38th week of 2013 patent applcation highlights part 78 |
Patent application number | Title | Published |
20130246993 | METHOD FOR ASSIGNING TERMINAL OF SEMICONDUCTOR PACKAGE, APPARATUS, AND SEMICONDUCTOR PACKAGE - An assignment method of terminals of a semiconductor package executed by an assignment supporting apparatus includes: deciding a maximum allowable distance to be a constraint condition regarding a relative distance between each of the pads and a terminal to be assigned to the pad, and extracting one or a plurality of assigned terminal candidates for each of the pads so that the relative distance between each of the pads and a terminal selected for the pad falls within a range of the maximum allowable distance; and deciding one of the terminals as a assigned terminal based on the assigned terminal candidates and assigning the one of the terminals to one of the pads. The process is a process to assign one of the terminals with priority to a pad having a smallest number of assigned terminal candidates in a not-assigned condition based on the assigned terminal candidates. | 2013-09-19 |
20130246994 | WIRING CHECK DEVICE AND WIRING CHECK SYSTEM - The purpose of the present invention is to provide a wiring check device, a wiring check system, a wiring check method, a wiring check program, and a recording medium, which are capable of taking into account a difference in the shape of a slit to find a risk of the worsening of electromagnetic noise characteristics. A wiring check device comprising: a wiring information acquiring unit for acquiring the wiring information of wiring; a first plane conducting body detecting unit for detecting a first plane conducting body adjacent to the wiring; a crossing wiring determining unit for detecting overlapped projections of the wiring and the first plane conducting body, and determining whether or not the wiring is a crossing wiring crossing a border line between a forming region of the first plane conducting body and a non-forming region of the first plane conducting body; and a closed curve length detecting unit for detecting closed curve length of the border line if it is determined that the wiring is a crossing wiring. | 2013-09-19 |
20130246995 | SYSTEMS, METHODS, AND APPARATUS FOR MODEL-BASED SECURITY CONTROL - An integrated model-driven application development and execution environment enables declaration of a data-role in an application model. The data-role is based on a property of a data entity in the application model. The data-role provides for the enforcement of domain-specific security policies with respect to data elements corresponding to the data entity. | 2013-09-19 |
20130246996 | Declarative Software Application Meta-Model and System for Self-Modification - A solution providing for the dynamic design, use, and modification of models using a declarative software application meta-model that provides for self-modification of a collection of the models is provided. The solution can enable continuous real-time testing, simulation, deployment, and modification of the collection of the models. A model in the collection of the models can represent an entity or a function and can be included in a set of related models. Additionally, a set of related models can include a plurality of sets of related models. The collection of the models can represent, for example, one or more software applications, processes, and/or the like. | 2013-09-19 |
20130246997 | Managing Hardware Implementation and Deployment of a Graphical Program - System and method for managing and specifying hardware implementation of a graphical program. A graphical program that implements an algorithm is stored in a memory of a computer system. The graphical program meets one or more first specified implementation requirements and is targeted for deployment to a programmable hardware element. A plurality of sets of descriptive directives are also stored in the memory, where the descriptive directives are associated with the graphical program and specify one or more additional specified implementation requirements, e.g., memory resource implementations, optimization directives, and so forth, where the additional directives result from programmatic and/or user-specification. Each set of descriptive directives is useable by a synthesis tool to generate a respective hardware configuration program for deployment to the graphical programmable hardware element. | 2013-09-19 |
20130246998 | Interactively Designing a Hardware Implementation of a Graphical Program - System and method for managing and specifying hardware implementation of a graphical program. A graphical program that implements an algorithm is stored in a memory of a computer system. The graphical program meets one or more first specified implementation requirements and is targeted for deployment to a programmable hardware element. A plurality of sets of descriptive directives are also stored in the memory, where the descriptive directives are associated with the graphical program and specify one or more additional specified implementation requirements, e.g., memory resource implementations, optimization directives, and so forth, where the additional directives result from programmatic and/or user-specification. Each set of descriptive directives is useable by a synthesis tool to generate a respective hardware configuration program for deployment to the graphical programmable hardware element. | 2013-09-19 |
20130246999 | METHOD, APPARATUS AND STORAGE MEDIUM FOR CUSTOMIZING APPLICATION - An application registers a first component used by the application with a customizing mechanism, and a component setting unit notifies the customizing mechanism of a second component corresponding to the first component. In accordance with changeover of the second component corresponding to the first component by the component setting unit, the first component executes process using the second unit after the second unit has been changed over. | 2013-09-19 |
20130247000 | DYNAMIC SYNTHESIS OF PROGRAM SYNCHRONIZATION - Dynamic synthesis includes receiving a program P and a specification S that describes desired properties of P. The dynamic synthesis also includes initializing a constraint C to true, enumerating schedules up to a defined limit that satisfy C, and executing a schedule of P. The dynamic synthesis further includes determining whether execution of the schedule violates S. In response to determining that the execution violates S, the dynamic synthesis includes determining whether to avoid future executions of the schedule. In response to determining that future executions of the schedule should be avoided, the dynamic synthesis includes computing a constraint that avoids the future execution, and adding the constraint to C; otherwise, the dynamic synthesis includes selecting another schedule for execution. In response to determining that the execution of the schedule does not violate S, the dynamic synthesis includes selecting another schedule for execution. | 2013-09-19 |
20130247001 | DYNAMIC SYNTHESIS OF PROGRAM SYNCHRONIZATION - Dynamic synthesis includes receiving a program P and a specification S that describes desired properties of P. The dynamic synthesis also includes initializing a constraint C to true, enumerating schedules up to a defined limit that satisfy C, and executing a schedule of P. The dynamic synthesis further includes determining whether execution of the schedule violates S. In response to determining that the execution violates S, the dynamic synthesis includes determining whether to avoid future executions of the schedule. In response to determining that future executions of the schedule should be avoided, the dynamic synthesis includes computing a constraint that avoids the future execution, and adding the constraint to C; otherwise, the dynamic synthesis includes selecting another schedule for execution. In response to determining that the execution of the schedule does not violate S, the dynamic synthesis includes selecting another schedule for execution. | 2013-09-19 |
20130247002 | ABSTRACTING BENEFIT RULES FROM COMPUTER CODE - A method that includes: obtaining a computer code usable to process insurance claims; building a computer readable directed graph representing a control flow of the code, by identifying decisions and actions in the code, the graph comprising nodes connected by edges, some of the nodes being decision nodes associated with the decisions and some of the nodes being action nodes associated with the actions; determining, on the graph, benefit action nodes that are each associated with at least one monetary outcome of a specified insurance claim; identifying all logic paths that lead to each benefit action node by traversing the graph from each benefit action node backwards, each logic path comprising a sequence of preceding decision nodes and action nodes connected by edges, each set of paths being associated with a specified benefit action node representing a benefit rule; and outputting all benefit rules by presenting each specified benefit action vis à vis grouped logic paths associated with the specified benefit action. | 2013-09-19 |
20130247003 | USING GRAMMAR TO SERIALIZE AND DE-SERIALIZE OBJECTS - Aspects of the subject matter described herein relate to serializing and de-serializing objects. In aspects, a serialization engine uses a grammar to serialize data into a binary representation. The serialization engine may call upon a host serialization engine to serialize embedded object that are not directly supported by the environment hosting the serialization engine. The serialization engine may encode the grammar used to serialize the data into the serialized data for use in de-serializing the data. After the object is serialized, the serialized data may be de-serialized when desired by using the grammar. The grammar is such that it causes embedded objects and relationships to be preserved in the serialized representation of the object. | 2013-09-19 |
