-09-06 |
20120226907 | Method and Apparatus For Article Authentication - An authentication method for authenticating an article in a device includes the steps of (a) reading an identification number stored on the article, (b) reading an authentication number stored on the article, (c) determining an input number based at least in part on the identification number, (d) applying an authentication function to the input number to calculate an output number, (e) determining that the article is authentic only if the authentication number corresponds to the output number, and (f) permitting use of the article in the device if the article is authentic, and disabling use of the article in the device if the article is not authentic. | 2012-09-06 |
20120226908 | System and Methods for Web-Application Communication - A system for providing communication between one or more clients ( | 2012-09-06 |
20120226909 | Method of Configuring a Node, Related Node and Configuration Server - A method for configuring a node, said node holding a public key depending on an identifier relating to said node, a related secret key and an address of a configuration server storing sets of configuration parameters for respective nodes, the method comprising the following steps carried out at the configuration server:
| 2012-09-06 |
20120226910 | SECURITY DEVICE FOR ELECTRONICS - A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the electronic device to its location. A monitor module ensures that the device security module is coupled to the electronic device before a data security module allows the electronic device to operate. The monitor module may also require that the device security module be recognized before the electronic device will operate. If the device security module is coupled and recognized, the user is prompted to provide an encryption key. If the key is correct, the electronic device will operate. The user may have a limited number of attempts to provide the encryption key. If the user makes too many attempts, the electronic device is disabled and the data thereon destroyed. If the device security module is uncoupled during operation, the electronic device is shut down. | 2012-09-06 |
20120226911 | CONTROL OF ACCESS TO A SECONDARY SYSTEM - A method and system for controlling access of a user to a secondary system. The user is logged on a user system. A primary system sends a random string to a user system that is connected to the secondary system. The user is logged on the user system. The primary system receives from the user system first authentication information including an encryption of the random string by a private key of the user. The primary system generates a user-specific key consisting of the encryption of the random string. The primary system generates second authentication information from protected secondary authentication data stored in the primary system via application of the user-specific key to the protected secondary authentication data. The primary system provides the second authentication information to the secondary system to enable access of the user to the secondary system. | 2012-09-06 |
20120226912 | PASSWORD-BASED OPERATION OF A LOCKED COMPUTING DEVICE - The present application relates to performing operations on a computing device having a restricted mode of operation and an unrestricted mode of operation. A first input sequence comprising a correct authentication code and a command code is obtained while in the restricted mode of operation. The device executes one or more special operations associated with the command code while the device remains in the restricted mode of operation. The device transitions to the unrestricted mode of operation upon obtaining a second input sequence comprising a correct authentication code, and in the unrestricted mode of operation the device may execute one or more regular operations. | 2012-09-06 |
20120226913 | SYSTEM AND METHOD FOR CLIPBOARD SECURITY - Provided is a clipboard security system and method for improving security of data transmission made through a clipboard which is frequently used in utilization of a computer. An example of the clipboard security system includes a clipboard managing unit for storing data in a clipboard or extracting data from the clipboard in response to a request from one or more objects, in which the clipboard managing unit includes a data encrypting unit for encrypting the data for which storage is requested according to a trust relationship of an object which desires to store the data in the clipboard and a data decrypting unit for decrypting the encrypted data according to a trust relationship of an object which desires to extract the encrypted data stored in the clipboard. | 2012-09-06 |
20120226914 | Checking Data Content - A system for automated checking of data content includes content checkers ( | 2012-09-06 |
20120226915 | Content Playback APIS Using Encrypted Streams - One embodiment of the present invention sets forth a technique for decrypting digital content in a secure environment. The technique includes the steps of receiving a digital rights management (DRM) license associated with a first frame of encrypted data from a DRM server, where the DRM license includes a decryption key for decrypting the first frame of encrypted data, transmitting the DRM license to a secure content playback pipeline for storage, and transmitting the first frame of encrypted data to the secure content playback pipeline for decryption, where, in response to receiving the first frame of encrypted data, a trusted processing entity within the secure content playback pipeline decrypts the first frame of encrypted data based on the decryption key included in the DRM license to generate a first set of decrypted data and store the first set of decrypted data in a secure memory space. | 2012-09-06 |
20120226916 | PROTECTED HEALTH CARE DATA MARKETING SYSTEM AND METHOD - Personally-identifying, protected health information (“PHI”) is stored in encrypted form in protected data records, and hash values derived from the PHI are stored in associated search records. A healthcare marketer may identify market segments of individuals by querying the search records using hashed query predicates, identifying protected data records based on the search record results, and providing anonymized data-record results to the healthcare marketer. Once a market segment has been anonymously identified, the marketer may cause personalized marketing messages to be generated for individuals in the market-segment without the marketer having been exposed to PHI associated with those individuals. | 2012-09-06 |
20120226917 | Data Content Checking - A data content checker arrangement for protecting communication between a sensitive computer system ( | 2012-09-06 |
20120226918 | Non-intrusive Power Management - A method and system for managing power consumption of a pool of computing devices that are logically grouped to provide a common set of functionality is disclosed. One aspect of certain embodiments includes predicting resource utilization for each device without installing customized software, firmware or hardware on the device. | 2012-09-06 |
20120226919 | STAGGERED POWER-UP AND SYNCHRONIZED RESET FOR A LARGE ASIC OR FPGA - Methods and apparatus for controlling the power-on current transients and for providing a gradual current draw in an ASIC or FPGA having a high gate count and a number of physical blocks are disclosed. Additionally, method(s) are disclosed which ensure related blocks emerge from a reset state on a common clock cycle even when the related blocks are geographically dispersed over a large area producing multiple clock cycle latency periods for signals between blocks. Complete flexibility of physical block start up is achieved by software control which permits the sequence and number of physical blocks started simultaneously. | 2012-09-06 |
