Patent application number | Description | Published |
20090150611 | MANAGEMENT OF EXTERNAL MEMORY FUNCTIONING AS VIRTUAL CACHE - A method and apparatus for managing the caching of data on an auxiliary memory of a computer. Pages of data may be cached on an auxiliary memory, such as a flash memory, at a virtual level using an identifier that does not involve a physical address of the pages on a memory. Pages may be cached on auxiliary memory that may be removable from the computer, e.g., by unplugging the memory from the computer. Page data may be encrypted and/or compressed on the auxiliary memory. An authentication indicator may be used to verify the accuracy of cached data in the case of an interrupted connection to the auxiliary memory, e.g., as a result of computer power down, hibernation, removal of the memory from the computer, etc. | 06-11-2009 |
20120124363 | ANALYZING PERFORMANCE OF COMPUTING DEVICES IN USAGE SCENARIOS - Techniques for conducting an automated analysis of operations carried out during the critical path for a usage scenario and suggesting ways in which the configuration of the computing device could be changed to affect performance of the computing device. Computing devices can be operated in a variety of usage scenarios and users may notice the performance of a computing device in certain usage scenarios more particularly. Critical path analysis of operations conducted in these usage scenarios can be used to identify a critical path of the usage scenario, from which changes that could be made to the computing device to affect performance could be identified. Once the changes that could be made are identified, suggestions can be made to the user, such that a user is able to make changes to the configuration to affect performance when the user has little knowledge about how to improve configurations. | 05-17-2012 |
20140075126 | MANAGEMENT OF EXTERNAL MEMORY FUNCTIONING AS VIRTUAL CACHE - A method and apparatus for managing the caching of data on an auxiliary memory of a computer. Pages of data may be cached on an auxiliary memory, such as a flash memory, at a virtual level using an identifier that does not involve a physical address of the pages on a memory. Pages may be cached on auxiliary memory that may be removable from the computer, e.g., by unplugging the memory from the computer. Page data may be encrypted and/or compressed on the auxiliary memory. An authentication indicator may be used to verify the accuracy of cached data in the case of an interrupted connection to the auxiliary memory, e.g., as a result of computer power down, hibernation, removal of the memory from the computer, etc. | 03-13-2014 |
Patent application number | Description | Published |
20080285530 | Wireless Node Location Mechanism Featuring Definition of Search Region to Optimize Location Computation - A wireless node location mechanism that defines a search region to optimize the computations associated with estimating the location of a given wireless node. According to one implementation, a coverage map associated with each radio receiver that records signal strength data is defined out to a threshold signal strength level. Before computing the estimated location of a given wireless nodes, a search region is defined based on the intersection of the coverage maps associated with each radio receiver that detects the wireless node. Some implementations use information provided by the fact that certain radio receivers did not detect the wireless node to further optimize the location estimate. By defining a search region, which is a generally small area relative to the space encompassed by an entire RF environment, the present invention provides several advantages, such as reducing the processing time and/or power to compute estimated locations for wireless nodes. | 11-20-2008 |
20090271864 | Containment of Rogue Systems in Wireless Network Environments - Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures. | 10-29-2009 |
20090296647 | Method and System for Dynamically Assigning Channels Across Multiple Radios in a Wireless LAN - In a fixed channel wireless network system with a limited number of channels, assignment of the fixed channels between remote client elements and access elements is made systematically according to a set of criteria accounting for network loading and interference, then channel assignments are dynamically updated according to a priority to maintain optimal network performance with changing conditions of load and interference. The channel utilization problem is address at a system level rather than at a local level by treating the system as a three dimensional color mapping problem. All noise is treated as having a source in virtual access elements with an appropriate performance metric. The performance metric is used to select a channel set that minimize chances of interference and maximize user performance. Specifically, there are several parameter matrices which are managed and updated by a central resource management element, namely signal strength between elements, interference, and load. These matrices are used to find the optimal channel assignments for a predetermined limited set of assignable channels. In one implementation, the channel assignment methodology takes into account the interference associated with access elements operating on a selected channel, as well as the interference or energy that spills over (or is otherwise observable) on physical channels adjacent to the selected channel. | 12-03-2009 |
20100322198 | Pre-Emptive Roaming Mechanism Allowing for Enhanced QoS in Wireless Network Environment - A preemptive roaming mechanism in wireless network environments. In one implementation, the present invention provides a wireless client that implements a preemptive roaming mode that, when an attribute of the signal (e.g., Signal to Noise Ratio (SNR), etc.) between the access point with which the client is currently associated crosses a threshold, scans for other access points with which to associate. In one implementation, the client switches between the scanning mode and a traffic mode to allow data to be transferred between the client and the current access point. The pre-emptive roaming functionality can be configured to support desired data rates or other QoS levels. | 12-23-2010 |
20110183688 | Enhanced Wireless Node Location Using Differential Signal Strength Metric - A wireless node location mechanism that employs a differential signal strength metric to reduce the errors caused by variations in wireless node transmit power, errors in signal strength detection, and/or direction-dependent path loss. As opposed to using the absolute signal strength or power of an RF signal transmitted by a wireless node, implementations of the location mechanism compare the differences between signal strength values detected at various pairs of radio receivers to corresponding differences characterized in a model of the RF environment. One implementation searches for the locations in the model between each pair of radio receivers where their signal strength is different by an observed amount. | 07-28-2011 |
20140029526 | Method and System for Dynamically Assigning Channels Across Multiple Radios in a Wireless LAN - According to one embodiment, a method includes monitoring, at one or more wireless network access elements, signal strength of signals transmitted by respective neighboring wireless network access elements. Information is collected from said wireless network access elements and converted into reportable data about signal strength observed during the monitoring. The method further includes identifying, based at least in part on interference associated with concurrent signal transmissions of the wireless network access elements, a combination of channel assignments for the one or more wireless network access elements from a plurality of possible combinations of channel assignments and assigning channels for concurrent, respective use by said wireless network access elements based on the identified combination of channel assignments. | 01-30-2014 |
Patent application number | Description | Published |
20100088376 | Obtaining content and adding same to document - Mechanisms to assist a user in obtaining content may be integrated with the tools that allow the user to author an e-mail message or any other type of document. For example, an e-mail composition system may offer various buttons that allow users to obtain certain types of content—e.g., movie times, restaurant menus, etc. When the user clicks the button, the requested type of content may be obtained, and the user may be offered the opportunity to insert the obtained content into the document that is being authored. The content that is obtained may follow a particular structure. For example, a system might be configured to respond to a request for movie-related content by returning a list of show-times and theaters for a particular movie. | 04-08-2010 |
20110276637 | TECHNIQUES TO SHARE MEDIA FILES THROUGH MESSAGING - Techniques to share media files through messaging are described. An apparatus may comprise a processor and a memory communicatively coupled to the processor. The memory may store a message application that when executed by the processor is operative to communicate a message and a message attachment comprising a media file at different time intervals using different transports. The message may have a link comprising a reference to a discoverable storage location for the media file. Other embodiments are described and claimed. | 11-10-2011 |
20130104053 | TECHNIQUES TO SHARE MEDIA FILES THROUGH MESSAGING - Techniques to share media files through messaging are described. An apparatus may comprise a processor and a memory communicatively coupled to the processor. The memory may store a message application that when executed by the processor is operative to communicate a message and a message attachment comprising a media file at different time intervals using different transports. The message may have a link comprising a reference to a discoverable storage location for the media file. Other embodiments are described and claimed. | 04-25-2013 |