20130247004 | VISUALLY INDICATING FILE ALLOCATION IN AN INTEGRATED DEVELOPMENT ENVIRONMENT - In a method for allocating a file to a user, a first computer receives, over a network, data monitored by a second computer. The first computer comprises an IDE client. The data comprises data of usage of the file by one or more users in a group of users. The first computer receives a request to allocate the file to a first user in the group. In response to the first computer determining that, based on the data of usage, the file is allocated to a second user in the group, the first computer denies the request. The first computer adds the first user to an end of a queue identifying one or more users in the group that are waiting for the second user to relinquish allocation of the file. The first computer utilizes the data of usage to display the queue in the IDE client. | 2013-09-19 |
20130247005 | SYSTEMS AND METHODS FOR A MOBILE BUSINESS APPLICATION DEVELOPMENT AND DEPLOYMENT PLATFORM - Systems and methods for developing, customizing, and deploying mobile device business applications are provided through a mobile application development and deployment platform. Preferably, these systems and methods are implemented in an Internet based environment that allows non-technical users to build highly-customizable cross-platform mobile applications. The platform allows users to select, input, create, customize, and combine various content, design characteristics, database structure, and application components, such as modules, some of which allow an end user to store and access data in an end user database for business applications. In certain embodiments, the platform allows users to compile and generate a configuration file for the mobile application that can be distributed to end users for execution on various mobile devices and mobile operating systems. When the mobile application is installed on, or executed by the mobile device, the configuration file may enable the retrieval of data associated with the mobile application. | 2013-09-19 |
20130247006 | SOFTWARE WIZARD IMPLEMENTATION FRAMEWORK - A framework for developing and testing a software wizard formalizes, through constraint functions, relationships between different pages of the software wizard. A sequence of user interface (UI) pages of a software wizard is generated in accordance with this framework by carrying out the steps of displaying a first UI page that includes a first UI element for causing a transition to a next UI page of the software wizard, wherein the first UI page is associated with one or more constraint functions, detecting an input event that triggers the one or more constraint functions of the first UI page to produce an output that identifies the next UI page in the sequence of UI pages of the software wizard, and transitioning to the next UI page based on the output. | 2013-09-19 |
20130247007 | MAKING DEBUGGER BEHAVIOR CONDITIONAL ON PAST PROGRAM STATE - A debugger variable is set; the variable is associated with: at least one location within a program to be debugged; and at least one expression that is valid within a scope of the location. A breakpoint associated with a location within the program is also set. Upon encountering the at least one location of the debugger variable during a current run of the program, a value of the at least one expression with which the debugger variable is associated is computed and assigned to the debugger variable. Upon encountering the location of the breakpoint during the current run of the program, the debugger is operated in at least one of a first manner and a second manner, depending on the value of the debugger variable; the first manner is different than the second manner. | 2013-09-19 |
20130247008 | HARDWARE BASED RUN-TIME INSTRUMENTATION FACILITY FOR MANAGED RUN-TIMES - Embodiments of the invention relate to performing run-time instrumentation. Run-time instrumentation is captured, by a processor, based on an instruction stream of instructions of an application program executing on the processor. The capturing includes storing the run-time instrumentation data in a collection buffer of the processor. A run-time instrumentation sample point trigger is detected by the processor. Contents of the collection buffer are copied into a program buffer as a reporting group based on detecting the run-time instrumentation sample point trigger. The program buffer is located in main storage in an address space that is accessible by the application program. | 2013-09-19 |
20130247009 | RUN-TIME INSTRUMENTATION INDIRECT SAMPLING BY INSTRUCTION OPERATION CODE - Embodiments of the invention relate to implementing run-time instrumentation indirect sampling by instruction operation code. An aspect of the invention includes reading sample-point instruction operation codes from a sample-point instruction array, and comparing, by a processor, the sample-point instruction operation codes to an operation code of an instruction from an instruction stream executing on the processor. A sample point is recognized upon execution of the instruction with the operation code matching one of the sample-point instruction operation codes. The run-time instrumentation information is obtained from the sample point. The run-time instrumentation information is stored in a run-time instrumentation program buffer as a reporting group. | 2013-09-19 |
20130247010 | RUN-TIME INSTRUMENTATION SAMPLING IN TRANSACTIONAL-EXECUTION MODE - Embodiments of the invention relate to implementing run-time instrumentation sampling in transactional-execution mode. An aspect of the invention includes run time instrumentation sampling in transactional execution mode. The method includes determining, by a processor, that the processor is configured to execute instructions of an instruction stream in a transactional-execution mode, the instructions defining a transaction. Completion of storage operations of the instructions is interlocked to prevent instruction-directed storage until completion of the transaction. A sample point is recognized during execution of the instructions while in the transactional-execution mode. Run-time-instrumentation-directed storing is performed, upon successful completion of the transaction, run-time instrumentation information obtained at the sample point. | 2013-09-19 |
20130247011 | TRANSFORMATION OF A PROGRAM-EVENT-RECORDING EVENT INTO A RUN-TIME INSTRUMENTATION EVENT - Embodiments of the invention relate to transforming a program-event-recording event into a run-time instrumentation event. An aspect of the invention includes enabling run-time instrumentation for collecting instrumentation information of an instruction stream executing on a processor. Detecting is performed, by the processor, of a program-event-recording (PER) event, the PER event associated with the instruction stream executing on the processor. A PER event record is written to a collection buffer as a run-time instrumentation event based on detecting the PER event, the PER event record identifying the PER event. | 2013-09-19 |
20130247012 | TRANSFORMATION OF A PROGRAM-EVENT-RECORDING EVENT INTO A RUN-TIME INSTRUMENTATION EVENT - Embodiments of the invention relate to transforming a program-event-recording event into a run-time instrumentation event. An aspect of the invention includes a method for transforming a program-event-recording event into a run-time instrumentation event. The method includes enabling run-time instrumentation for collecting instrumentation information of an instruction stream executing on a processor. The method also includes detecting, by the processor, a program-event-recording (PER) event, the PER event associated with the instruction stream executing on the processor. The method further includes writing a PER event record to a collection buffer as a run-time instrumentation event based on detecting the PER event, the PER event record identifying the PER event. | 2013-09-19 |
20130247013 | CONTROLLING OPERATION OF A RUN-TIME INSTRUMENTATION FACILITY FROM A LESSER-PRIVILEGED STATE - Embodiments of the invention relate to enabling and disabling execution of a run-time instrumentation facility. An instruction for execution by the processor in a lesser privileged state is fetched by the processor. It is determined, by the processor, that the run-time instrumentation facility permits execution of the instruction in the lesser-privileged state and that controls associated with the run-time instrumentation facility are valid. The run-time instrumentation facility is disabled based on the instruction being a run-time instrumentation facility off (RIOFF) instruction. The disabling includes updating a bit in a program status word (PSW) of the processor to indicate that run-time instrumentation data should not be captured by the processor. The run-time instrumentation facility is enabled based on the instruction being a run-time instrumentation facility on (RION) instruction. The enabling includes updating the bit in the PSW to indicate that run-time instrumentation data should be captured by the processor. | 2013-09-19 |