20120226920 | SYSTEMS AND METHODS OF DATA TRANSMISSION AND MANAGEMENT - Data communications systems and methods comprise a conductive media infrastructure in communication with a baseband data universe propagating at least one first signal and a broadband data universe propagating at least one second signal. At least one segmentation device is in communication with the conductive media infrastructure and partitions the broadband data universe from the baseband data universe. A coupling device is in communication with the at least one segmentation device and modulates transmission parameters of the second signal such that information travels within the broadband data universe via the conductive media infrastructure and avoids the baseband data universe. Power distribution and management systems and methods are also provided which preserve power distribution via a baseband data universe while one or more devices communicate energy data via a broadband data universe | 2012-09-06 |
20120226921 | METHOD AND APPARATUS FOR IMAGE PROCESSING - An image processing apparatus includes a chipset unit which processes data; a connector which includes a plurality of terminals, and is configured to connect with a cable so that the chipset unit can transmit and receive a signal to and from an external device; a switching unit which supplies power to the external device through a first terminal of the connector, and selectively controls a switching operation regarding whether or not to supply power to the first terminal on the basis of a signal state of a second terminal of the connector when the cable is connected to the connector. A control method of the image processing apparatus is also disclosed. | 2012-09-06 |
20120226922 | CAPPING DATA CENTER POWER CONSUMPTION - Example systems, methods and articles of manufacture to cap data center power consumption are disclosed. A disclosed example system includes a group power capper to allocate a fraction of power for a data center to a portion of the data center, a domain power capper to allocate hosted applications to a server of the portion of the data center to comply with the allocated portion of the power, and a local power capper to control a first state of the server and a second state of a cooling actuator associated with the portion of the data center to comply with the allocated portion of the power. | 2012-09-06 |
20120226923 | POWER CONSUMPTION CONTROLLER, A POWER CONSUMPTION CONTROL SYSTEM, A POWER CONSUMPTION CONTROL METHOD AND A PROGRAM THEREOF - A power consumption controller includes an input power monitoring unit, a load information monitoring unit, a redundancy configuration unit and a power control unit. The input power monitoring unit monitors an input power to a unit including a plurality of components. The load information monitoring unit measures a load of each of the components. The redundancy configuration unit stores information regarding an operation state of each of the components and extracts information regarding a configuration in which redundancy is maintained even if one of the components in operation is stopped. The power control unit detects whether or not the input power is over a predetermined value, selects a component having the smallest load among the components of the extracted configuration when the input power is over the predetermined value and switches the selected component into a power saving mode. | 2012-09-06 |
20120226924 | INTERFACE CIRCUIT SYSTEM AND METHOD FOR PERFORMING POWER MANAGEMENT OPERATIONS IN CONJUNCTION WITH ONLY A PORTION OF A MEMORY CIRCUIT - A memory circuit power management system and method are provided. An interface circuit is in communication with a plurality of memory circuits and a system. In use, the interface circuit is operable to perform a power management operation in association with only a portion of the memory circuits. | 2012-09-06 |
20120226925 | METHOD FOR SWITCHING OPERATING SYSTEM AND ELECTRONIC APPARATUS USING THE SAME - A method for switching an operating system (OS) and an electronic apparatus are provided. While switching to a first OS, a system firmware stored in a memory unit declares that a first segment of a system memory is in a usable state and a second segment of the system memory is in a reserved state by using a first resource description table, so that the first OS is in a working state in the first segment and a second OS is in a power-saving state in the second segment. While switching to the second OS, the system firmware declares that the second segment is in the usable state and the first segment is in the reserved state by using a second resource description table, so that the second OS is in the working state and the first OS is in the power-saving state. | 2012-09-06 |
20120226926 | INDEPENDENT POWER CONTROL OF PROCESSING CORES - Independent power control of two or more processing cores. More particularly, at least one embodiment of the invention pertains to a technique to place at least one processing core in a power state without coordinating with the power state of one or more other processing cores. | 2012-09-06 |
20120226927 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ADVANCED POWER MANAGEMENT FOR SERIAL ADVANCED TECHNOLOGY ATTACHMENT (SATA)-BASED STORAGE DEVICES - Methods, systems, and non-transitory computer readable media for advanced power management for serial advanced technology attachment (SATA)-based storage devices are disclosed. According to one aspect, the subject matter described herein includes a method for advanced power management of SATA-based storage devices. The method includes, at a SATA-based storage device having a controller, a non-volatile memory for storing data, and a communication interface for communicating with a host, receiving from the host a command to enter a quiescent mode. In response to receiving the command to enter a quiescent mode, the storage device enters a quiescent mode. The storage device receives from the host an indication that the storage device should enter a low power mode. In response to this indication, the storage device puts at least a portion of the non-volatile memory into a low power mode while maintaining at least a portion of the controller in normal power mode. The storage device optionally puts a physical layer interface of the storage device into a low power mode for additional power savings. | 2012-09-06 |
20120226928 | STORAGE DEVICE - The present invention makes is possible to appropriately set the power saving control of the storage device from the management device of the storage device. In addition, the storage device executes control of the power saving for the magnetic disk device after ensuring consistency between an instruction from the administrator and the operating state of the magnetic disk device in the storage device. | 2012-09-06 |
20120226929 | Integrated Circuit Devices Including Detection For Multiple Power Supply Voltages And Related Systems And Methods - A System on Chip (SoC) may include a logic circuit, a plurality of input/output pads, and a plurality of input/output circuits electrically coupled between the logic circuit and respective ones of the plurality of input/output pads. In addition, a voltage detection circuit may be coupled to the plurality of input/output circuits. More particularly, the voltage detection circuit may be configured to detect first and second power supply voltages at the plurality of input/output circuits with the first and second power supply voltages having different on-state voltage levels. Related methods are also discussed. | 2012-09-06 |
20120226930 | System and Method for Handling a Power Outage - A method for reporting a power outage to a communications controller includes detecting the power outage, and selecting a transmission slot from a plurality of transmission slots in order to report the power outage to the communications controller, the transmission slot selected according to a non-uniform probability distribution function, the non-uniform probability distribution function is monotonic with time after the power outage. The method also includes transmitting a first power outage indicator to the communications controller in the transmission slot selected. | 2012-09-06 |
