52nd week of 2011 patent applcation highlights part 65 |
Patent application number | Title | Published |
20110320985 | INFORMATION LANDSCAPE MODELING, ANALYSIS & VALIDATION - Managing and validating a project using an information landscape. Embodiments include providing an information landscape including a topology of landscape elements for the project, linking the topology of landscape elements to a plurality of solution artifacts, and validating at least one of the plurality of solution artifacts and semantics of the information landscape. | 2011-12-29 |
20110320986 | METHOD FOR DESIGNING OVERLAY TARGETS AND METHOD AND SYSTEM FOR MEASURING OVERLAY ERROR USING THE SAME - A method for designing an overlay target comprises selecting a plurality of overlay target pairs having different overlay errors or offsets, calculating a deviation of the simulated diffraction spectrum for each overlay target pair, selecting a plurality of sensitive overlay target pairs by taking the deviation of the simulated diffraction spectrum into consideration, selecting an objective overlay target pair from the sensitive overlay target pairs by taking the influence of the structural parameters to the simulated diffraction spectrum into consideration, and designing the overlay target pair based on the structural parameter of the objective overlay target pair. | 2011-12-29 |
20110320987 | SEMICONDUCTOR DEVICE MANUFACTURING METHOD, DATA GENERATING APPARATUS, DATA GENERATING METHOD AND RECORDING MEDIUM READABLE BY COMPUTER RECORDED WITH DATA GENERATING PROGRAM - A semiconductor manufacturing method comprising, a data generating process including, acquiring a simulation light pattern that simulates a shape of a light exposure pattern formed on a substrate on the basis of design data of a semiconductor device, acquiring a simulation electron beam exposure pattern that simulates a shape of an electron beam exposure pattern formed by an electron beam exposure on the substrate on the basis of the design data, extracting difference information representing a shape difference portion between the simulation light pattern and the simulation electron beam exposure pattern, acquiring changed design data for modifying shape by changing the design data in accordance with the difference information, conducting the electron beam exposure on the substrate by use of the changed design data for modifying the shape. | 2011-12-29 |
20110320988 | LAYOUT PATTERN GENERATING APPARATUS AND LAYOUT PATTERN GENERATING METHOD - An apparatus for generating a layout pattern of each element includes a storage, a basic figure generator, an additional figure generator, a display unit and an operation input unit; wherein the storage stores terminal figure relative position information, figure adjustment value information and additional figure relative position information; the basic figure generator generates an effective area figure and a terminal figure of a layout pattern generation target element on the basis of the terminal figure relative position information and the figure adjustment value information; the additional figure generator generates the additional figure of the layout pattern generation target element on the basis of the generated effective area figure and terminal figure and the additional figure relative position information; the display unit displays the generated effective area figure, terminal figure and additional figure; and the figure adjustment value information is changed depending on an input from the operation input unit. | 2011-12-29 |
20110320989 | MINIMAL LEAKAGE-POWER STANDARD CELL LIBRARY - A minimal leakage power Standard Cell Library is provided. The minimal leakage power Standard Cell Library provides minimal leakage power cells with improved speed characteristics. The minimal leakage power Standard Cell Library includes cells from an existing Standard Cell Library and a set of minimal leakage power cells for a selected set of logic functions. The minimal leakage power Standard Cell Library is formed by identifying a set of logic functions. For each logic function in the identified set, a base case for an unfolded implementation of the logic function is determined. Widths for transistors in a transistor topology used in the unfolded implementation of the logic function are determined based on the non-linear leakage power characteristics for the transistor topology to achieve minimal leakage power. The determined widths are then assigned to the transistors and the minimal leakage cell is added to the library. | 2011-12-29 |
20110320990 | LOGIC-DRIVEN LAYOUT VERIFICATION - A check for determining the appropriateness of physical design data is provided, where the check includes both a physical component and a logical component. Based upon the logical component of the check, portions of the physical design data that correspond to the logical component are identified and selected. After the portions of the physical design data corresponding to the logical component have been selected, this physical design data can be provided to a physical design analysis tool, along with the physical component of the design check. The physical design analysis tool can then use the physical component of the design check to perform an analysis of the selected physical design data. | 2011-12-29 |
20110320991 | HIERARCHIAL POWER MAP FOR LOW POWER DESIGN - A computer-implemented method for debugging the power aspect of an IC design by integrating the power specification expressed in certain power specification format and its corresponding circuit design within a power schematic diagram called power map. Power map is created by using a power data base generated by regrouping the original circuit design hierarchy to new hierarchies defined by the power specification. Power map contains power cell symbols (such as isolation cells, level shifters, power switches) and signal nets, and can show the relationship between power domains. Power map can also display mismatches or errors between the power specification and the circuit design for those signals connecting the power domains. Furthermore, power map can be used in conjunction with simulation result. | 2011-12-29 |
20110320992 | BUFFER-AWARE ROUTING IN INTEGRATED CIRCUIT DESIGN - A method, system, and computer usable program product for buffer-aware routing in integrated circuit design are provided in the illustrative embodiments. The design has cells, and the circuit includes buffers and wires. A route is received from a set of routes. The route couples a first point in the circuit to a second point in the circuit and including at least one buffer between the first point and the second point. A determination is made whether the route violates a set of hard constraints for a part of the circuit, where the set of hard constraints includes a reach length constraint. In response to the route not violating any hard constraint in the set of hard constraints, the route is selected as a buffer-aware routing solution between the first and the second points in the circuit. | 2011-12-29 |
20110320993 | Efficient Continuous Grading Flow for Test Coverage Analysis - A system for performing efficient continuous grading flow for test coverage analysis. The system provides for continuous test coverage grading. The continuous grading flow analyzes individual tests upon completion without requiring an entire set of tests to finish. As a result, the grading process at the end of the regression run is no longer necessary, disk space and memory requirements are dramatically reduced, and partial results are produced as the grading of individual tests complete, allowing engineers to track progress and make real-time decisions based on the intermediate results. The resource requirements of our continuous flow scale linearly with the number of tests rather than exponentially as with traditional approaches. | 2011-12-29 |
20110320994 | APPARATUS FOR DESIGNING SEMICONDUCTOR INTEGRATED CIRCUIT, METHOD OF DESIGNING SEMICONDUCTOR INTEGRATED CIRCUIT, AND PROGRAM FOR DESIGNING SEMICONDUCTOR INTEGRATED CIRCUIT - A device comprises a analysis section for detecting hold errors according to data including the values of the input and output nodes of the FF circuit, and identifying the node in which a hold error has occurred, a determining section for determining insertion of the trailing edge FF or the buffer into hold error sections on the basis of the results of the analysis by the analysis section, a FF insertion section for inserting the FF into a hold error section subjected to position determination so as to insert the trailing edge FF, and connecting a clock line to the FF based on the results of the determining section, and a buffer insertion section for inserting the buffer into the hold error section subjected to the position determination so as to insert the FF based on the results of data of the determining section. | 2011-12-29 |
20110320995 | Noise Analysis Designing Method - To provide a simulation technology of ending multiphysics analysis on heat, vibration, and EMC within a practical time and with a low-price computation process at an early stage of product designing, in a noise analysis designing method for an electric device, such as an inverter for automobile, this electric device includes one or more energy sources, a propagation path through which energy from the energy source propagates, and a noise occurring part where an electromagnetic radiated noise occurs due to the energy coming from the propagation path, the method has a step of estimating the occurring noise, such as a occurring radiated noise, by analyzing a path specified by a user by using a calculator, and the path specified by the user is a path of the energy flowing through the propagation path. | 2011-12-29 |
20110320996 | DELAY LIBRARY GENERATION SYSTEM - A delay library generation apparatus ( | 2011-12-29 |