20130247014 | MODIFYING RUN-TIME-INSTRUMENTATION CONTROLS FROM A LESSER-PRIVILEGED STATE - Embodiments of the invention relate to modifying run-time-instrumentation controls (MRIC) from a lesser-privileged state. The MRIC instruction is fetched. The MRIC instruction includes the address of a run-time-instrumentation control block (RICCB). The RICCB is fetched based on the address included in the MRIC instruction. The RICCB includes values for modifying a subset of the processor's run-time-instrumentation controls. The subset of run-time-instrumentation controls includes a runtime instrumentation program buffer current address (RCA) of a runtime instrumentation program buffer (RIB) location. The RIB holds run-time-instrumentation information of the events recognized by the processor during program execution. The values of the RICCB are loaded into the run-time-instrumentation controls. Event information is provided to the RIB based on the values that were loaded in the run-time-instrumentation control. | 2013-09-19 |
20130247015 | PLAN-BASED PROGRAM SLICING - A method for generating a slice from a plan-based representation of a program is provided. The method comprises constructing a plan representation of a program, wherein the plan representation comprises a plurality of nodes, edges, and ports; and receiving one or more slicing criteria from a user. The slicing criteria comprise one or more variable occurrences or statements from the program, according to which a slice is generated from the plan representation. | 2013-09-19 |
20130247016 | METHOD AND SYSTEM FOR CONTAINMENT OF USAGE OF LANGUAGE INTERFACES - Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface. | 2013-09-19 |
20130247017 | METHOD AND SYSTEM FOR GENERATING CODE - A computer implemented method and system to generate final code for execution in a runtime environment, the method including creation, via a compiler, of intermediate code from destination source code, wherein the destination source code has been compiled from original source code which includes at least one jump instruction, by omitting the at least one jump instruction, the destination source code existing in a destination programming language and the original source code in a source programming language, loading the intermediate code into an intermediate code manipulation unit, and creation, via the intermediate code manipulation unit, of the final code from the intermediate code, wherein the creation comprises an insertion of at least one jump statement into the final code, and wherein the inserted at least one jump statement is functionally equivalent to the at least one omitted jump instruction. | 2013-09-19 |
20130247018 | EFFICIENT INTERPRETER PROFILING TO OBTAIN ACCURATE CALL-PATH INFORMATION - A method for obtaining accurate call path information in a mixed-mode environment where interpreted methods and non-interpreted methods can call one another is disclosed. In one embodiment, such a method includes generating an event and recording it in a buffer when an interpreted method calls an interpreted method. The method also generates an event and records it in the buffer when an interpreted method calls a non-interpreted method. The method further generates an event and records it in the buffer when a non-interpreted method calls an interpreted method. The method refrains from generating an event when a non- interpreted method calls a non-interpreted method. A corresponding apparatus and computer program product are also disclosed. | 2013-09-19 |
20130247019 | Specifying Memory Resource Implementations for Deployment of a Graphical Program to Programmable Hardware - System and method for managing and specifying hardware implementation of a graphical program. A graphical program that implements an algorithm is stored in a memory of a computer system. The graphical program meets one or more first specified implementation requirements and is targeted for deployment to a programmable hardware element. A plurality of sets of descriptive directives are also stored in the memory, where the descriptive directives are associated with the graphical program and specify one or more additional specified implementation requirements, e.g., memory resource implementations, optimization directives, and so forth, where the additional directives result from programmatic and/or user-specification. Each set of descriptive directives is useable by a synthesis tool to generate a respective hardware configuration program for deployment to the graphical programmable hardware element. | 2013-09-19 |
20130247020 | UPGRADE OF SOFTWARE IMAGES BASED ON STREAMING TECHNIQUE - Releasing a portion of mass memory, relocating memory blocks stored in boot locations of the target software image to the released portion, storing the boot blocks into corresponding boot locations, booting the data-processing entity from the boot blocks in the corresponding boot locations thereby loading a streaming function, and serving each request of reading a selected memory block of the target software image by the streaming function, the streaming function downloading the selected memory block from the external source and storing the selected memory block into the released portion when the selected memory block is not available in the mass memory, or retrieving the selected memory block from the mass memory otherwise. | 2013-09-19 |
20130247021 | ELECTRONIC DEVICE, SYSTEM AND METHOD FOR UPDATING AND UNINSTALLING SOFTWARE - A method for uninstalling and updating software is provided. The method includes: detecting that whether there is at least one icon displayed in the uninstall area or the update area. If there is the icon displayed in the uninstall area, determining a software corresponding to the icon displayed in the uninstall area; and controlling to uninstall the software. If there is the icon displayed in the update area, determining a software corresponding to the icon displayed in the update area; and controlling to update the software. | 2013-09-19 |
20130247022 | IDENTIFYING OPTIMAL UPGRADE SCENARIOS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested. | 2013-09-19 |
20130247023 | System and Method for Updating Network Computer Systems - An update system configured to provide software updates, software patches and/or other data packets to one or more computer systems via a network is disclosed. The update system may interact with a network management system, such as an enterprise management system, to distribute data packets and gather configuration information. The update system may generate and send commands to the network management system. The network management system may carry out the commands to distribute data packets and/or gather configuration information. | 2013-09-19 |
20130247024 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR POPULATING A LIST OF KNOWN WANTED DATA - A system, method, and computer program product are provided for populating a list of known wanted data. In use, an update to data is identified. In addition, a list of known wanted data is populated with the data, in response to the update. | 2013-09-19 |
20130247025 | Method and device for optimizing data updates in operationally approved software applications of aircraft - Optimizing data updates in an operationally approved software application of aircraft, comprising a first software component using a second software component. Following the receipt of a software component comprising an update of said second software component, said received software component is analyzed and a class of the update of said second software component is determined. Depending on said class, the update of said second software component is transmitted to said first software component and/or to a central download system. If the update of said second software component is transmitted to said first software component, said second software component is updated and a configuration report showing said update is created. | 2013-09-19 |
20130247026 | One Click Deployment - Techniques are provided for deploying applications hosted by an application service provider. An application in a first environment is automatically deployed to a second environment in response to receiving a request over a network from the party for whom the second environment is being hosted. The first environment may be an environment where applications are developed by the party over the network. Deployment of the application may entail provisioning of an environment for the application. | 2013-09-19 |
20130247027 | Distribution and installation of solidified software on a computer - Techniques relating to the distribution and installation of solidified (or “frozen”) software on a computer are disclosed. Any additional software installed on the computer after the solidification process will not execute, regardless of whether the installation is initiated or otherwise performed by a person with administrative privilege. The installation of the solidified software can be carried out by installing pre-solidified software, by solidifying the software at the source code level and by solidifying the software by the compiler. The solidification can also be performed when software distributions are manufactured, for example on CDs, or as part of an installation procedure that can run and/or install differently each time. A business process for billing customers for the transfer or usage of solidified software is also disclosed. | 2013-09-19 |
20130247028 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR VALIDATING ONE OR MORE METADATA OBJECTS - In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment. | 2013-09-19 |