20120226931 | SERVER, A METHOD, A SYSTEM AND A PROGRAM THEREOF - A server includes a monitor unit configured to monitor a failure of one or more user networks and a recovery support unit configured to support a recovery of the failure of one or more user networks. When detecting an alarm showing occurrence of the failure, the server identifies a user network in which the failure occurs based on both line information for each user network and the alarm, and notifies the alarm to the plurality of management terminals of the identified user network. | 2012-09-06 |
20120226932 | Reducing Data Stream Interruption During Failure of a Firewall Device - A method includes a first firewall device performing a firewall function on a first redundant input data packet and outputting the first redundant input data packet as a first redundant output data packet according to the firewall function. A second firewall device performs only the the same firewall function on a second redundant input data packet and outputs the second redundant input data packet as a second redundant output data packet according to the firewall function. The redundant output data packets are at least substantially similar when the firewall devices are functioning properly. A controller receives the redundant output data packets and transmits at a given time one of the redundant output data packets to a target. The controller transmits the first redundant output data packet to the target while the second device is failed. | 2012-09-06 |
20120226933 | MAINTAINING DATA CONCURRENCY WITH A DISPERSED STORAGE NETWORK - A method begins by a processing module generating a transaction number and generating at least a threshold number of dispersed storage network (DSN) concurrency requests, wherein each of the at least the threshold number of DSN concurrency requests includes a header section and a payload section; each of the payload sections includes the transaction number, a last known slice revision number, and a slice name section, wherein a first slice name section of a first one of the payload sections includes one or more first slice names that includes a first slice name corresponding to a first encoded data slice of a set of encoded data slices; and a second slice name section of a second one of the payload sections includes one or more second slice names that includes a second slice name corresponding to a second encoded data slice of the set of encoded data slices. | 2012-09-06 |
20120226934 | MISSION CRITICAL NAND FLASH - A flash controller reliably stores data in NAND FLASH by encoding data using an encoding algorithm, and storing that data across multiple pages of the memory. In one embodiment, true data is accepted by the controller, and the controller in turn creates coded data that is the bit-for-bit complement of the true data. The true data and the coded data are then written to the NAND FLASH on a page by page basis. A property of the coding techniques used is that, in at least some cases, detected errors can be corrected. | 2012-09-06 |
20120226935 | VIRTUAL RAID-1 DRIVE AS HOT SPARE - Disclosed is a method of providing virtual volumes to at least one host. Physical drives are grouped. Data is mirrored within groups to create a RAID-1 protected virtual drive. Data is also mirrored from the first virtual drive on a second virtual drive to create a hot spare virtual drive to act as a replacement for the RAID-1 protected virtual drive. | 2012-09-06 |
20120226936 | DUPLICATE-AWARE DISK ARRAYS - A duplicate-aware disk array (DADA) leaves duplicated content on the disk array largely unmodified, instead of removing duplicated content, and then uses these duplicates to improve system performance, reliability, and availability of the disk array. Several implementations disclosed herein are directed to the selection of one duplicate from among a plurality of duplicates to act as the proxy for the other duplicates found in the disk array. Certain implementations disclosed herein are directed to scrubbing latent sector errors (LSEs) on duplicate-aware disk arrays. Other implementations are directed to disk reconstruction/recovery on duplicate-aware disk arrays. Yet other implementations are directed to load balancing on duplicate-aware disk arrays. | 2012-09-06 |
20120226937 | DISASTER RECOVERY REPLICATION THROTTLING IN DEDUPLICATION SYSTEMS - Communication is arrested between a source data entity and a replicated data entity at a location declared in a DR mode. The DR mode is negotiated to a central replication management component as a DR mode entry event. The DR mode entry event is distributed, by the central replication management component, to each member in a shared group. The DR mode is enforced using at least one replication policy. | 2012-09-06 |
20120226938 | DATA MIGRATION MANAGEMENT APPARATUS AND INFORMATION PROCESSING SYSTEM - The present invention provides a data migration management apparatus that can easily create a re-execution task for re-executing an error-terminated data migration task, and also can increase the possibility of the re-execution task being successful. In a case where a data migration from a migration-source volume to a migration-destination volume fails, the management apparatus uses the information of the failed task to create a re-execution task. The management apparatus changes the configuration of a volume pair as necessary. The management apparatus manages the failed task in association with the re-execution task. | 2012-09-06 |
20120226939 | ACCELERATING RECOVERY IN MPI ENVIRONMENTS - A computer usable program product for accelerating recovery in an MPI environment is provided in the illustrative embodiments. A first portion of a distributed application executes using a first processor and a second portion using a second processor in a distributed computing environment. After a failure of operation of the first portion, the first portion is restored to a checkpoint. A first part of the first portion is distributed to a third processor and a second part to a fourth processor. A computation of the first portion is performed using the first and the second parts in parallel. A first message is computed in the first portion and sent to the second portion, the message having been initially computed after a time of the checkpoint. A second message is replayed from the second portion without computing the second message in the second portion. | 2012-09-06 |
20120226940 | Self-Expanding Test Automation Method - A method for automatically testing an apparatus controlled by software based on pilot test case file comprising user input sequence data recorded manually and the time stamp of the input. In the process of automated testing, these pre-recorded user inputs are replay with same input sequence but with either the same time interval between two subsequent inputs recorded prior; or with a random time interval autonomously generated in a range set by the test configuration. During the process of replaying user input, a separate plural numbers of background tasks are executed in parallel with random execution delays to generate varying system load and execution timing to simulate the apparatus' unpredictable real operation scenarios. The user input and new random time interval between each user input are recorded at replay as a new expanded test record file for later test result trace and failure analysis. | 2012-09-06 |
20120226941 | DEBUG CARD AND METHOD FOR DIAGNOSING FAULTS - A debug card for diagnosing a motherboard and a power supply unit (PSU) of a same computer includes a plurality of first nixie tubes, a plurality of second nixie tubes, a first port, a second port, and a control unit. The control unit is electronically connected to the plurality of first nixie tubes, the plurality of second nixie tubes, the first port, and the second port. The first port is electronically connected to the motherboard, and the second port is electronically connected to the PSU. Under the control of the control unit, fault codes of the motherboard are displayed by the plurality of the first nixie tubes, and fault codes of the PSU are displayed by the plurality of the second nixie tubes. | 2012-09-06 |