20110320997 | Delay-Cell Footprint-Compatible Buffers - A method for creating a design for an integrated circuit, by developing a set of delay cells where each of the cells in the set has a different delay time from the other cells in the set, and where each of the cells in the set has the same surface area, has the same pin-outs, has the same drive strength, and has the same input capacitance, where an originally-used cell in the set can be swapped out for a different replacement cell in the set without any impact on the design of the integrated circuit besides a change in delay time from the originally-used cell to the replacement cell. | 2011-12-29 |
20110320998 | LIGHT-EMITTING DIODE SYSTEM DESIGNER - A system may include a database configured to store information including characteristics of a plurality of components. The system may further include a server in communication with the database and configured to receive design parameters indicative of characteristics of an LED lighting solution; determine a plurality of LED lighting array designs, each design including at least one of a parallel and a series arrangement of LEDs and configured to provide an amount of light specified by the design parameters; for each one of at least a subset of the plurality of LED lighting array designs, determine an LED driver design configured to power the one of the LED lighting array designs; and generate at least one LED lighting solution, each LED lighting solution including one of the LED lighting array designs combined with one of the LED driver designs configured to power the one of the LED lighting arrays. | 2011-12-29 |
20110320999 | DECOMPRESSORS FOR LOW POWER DECOMPRESSION OF TEST PATTERNS - Disclosed below are representative embodiments of methods, apparatus, and systems used to generate test patterns for testing integrated circuits. Embodiments of the disclosed technology can be used to provide a low power test scheme and can be integrated with a variety of compression hardware architectures (e.g., an embedded deterministic test (“EDT”) environment). Certain embodiments of the disclosed technology can reduce the switching rates, and thus the power dissipation, in scan chains with no hardware modification. Other embodiments use specialized decompression hardware and compression techniques to achieve low power testing. | 2011-12-29 |
20110321000 | TECHNIQUE FOR CREATING ANALYSIS MODEL AND TECHNIQUE FOR CREATING CIRCUIT BOARD MODEL - According to a circuit board creation program presented herein, a simulation assuming a case in which an addition of a bypass capacitor near a another bypass capacitor provided between a pin and via of an LSI part can be performed, simply by adding a bypass capacitor property model and changing the value of a coefficient parameter by which the property value of an element of a line part is to be multiplied or divided. | 2011-12-29 |
20110321001 | VISUALIZATION OF RUNTIME ANALYSIS ACROSS DYNAMIC BOUNDARIES - The formulation of an architectural diagram of a software program having multiple components. A static model identifying at least some of the components and a relationship between the components is accessed by perhaps performing a static code analysis of the code of the software program. A dynamic analysis is also performed by executing the software program, and observing the execution to derive dynamic behaviors of the software program. These dynamic behaviors may perhaps be information that is not readily available based on a static code analysis of the computer program alone, such as parameter values exchanged, paths of execution, and additional components invoked. The architectural diagram is then formulated using the static model and the dynamic behaviors to generate a more complete representation of the computer program. | 2011-12-29 |
20110321002 | Rewriting Branch Instructions Using Branch Stubs - Mechanisms are provided for rewriting branch instructions in a portion of code. The mechanisms receive a portion of source code having an original branch instruction. The mechanisms generate a branch stub for the original branch instruction. The branch stub stores information about the original branch instruction including an original target address of the original branch instruction. Moreover, the mechanisms rewrite the original branch instruction so that a target of the rewritten branch instruction references the branch stub. In addition, the mechanisms output compiled code including the rewritten branch instruction and the branch stub for execution by a computing device. The branch stub is utilized by the computing device at runtime to determine if execution of the rewritten branch instruction can be redirected directly to a target instruction corresponding to the original target address in an instruction cache of the computing device without intervention by an instruction cache runtime system. | 2011-12-29 |
20110321003 | Systems and Methods For Providing Modular Configurable Creative Units For Delivery Via Intext Advertising - The present disclosure relates to systems and methods for creating, via a development tool, a unit type for display on a web page in response to a keyword on the web page. A development tool may identify a unit type template for creating a unit type. The unit type may comprise a tooltip for augmenting a keyword on a web page. A user may select, via the development tool, a media block component to add to the unit type. The user may place the media block component on a layout of the unit type. The development tool may generate script code to define the layout of the unit type as a set of cells and rows within a predetermined sized container. The media block component may be placed in a cell and a row of the set of cells and rows. The script code may provide execution direction for rendering media of the media block component while displaying the unit type. | 2011-12-29 |
20110321004 | TARGET APPLICATION CREATION - An illustrative embodiment of a computer-implemented process for target application creation receives a representation of a logical topology diagram for an application architecture to form a source input, locates part type information in a part type dictionary using the source input, locates application parts in an application parts repository for each located part type and composes a subset of identified parts. The computer-implemented process further determines whether integration dependencies are met and responsive to a determination that integration dependencies are met, consolidates parts into an application structure, determines whether to exclude parts and responsive to a determination to not exclude parts, builds a target application. | 2011-12-29 |
20110321005 | COMPACTION AND DE-ALLOCATION OF PARTIAL OBJECTS THROUGH SCHEDULING A TRANSACTION - Illustrated is a system and method for identifying a current object that is part of a versioned object, the versioned object to include at least one partial object and a base object. The system and method further include marking the at least one partial object as a candidate for compaction. Additionally, the system and method include compacting the at least one partial object, where the at least one partial object is marked, by replacing a characteristic of the base object with a characteristic of the at least one partial object. The system and method includes scheduling a transaction for each thread in a transaction pool so as to de-allocate memory associated with the at least one partial object, the transaction to be executed in a non-preemptable manner. | 2011-12-29 |
20110321006 | Configuring a State Diagram with Graphical Source Code - A system and method for configuring a state diagram with graphical source code is described. The state diagram may be created in response to user input. The state diagram may include a plurality of state icons and a plurality of connector elements interconnecting the state icons, where the state icons represent a plurality of states and wherein the connector elements represent transitions between the states. Graphical source code may be associated with one or more of the state icons. | 2011-12-29 |
20110321007 | TARGETING CODE SECTIONS FOR CORRECTING COMPUTER PROGRAM PRODUCT DEFECTS USING RECORDS OF A DEFECT TRACKING SYSTEM - An unresolved defect can be identified in a computer program product. It may not be initially known which of a plurality of different code segments of the computer program product are able to be modified to correct to repair the unresolved defect. A subset of the different code segments can be predicted utilizing information contained within a database of previously reported defects. The predicting can be determined based on a set of code segments that were previously modified to correct or repair the previously reported defects as detailed within the database. | 2011-12-29 |
20110321008 | MULTI-MODAL CONVERSION TOOL FOR FORM-TYPE APPLICATIONS - GUI form code comprising a set of GUI elements can be imported. A user interface description can be generated from the GUI form code that has an element corresponding to each GUI element. For each user interface element converted from a corresponding to one of the GUI elements, a user interface element type can be determined as can temporal associations between the user interface elements. A Conversation User Interface (CUI) code corresponding to the GUI form code can be created from the user interface description. When creating the CUI code for each of the user interface elements, different and rules to convert the user interface element into CUI code can be used depending on a user interface element type of the user interface element being converted. When creating the CUI code, the user interface elements can be temporally ordered based on the pre-determined spatio-temporal associations between the graphical user interface (GUI) elements. | 2011-12-29 |