20130247029 | METHODS OF TRACKING REMOTE SOFTWARE INSTALLATIONS AND REGISTRATIONS AND RELATED SYSTEMS AND COMPUTER PROGRAM PRODUCTS - Methods of tracking remote software installations at a central server may include receiving an installation message over a network from a user device wherein the installation message indicates, an installation of the software at the user device. After receiving the installation message from the user device, an installation code may be created responsive to receiving the installation message, and the installation code may uniquely identify installation of the software at the user device. The installation code may be transmitted over the network to the user device, and the installation code may be stored at the central server. Related systems and computer program products are also discussed. | 2013-09-19 |
20130247030 | PROVIDING INFORMATION ABOUT A WEB APPLICATION OR EXTENSION OFFERED BY WEBSITE BASED ON INFORMATION ABOUT THE APPLICATION OR EXTENSION GATHERED FROM A TRUSTED SITE - A method for installing an offered web application or browser extension in a web browser includes receiving a user action on a website located at a first internet domain. Information about the offered web application or browser extension not currently installed in the web browser is displayed in response to the user action. The displayed information is provided by a digital marketplace located at a second internet domain distinct from the first internet domain. A correspondence of the displayed information to the offered web application or browser extension is ensured through functionality provided by the web browser. An indication to install the offered web application or browser extension is received from a user, and the web application or browser extension is installed in response to the received indication. | 2013-09-19 |
20130247031 | Method and System for Configuring and Managing Third Party Software, and Management Server - Embodiments of the present invention provide a method and system for configuring and managing third party software and a management server. The method includes registering, by a management server, third party software provided by each service provider and a configuration template corresponding to the third party software. After an application by a user for a service via a customer service terminal succeeds, the management server receives, a configuration instruction delivered by the customer service terminal. The configuration instruction includes information about a service provider providing the service and includes third party software corresponding to the service. The management server notifies a user equipment of downloading the third party software from the service provider. | 2013-09-19 |
20130247032 | Method of and system for computer system state checks - A system for and method of system state analysis of a computational system. The method is comprised of capturing selective state information of a computational system configured to operated with one or more guest machines running on a virtual machine layer and configured to output state information. The state information is then analyzed to for compliance checking. The system for system state analysis is comprised of a storage system, computation hardware configured to run the guest machines and the virtual machine layer, guest machines, a virtual machine layer configured to output guest machine state information, a system state snapshot server configured to control the virtual machine layer for the capture of state information. | 2013-09-19 |
20130247033 | SYSTEM AND METHOD FOR MANAGING VIRTUAL MACHINE CONFIGURATIONS - A method in one example implementation includes receiving a plurality of command messages through a control channel and reconstructing the command messages to determine an intended command for one or more virtual machines on a server device. The command messages include one or more criteria and the intended command corresponds to an operation defined in a policy database. The method also includes determining whether the corresponding operation is permitted by comparing one or more policies associated with the operation to the one or more criteria. The method further includes sending the command messages to the server device if the operation is permitted. In more specific embodiments, the operation may include one of creating, cloning, deleting, starting, stopping, and modifying the one or more virtual machines. | 2013-09-19 |
20130247034 | Method and System for Utilizing Spare Cloud Resources - A cloud computing system including a computing device configured to run virtual machine instances is disclosed. The computing device includes a hypervisor program for managing the virtual machine instances. A customer virtual machine instance is run by the hypervisor program on the computing device, and a grid virtual machine instance is run by the hypervisor program on the computing device. The grid virtual machine instance is configured to run only when a resource of the computing device is not being utilized by the customer virtual machine instance. | 2013-09-19 |
20130247035 | TECHNIQUES FOR MANAGING VIRTUAL MACHINE (VM) STATES - Techniques for managing virtual machine (VM) states are provided. Applications executing within a processing context of a VM communicate outside that processing context with a hypervisor or VM Monitor (VMM) to have the hypervisor perform host operations for the VM. | 2013-09-19 |
20130247036 | INFORMATION PROCESSING APPARATUS, VIRTUAL IMAGE FILE CREATION SYSTEM, AND VIRTUAL IMAGE FILE CREATION METHOD - According to one embodiment, an information processing apparatus is configured to create a virtual image file executing a virtual machine by a virtualization client terminal. The apparatus includes a setting module. The setting module is configured to set, for the virtual image file, a domain name of a domain and a user ID and a password to participate in the domain, when the virtual image file is created. | 2013-09-19 |
20130247037 | CONTROL COMPUTER AND METHOD FOR INTEGRATING AVAILABLE COMPUTING RESOURCES OF PHYSICAL MACHINES - In a method for integrating available computing resources of physical machines in a data center, a user request for installing a virtual machine in a data center and a specified amount of computing resources required by the virtual machine are received from a client computer. If there are no physical machine that satisfies the specified amount of computing resources and a total amount of available computing resources of the physical machines is equal to or greater than the specified amount, a resource collection strategy of the physical machines is set. The available computing resources of the physical machines are collected according to the resource collection strategy, virtual machines previously installed in one of the physical machines are transferred to other physical machines, and the virtual machine required by the client computer is deployed in the one of the physical machines. | 2013-09-19 |
20130247038 | DEVICE-INTEGRATION METHOD, TERMINAL-APPARATUS, AND DISTRIBUTED MULTI-TERMINAL-APPARATUS SYSTEM - A device-integration method, a terminal-apparatus and a distributed multi-terminal-apparatus system. The device-integration method is applied in a terminal-apparatus on which there runs a virtual-machine-hypervisor, and the method includes: the virtual-machine-hypervisor scanning a bus configuration storage unit of the terminal-apparatus, to acquire local-device-information on each of the local devices that the terminal-apparatus has; the virtual-machine-hypervisor sending the acquired local-device-information to an adjacent terminal-apparatus, and receiving, from the adjacent terminal-apparatus, remote-device-information on each of the remote devices that the adjacent terminal has; the virtual-machine-hypervisor organizing the local devices and the remote devices on a virtual bus of the terminal-apparatus. | 2013-09-19 |
20130247039 | COMPUTER SYSTEM, METHOD FOR ALLOCATING VOLUME TO VIRTUAL SERVER, AND COMPUTER-READABLE STORAGE MEDIUM - An embodiment of the invention is a computer system, including a management apparatus, a storage apparatus and a physical server. The management apparatus registers a master volume created from a first volume provided by the storage apparatus to a first virtual server in operation. The storage apparatus creates, when a second volume provided by the storage apparatus to a second virtual server operating on the physical server satisfies a specific similarity condition with respect to the registered master volume, a difference volume for storing difference data between the master volume and a volume of the second virtual server. The second virtual server accesses the difference volume and the master volume. | 2013-09-19 |
20130247040 | VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event. | 2013-09-19 |
20130247041 | AUTOMATICALLY SELECTING OPTIMAL TRANSPORT PROTOCOL IN A CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an optimal transport protocol in a cloud computing environment. An application creates a socket to communicate with a destination Virtual Machine (VM). The application requests a daemon agent to query a virtual machine manager to determine if the destination VM is on the same hypervisor as the application. The daemon agent receives a VMCI address (“context ID”) and an indication of the hypervisor associated with the destination VM from the virtual machine manager. The daemon agent enables the transport layer to route traffic over the VMCI protocol to the destination VM using its context ID in response to the destination VM being on the same hypervisor as the application. In this manner, the application is able to route traffic using an optimal transport protocol, including VMCI, depending on peer hypervisor association without requiring any code modifications to the application. | 2013-09-19 |