20120226942 | INTERRUPTIBLE NON-DESTRUCTIVE RUN-TIME BUILT-IN SELF-TEST FOR FIELD TESTING - A built-in self-test (BIST) diagnostic system tests the execution of a processor. The processor is arranged to execute a normal application for controlling a process that is external to the processor. The normal execution is executed in normal execution timeslots that have idle timeslots that are interspersed in time between the normal execution timeslots. A BIST controller is arranged to detect the presence of an idle timeslot in the execution of the processor and to use a scan chain to scan-in a first test pattern for a test application for testing the processor. The first test pattern is executed by the processor during the detected idle timeslot and a first result pattern generated by the execution of the first test pattern is scanned-out. The scanned-out first test pattern is evaluated to determine the presence of an error. The first test pattern application is conditionally interruptible. | 2012-09-06 |
20120226943 | SYSTEM AND METHOD TO EFFICIENTLY IDENTIFY BAD COMPONENTS IN A MULTI-NODE SYSTEM UTILIZING MULTIPLE NODE TOPOLOGIES - The exemplary embodiments of the present invention provide a method for efficiently identifying the bad component(s) in a multi-node system. The method includes assigning a unique ID to each of a plurality of nodes on the multi-node system, generating test statistics from a test on a plurality of nodes, and comparing the test statistics for the plurality of nodes against a first topology to generate a first number of clusters of bad nodes. The method further includes comparing the test statistics for the plurality of nodes against a second topology to generate a second number of clusters of bad nodes, and identifying the bad nodes by comparing the cluster sizes to a topology threshold. | 2012-09-06 |
20120226944 | STATIC DATA RACE DETECTION AND ANAYLSIS - Static data race analysis of at least a portion of a multi-threaded application in order to identify potential data race defects in the multi-threaded application. The static data race analysis includes intra-component static analysis as well as inter-component static analysis. The intra-component static analysis for a given component involves identifying a set of memory accesses operations in the component. For each of at least one of the set of memory access operations, the analysis determines whether there is a data race protection element associated with the memory access command. | 2012-09-06 |
20120226945 | PROVIDING AUTOMATIC RETRY OF TRANSACTIONS WITH DIAGNOSTICS - A method, system and computer program product for handling a unit of work in a transaction processing system, in which the system comprises one or more production regions operating minimal or no diagnostic functions and one or more diagnostic regions operating maximal or full diagnostic functions. A unit of work is received, which is routed to a production region. After receiving a notification that the work has failed, the work is routed to a diagnostic region. | 2012-09-06 |
20120226946 | Assist Thread Analysis and Debug Mechanism - A processor recognizes a request from a program executing on a first hardware thread to initiate software code on a second hardware thread. In response, the second hardware thread initiates and commences executing the software code. During execution, the software code uses hardware registers of the second hardware thread to store data. Upon termination of the software code, the second hardware thread invokes a hypervisor program, which extracts data from the hardware registers and stores the extracted data in a shared memory area. In turn, a debug routine executes and retrieves the extracted data from the shared memory area. | 2012-09-06 |
20120226947 | SYSTEM AND METHOD FOR A STAGGERED EXECUTION ENVIRONMENT - A staggered execution environment is provided to safely execute an application program against software failures. In an embodiment, the staggered execution environment includes one or more probe virtual machines that execute various portions of an application program and an execution virtual machine that executes the same application program within a time delay behind the probe virtual machines. A virtualization supervisor coordinates the execution of the application program on one or more probe virtual machines. The probe virtual machines are used to detect and correct software failures prior to the execution virtual machine encountering them. The virtualization supervisor embargos output data in order to ensure that erroneous data is not released which may adversely affect external processes. | 2012-09-06 |
20120226948 | TROUBLE PREDICTION APPARATUS, TROUBLE PREDICTION METHOD, AND COMPUTER PROGRAM PRODUCT - A trouble prediction apparatus includes a trouble-occurred device information storage unit that stores therein trouble occurrence information of trouble-occurred devices in which a trouble has occurred out of a plurality of management target devices; a calculating unit that calculates a trouble occurrence probability based on the trouble occurrence information; and a predicting unit that predicts a trouble of a prediction target device out of the management target devices by referring to the trouble occurrence probability. | 2012-09-06 |
20120226949 | Multi-Channel Bus Protection - An embodiment of the invention provides a method for managing errors on a bus. Information read from a source is encoded. The encoded information is transmitted on a channel that is part of the bus. The encoded information is evaluated. When no errors are detected, the decoded information is provided to a target. When the decoded information has an error or errors that can not be corrected, the source is asked to present the information to the bus again. When an error or errors can be corrected, the corrected information is sent to the target. | 2012-09-06 |
20120226950 | DATA CLASSIFICATION BASED ON CYCLIC REDUNDANCY CHECK AND DECODER METRIC - A method of data classification for use in a wireless communication system includes obtaining decoder metrics from a decoder. The decoder metrics correspond to data generated by the decoder. The decoder metrics include a symbol error rate (SER) and an energy metric (EM). The method also includes classifying the data into a first category if the data fails a cyclic redundancy check (CRC) check, into a second category if the data passes the CRC check and is determined to be unreliable, or into a third category if the data passes the CRC check and is determined to be reliable. A reliability of the data is determined based on the decoder metrics and an EM threshold. | 2012-09-06 |
20120226951 | TEST APPARATUS - Provided is a test apparatus comprising a plurality of pattern output sections. In a high-speed mode, each pattern output section outputs, as pattern data corresponding to at least one of a plurality of partial periods, the pattern data corresponding to an input pattern input to the pattern output section and the pattern data corresponding to input patterns input to other pattern output sections. | 2012-09-06 |
20120226952 | AUTOMATIC IDENTIFICATION OF INFORMATION USEFUL FOR GENERATION-BASED FUNCTIONAL VERIFICATION - a computer-implemented method, an apparatus and a computer program for automatically extracting useful information for functional verification. The method comprising performing repeatedly both operating an instruction generator associated with a Design Under Test (DUT), whereby a generated instruction is determined, the generated instruction having one or more instruction attributes; and collecting information relating to the generated instruction. Based on the generated instruction and the collected information, a classification technique is utilized to classify the information based on the instruction attributes. | 2012-09-06 |
