03rd week of 2012 patent applcation highlights part 53 |
Patent application number | Title | Published |
20120016838 | LOCAL FILE SERVER TRANSFERRING FILE TO REMOTE FILE SERVER VIA COMMUNICATION NETWORK AND STORAGE SYSTEM COMPRISING THOSE FILE SERVERS - A remote file server managing a remote storage device and a local file server managing a local storage device are coupled to a communication network (e.g. the Internet). The local file server (A) replicates a file in the local storage device to the remote file server and, (B) if a first condition is satisfied, manages the replicated file which is the file from which the data is replicated as a migration target file. The local file server, even if the (B) is completed, does not delete the migration target file from the local storage device and, if the second condition is satisfied, deletes the migration target file from the local storage device. | 2012-01-19 |
20120016839 | De-Duplication Based Backup Of File Systems - File system backups are performed by copying information describing changes in the file system since a previous point in time. To restore data, a virtual restored file system (VRFS) structure is created corresponding to a snapshot of data copied from the file system that is stored in the backup file system. A client can read the data stored in the backup file system pointed at by the VRFS structure as well as write to the backup file system. Multiple clients can share blocks of data stored on the backup file system via the same VRFS structure or via multiple VRFS structures. If a client writes to a data block pointed at by a VRFS, a copy of the data block is made to which the client makes changes so that the data in the original data blocks is saved for other clients. | 2012-01-19 |
20120016840 | VIRTUAL MACHINE AWARE REPLICATION METHOD AND SYSTEM - A method for replicating a virtual file system of a virtual machine. The method includes accessing a host file system usage map of a host machine that indicates active blocks out of a plurality of blocks of the host file system, and accessing a virtual file system usage map of a virtual machine that indicates active blocks out of a plurality of blocks of the virtual file system. A merged usage map is generated from information of the host file system usage map and the virtual file system usage map that identifies active blocks of the host file system associated with the virtual file system. The virtual file system is then replicated at a replication destination in accordance with the merged usage map. | 2012-01-19 |
20120016841 | BLOCK LEVEL INCREMENTAL BACKUP - A system and method include creating a full backup copy of selected data from a storage device. A series of incremental backups are created over time following the creation of the full backup copy. The oldest incremental backup is merged into the full backup at a desired time. | 2012-01-19 |
20120016842 | DATA PROCESSING APPARATUS, DATA PROCESSING METHOD, DATA PROCESSING PROGRAM, AND STORAGE APPARATUS - In a data processing apparatus, a snapshotting unit creates a second snapshot in a first storage space while a first snapshot of the first storage space exists in a second storage space. A storage unit stores first progress data indicating progress of physical copy to the first storage space for a current second snapshot, and second progress data indicating progress of physical copy to the first storage space for a preceding second snapshot. | 2012-01-19 |
20120016843 | Information Source Agent Systems and Methods for Backing Up Files To a Repository Using File Identicality - A system, method, and computer program product for storing back-up files using file identicality properties are provided. A system is provided that intercepts file information from files while they are being stored to a back-up system. The files are intercepted with a file gathering interface that is in communication with one or more information source clients. The system includes an indexing engine to index file data contents of the intercepted file, a metadata engine to manage metadata concerning the intercepted file, and a triage engine to manage the file gathering interface, the indexing engine, and the metadata engine. Methods are provided for the interception of files being sent to a back-up system that take advantage of file identicality properties. | 2012-01-19 |
20120016844 | DATA PROCESSING APPARATUS, DATA PROCESSING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM STORING A PROGRAM - A table is provided including a document name and content that is included the document data thereof and for which the number of times that duplication is permitted is restricted, in association with each other. The table is referenced, and a determination is made as to whether document data targeted for duplication processing includes content for which duplication processing is restricted. If a determination is made that such content is included, deletion-completed document data in which the content has been deleted from the document data is generated (S | 2012-01-19 |
20120016845 | SYSTEM AND METHOD FOR DATA DEDUPLICATION FOR DISK STORAGE SUBSYSTEMS - A method for data deduplication includes the following steps. First, segmenting an original data set into a plurality of data segments. Next, transforming the data in each data segment into a transformed data representation that has a band-type structure for each data segment. The band-type structure includes a plurality of bands. Next, selecting a first set of bands, grouping them together and storing them with the original data set. The first set of bands includes non-identical transformed data for each data segment. Next, selecting a second set of bands and grouping them together. The second set of bands includes identical transformed data for each data segment. Next, applying a hash function onto the transformed data of the second set of bands and thereby generating transformed data segments indexed by hash function indices. Finally, storing the hash function indices and the transformed data representation of one representative data segment in a deduplication database. | 2012-01-19 |