20110321009 | IMPLEMENTING ENCRYPTION VIA ASPECT ORIENTED PROGRAMMING - A device may include a processor. The processor may be configured to read an aspect, and identify, within a program, code for instantiating an object output stream object based on the aspect. In addition, the processor may be configured to replace, within the program, the code for instantiating the object output stream object with code for instantiating secure object output stream object. Furthermore, the processor may be configured to generate a compiled program from code obtained by replacing, in the program, the code for instantiating the object output stream object with the code for instantiating the secure object output stream object. The processor may be configured to write the compiled program to a file. | 2011-12-29 |
20110321010 | WEB APPLICATION FRAMEWORK BASED ON OBJECT ORIENTED CLASS MAPPING - A method and system for building a web application framework is provided. This framework explicitly maps each dynamic web page to a class method, called “web service” method. Each MIME type of static web pages is implicitly mapped to a predefined web service method of a system class. All related web service methods are grouped into one object class, in which a business unit of coupled dynamic web pages is bind together to construct a natural web user session implicitly. Each web service class is logically divided into four segments, which is described by a paradigm, called “STUD” (acronym for Services, Templates, Utilities and Data). A new data exchange format, called “SDON” (acronym for Simple Data Object Notation), is defined to represent a structured data exchanged between web client and web server or passed among web servers. A SDON data string can be directly reflected into an object of the data class type. Each data source related to a relational database is mapped to a three tier structure of classes (schema, table, and data record). The data record classes inherit the names of tables inside the database. | 2011-12-29 |
20110321011 | APPLICATION SERVER WITH A PROTOCOL-NEUTRAL PROGRAMMING MODEL FOR DEVELOPING TELECOMMUNICATIONS-BASED APPLICATIONS - An application server is described for development of telecommunications-based software applications. The application server provides a protocol-neutral programming model for application developers. Rather than having to account for specific protocol entry points into the server, all interactions in the server are abstracted as asynchronous events through the event broker layer. State management and concurrency are implemented as an actor-based model, where each actor owns its own segment of state and other actors wishing to update that state send asynchronous events to the owner. Thus, any communication in the various protocols can be expressed as an asynchronous event passed to, from and between the actors, who are each responsible for maintaining their own segment of state locally. This architecture allows multiple protocols to be consumed in one process, allow applications sessions to span multiple environments and protocols, and allows the programming model to be decoupled from any particular protocol entry point. | 2011-12-29 |
20110321012 | Non-Intrusive Measurement of Content Quality Using Dry Runs with Roll-back - Validation and determination of business application program content quality destined for loading on a target production computing environment is automated by receiving an application program into a controlled production computing environment, and, during a dry run test in the production computing environment, logging changes to content from an initial state as loaded by the application program; applying a business rule to the content during data loading to validate against business objects; capturing validation errors produced by the validation and structural change commands to the content into a log file; and automatically rolling back changes made to the content during the dry run test to the initial state thereby avoiding committing content changes to the production computing environment. | 2011-12-29 |
20110321013 | INTERACTIVE ENVIRONMENT FOR TEST CASE GENERATION ASSOCIATED WITH A COMPUTER CODE - A method of generating test cases for a given computer code is provided. The method includes: building a method call graph for a computer code under test, wherein the method call graph holds method calls between code elements of the code; presenting code elements having relevancy for testing for a portion of the computer code in response to a selection of the portion, wherein the relevancy is determined using the method call graph; associating test values for code elements in response to selection from a suggested range of test values generated for each selected code element respectively; and generating a test case useable for testing the selected portion of computer code, wherein the test case refers to the selected code elements relevant for the selected portion with the associated selected values, wherein at least one of the building, the presenting, the associating, and the generating is executed by a processor. | 2011-12-29 |
20110321014 | TESTING COMPATIBILITY OF A COMPUTER APPLICATION - Presented is a method, system, computer readable instructions executable code and computer storage medium for testing compatibility between a computer application and a target computer platform. Configuration parameters of a computer application are provided to a computer system for comparison against a database to determine whether the configuration parameters of the computer application and the configuration parameters of a target computer platform are compatible or incompatible. | 2011-12-29 |
20110321015 | HARDWARE TRIGGERING MECHANISM FOR SOFTWARE DEBUGGER - Embodiments of the invention utilize a signal analyzer to monitor a data path, the data path to include a plurality of transactions to be executed via a processor. The signal analyzer may further identify data of a first and a second transaction from the plurality of transactions. Transaction replication logic operatively coupled to the signal analyzer may generate a replicate transaction from the first transaction in response to the signal analyzer identifying the data of the first transaction, the replicate transaction to be stored in a memory. An interrupt generator operatively coupled to the signal analyzer may send an interrupt to the processor in response to the signal analyzer identifying at least the data of the second transaction, the processor to halt the execution of transactions and to pass control of execution of the second transaction to a debugging module in response to receiving the interrupt. | 2011-12-29 |
20110321016 | INJECTION CONTEXT BASED STATIC ANALYSIS OF COMPUTER SOFTWARE APPLICATIONS - Embodiments of the invention generally relate to injection context based static analysis of computer software applications. Embodiments of the invention may include selecting a sink within a computer software application, tracing a character output stream leading to the sink within the computer software application, determining an injection context of the character output stream at the sink, where the injection context is predefined in association with a state of the character output stream at the sink, identifying any actions that have been predefined in association with the identified injection context, and providing a report of the actions. | 2011-12-29 |
20110321017 | COMPUTER CODE DEBUGGING METHOD AND APPARATUS PROVIDING EXCEPTION BREAKPOINTS - A computer method and apparatus for debugging program code provides exception breakpoints with exception notification. Through a user interface, a user associates one or more exception breakpoints with respective different certain lines of code. A computer processor is configured to execute the subject program code in debug mode. During the executing, for each of the different certain lines of code, the processor: (a) pauses to pre-evaluate and determine tendency to throw an exception or spawn an interrupt, and (b) at the certain line of code, stops execution of the subject program code only if the pre-evaluating determined existence of a would-be exception or run-time interrupt. | 2011-12-29 |
20110321018 | PROGRAM, METHOD, AND SYSTEM FOR CODE CONVERSION - A program product, a method and a system for enhancing the readability of Java® source code obtained by decompiling Java® bytecode. Code which does not directly correspond to language of a second programming language and which is intended to execute an instruction related to a stack operation, is replaced with any combination of an expression for assignment to a temporary variable, a call for a dummy method which only returns part of an argument as-is, and an expression for reading the temporary variable. Code for calling a method which does not correspond to a second programming language and which leaves its value on the stack and has no return value is replaced by a new method. The new method, having an additional first argument and the original argument, executes the original method call and returns the additional first argument as-is. | 2011-12-29 |
20110321019 | COMPILE-TIME MANAGEMENT OF POLYPHASIC MODULES - The disclosed embodiments provide a system that facilitates the compilation of a software program. During operation, the system uses a directory hierarchy for the software program to infer a compilation unit to be used in the software program as a member of a module. Next, the system obtains a module declaration for the module using the directory hierarchy. Finally, the system enables compilation of the software program by dynamically identifying and locating one or more dependencies of the module using the module declaration and the directory hierarchy. | 2011-12-29 |