20120226953 | SEMICONDUCTOR INTEGRATED CIRCUIT, DESIGN APPARATUS AND DESIGN METHOD - A semiconductor integrated circuit has one or more of scan chains each having series-connected flip-flops that exist in an internal circuit. Each scan chain is divided into a plurality of segments. Each segment is controllable a timing of a clock signal. The semiconductor integrated circuit has a clock gating circuit capable of being shared by the scan chains and configured to generate a plurality of clock signals for driving each segment, the clock gating circuit being provided for each scan chain, and a segment control signal generator configured to generate a control signal to be used when the clock gating circuit generates the clock signals so that an effect of a fault of the internal circuit is transferred through one of the segments and care bits corresponding to a next fault are captured in a corresponding segment. | 2012-09-06 |
20120226954 | ERROR CORRECTION DECODER AND STORAGE APPARATUS - According to embodiments, an error correction decoder carrying out iterative decoding for coded data based on LDPC code. The decoder comprises a generation unit and an inversion, control unit. The generation unit is configured to generate an inversion node list listing variable nodes connected to check nodes not satisfying a parity check when a code word cannot be obtained after carrying out the iterative decoding a first number of iterations. The inversion control unit is configured to choose a variable node which is a target for inversion from among the variable nodes listed in the inversion node list, and to carry out inversion processing which includes updating an input likelihood of the variable node which is the target for inversion temporarily by inverting a sign of an a posteriori likelihood of the variable node which is the target for inversion. | 2012-09-06 |
20120226955 | METHOD AND APPARATUS FOR FORWARD ERROR CORRECTION (FEC) IN A RESOURCE-CONSTRAINED NETWORK - An electronic device may utilize or support adaptive use of forward error correction (FEC) in a resource-constrained network. The adaptive FEC use may comprise determining whether use of FEC encoding in transmissions from another electronic device to the electronic device is necessary, desirable, and/or feasible, and when use of FEC encoding is deemed feasible and either necessary or desirable, instructing the another electronic device to utilize FEC encoding when transmitting signals destined for the electronic device. Use of FEC encoding may be determined to be feasible, necessary and/or desirable based on power loss associated with the communications from the another electronic device; based on determination of latency associated with the communications from the another electronic device; and/or based on power and/or processing related resources in the electronic device. The electronic device may separately and selectively apply FEC encoding to transmissions to the another electronic device. | 2012-09-06 |
20120226956 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING IN A COMMUNICATION/BROADCASTING SYSTEM - A method and apparatus for transmitting in a communication/broadcasting system is provided. The method includes determining to use an additional parity technique, generating an Nth parity check matrix, where N is an integer, performing Low Density Parity Check (LDPC) encoding using the Nth parity-check matrix, modulating a codeword corresponding to the Nth parity-check matrix, and transmitting the modulated codeword. | 2012-09-06 |
20120226957 | CONTROLLER, DATA STORAGE DEVICE AND PROGRAM PRODUCT - According to an embodiment of a controller, a bit string manipulating unit manipulates a bit string of manipulation target data based on a predetermined rule. A special data setting unit generates a magic number based on a special data setting request from a host interface, obtains an error detecting code for the magic number, and sends the magic number and the error detecting code as manipulation target data to the bit string manipulating unit to obtain a manipulated manipulation target data. The special data setting unit also extracts logical block address information from the special data setting request, and instructs an access unit to write the magic number in the manipulated manipulation target data to a user data storage area and to write the error detecting code in the manipulated manipulation target data to a redundant area in a storage area located by the logical block address information. | 2012-09-06 |
20120226958 | METHOD FOR DETECTING SHORT BURST ERRORS IN LDPC SYSTEM - The present invention is a device for detecting short burst errors. The device includes a first signal input, wherein the first signal input is configured to receive a first signal. The device includes a second signal input, wherein the second signal input is configured to receive a second signal. The device includes a logic gate, wherein the logic gat is operable for receiving the first signal vial the first signal input, receiving the second signal via the second signal input, and generating a logic output gate signal based on the received first signal and the second signal. Furthermore, the device includes a filter, wherein the filter is configured for receiving the logic output gate signal from the logic gate and generates a filter output signal based upon the received logic output gate signal, wherein the filter output signal is operable for flagging errors. | 2012-09-06 |
20120226959 | ADJUSTABLE PROGRAMMING SPEED FOR NAND MEMORY DEVICES - Embodiments of the invention describe methods, systems and apparatuses to improve solid state device (SSD) write speed by efficiently utilizing error correction code executed for the device. SSDs may be comprised of several NAND memory devices. It is understood that such devices tend to have a raw bit error rate (RBER) that is related to the program/erase cycle count for the device. | 2012-09-06 |
20120226960 | RETRIEVAL OF ENCODED DATA SLICES AND ENCODED INSTRUCTION SLICES BY A COMPUTING DEVICE - A computing device includes a central processing unit (CPU) and a memory system module. The CPU includes a data dispersed storage error coding (DSEC) module operable to DSEC decode a set of encoded ingress data slices to recapture ingress data and DSEC encode egress data to produce a set of encoded egress data slices, an instruction DSEC module operable to DSEC decode a set of encoded instruction slices to recapture an instruction, and an arithmetic logic unit (ALU) operable to, execute the instruction on the ingress data and execute the instruction to produce the egress data. The memory system module is operable to coordinate retrieval of the set of encoded ingress data slices from memory, coordinate retrieval of the set of encoded instruction slices from the memory, and coordinate storage of the set of encoded egress data slices in the memory. | 2012-09-06 |
20120226961 | EFFICIENT REDUNDANT MEMORY UNIT ARRAY - A method of storing data is disclosed. A set of data blocks, including a plurality of proper subsets of data blocks, is stored. A plurality of first-level parity blocks is generated, wherein each first-level parity block is generated from a corresponding proper subset of data blocks within the plurality of proper subsets of data blocks without reference to other data blocks not in the corresponding proper subset. A second-level parity block is generated, wherein the second level parity block is generated from a plurality of data blocks included in at least two of the plurality of proper subsets of data blocks, and wherein recovery of a lost block in a given proper subset of data blocks is possible without reference to any data blocks not in the given proper subset. | 2012-09-06 |
20120226962 | WEAR-FOCUSING OF NON-VOLATILE MEMORIES FOR IMPROVED ENDURANCE - Storing data in memory using wear-focusing techniques for improved endurance. A method for storing the data includes receiving write data to be written into a memory that is logically divided into a plurality of regions. The plurality of regions includes a first region and a second region that are implemented by the same memory technology. The memory is subject to degradation as a result of write operations. The write data is classified as dynamic data or static data. The write data is encoded using a first type of encoding in response to the write data being classified as dynamic. The write data encoded using the first type of encoding is stored in the first region of the memory. The write data is encoded using a second type of encoding and stored in the second region of the memory in response to classifying the write data as static data. | 2012-09-06 |