20130247042 | Population State-Based Performance Assessment of a Hypervisor - Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-level performance indicators. Higher level performance indicators can be determined based on lower level state assessments. A reviewer can also view historical performance metrics and indicators, which can aid in understanding which configuration changes or system usages may have led to sub-optimal performance. | 2013-09-19 |
20130247043 | Stale Performance Assessment of a Hypervisor - Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-level performance indicators. Higher level performance indicators can be determined based on tower level state assessments. A reviewer can also view historical performance metrics and indicators, which can aid in understanding which configuration changes or system usages may have led to sub-optimal performance. | 2013-09-19 |
20130247044 | INTERACTIVE ARCHITECTURE-BASE PRESENTATION OF HYPERVISOR PERFORMANCE - Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-levet performance indicators. Higher level performance indicators can be determined based on tower level state assessments. A reviewer can also view historical performance metrics and indicators, which can aid in understanding which configuration changes or system usages may have led to sub-optimal performance. | 2013-09-19 |
20130247045 | AUTOMATIC OPTIMIZATION FOR VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing. | 2013-09-19 |
20130247046 | PROCESSING CODE UNITS ON MULTI-CORE HETEROGENEOUS PROCESSORS - A virtual machine can be extended to be aware of secondary cores and specific capabilities of the secondary cores. If a unit of platform-independent code (e.g., a function, a method, a package, a library, etc.) is more suitable to be run on a secondary core, the primary core can package the unit of platform-independent code (“code unit”) and associated data according to the ISA of the secondary core. The primary core can then offload the code unit to an interpreter associated with the secondary core to execute the code unit. | 2013-09-19 |
20130247047 | RECORDING MEDIUM HAVING VIRTUAL MACHINE MANAGING PROGRAM RECORDED THEREIN AND MANAGING SERVER DEVICE - A virtual machine managing program manages plural physical machines and makes a computer device execute processing through virtual machines developed on each physical machine. Virtual machines are assigned to physical machines on the basis of CPU usage rate and temperature, and are moved among the physical machines as needed, to maintain acceptable operating conditions. | 2013-09-19 |
20130247048 | METHOD OF OPERATING A COMMUNICATION DEVICE AND RELATED COMMUNICATION DEVICE - A method is provided for operating a communication device offering a plurality of features by a plurality of virtual machines, which run on a virtualized representation of a plurality of hardware components. The method includes: obtaining a mapping between at least some features of the plurality of features and corresponding sets of virtual machines of the plurality of virtual machines and hardware components of the plurality of hardware components which are required to enable the features; and upon deciding to activate or deactivate at least one group of features of the plurality of features, switching on or off virtual machines of the plurality of virtual machines and hardware components of the plurality of hardware components depending on the mapping. | 2013-09-19 |
20130247049 | CONTROL APPARATUS AND METHOD OF STARTING CONTROL APPARATUS - A control apparatus may include a processor configured to execute one or more programs in order to control a control target, and an accepting unit configured to accept a user input. The processor may start a first program to cause the accepting unit to function at a time of starting the control apparatus, and thereafter start a second program for executing a function selected by the user input accepted by the accepting unit, amongst a plurality of functions executable by the control target, with preference over programs for executing other functions. | 2013-09-19 |
20130247050 | BATCH PROCESSING SYSTEM - The second computer detects performance of processing to record the execution status of a batch job on a storing device, selects a recording method to be used from among a plurality of recording methods according to the detected performance, and notifies the first computer of the result. The first computer records the execution status of the batch job, executed in the own computer, on the storing device, using the recording method notified from the second computer. | 2013-09-19 |
20130247051 | IMPLEMENTATION OF A PROCESS BASED ON A USER-DEFINED SUB-TASK SEQUENCE - Various embodiments of systems and methods for implementation of a process based on a user-defined sub-task sequence are described herein. The process includes a set of sub-tasks. A plan owner defines the sequence in which the one or more sub-tasks are to be processed. In one embodiment, the plan owner defines the sequence by setting a fore-task for each sub-task in the sequence. The plan owner also defines a tester who would be processing each sub-task in the set of sub-tasks. A workflow template is triggered for implementing the process. The workflow template loops on the steps defined in the workflow template for processing each sub-task in the set of sub-tasks according to the sequence defined by the plan owner. Each tester after processing the sub-task assigned to them submits the processed sub-task. The process is implemented after all the sub-tasks in the set of sub-tasks have been processed. | 2013-09-19 |
20130247052 | Simulating Stream Computing Systems - A method, an apparatus and an article of manufacture for generating a synthetic workload for stream computing. The method includes generating an undirected graph that meets a node degree distribution parameter, obtaining a user-defined parameter for at least one feature for at least one stream computing application, and manipulating the undirected graph to generate a synthetic workload for stream computing in compliance with the user-defined parameter for the at least one feature for the at least one stream computing application. | 2013-09-19 |
20130247053 | TRANSACTION-BASED SHARED MEMORY PROTECTION FOR HIGH AVAILABILITY ENVIRONMENTS - Various systems and methods for implementing a transaction-based shared memory protection for high availability environments are described herein. A processing thread is executed, with the processing thread configured to access a multi-stage critical section, the multi-stage critical section haying a first and second stage, the first stage to store a staging area of a plurality of operations to be executed in the memory shared with at least one other processing thread, and the second stage o execute the operations from the staging area. The thread further configured to determine whether the staging area includes an indication of successfully completing the first stage and execute the operations when there is an indication of successfully completing the first stage. | 2013-09-19 |
20130247054 | GPU Distributed Work-Item Queuing - Methods and systems are provided for graphics processing unit distributed work-item queuing. One or more work-items of a wavefront are queued into a first level queue of a compute unit. When one or more additional work-items exist, a queuing of the additional work-items into a second level queue of the compute unit is performed. The queuing of the work-items into the first and second level queue is performed based on an assignment technique. | 2013-09-19 |
20130247055 | Automatic Execution of Actionable Tasks - Provided is a method for automatic execution of actionable tasks, which facilitates the creation of a platform for one-point management of multiple activities and events by enabling automatic performance of various tasks associated with sending wishes and gifts, travel check-ins, travel planning, banking, dining out, making reservations, and other activities. The method may utilize data associated with events or activities from one or more input sources. The method may include identifying one or more actionable tasks, creating one or more automatically executable tasks based on the one or more actionable tasks, executing the created automatically executable actionable tasks, and presenting the results to the user. | 2013-09-19 |
20130247056 | VIRTUAL MACHINE CONTROL METHOD AND VIRTUAL MACHINE - A virtual machine control method and a virtual machine having the dual objectives of utilizing NIC on a virtual machine that creates sub-virtual machines operated by a VMM on virtual machines generated by a hypervisor to avoid software copying by the VMM and to prevent band deterioration during live migration or adding sub-virtual machines. In a virtual machine operating plural virtualization software on a physical machine including a CPU, memory, and multi-queue NIC; a virtual multi-queue NIC is loaded in the virtual machine, for virtual queues included in the virtual multi-queue NIC, physical queues configuring the multi-queue NIC are assigned to virtual queues where usage has started, and the physical queues are allowed direct access to the virtual machine memory. | 2013-09-19 |
20130247057 | MULTI-TASK PROCESSING APPARATUS - A multi-task processing apparatus includes a sequencer for switching and processing multiple task data; a memory for storing the task data, wherein the memory stores/reads the task data between a volatile memory cell and a plurality of associated non-volatile memory cells when the task data is switched. | 2013-09-19 |