20110321020 | TRANSFORMING DECLARATIVE EVENT RULES INTO EXECUTABLE PROCEDURES - In an embodiment of the present invention, event handlers are used to trigger actions based on events occurring on a data stream. A process of the present invention involves creating the event handler, which may be embodied in, for example, software. The creation of the event handler involves parsing all of the rules in a manner that allows events themselves to trigger actions that will ultimately involve evaluation of rule and, if necessary, firing of those rules. | 2011-12-29 |
20110321021 | Arranging Binary Code Based on Call Graph Partitioning - Mechanisms are provided for arranging binary code to reduce instruction cache conflict misses. These mechanisms generate a call graph of a portion of code. Nodes and edges in the call graph are weighted to generate a weighted call graph. The weighted call graph is then partitioned according to the weights, affinities between nodes of the call graph, and the size of cache lines in an instruction cache of the data processing system, so that binary code associated with one or more subsets of nodes in the call graph are combined into individual cache lines based on the partitioning. The binary code corresponding to the partitioned call graph is then output for execution in a computing device. | 2011-12-29 |
20110321022 | Code generation through metadata programming for mobile devices and web platforms to ease access to web services - A system and method for making a web service available to remote clients. In one illustrative embodiment, the web services are provided by a server. The server can use a metadata program to generate client side libraries that facilitate the development and maintenance of client side applications. A metadata binder on the server can be used to interface with the client side libraries. In operation, web services can be provided to mobile clients by generating Web Services Description Language function definitions. From those Web Services Description Language function definitions, Java objects can be created. Libraries can be generated from the objects for a plurality of platforms. The server can then communicate with the mobile clients operating on the plurality of platforms through the generated libraries. | 2011-12-29 |
20110321023 | Concurrent Embedded Application Update - Providing concurrent embedded application updates comprising a first computer processor for executing a first embedded application, the executing generating a first plurality of processing threads, the first computer processor coupled to a first storage location and a second storage location. The first computer processor configured to accept and process instructions from a host system, receive one or more notifications indicating that a second embedded application has been successfully loaded into one of the first storage location and the second storage location, terminate execution of the first plurality of processing threads in response to receiving the one or more notifications, and execute the second embedded application while continuing to accept instructions from the host system and without restarting in response to receiving the one or more notifications. | 2011-12-29 |
20110321024 | METHOD AND APPARATUS FOR UPDATING AN EXECUTING APPLICATION - An approach is provided for updating an application such as a widget. An update platform receives a request to update an application executing on a device. Execution of the application retrieves all or a portion of stored code associated with the application from a storage memory of the device and places the retrieved stored code as executing code in an execution memory of the device. The update platform determines whether updated code corresponding to the application is available based, at least in part, on the request and determines to retrieve the updated code if available. The update platform then determines to replace all or a portion of the stored code with the updated code without affecting the executing code. | 2011-12-29 |
20110321025 | Enhanced Upgrade Path - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for establishing upgrade paths. In one aspect, a method includes establishing an interim environment and platform, migrating the data from the legacy environment and platform to the interim environment and platform, and migrating the data from the interim environment and platform to the upgraded environment and platform. | 2011-12-29 |
20110321026 | SYSTEM FOR REMOTE LOADING OF OBJECTS OR FILES IN ORDER TO UPDATE SOFTWARE - A system for remote loading of objects or files in order to update software includes operating system architecture that calls for different tasks to be broken down into software modules that are connected to one another by dynamic links or are composed of executable subroutines that have main dependence links to other parts of the operating system. Each of the modules is composed of object files or libraries that are represented by dynamic link libraries among themselves according to a number of dependence levels that are described in their respective attributes. | 2011-12-29 |
20110321027 | REBOOTLESS DISPLAY DRIVER UPGRADES - Systems and methods for rebootless updating of a IHV display driver are disclosed. According to such a method, first, the operating system stops the driver from running Second, the system switches over to an interim or temporary display driver, which be a default driver provided with the operating system. Third, the new hardware-specific driver is started. Thus, a hardware-specific display driver may be updated without rebooting. | 2011-12-29 |
20110321028 | APPLICATIONS INCLUDING MULTIPLE EXPERIENCE MODULES - An application on a device includes multiple experience modules that each implement a set of features when the application is running on the device. Each of the multiple experience modules includes a first component that includes code specific to a particular type of the device, and a second component that includes code that is common across multiple types of devices. Update packages changing individual ones of the multiple experience modules can be received from a deployment service and installed on the device. | 2011-12-29 |
20110321029 | UPGRADE MANAGEMENT OF APPLICATION COMPONENTS - Architecture that enables separation of a user interface (UI) upgrade from the content and application logic upgrade. Administrators can upgrade to take advantage of new infrastructure features, and independently schedule the UI upgrade, for example, to accommodate customization work or to ensure user training. Furthermore, administrators can now allow users to choose when to switch to the new UI. More specifically, the architecture facilitates the separation of a UI upgrade from content and application logic upgrade, the ability to control the UI upgrade at multiple levels of precision, the ability for application logic and UI components to change behaviors based on the UI version of the context, and the ability to “preview” the updated UI before permanently switching to it. Additionally, UI components can be filtered to only appear in the appropriate UI version, and the site's UI version can be compared to versions that a component is compatible with. | 2011-12-29 |
20110321030 | METHOD AND APPARATUS FOR UPDATING A SOFTWARE IMAGE - A method and apparatus for updating the software image on a plurality of computing devices which comprises creating a simulated version of the software image of the devices in a changed format, altering the simulated version of the software image and copying the altered version back to the devices. The change of format typically obviates the need for human interaction during the update process. | 2011-12-29 |
20110321031 | UPDATING NODES CONSIDERING SERVICE MODEL CONSTRAINTS - Methods, systems, and computer-readable media for deploying an update to nodes propagated throughout a data center are provided. Launching new upgrade to hosting environment residing on the nodes typically invokes a mechanism (e.g., fabric controller) to form a group of nodes that are independent of one another with respect to upgrade domains, which are assigned to tenants (e.g., program components of service applications running within the data center) presently hosted by the nodes. The constraints of the update domains are articulated by service level agreements established for the service applications, respectively. Forming the group involves identifying independent nodes for membership, where no two members of the group host analogous tenants (belonging to a common service application) that are assigned to distinct update domains. However, it is acceptable to join to the group those nodes hosting analogous tenants that are each assigned to the same update domain. | 2011-12-29 |
20110321032 | DYNAMIC WEB RESOURCE PROVISIONING - In one embodiment, Dynamic Web Resource Provisioning (DWRP) is a web services based mechanism for dynamic web services application programming interface (API) extensibility. A director network device provisions one or more agent network devices with a message in the form of a POST request to a first API. The message includes instruction configured to extend a second API in the agent network device. The director network device delivers dynamic language code to the second API by way of a PUT request. | 2011-12-29 |
20110321033 | Application Blueprint and Deployment Model for Dynamic Business Service Management (BSM) - Disclosed are systems and methods for model based provisioning of applications and servers (both physical and virtual) to execute provisioned applications in a reliable and repeatable manner. Several aspects of a complex application management including compliance, change tracking, monitoring, discovery, processing steps, CMDB integration are disclosed within a comprehensive hierarchy of definition templates forming a model. This model can then be used at provisioning time to instantiate a compliant instance of the provisioned application. This model can also be used at run-time for managing run-time aspects of the provisioned application. Additionally, the model based approach can help track applications even when or if applications drift from their intended design and policies for use. | 2011-12-29 |