20120226963 | BAD BLOCK MANAGEMENT FOR FLASH MEMORY - Bad block management for flash memory including a method for storing data. The method includes receiving a write request that includes write data. A block of memory is identified for storing the write data. The block of memory includes a plurality of pages. A bit error rate (BER) of the block of memory is determined and expanded write data is created from the write data in response to the BER exceeding a BER threshold. The expanded write data is characterized by an expected BER that is lower than the BER threshold. The expanded write data is encoded using an error correction code (ECC). The encoded expanded write data is written to the block of memory. | 2012-09-06 |
20120226964 | DYNAMIC SYNCHRONIZATION OF DATA CAPTURE ON AN OPTICAL OR OTHER HIGH SPEED COMMUNICATIONS LINK - A method that dynamically adjusts link control parameters of a communications network. The communications network includes a transmitter coupled through a first data link to a receiver. The transmitter and receiver each have at least one associated link control parameter that affects the operation of that component. According to one method, data signals are transmitted over the first data link and the transmitted data signals are captured. The values of the captured data signals are compared to expected values for those signals, and the values of the link control parameters are adjusted to successfully capture the transmitted digital signals. | 2012-09-06 |
20120226965 | Reliable Data Transmission with Reduced Bit Error Rate - A data transmission system includes at least one transmission line. A sender is configured to send data frames to the at least one transmission line and a recipient is configured to receive the data frames from the at least one transmission line. The sender and the recipient are both configured to determine a check sum based on a plurality of corresponding data frames that are sent to and, respectively, received from the at least one transmission line. A check sum comparing unit is configured to receive and to compare the check sum determined by the sender and the corresponding check sum determined by the recipient. The check sum comparing unit is also configured to signal a transmission error or initiate a safety function when the check sums compared are not equal. | 2012-09-06 |
20120226966 | System and Method for Device Identification in a Communications System - A method of transmitting an information sequence in a message includes embedding a first information sequence into an original payload of the message to produce an augmented payload and generating an original error check code using the augmented payload, the original error check code derived from the first information sequence. The method also includes transmitting the message, the message including the original payload and the original error check code. | 2012-09-06 |
20120226967 | Spreadsheet-Based Graphical User Interface for Modeling of Products Using the Systems Engineering Process - A spreadsheet environment is used as a graphical user interface for depicting and interacting with the various aspects of a system. In particular, the spreadsheet environment supports using OMG SysML to model a system and to execute tasks associated with the systems engineering process. | 2012-09-06 |
20120226968 | ENHANCED BROWSER NAVIGATION - A method is provided for processing a Web page for display on a device in communication with a server when the Web page is selected by a user clicking on a hyperlink. The method comprises the following steps. Text associated with a link label of the hyperlink is stored. The stored text is used to identify a relevant portion of the Web page that is desired by the user. At least a portion of a Web page identified by a link destination of the hyperlink is retrieved. The relevant portion of the Web page is presented to the user. A computer readable medium comprising instructions for executing the method and a computing device configured to execute the instructions are also provided. | 2012-09-06 |
20120226969 | SYSTEM FOR AUTOMATICALLY FILLING IN PAPER FORMS WITH ELECTRONIC DATA - Embodiments of the disclosed technology provide a system and method for automatically filling paper form with electronic data. The system receives from a user a scanned image of a paper form that includes a plurality of fields. The system then retrieves a schema map that maps the plurality of fields in the paper form to a plurality of fields in an electronic data record associated with the user. Next, the system retrieves data values of the fields in the electronic data record based on the schema map. The system also synthesizes the retrieved data values and the scanned image to create an image of the paper form in which the fields are filled with the retrieved data values. | 2012-09-06 |
20120226970 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR GENERATING BROWSER-EXECUTABLE SOFTWARE PROGRAM TO PRESENT WEB PAGE AS MOBILE APPLICATION - A browser-executable software program for presenting a web page that provides the “look and feel” and functionality of a mobile application can be automatically generated from a mobile application specification. The mobile application specification identifies one or more predetermined content component types and one or more associated content sources. For each content component type, a copy of a corresponding code generation template is populated with a URL for each corresponding content source and executed to produce browser-executable program code. The browser-executable program code is then embedded into a populated copy of a navigation container code template to form a complete browser-executable software program, which is integrated into an HTML page. The HTML page can be returned in response to a request from a browser executing on a networked mobile wireless telecommunication computing device and the HTML page carries the browser-executable software program to the browser. | 2012-09-06 |
20120226971 | System and method for harmonious tiling search and publishing - A new approach is proposed that contemplates systems and methods to provide harmonious tiling layout for a single heterogeneous data feed with a unique and brief syntax. The approach provides solutions to fit shapes into a container without having any holes by automatically providing the most optimum harmonious layout and tile presentation “win-out” over time, and a survival of the fittest of visual presentation based on configurable metrics. A single user interface combines the action of searching and publishing as a single process whereby search results are formatted with the intention to facilitate publishing the chosen items. | 2012-09-06 |
20120226972 | SYSTEMS AND METHODS THERETO FOR ACCELERATION OF WEB PAGES ACCESS USING NEXT PAGE OPTIMIZATION, CACHING AND PRE-FETCHING TECHNIQUE - A method and system for acceleration of access to a web page using next page optimization, caching and pre-fetching techniques. The method comprises receiving a web page responsive to a request by a user; analyzing the received web page for possible acceleration improvements of the web page access; generating a modified web page of the received web page using at least one of a plurality of pre-fetching techniques; providing the modified web page to the user, wherein the user experiences an accelerated access to the modified web page resulting from execution of the at least one of a plurality of pre-fetching techniques; and storing the modified web page for use responsive to future user requests. | 2012-09-06 |