20130247058 | SYSTEM FOR SCHEDULING THE EXECUTION OF TASKS BASED ON LOGICAL TIME VECTORS - A method for scheduling interdependent tasks on a multi-task system includes: associating to each task a logical time vector indicative of the current occurrence of the task and the occurrences of other tasks on which the current occurrence depends; defining a partial order on the set of logical time vectors, such that a first vector is greater than a second vector if all first vector components are greater or equal to the respective second vector components, and at least one component of the first vector is strictly greater than the respective component of the second vector; after an execution of a task, updating its logical time vector for a new occurrence by incrementing at least one component of the vector; comparing the logical time vectors according to the partial order relation; and executing each task having a logical time vector smaller than all other logical time vectors. | 2013-09-19 |
20130247059 | CALCULATING AND COMMUNICATING LEVEL OF CARBON OFFSETTING REQUIRED TO COMPENSATE FOR PERFORMING A COMPUTING TASK - During performance of a specified computing task data concerning resource consumption regarding that specified computing task is gathered and stored. Upon completion of the specified computing task, the amount of carbon offset required to compensate for resource consumption associated with performance of the completed specified computing task is calculated based upon stored or known resource consumption data. The calculated amount of carbon offset information may be transmitted to a carbon offset function provider, and a carbon offset function provider implements the specified amount of carbon offset based upon the calculated amounts communicated for the completed specified computing task. | 2013-09-19 |
20130247060 | APPARATUS AND METHOD FOR PROCESSING THREADS REQUIRING RESOURCES - A data processing apparatus has processing circuitry for processing threads using resources accessible to the processing circuitry. Thread handling circuitry handles pending threads which are waiting for resources required for processing. When a request is made for a resource which is not available, a lock is set to ensure that once the resource becomes available, the resource remains available until the lock is removed. This prevents other threads reallocating the resource. When a subsequent pending thread requests access to the same locked unavailable resource, the lock is transferred to that subsequent thread so that the latest thread accessing that resource is considered the lock owning thread. The lock is removed once the lock owning thread is ready for processing. | 2013-09-19 |
20130247061 | METHOD AND APPARATUS FOR THE SCHEDULING OF COMPUTING TASKS - Described herein are methods and related apparatus for the allocation of computing resources to perform computing tasks. The methods described herein may be used to allocate computing tasks to many different types of computing resources, such as processor cores, individual computers, and virtual machines. Characteristics of the available computing resources, as well as other aspects of the computing environment, are modeled in a multidimensional coordinate system. Each coordinate point in the coordinate system corresponds to a unique combination of attributes of the computing resources/computing environment, and each coordinate point is associated with a weight that indicates the relative desirability of the coordinate point. To allocate a computing resource to execute a task, the weights of the coordinate points, as well as other related factors, are analyzed. | 2013-09-19 |
20130247062 | VERIFYING SYNCHRONIZATION COVERAGE IN LOGIC CODE - A computer implemented system and method for measuring synchronization coverage for one or more concurrently executed threads is provided. The method comprises updating an identifier of a first thread to comprise an operation identifier associated with a first operation, in response to determining that the first thread has performed the first operation; associating the identifier of the first thread with one or more resources accessed by the first thread; and generating a synchronization coverage model by generating a relational data structure of said one or more resources, wherein a resource is associated with at least the identifier of the first thread and an identifier of a second thread identifier, such that the second thread waits for the first thread before accessing said resource. | 2013-09-19 |
20130247063 | COMPUTING DEVICE AND METHOD FOR MANAGING MEMORY OF VIRTUAL MACHINES - In a method for managing memory of virtual machines in a computing device, a user request for allocating a specified amount of memory of the computing device to a virtual machine is received. If the available memory of the computing device is less than the specified amount of memory, total idle memory of all the virtual machines in the computing device is calculated. If the total idle memory is less than the specified amount of memory, an average release memory of the virtual machines in the computing device is calculated. The idle memory of the virtual machines is released according to the average release memory. | 2013-09-19 |
20130247064 | SYSTEM AND METHOD OF CO-ALLOCATING A RESERVATION SPANNING DIFFERENT COMPUTE RESOURCES TYPES - Co-allocating resources within a compute environment includes. Receiving a request for a reservation for a first type of resource, analyzing constraints and guarantees associated with the first type of resource, identifying a first group of resources that meet the request for the first type of resource and storing in a first list, receiving a request for a reservation for a second type of resource, analyzing constraints and guarantees associated with the second type of resource, identifying a second group of resources that meet the request for the second type of resource and storing in a second list, calculating a co-allocation parameter between the first group of resources and the second group of resources and reserving resources according to the calculated co-allocation parameter of the first group of resources and the second group of resources. The request may also request exclusivity of the reservation. | 2013-09-19 |
20130247065 | APPARATUS AND METHOD FOR EXECUTING MULTI-OPERATING SYSTEMS - An apparatus and method for executing multi-operating systems (OS) are provided. Resources allocated to the respective multi-OSs are managed by management applications of the multi-OSs. A processor executes a plurality of multi-OSs. Each of the plurality of multi-OSs executes the management application. Each of the plurality of multi-OSs regards a resource held by another multi-OS among the plurality of multi-OSs as used by the corresponding management application, thereby preventing the resource from being allocated to another application included in the multi-OS. | 2013-09-19 |
20130247066 | Process Scheduler Employing Adaptive Partitioning of Process Threads - A system includes a processor and memory storage units storing software code. The software code comprises code for a scheduling system and for generating a plurality of adaptive partitions that are each associated with one or more process threads and that each have a corresponding processor budget. The code also is executable to, when the system is under a normal load, allocate the processor to one of the threads that is in a ready state and has the highest priority among the process threads that are in a ready state. The code is also executable to, when the system is in overload, allocate the processor to one of the process threads that is in a ready state and has the highest priority among the process threads that are in a ready state and for which the adaptive partition that the process thread is associated with has available guaranteed processor budget. | 2013-09-19 |
20130247067 | GPU Compute Optimization Via Wavefront Reforming - Methods and systems are provided for graphics processing unit optimization via wavefront reforming including queuing one or more work-items of a wavefront into a plurality of queues of a compute unit. Each queue is associated with a particular processor within the compute unit. A plurality of work passes are performed. A determination is made which of the plurality of queues are below a threshold amount of work-items. Remaining one or more work-items from the queues with remaining ones of the work-items are redistributed to the below threshold queues. A subsequent work pass is performed. The, repeating of the determining, redistributing, and performing the subsequent work pass is done until all the queues are empty. | 2013-09-19 |
20130247068 | LOAD BALANCING METHOD AND MULTI-CORE SYSTEM - A multi-core system includes at least three cores, a load comparator and a load migrator. The comparator simultaneously compares at least three loads of the at least three cores to detect a maximum load and a minimum load. The load migrator determines a first core having the maximum load as a source core and a second core having the minimum load as a target core of the at least three cores to migrate tasks from the source core to the target core. | 2013-09-19 |