20110321034 | Method for Improving the Performance of Computers - In a method for improving the performance of a computer system by releasing computer resources, a list P of programs installed on a computer system is determined. All relevant extension points EP of the computer system are searched for registered entries. A list A of automatically starting programs is generated by assigning the registered entries at the relevant extension points EP to the installed programs, respectively. The list A of the automatically starting programs is compared with a list S of system-required programs and a list V of used programs. Programs that are not system-required and programs that have not been used for a longer period of time are deactivated and computer resources that have been used by the deactivated programs are released. The deactivation of programs can be done by the user or automatically and can be cancelled when necessary. | 2011-12-29 |
20110321035 | METHODS AND APPARATUS TO COLLECT WIRELESS INFORMATION - Example methods, apparatus, and articles of manufacture to collect wireless information are disclosed. A disclosed example method involves installing an operating system and a data collector to execute outside a context of the operating system on a wireless handheld device. A testing process is performed to ensure functionality of the wireless handheld device. An application is installed on the wireless handheld device to execute in the context of the operating system. The data collector is to collect usage information regarding the application and to provide the usage information to a network provider. | 2011-12-29 |
20110321036 | GENERATING AND USING CONSTRAINTS ASSOCIATED WITH SOFTWARE RELATED PRODUCTS - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set. | 2011-12-29 |
20110321037 | DATA ONLY SOLUTION PACKAGE - Technologies are described herein for deploying a data only solution package separate from custom code. In this way, lifecycles of the data only solution package and the custom code can be separately controlled. In an illustrative implementation, the data only solution package is received at a computer. A data specification is installed at the computer through the data only solution package. The data specification may specify a location of an external system storing external data. A data subscription may also be installed at the computer through the data only solution package. The data subscription may include queries for retrieving the external data from the external system and frequency information specifying a frequency at which to retrieve the external data. The external data is retrieved from the external system utilizing the location information, the queries, and the frequency information. A data cache at the computer is populated with the external data. | 2011-12-29 |
20110321038 | SYSTEM AND METHOD FOR DOWNLOADING AND DISPLAYING ADS - There is disclosed a system and method for downloading and displaying advertisements during software installation on the device. In an embodiment, the method comprises: receiving a selection of one or more software installation options and considering any additional criteria for selection of an initialization file; in dependence upon the selection of one or more installation options and any additional criteria, downloading a corresponding initialization file; reading the downloaded initialization file for a list of one or more advertisement files to be downloaded to the device and played back in accordance with playback parameters provided in the initialization file; and downloading the list of advertisement files and displaying the advertisement files during the software installation in accordance with the playback parameters. | 2011-12-29 |
20110321039 | VIRTUAL NETWORK PACKET TRANSFER SIZE MANAGER - The method determines whether a particular virtual adapter of a virtual network IHS may perform enhanced packet communication transfer of larger sizes than those of physical network IHSs. The method registers each virtual adapter maximum receive unit (MRU) value in an MRU attribute table within a hypervisor virtual switch. The hypervisor virtual switch provides communication pathways for packet transfers between virtual network IHS virtual adapters and also between physical adapters. The method determines if a sending virtual adapter is sending a packet to a receiving virtual adapter that is local or a remote virtual trunk adapter. The method determines if the receiving virtual adapter exhibits a registered MRU value. If the receiving virtual adapter exhibits a registered MRU value, the method provides for larger sizes of packet transfers for those particular packets. | 2011-12-29 |
20110321040 | Systems and Methods for Sharing the Results of Analyses Among Virtual Machines - A computer-implemented method may include performing a first analysis on at least one file of a master virtual machine and inserting, into the master virtual machine, information that indicates at least one result of the first analysis. The computer-implemented method may also include maintaining at least one additional virtual machine that is based on the master virtual machine. The computer-implemented method may further include directing the additional virtual machine to reference the information in the master virtual machine instead of performing a second analysis on at least one file of the additional virtual machine. Various other systems, methods, and computer-readable media are also disclosed. | 2011-12-29 |
20110321041 | METHOD AND SYSTEM FOR MIGRATING A VIRTUAL MACHINE - An exemplary embodiment of the present invention provides a method of migrating a virtual machine. The method comprises replicating a source storage device corresponding to the virtual machine to a target storage device through replication links. The method also comprises receiving a migration state that indicates initiation of a migration of the virtual machine from a source server to a target server. The method also comprises collecting storage system status information of the source storage device and storing the storage system status information to a persistent store accessible to the target server. The method also comprises sending memory states and central processing unit (CPU) states to the target server through a communications network. The method also comprises performing a failover of the virtual machine from the source server to the target server and from source storage device to target storage device. | 2011-12-29 |
20110321042 | Methods and Systems to Permit Multiple Virtual Machines to Separately Configure and Access a Physical Device - Methods and systems to permit multiple virtual machines (VMs) to separately configure and access a physical resource, substantially outside of a virtual machine monitor (VMM) that hosts the VMs. Each of a plurality of virtual machines (VMs) may access and configure the physical device through corresponding instances of a device driver that exposes controllable functions of the physical device within the VMs. VM-specific configuration parameters and connection information may be maintained for each of the VMs, outside of a VMM, to reconfigure or virtualize the physical device for each of the VMs with the corresponding VM-specific configuration parameters and connection information. Physical device virtualization augmentation features may be implemented within a combination of a physical device controller and a host device driver that executes outside of the VM. | 2011-12-29 |
20110321043 | System, Method and Program Product for Native Interface Optimization of Read-Only Arrays - A computer-implemented process, system and program product for remote array processing receives a requested array in a remote execution container, generates a fingerprint of the requested array, bundles the fingerprint with the requested array and returns a pointer to array elements of the requested array to a caller. The computer-implemented process further receives a call to release the requested array from the caller to form a received release, determines, using the fingerprint, whether the requested array has been modified and responsive to a determination that the array has been modified, sending a call to release the requested array to a virtual machine and responsive to a determination that the array has not been modified, not sending a call to release the requested array to a virtual machine. | 2011-12-29 |
20110321044 | CLIENT HYPERVISOR-BASED TERMINAL DEVICE AND OPERATING METHOD THEREOF - A client hypervisor-based terminal device includes an advertisement module that provides an advertisement, an advertisement time controlling part that monitors a user time of a user module, and a client hypervisor part which operates the advertisement module based on a result of monitoring by the advertisement time controlling part. Accordingly, an advertisement is provided, satisfying both an advertiser and a user of the terminal device. | 2011-12-29 |
20110321045 | SYSTEM AND METHOD OF MANAGING VIRTUAL MACHINE, AND CONTROL APPARATUS, METHOD AND PROGRAM - A virtual machine management system includes an image capturing unit ( | 2011-12-29 |