20120226973 | METHOD AND SYSTEM FOR INTELLIGENTLY TRUNCATING CHARACTER STRINGS IN A SERVICE REGISTRY COMPUTING ENVIRONMENT - A method and system for truncating character strings in a computing environment. One implementation involves receiving a list including plural character strings, truncating one or more of the character strings to generate a display list of unique character strings based on determining a truncation location within each string by: for each character string, comparing the string and corresponding Uniform Resource Identifier (URI), if the string is different from the URI, then truncating the beginning of the string, otherwise if the string matches the URI, then truncating the end of the string. | 2012-09-06 |
20120226974 | CONCEPTS AND LINK DISCOVERY SYSTEM - In one embodiment, a method includes receiving a first selection, from a user, indicative of a first concept, the first concept being defined by the presence or absence of a text string in an unstructured data object or a data code stored in a structured data object. The method further includes receiving a second selection, from a user, the second selection indicative of a second concept, the second concept being defined by the presence or absence of a text string in an unstructured data object or a data code stored in a structured data object. The method further includes determining a relationship between the first concept and the second concept, the relationship based on a number of documents from a plurality of documents that include the first concept and the second concept. The method further includes outputting a visual representation of the relationship to a display. | 2012-09-06 |
20120226975 | Object Placeholders in Electronic Documents - An electronic book (“eBook”) reader application executing on an electronic device conserves non-volatile, random access memory by reading from non-volatile memory an electronic document page that includes text and at least one non-textual object (e.g., an image), storing the read electronic document page in volatile memory such that the at least one non-textual object is replaced with a placeholder that occupies less memory than the non-textual object (e.g., a blank rectangle having the same dimensions as the image), determining that the electronic document page stored in volatile memory is likely to be displayed imminently, and replacing the placeholder in the stored electronic document page with the non-textual object. | 2012-09-06 |
20120226976 | SCROLL-BASED SERIALIZED BOOK READER - A method and a device are disclosed for a reader application configured to run on a computing device. The scrolling reader application, when run on the computing device, causes the computing device to display a scrolling text stream field, a control panel configured to control the scrolling of the text stream, a status line including at least a page number and a line number, and several special-function elements including a table of content button, a current position button, and an index button. The scrolling reader application may further include a module to serialize a text document into a character array usable to form a text stream. | 2012-09-06 |
20120226977 | SYSTEM AND METHOD FOR TOUCHSCREEN KNOB CONTROL - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for controlling a user interface. A system configured to practice the method displays a user interface element, such as a knob, on a touch-sensitive display. The system receives input from a user associated with the user interface element via the touch-sensitive display. For example, the user can provide input to the knob via a tap, twist, flick, press-and-hold, drag, slide, or other touch-based input with a single or multiple fingers or other points of contact. The system matches the input to an input category selected from a group of predefined input categories for the user interface element, and updates the user interface element based on the input and based on the input category. The system can also update a value represented by the user interface element, such as a value that affects output or other settings of a software application. | 2012-09-06 |
20120226978 | Graphical User Interface Having An Orbital Menu System - A graphical user interface for display on a touchscreen display of an electronic user device includes an orbital menu that has a plurality of displayed selectable icons arranged in a first essentially circular pattern, wherein the selectable icons are a predetermined number of otherwise available icons for a current menu level of the orbital menu. In certain embodiments, the available icons are user selectable so as to be able to access device functions, menu levels, device options, etc. The orbital menu may include a number of hidden icons, which correspond to the remaining available icons that otherwise exceed the predetermined number. Additionally, the orbital menu may include a graphical representation of the selectable icons as spinning along the first essentially circular pattern in response to a user contact of the orbital menu provided using the touchscreen display. | 2012-09-06 |
20120226979 | Navigation of a Graphical User Interface Using Multi-Dimensional Menus and Modes - A graphical user interface for display on a touchscreen display of an electronic user device includes operating modes arranged along at least a two dimensional plane of the graphical user interface, where the operating modes include at least a media play mode and a media capture mode. The graphical user interface also includes a currently-active view of a first operating mode displayed on the touchscreen display, where the currently-active view is changeable from the first operating mode to a second operating mode in response to a user input. Additionally, the graphical user interface includes a graphical representation of the second operating mode which is displayed on the touchscreen display as the currently-active view following the user input, where the user input corresponds to an instruction to navigate in a direction of the at least two dimensional plane of the graphical user interface which corresponds to the second operating mode. | 2012-09-06 |
20120226980 | RENDERING A WEB PAGE COMPRISING PLUG-IN CONTENT - A method and system are described of rendering a web page comprising plug-in content at one or more locations in the web page. Not all plug-in content of the web page is automatically played. Instead, the user is enabled to select the plug-in content at a location for playing ( | 2012-09-06 |
20120226981 | CONTROLLING ELECTRONIC DEVICES IN A MULTIMEDIA SYSTEM THROUGH A NATURAL USER INTERFACE - Technology is provided for controlling one or more electronic devices networked in a multimedia system using a natural user interface. Some examples of devices in the multimedia system are audio and visual devices for outputting multimedia content to a user like a television, a video player, a stereo, speakers, a music player, and a multimedia console computing system. A computing environment is communicatively coupled to a device for capturing data of a physical action, like a sound input or gesture, from a user which represents a command. Software executing in the environment determines for which device a user command is applicable and sends the command to the device. In one embodiment, the computing environment communicates commands to one or more devices using a Consumer Electronics Channel (CEC) of an HDMI connection. | 2012-09-06 |
20120226982 | VIDEO DISPLAY DEVICE AND MENU SCREEN DISPLAY METHOD - According to one embodiment, a video display device includes a menu screen display module. The menu screen display module displays a menu screen. The menu screen includes at least two hierarchical levels. A higher hierarchical level includes a first group formed by arranging select elements representing classifications of various functions related to video image displaying. A lower hierarchical level includes a second group formed by arranging select elements representing the functions. Upon receipt of a signal from a direct key to which one of the classifications represented by the select elements of the higher hierarchical level is assigned, the menu screen display module displays the menu screen in a state in which one of the select elements is selected. Here, the one of the select elements represents the one of the classifications to which the direct key is assigned, and the operation device includes the direct key. | 2012-09-06 |