20130247069 | Creating A Checkpoint Of A Parallel Application Executing In A Parallel Computer That Supports Computer Hardware Accelerated Barrier Operations - In a parallel computer executing a parallel application, where the parallel computer includes a number of compute nodes, with each compute node including one or more computer processors, the parallel application including a number of processes, and one or more of the processes executing a barrier operation, creating a checkpoint of a parallel application includes: maintaining, by each computer processor, global barrier operation state information, the global barrier operation state information includes an aggregation of each process's barrier operation state information; invoking, for each process of the parallel application, a checkpoint handler; saving, by each process's checkpoint handler as part of a checkpoint for the parallel application, the process's barrier operation state information; and exiting, by each process, the checkpoint handler. | 2013-09-19 |
20130247070 | METHOD AND SYSTEM FOR VIRTUALIZATION OF SOFTWARE APPLICATIONS - A method of virtualizing an application to execute on a plurality of operating systems without installation. The method includes creating an input configuration file for each operating system. The templates each include a collection of configurations that were made by the application during installation on a computing device executing the operating system. The templates are combined into a single application template having a layer including the collection of configurations for each operating system. The collection of configurations includes files and registry entries. The collections also identifies and configures environmental variables, systems, and the like. Files in the collection of configurations and references to those files may be replaced with references to files stored on installation media. The application template is used to build an executable of the virtualized application. The application template may be incorporated into a manifest listing other application templates and made available to users from a website. | 2013-09-19 |
20130247071 | SYSTEM AND METHOD FOR EFFICIENT SHARED BUFFER MANAGEMENT - A method for managing a shared buffer between a data processing system and a network. The method provides a communication interface unit for managing bandwidth of data between the data processing system and an external communicating interface connecting to the network. The method performs, by the communication interface unit, a combined de-queue and head drop operation on at least one data packet queue within a predefined number of clock cycles. The method also performs, by the communication interface unit, an en-queue operation on the at least one data packet queue in parallel with the combined de-queue operation and head drop operation within the predefined number of clock cycles. | 2013-09-19 |
20130247072 | METHOD AND APPARATUS FOR BANDWIDTH ALLOCATION MODE SWITCHING BASED ON RELATIVE PRIORITIES OF THE BANDWIDTH ALLOCATION MODES - A system, apparatus, and method for allocation mode switching on an event-driven basis are described herein. The allocation mode switching method includes detecting an event, selecting a bandwidth allocation mode associated with the detected event, and allocating a plurality of execution cycles of an instruction execution period of a processor core among a plurality of instruction execution threads based at least in part on the selected bandwidth allocation mode. Other embodiments may be described and claimed. | 2013-09-19 |
20130247073 | SYSTEMS AND METHODS FOR ENHANCING FIRMWARE - A measuring instrument includes at least one processor having at least one processor internal resource. The measuring instrument may also include at least one hardware component external to the processor and at least one storage component. Firmware may be stored in the storage component and is accessible by the processor. The firmware includes at least one application; a virtualized hardware system having routines that emulate at least one processor internal resource; and at least one application programming interface between the application and the virtualized hardware system. | 2013-09-19 |
20130247074 | IMAGE FORMING DEVICE, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM - In an image forming device which is capable of executing an application program, a plurality of interface providing units are arranged each providing the application program with an interface which enables the application program to use a function of the image forming device. A selecting unit selects at least one of the plurality of interface providing units as an object of use for the application program based on a result of comparison of information stored in a storage device and indicating an execution environment of each of the plurality of interface providing units with information stored in the storage device and indicating an execution environment of the image forming device. | 2013-09-19 |
20130247075 | INFORMATION RECORDING MEDIUM AND HOLDING DEVICE FOR HOLDING INFORMATION RECORDING MEDIUM - An information recording medium | 2013-09-19 |
20130247076 | SPINDLE STRUCTURE AND OPTICAL DISC DRIVE INCLUDING THE SPINDLE STRUCTURE - A spindle structure for an optical disc and an optical disc drive employing the spindle structure are provided. The spindle structure includes a spindle motor having a rotation axis, a spindle that is coupled to the rotation axis, and a sliding cone coupled to the spindle and inserted into a center hole of the optical disc. The sliding cone includes a plurality of hook-shaped guide rods extended toward the spindle, and the spindle includes guide holes, to which the plurality of hook-shaped guide rods are inserted into and coupled. | 2013-09-19 |
20130247077 | PROGRAM GUIDE SYSTEM FOR RECORDING TELEVISION PROGRAMS - An interactive program guide system is provided. The system facilitates recording of programs selected from the program guide. The system handles the recording and viewing of pay programs, parentally-controlled programs, consecutive programs on different television channels, and programs with and without copy protection. Programs may be recorded using combination television videocassette recorder (TV/VCR) units. | 2013-09-19 |
20130247078 | EMOTICONS FOR MEDIA - Disclosed are systems and techniques that generate a set of measures for one or more users to rate media content. A user, for example, indicates her emotions towards the media content according to one or more various inputs. As inputs are received, the inputs are analyzed and associated with at least one of the set of measures to rate the media content according to an emotion. For example, the set of measures include images that indicate various emotions. These measures are associated with the inputs received from the one or more users, and used to evaluate the media content according to the one or more users emotions detected. Therefore, potential users have additional metrics for evaluating potential media content before purchasing, viewing, interacting with, or sharing the media content. | 2013-09-19 |
20130247079 | REMOTE MONITORING METHOD FOR SMART TV, AND SMART TV SYSTEM - A remote monitoring method and apparatus for a smart TV and a smart TV system are provided. Real-time status information of the smart TV and/or an external device is retrieved and transmitted to a remote device, such that the remote device in real-time monitors the smart TV and/or the external device according to the real-time status information. Real-time monitoring on smart appliances in a smart appliance control system can be achieved without requiring additional dedicated devices, thereby lowering production costs and maintenance costs as well as saving resources and enhancing user experiences. | 2013-09-19 |
20130247080 | EMPIRICAL AD POD DETECTION - A system and method for analyzing the viewing behavior of end users that are viewing video content to determine the likely presence of one or more advertisements being viewed and to assess the viewers who stop viewing during the course of such advertisements. The system periodically or continuously receives tune data reflecting the viewing behavior of end users, analyzes the cumulative viewing behavior reflected by the received tune data, and delivers a report of the analysis to advertisers, agencies, media sellers, or other parties that are interested in measuring the effectiveness of advertisements on end users. The analysis by the system can be done over multiple different types of content-distribution platforms. | 2013-09-19 |
20130247081 | SYSTEM AND METHOD FOR MEASURING TELEVISION AUDIENCE ENGAGEMENT - A system and method are disclosed that measures audience engagement with a program based on the time a user spends viewing the program. A program's ability to retain viewers is referred to as the “stickiness” of the program. The viewership for a program is determined by the system and then compared to viewership of various other programs in order to assess the audience retention for the analyzed program as compared to the retention of the other programs. The system calculates a “stickiness index” for the program, which is a numerical representation of the analyzed program's stickiness as compared to the average of the other programs. The system may generate a report including the analyzed data and calculated stickiness index for advertisers, agencies, media sellers, or other parties that are interested in assessing viewership of the analyzed program. | 2013-09-19 |