20110321046 | PROCESS INFORMATION MANAGEMENT APPARATUS AND METHOD, IMAGE FORMING APPARATUS, AND COMPUTER READABLE MEDIUM STORING PROGRAM THEREFOR - A process information management apparatus includes a first processor, a management unit, a second processor, a generator, and a third processor. The first processor executes a first process based on a first application program in an environment where a first system is operating. The management unit manages information regarding a process executed in an environment where a second system is operating, based on a second application program in the environment. The second processor executes a second process based on the second application program in the environment. The generator generates, when the first process is executed, an execution instruction for a third process corresponding to the first process to regard the first process is executed in the environment, and, when the first process is completed, generates a completion instruction for the third process. Based on the second application program in the environment, the third processor executes and completes the third process. | 2011-12-29 |
20110321047 | APPLICATION PRE-LAUNCH TO REDUCE USER INTERFACE LATENCY - A device stores a plurality of applications and a list of associations for those applications. The applications are preferably stored within a secondary memory of the device, and once launched each application is loaded into RAM. Each application is preferably associated to one or more of the other applications. Preferably, no applications are launched when the device is powered on. A user selects an application, which is then launched by the device, thereby loading the application from the secondary memory to RAM. Whenever an application is determined to be associated with a currently active state application, and that associated application has yet to be loaded from secondary memory to RAM, the associated application is pre-launched such that the associated application is loaded into RAM, but is set to an inactive state. | 2011-12-29 |
20110321048 | FACILITATING QUIESCE OPERATIONS WITHIN A LOGICALLY PARTITIONED COMPUTER SYSTEM - A facility is provided for processing to distinguish between a full conventional (or total system) quiesce request within a logically partitioned computer system, which requires all processors of the computer system to remain quiesced for the duration of the quiesce-related operation, and a new early-release conventional quiesce request, which is associated with fast-quiesce request utilization. In accordance with the facility, once all processors have quiesced responsive to a pending quiesce request sequence, the processors are allowed to block early-release conventional quiesce interrupts and to continue processing if there is no total system quiesce request in the pending quiesce request sequence. | 2011-12-29 |
20110321049 | Programmable Integrated Processor Blocks - An integrated processor block of the network on a chip is programmable to perform a first function. The integrated processor block includes an inbox to receive incoming packets from other integrated processor blocks of a network on a chip, an outbox to send outgoing packets to the other integrated processor blocks, an on-chip memory, and a memory management unit to enable access to the on-chip memory. | 2011-12-29 |
20110321050 | METHOD AND APPARATUS FOR PROVIDING SHARED SCHEDULING REQUEST RESOURCES - In accordance with one or more embodiments and corresponding disclosure thereof, various aspects are described in connection with providing shared scheduling request (SR) resources to devices for transmitting SRs. Identifiers related to the shared SR resources can be signaled to the devices along with indications of the shared SR resources in given time durations. Thus, devices can transmit an SR over shared SR resources related to one or more received identifiers for obtaining an uplink grant. This can decrease delay associated with receiving uplink grants since the device need not wait for dedicated SR resources before transmitting the SR. In addition, overhead can be decreased on control channels, as compared to signaling dedicated SR resources and/or uplink grants. Moreover, identifiers related to SR resources can correspond to a grouping of devices, such that a device can transmit over shared SR resources related to a group including the device. | 2011-12-29 |
20110321051 | TASK SCHEDULING BASED ON DEPENDENCIES AND RESOURCES - An example system identifies a set of tasks as being designated for execution, and the set of tasks includes a first task and a second task. The example system accesses task dependency data that corresponds to the second task and indicates that the first task is to be executed prior to the second task. The example system, based on the task dependency data, generates a task dependency model of the set of tasks. The dependency model indicates that the first task is to be executed prior to the second task. The example system schedules an execution of the first task, which is scheduled to use a particular data processing resource. The scheduling is based on the dependency model. | 2011-12-29 |
20110321052 | MUTLI-PRIORITY COMMAND PROCESSING AMONG MICROCONTROLLERS - A method, system and computer program product for serially transmitting processor commands of different execution priority. A front-end processor, for example, serially receives processor commands. A low-priority queue coupled to the front-end processor stores low-priority commands, and a high-priority queue coupled to the front-end processor stores high-priority commands. A controller enables transmission of commands from either the low-priority queue or the high-priority queue for execution. | 2011-12-29 |
20110321053 | MULTIPLE LEVEL LINKED LRU PRIORITY - A method that includes providing LRU selection logic which controllably pass requests for access to computer system resources to a shared resource via a first level and a second level, determining whether a request in a request group is active, presenting the request to LRU selection logic at the first level, when it is determined that the request is active, determining whether the request is a LRU request of the request group at the first level, forwarding the request to the second level when it is determined that the request is the LRU request of the request group, comparing the request to an LRU request from each of the request groups at the second level to determine whether the request is a LRU request of the plurality of request groups, and selecting the LRU request of the plurality of request groups to access the shared resource. | 2011-12-29 |
20110321054 | SYSTEMS AND METHODS FOR MANAGED SERVICE DELIVERY IN 4G WIRELESS NETWORKS - Systems and methods for managed service delivery at the edge in 4G wireless networks for: dynamic QoS (Quality of Service) provisioning and prioritization of sessions based on the task (current, future) of the workflow instance; predicting the current and future network requirements based on the current and future tasks of all business process sessions and prepare session QoS accordingly; providing an audit trail of business process execution; and reporting on business process execution. | 2011-12-29 |
20110321055 | TRANSPORTATION ASSET MANAGER - Systems and methods of visualizing assets are disclosed that include registering assets into a system, creating a correlation between the location of the assets and a physical representation of the operational area, determining the status and class of the assets, selecting at least one asset, and exerting control over the at least one asset. | 2011-12-29 |
20110321056 | DYNAMIC RUN TIME ALLOCATION OF DISTRIBUTED JOBS - A job optimizer dynamically changes the allocation of processing units on a multi-nodal computer system. A distributed application is organized as a set of connected processing units. The arrangement of the processing units is dynamically changed at run time to optimize system resources and interprocess communication. A collector collects metrics of the system, nodes, application, jobs and processing units that will be used to determine how to best allocate the jobs on the system. A job optimizer analyzes the collected metrics to dynamically arrange the processing units within the jobs. The job optimizer may determine to combine multiple processing units into a job on a single node when there is an overutilization of interprocess communication between processing units. Alternatively, the job optimizer may determine to split a job's processing units into multiple jobs on different nodes where the processing units are over utilizing the resources on the node. | 2011-12-29 |
20110321057 | MULTITHREADED PHYSICS ENGINE WITH PREDICTIVE LOAD BALANCING - A circuit arrangement and method utilize predictive load balancing to allocate the workload among hardware threads in a multithreaded physics engine. The predictive load balancing is based at least in part upon the detection of predicted future collisions between objects in a scene, such that the reallocation of respective loads of a plurality of hardware threads may be initiated prior to detection of the actual collisions, thereby increasing the likelihood that hardware threads will be optimally allocated when the actual collisions occur. | 2011-12-29 |
20110321058 | Adaptive Demand-Driven Load Balancing - The present disclosure involves systems, software, and computer implemented methods for providing adaptive demand-driven load balancing for processing jobs in business applications. One process includes operations for identifying a workload for distribution among a plurality of work processes. A subset of the workload is assigned to a plurality of work processes for processing of the subset of the workload based on an application-dependent algorithm. An indication of availability is received from one of the plurality of work processes, and a new subset of the workload is assigned to the work process. | 2011-12-29 |