20120226983 | Copying an Object in an Animation Creation Application - A first input is received in an animation creation application having a user interface showing a virtual-space area for first objects, and a timeline area for second objects representing events. To generate the first input, a user presses and holds an input control while a cursor is over one of the first or second objects. It is determined whether the input control is held for at least a predefined duration. If so, a copy of the object is assigned to the cursor, and the copy is subsequently pasted at another location in the user interface upon the input control ceasing to be held after the cursor is moved to the other location. If the input control does not remain held for at least the predefined duration the copy of the object is not assigned to the cursor. | 2012-09-06 |
20120226984 | COMPUTER METHOD AND SYSTEM AUTOMATICALLY PROVIDING CONTEXT TO A PARTICIPANT'S QUESTION IN A WEB CONFERENCE - Computer method and system provides context in an online meeting, a web conference or other shared slides application. A person (attendee or participant) asking a question does so in the specific section (slide) of the shared application. Screen images of these specific slides are captured and coupled to respective questions. The questions are queued for the presenter. Captured screen images provide context for the questions. Each question selected from the queue by the presenter automatically provides context without interrupting flow of the presentation and online meeting. | 2012-09-06 |
20120226985 | HOSTED VIRTUAL DESKTOP DYNAMIC CONFIGURATION BASED ON END POINT CHARACTERISTICS - In accordance with an example embodiment, there is disclosed herein an apparatus comprising a communication interface configured to receive data representative of a virtual desktop, a user interface, and virtual desktop logic coupled with the communication interface and the user interface. The virtual desktop logic determines capabilities of the user interface and provides a virtual desktop on at least one component of the user interface based on the determined capabilities of the user interface. | 2012-09-06 |
20120226986 | SYSTEMS AND METHODS FOR DISPLAYING BLADE CHASSIS DATA - Systems and methods for displaying blade chassis data are provided. One system includes a memory for storing computer code comprising a blade chassis information module and a processor capable of being in communication with a blade chassis. The processor, when executing the computer code comprising the blade chassis information module, is configured to receive the blade chassis data, create a user interface for the blade chassis data, and display the blade chassis data on the user interface. One method includes receiving blade chassis data, creating a user interface for the blade chassis data, and displaying the blade chassis data on the user interface. Also provided are physical computer storage mediums including a computer program product for performing the above method. | 2012-09-06 |
20120226987 | REALTIME COMMUNICATIONS AND NETWORK BROWSING CLIENT - A graphical user interface is displayed. The graphical user interface includes at least one communication control for managing communications with other network nodes and at least one browser control for navigating to different network resource addresses. Human perceptible realtime output is generated from realtime communication data relating to a realtime communication session with at least one other client network node. In the process of generating of at least some of the human perceptible realtime output, operation of the client network node is managed based on at least one performance target. In the graphical user interface, a graphical representation of a network resource identified in connection with the browser control is displayed. | 2012-09-06 |
20120226988 | System for Information Collation and Display - A system and a method for collating and displaying information, the system comprising display creation means; template creation means; interactive means; editing means; browsing means; and multi-platform deployment means. The system can be used with multiple platforms including web based social networking, mobile based social networking, advertising, enterprise management, and 3rd party support. The method including the steps of enabling interaction with pre-determined information; creating a multi-dimensional templates having surfaces for display of information; displacing the created surfaces said displacement including moving the surfaces, rotating the surfaces and scaling the surfaces up and down; editing the information displayed on the surfaces; browsing information on said surfaces selectively; and deploying the system to be used with multiple platforms. | 2012-09-06 |
20120226989 | POLY VECTORAL REVERSE NAVIGATION - This disclosure relates to navigation and display of information. A plurality of contexts may each include one or more nodes. A first visual display (e.g., presented to a user) may include representations of a first node, a first context and/or two other contexts. The first visual display may be directly navigated to visual representations corresponding to each of the two other contexts, which may include references to the first node. The other contexts may also include one or more other nodes in a collection of nodes. Nodes and contexts can appear as part of a web page or web site, or in other representative forms that allow the display and navigation of complex structures of information. Aspects of this invention include computer programs implemented on computer readable media, situated both local to a user and in client-server configurations. | 2012-09-06 |
20120226990 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus includes a web browser configured to receive screen data from a web server on a network and display a screen based on the screen data. The information processing apparatus stores a script to be used in rewriting the screen data received by the web browser, and executes generation of a file and upload of the generated file according to a user's instruction issued via a screen displayed based on the rewritten screen data after the screen data is rewritten with use of the script. | 2012-09-06 |
20120226991 | SYSTEM AND METHOD FOR PROVIDING ENHANCED MATCHING BASED ON QUESTION RESPONSES - In one example embodiment, an apparatus is provided that includes a central website that interfaces with one or more end users to establish a profile for each of the end users to be used in matching the end users to each other for a potential relationship. Information is provided in the profile and the information includes relevant characteristics of corresponding end users. A first end user is asked one or more questions after their profile is established, the questions being posed to a second end user whose respective profile has also been established and whose profile has already been matched to the first end user's profile. Answers for the questions from the first and second end users are compared and a subsequent message is sent to the first end user if the answers provided by the first end user and the second end user are compatible. | 2012-09-06 |
20120226992 | REMOTE USER INTERFACE MEDIA ADAPTER IN NETWORK BRIDGE - A bridge including an adapter is able to transcode or translate different graphics languages to permit a variety of networked, dissimilar devices, to communicate. The bridge translates an existing application device's graphics/images into a Remote User Interface (Remote UI or RUI) graphics protocol of a rendering device and transmits the translated RUI to the rendering device. The rendering device is then able to display the translated RUI. | 2012-09-06 |