20130247082 | Method and System for Identification of Distributed Broadcast Content - A method and system of performing high-throughput identifications of broadcast content is provided. A device can send a content identification query, which includes a sample of content being broadcast, to a server to request an identity of the content. The server will perform a computational identification of the content, return the result to the device, and store the result. For all subsequently received content identification queries requesting an identity of content being broadcast from the same source and in a time during which the content is still being broadcast from the source, the server will send the stored content identification in response to the subsequent queries. If a subsequent content identification query does not request the identity of content being broadcast from the same source or is not received during the time that the content is still being broadcast, the server will perform a computational identification of a content sample. | 2013-09-19 |
20130247083 | SYSTEMS AND METHODS FOR MATCHING AN ADVERTISEMENT TO A VIDEO - Systems and methods for automatically matching in real-time an advertisement with a video desired to be viewed by a user are provided. A database is created that stores one or more attributes (e.g., visual metadata relating to objects, faces, scene classifications, pornography detection, scene segmentation, production quality, fingerprinting) associated with a plurality of videos. Supervised machine learning can be used to create signatures that uniquely identify particular attributes of interest, which can then be used to generate the attributes associated with the plurality of videos. When a user requests to view an on-line video having associated with it an advertisement, an advertisement can be selected for display with the video based on matching an advertiser's requirements or campaign parameters with the stored attributes associated with the requested video, with the user's information, or a combination thereof. The displayed advertisement can function as a hyperlink that allows a user to select to receive additional information about the advertisement. The performance or effectiveness of the selected advertisements can be measured and recorded. | 2013-09-19 |
20130247084 | Delivery Forecast Computing Apparatus for Display and Streaming Video Advertising - A computer-driven apparatus coupled to a network receives data from metadata sources and consumers' display devices. From the sources, the apparatus collects metadata concerning characteristics of a given item of host video and a proposed class of advertisements for web delivery proximate or embedded in the given item. The apparatus continually monitors actual delivery of the given item by receiving transmissions from consumers' display devices. The apparatus develops initial forecasting inputs based on historical data from similar host videos, and then adjusts the forecasting inputs based on the actual deliveries. These forecasting inputs are used to compute an interim supply of advertising opportunities associated with the given item, which is reduced by relevant factors to provide a net available supply forecast. The apparatus provides a human-readable display of information including the net available supply forecast. | 2013-09-19 |
20130247085 | METHOD FOR GENERATING VIDEO MARKUP DATA ON THE BASIS OF VIDEO FINGERPRINT INFORMATION, AND METHOD AND SYSTEM FOR PROVIDING INFORMATION USING SAME - The present invention relates to a method for generating video markup data on the basis of video fingerprint information, and to a method and system for providing information using same; and more particularly, to a method and system for conveniently and efficiently providing a variety of pieces of information, such as object-related advertising information, on the basis of video markup data which are generated in consideration of object information relating to objects in a video and of the fingerprint information of the video. | 2013-09-19 |
20130247086 | Method and apparatus for providing content control via detection of modifications to a signal - A method and apparatus is provided for generating or providing any of various types of modifications purposely made to generally known signals, waveforms, conditions, functions, etc. The modifications are sensed, read, detected or interpreted to provide a content control command indicative of the difference between the original signal, waveform, condition, functions, etc., and the modified signal, waveform, condition, function, etc. The content control command may be used to provide content control for a content control system, which in turn may provide control of a selected compliant device. | 2013-09-19 |
20130247087 | PROGRAM GUIDE SYSTEM FOR RECORDING TELEVISION PROGRAMS - An interactive program guide system is provided. The system facilitates recording of programs selected from the program guide. The system handles the recording and viewing of pay programs, parentally-controlled programs, consecutive programs on different television channels, and programs with and without copy protection. Programs may be recorded using combination television videocassette recorder (TV/VCR) units. | 2013-09-19 |
20130247088 | METHOD AND APPARATUS FOR THE AUTHENTICATION OF USERS OF A HYBRID TERMINAL - The invention concerns a method for the authentication of users of a hybrid terminal with a first registration step. The first registration step comprises entry of user identification data, request to enter a personal identification number, forwarding of the personal identification number to a registration server of an authentication apparatus, forwarding of the user identification data, validation of the user identification data, generation of a registration code, and in the event that entry of the personal identification number has not taken place, generation of the personal identification number, forwarding of the registration code to the internet-capable terminal and in the event that entry of the personal identification number has not taken place, forwarding of the personal identification number via a separate connection to the user. Furthermore, the invention concerns a corresponding apparatus for carrying out the method. | 2013-09-19 |
20130247089 | DESCRAMBLING OF MULTIPLE TELEVISION CHANNELS - Various arrangements for descrambling multiple television channels concurrently are presented. A set-top box may receive a first plurality of television channels as scrambled data packets. A previously-received locally-stored networking information table may be accessed that associates each of the multiple television channels with the same entitlement control message, as indicated by a packet identifier. An entitlement control message having the same packet identifier may be received. A smartcard may be used to decrypt the entitlement control message having the same packet identifier to obtain a first control word and a second control word. Scrambled data packets corresponding to the multiple television channels may be descrambled using the first control word and the second control word. These television channels may be stored and/or output for presentation by the set-top box. | 2013-09-19 |
20130247090 | SMARTCARD ENCRYPTION CYCLING - Various arrangements for encrypting multiple television channels are presented. A first television channel of a plurality of television channels to be protected via a first entitlement control message (ECM) using a first encryption scheme may be designated. The plurality of television channels may be transmitted using a single transponder stream. A second television channel of the plurality of television channels to be protected via a second ECM encrypted using a second encryption scheme while the first television channel of the plurality of television channels is protected using the first encryption scheme may be designated. The first and second ECMs may be transmitted to a plurality of television receivers. Data from the first ECM may be used for descrambling of the first television channel by the plurality of television receivers. Data from the second ECM may be used for descrambling of the second television channel by the plurality of television receivers. | 2013-09-19 |
20130247091 | Automatic Commercial Playback System - While a multimedia device is fast-forwarding content, the multimedia device reads “jump back” tags expressed in or derived from a closed-caption stream. When the multimedia device detects the presence of a “jump back” tag while fast-forwarding, the multimedia device enters a special state. While in this special state, if the multimedia device detects that the user has instructed the multimedia device to stop fast-forwarding, the multimedia device locates a specified temporal location in a recorded commercial break. This specified temporal location may be specified by the particular tag, for example. The multimedia device stops performing whatever activity in which the multimedia device was engaged, “jumps back” to the specified temporal location in the recorded commercial break, and resumes playing the recorded content stream at normal speed from the specified temporal location. | 2013-09-19 |
20130247092 | Automatic Contact Information Transmission System - According to one aspect, a DVR sends a user's contact information over a network to a third party. Upon determining that a television program or advertisement contains a special tag that is associated with a third party, the DVR displays, to the user, a prompt that invites the DVR user to allow the DVR to send the user's contact information to the third party. If the user gives permission for the DVR to send the contact information to the third party, then the DVR sends the contact information to the third party (e.g., over the Internet). | 2013-09-19 |