20110321059 | STACK OVERFLOW PREVENTION IN PARALLEL EXECUTION RUNTIME - A parallel execution runtime prevents stack overflow by maintaining an inline counter for each thread executing tasks of a process. Each time that the runtime determines that inline execution of a task is desired on a thread, the runtime determines whether the inline counter for the corresponding thread indicates that stack overflow may occur. If not, the runtime increments the inline counter for the thread and allows the task to be executed inline. If the inline counter indicates a risk of stack overflow, then the runtime performs additional one or more checks using a previous stack pointer of the stack (i.e., a lowest known safe watermark), the current stack pointer, and memory boundaries of the stack. If the risk of stack overflow remains after all checks have been performed, the runtime prevents inline execution of the task. | 2011-12-29 |
20110321060 | OPERATING SYSTEM NOTIFICATION OF ACTIONS TO BE TAKEN RESPONSIVE TO ADAPTER EVENTS - Notification of hardware actions to be taken responsive to hardware events is facilitated. An operating system coupled, but external to, the hardware notifies firmware of the hardware action to be taken. | 2011-12-29 |
20110321061 | CONVERTING A MESSAGE SIGNALED INTERRUPTION INTO AN I/O ADAPTER EVENT NOTIFICATION - One or more message signaled interruption requests from one or more input/output (I/O) adapters are converted to I/O adapter event notifications. Each I/O adapter event notification includes the setting of one or more specific indicators in system memory and an interruption request, the first of which results in a pending I/O adapter interruption request. While a request for an I/O adapter interruption is pending, subsequent message signaled interruption requests are converted to I/O adapter event notifications, but do not result in additional requests for I/O adapter interruptions. | 2011-12-29 |
20110321062 | CAPTURING EVENTS FROM AND PROVIDING TARGETED MESSAGES TO A DIGITAL MEDIA DEVICE - Systems and methods for collecting events and providing messages using Extensible Messaging and Presence Protocol (XMPP), Session Initiation Protocol (SIP) or any other protocol that provides for authentication, presence and messaging. One such method is performed in a digital media device, such as a set top. A digital media device may collect events associated with usage and behavior and publish the information to a node. The node may communicate data to an aggregator and a harvester to reformat the data to make it available to analytics systems. In addition, the digital media device may subscribe to a node to receive notifications of messages having geographic or other relevance based on an identifier associated with the digital media device. | 2011-12-29 |
20110321063 | APPLICATION SETTINGS MIGRATION USING VIRTUALIZATION - Application setting virtualization for a user. Application settings from a source computer are copied to a user-specific location on a destination computer and layered under corresponding application settings associated with one or more applications installed on the destination computer. In response to receiving a request from an application for an application setting, the requested application setting is retrieved from the layered application settings such that the layers are searched in order for the requested application setting and the first application setting found is retrieved and returned to the requesting application. | 2011-12-29 |
20110321064 | ACCELERATED CLASS CHECK - Handling a virtual method call includes extracting, from a pointer to an object, an identifier associated with the class of the object, the pointer to the object being associated with the virtual method call, and the identifier being embedded within the pointer; using the identifier to obtain a virtual method table, including locating a first entry in a class identifier table mapping a plurality of class identifiers to a corresponding plurality of class data, the first entry being associated with the identifier and comprising the virtual method table or a pointer used to obtain the virtual method table; locating a second entry in the virtual method table, the second entry being associated with the virtual method call; and jumping to an address associated with the second entry to execute code at the address. | 2011-12-29 |
20110321065 | Methods and Systems to Implement a Physical Device to Differentiate Amongst Multiple Virtual Machines of a Host Computer System - Methods and systems to implement a physical device to differentiate amongst multiple virtual machines (VM) of a computer system. The device may include a wireless network interface controller. VM differentiation may be performed with respect to configuration controls and/or data traffic. VM differentiation may be performed based on VM-specific identifiers (VM IDs). VM IDs may be identified within host application programming interface (API) headers of incoming configuration controls and data packets, and/or may be looked-up based on VM-specific MAC addresses associated with data packets. VM IDs may be inserted in API headers of outgoing controls and/or data packets to permit a host computer system to forward the controls and/or packets to appropriate VMs. VM IDs may be used look-up VM-specific configuration parameters and connection information to reconfigure the physical device on a per VM basis. VM IDs may be used look-up VM-specific security information with which to process data packets. | 2011-12-29 |
20110321066 | TECHNIQUES FOR ESTABLISHING VIRTUAL DEVICES - Techniques for establishing virtual devices are presented. A legacy control system is encapsulated as a virtual device. The virtual device is isolated within a host hardware associate with a host OS and access to and from the virtual device is authenticated and controlled by the host OS. Legacy hardware used by the legacy control system is connected to the host hardware, thereby permitting the legacy control system to continue to access the legacy hardware when the virtual device processes. | 2011-12-29 |
20110321067 | COMPUTING DEVICE USING INEXACT COMPUTING ARCHITECTURE PROCESSOR - In general, in one aspect, the invention relates to a computer readable medium including software instructions which, when executed by a processor, perform a method, the method including receiving a first method call from an application, wherein the first method call is associated with a first application component; obtaining a first application component error tolerance (ACET) value associated with the first method call; determining, using the first ACET value and a first inexact amount value (IAV) of a first inexact computing architecture (ICA) Processor (ICA) processor, that the first ICA processor is available to execute the first method call; and processing the first method call using the first ICA processor. | 2011-12-29 |
20110321068 | Disk chucking device and motor apparatus using the same - There is provided a disk chucking device including a disk chucking device including a centering case to which an inner circumferential surface of a disk is fixed, chucking members received in insertion holes formed in the centering case, and an elastic member connecting the centering case and the chucking members to each other in such a manner as to elastically support the inner circumferential surface of the disk, when the disk is mounted on the centering case, the elastic member having at least two bent portions by which displacements and restoring forces have a quadratic function relationship. | 2011-12-29 |
20110321069 | DISC-CLAMPING MECHANISM AND DISC DRIVING APPARATUS - A simplified dist-clamping mechanism is provided to decrease the number of parts and processes of the assembly of a disc-clamping mechanism. The disc-clamping mechanism has a clamping plate sandwiching a disc by cooperating with a turntable, and a clamp base rotatably holding the clamping plate. The clamping plate has a surface plate pressing a disc toward the turntable, a small-radius body portion having an outer diameter smaller than that of the surface plate portion, and a flange portion protruding more than an end portion in an axial direction of the small-radius body portion and being parallel to the surface plate portion. The clamp base is integrally formed while including a thin-plate shaped holding portion, a stopper piece, and a bent portion which extends from the holding portion. | 2011-12-29 |
20110321070 | METHOD AND APPARATUS OF REMOTE VIDEO DISTRIBUTION - A method of remote video file distribution, the method comprising the steps of: a user browsing information relating to video titles on a user terminal device; the user selecting a video title and sending an order of the selection of the video title from the personal terminal device via a telecommunications network to a remote order processing apparatus; the order processing apparatus sending an order confirmation package, including order identification information, to the user; the order processing apparatus sending information relating to the order and the order identification information to an order pick-up terminal; and the order pick-up terminal delivering a video file of video content to the user upon presentation of the order identification information. | 2011-12-29 |
20110321071 | DEVICE-BASED ONE BUTTON SHOPPING USING METADATA - A television is interfaced to one or more on-line stores through a network connection. The television has purchasing data stored in a configuration file. Upon execution of a “one-button buy” function, metadata from a content stream and the purchasing data is used to find a purchase item related to the content stream, decide upon an on-line store and purchase the purchase item from the on-line store. In some embodiments, the a “one-button buy” function is a dedicated “buy” button on a remote control that is associated with the television. In some embodiments, without any further interaction, the purchase item is billed to the viewer and shipped to the viewer as if the viewer found the purchase item through the on-line store from a personal computer. | 2011-12-29 |
20110321072 | Self-Service Channel Marketplace - A content hosting system allows content providers to create channels of video content and make them available to users in a marketplace. Users can search or browse for channels of interest, and selectively subscribe to channels. Users can also pay for the right to view premium videos in each channel. The system ranks channels according to the value provided. Generally, users will seek out and subscribe to the highest ranked channels that provide the greatest value. The ranking function allows different providers to compete for the subscriptions of users. Providers can observe their channel's reception in the market by analyzing rankings and usage statistics to adjust channels to maximize channel performance. The system operator can also create bundled channels containing videos from multiple providers, and the resulting subscription revenue can be distributed to the various providers of the videos in the channel. | 2011-12-29 |
20110321073 | TECHNIQUES FOR CUSTOMIZATION - Techniques are disclosed that involve detecting and tracking groups of people associated with a user device (e.g., people watching television), and customizing the experience to the group. Various features may be employed. Such features may include classification of individuals, identification of commonly occurring groupings of people, and identification of the presence of group outsiders. Based on the presence of such individuals, groups, and/or outsiders, delivery of information to the user device may be controlled. | 2011-12-29 |
20110321074 | APPARATUSES, SYSTEM, METHOD, AND STORAGE MEDIUM FOR CROWD GAME - Apparatuses, system, method, and storage medium for crowd game are disclosed. A series of missions forming a crowd game are outputted to a display device, each mission specifying a task for spectators of an event. A result for a mission is determined on the basis of participation and/or reaction by the spectators for the task. A total result for the crowd game is determined on the basis of the results for the missions. | 2011-12-29 |
20110321075 | DYNAMICALLY MODIFYING MEDIA CONTENT FOR PRESENTATION TO A GROUP AUDIENCE - A computer implemented method dynamically modifies media content to be presented to a group of viewers. A plurality of content filters, each of which has multiple sub-components and is based on a member profile of a different member of a media viewing audience, is generated. Media content is then modified, based on the plurality of content filters, to create a dynamically modified media content for viewing by the media viewing audience. | 2011-12-29 |
20110321076 | VIEWING TERMINAL DEVICE, SERVER DEVICE, AND PARTICIPATING PROGRAM SHARING SYSTEM - A viewing terminal device transmits a viewing information and a comment information fetched using an input processing unit to a server device via a network. To display a video data of a broadcast program, the viewing terminal device issues a request to transmit a viewing statistical information and sends the transmission request to the server device, and receives and displays the viewing statistical information transmitted from the server device in response to the request to transmit the viewing statistical information. | 2011-12-29 |
20110321077 | VIEWING IMPRESSION REPORT COLLECTION, STORAGE, AND REPORTBACK OF INSERTED CONTENT WITH DVR PLAYBACK - A method and system that computes viewing statistics for a digital video content stream received at a set-top box. The digital video content stream includes a first segment of video content, a second segment of video content, a third segment of video content, a first timing mark that indicates a transition from the first segment to the second segment, and a second timing mark that indicates a transition from the second segment to the third segment. The method initiates a transmission of the digital video content stream at the set-top box, monitors the transmission of the digital video content stream relative to the first timing mark and the second timing mark, and computes view data for the second segment based on the monitoring of the transmission. The method stores the view data at the set-top box. | 2011-12-29 |
20110321078 | FORECASTING AND CABLE TELEVISION NETWORK - PLANNING OF NARROWCAST SERVICES - A method and a non-transitory computer readable medium for evaluating a configuration change of a cable television network, the method may include: receiving, a model of a cable television network, the cable television network comprises multiple service groups, multiple transmitters and at least one session management unit; wherein each service group comprises multiple user devices; receiving or generating, viewers' activity information about viewing patterns of viewers that belong to the multiple service groups; receiving a request to perform a requested change in a current configuration of the cable television network; simulating, by a simulator, based on the model, the viewers' activity information and the requested change, a provision of services to the multiple service groups given the requested change to provide simulation results that represent an effect of the requested change, prior to a deployment of the change in the cable television network. | 2011-12-29 |
20110321079 | SYSTEMS AND METHODS FOR AUTHORIZING ACCESS TO NETWORK SERVICES USING INFORMATION OBTAINED FROM SUBSCRIBER EQUIPMENT - Systems and methods are described for authorizing access to network service based upon information obtained from a set-top box (STB) or other subscriber equipment associated with the user requesting access to the network service. The network service suitably contacts a subscriber device associated with the user via the network in response to a request for access that is received from the user. Information obtained from the subscriber device is processed to thereby determine if the user is authorized to use the service. If the user is authorized, then the service is provided via the network. Access to an online video stream, for example, can be conditioned upon the requesting user having an appropriate account with a cable, direct broadcast satellite (DBS) or other service that can be verified through contact with the user's STB or other subscriber equipment. | 2011-12-29 |
20110321080 | Systems, Methods, and Products for Presenting Content - Methods, systems, and products modify and/or block content. A program is received, along with a default rating of the program and dynamic ratings of portions of the program. A preference is received from memory to at least one of block and modify the program. When a dynamic rating is missing for a portion of the program, then revert to the default rating and block the portion of the program from presentation. | 2011-12-29 |
20110321081 | IMAGE DEVICE, RECEIVING METHOD OF CONTENTS, SERVER AND PROVIDING METHOD OF CONTENTS - An image device, a receiving method of contents, a server, and a providing method of contents are provided. The image device includes: a communication unit which communicates with a server that provides content received from a content provider; a display unit; at least one application execution unit which executes the content; and an application controller which controls the communication unit to receive the content corresponding to a log-in user from the server and displays, on the display unit, reception information indicating reception of the content based on a user ID for the log-in user to be logged in to the image device and a token which matches the user ID to a content ID for the log-in user to be connected to the content provider. | 2011-12-29 |
20110321082 | User-Defined Modification of Video Content - A particular method of user-defined modification of video content includes receiving video content at a set-top box (STB) and converting the video content into modifiable video content. The method includes selecting an image in at least one frame of the modifiable video content. The image is associated with a user-defined modification condition. The at least one frame of the modifiable video content is modified to generate modified video content. Modifying the at least one frame includes modifying the selected image in the at least one frame. | 2011-12-29 |
20110321083 | INTEGRATING AND PROCESSING EMBEDDED LINKS TO RELATED VIDEO CONTENT IN A VIDEO STREAM TO PROVIDE ADVERTISING INFORMATION - In one embodiment, a capability is disclosed for conveying a link to further information over a cable system to a consumer device, wherein the video link can be associated with an external video source. The information can be conveyed to the consume device in one embodiment by embedding the video link information within a stream of MPEG formatted video information using an EBIF application. The video link information can be a URL from which the external information, typically video information, can be received. Upon detecting the link, the consumer device opens up a display window on a television image, which is presented to the viewer in an overlaid manner in addition to the MPEG video information on a television display. Typically, after the external video is presented, the window is closed. | 2011-12-29 |
20110321084 | APPARATUS AND METHOD FOR OPTIMIZING ON-SCREEN LOCATION OF ADDITIONAL CONTENT OVERLAY ON VIDEO CONTENT - A method of providing a video content formed of a plurality of successive video frames is disclosed. The method includes: extracting a visual feature from an image of each of subject frames which are all or some of the plurality of video frames; and selecting one of a plurality of candidate overlay insertion regions which are pre-assigned on each of the subject frames at different positions for allowing an additional content as a content overlay to be overlaid on the subject frames for display, as a final overlay insertion region, based on distances of the plurality of candidate overlay insertion regions from the extracted feature. | 2011-12-29 |