20120016846 | DATA DEDUPLICATION BY SEPARATING DATA FROM META DATA - Provided are techniques for data deduplication. A chunk of data and a mapping of boundaries between file data and meta data in the chunk of data are received. The mapping is used to split the chunk of data into a file data stream and a meta data stream and to store file data from the file data stream in a first file and to store meta data from the meta data stream in a second file, wherein the first file and the second file are separate files. The file data in the first file is deduplicated. | 2012-01-19 |
20120016847 | File Management System And Method - A file management system ( | 2012-01-19 |
20120016848 | ESTABLISHING PARSE SCOPE - Example apparatus, methods, and computers control establishing a shared parse scope between two computers that intend to be involved in a shared de-duplication action. One example method includes, upon determining that a first de-duplication logic and a second de-duplication logic are to participate in a shared de-duplication action for an object, controlling the first de-duplication logic to establish a shared parse scope with the second de-duplication logic. Establishing the shared parse scope may include negotiations between the computers, where the negotiations transfer dialect information. The dialect information may take the form of rules. The method may also include persisting the shared parse scope. | 2012-01-19 |
20120016849 | Sharing and Deconflicting Data Changes In A Multimaster Database System - A computer-based method and system for sharing and deconflicting data changes amongst a plurality of replication sites. In a particular embodiment, data changes at sites to data objects are tracked by each site on a per-data object basis using per-data object version vectors. In another particular embodiment, data changes at sites to links connecting two data objects are tracked by each site on a per-link set basis using per-link set version vectors. In another particular embodiment, per-object version vectors are used to detect a conflict resulting from concurrent changes at two or more sites in which one of the concurrent changes includes an object resolution change. | 2012-01-19 |
20120016850 | Notifying Users of File Updates on Computing Devices Using Content Signatures - A method, computer program product, and apparatus for managing file updates using content signatures that use file identicality properties are provided. A method and computer program product are provided for the notification of receipt of a new version of the old file using content signatures that take advantage of file identicality properties. Content signature application modules and registries exist within information source clients and centralized servers to support the notification methods. An apparatus is provided that associates a file it has received, that is a new version of an old file, with previously stored content signatures in an indexed archive system. The information source clients that have the previously stored content signatures are then identified. These information source clients are then notified that the new version of the file exists. | 2012-01-19 |
20120016851 | System and Method for Partially Deferred Index Maintenance - Methods and Apparatus, including computer program products, for maintaining indexes in a database management system. The database management system includes a table having table entries and an index data structure having index data structure entries, the index data structure relating to the table. The index data structure is updated synchronously with an insertion of table entries. The index data structure is maintained unchanged when the table entries are deleted. It is verified by an index-scan on the index data structure that a valid criterion is fulfilled for index data structure entries, and those index data structure entries that pass the valid criterion from the index-scan are returned. | 2012-01-19 |
20120016852 | COLLABORATIVE, DISTRIBUTED, DATA DE-DUPLICATION - Example apparatus, methods, and computers participate in collaborative, distributed, data de-duplication. One example method includes initializing a layered parser in a first node in a collaborative distributed data de-duplication (CDDD) topology with a first set of de-duplication control parameters. After transmitting some information to another node in the CDDD topology, the method includes selectively reconfiguring the layered parser in response to feedback acquired from the second node in the CDDD topology. The feedback concerns the data provided by the layered parser. | 2012-01-19 |
20120016853 | EFFICIENT AND CONSISTENT SOFTWARE TRANSACTIONAL MEMORY - A method and apparatus for efficient and consistent validation/conflict detection in a Software Transactional Memory (STM) system is herein described. A version check barrier is inserted after a load to compare versions of loaded values before and after the load. In addition, a global timestamp (GTS) is utilized to track a latest committed transaction. Each transaction is associated with a local timestamp (LTS) initialized to the GTS value at the start of a transaction. As a transaction commits it updates the GTS to a new value and sets versions of modified locations to the new value. Pending transactions compare versions determined in read barriers to their LTS. If the version is greater than their LTS indicating another transaction has committed after the pending transaction started and initialized the LTS, then the pending transaction validates its read set to maintain efficient and consistent transactional execution. | 2012-01-19 |
20120016854 | FILE-SHARING SYSTEM AND METHOD FOR MANAGING FILES, AND PROGRAM - A file, for which writing has been reserved, in a file-sharing system can be efficiently read. A check-in file agent is provided in a computer that executes check-in of a file as the file-write reserving processing, a file manager is provided in a file-sharing computer, and a check-out file agent is provided in a computer that executes check-out of a file as the file reading processing. Upon request for check-in of a file, the check-in file agent divides the file into divided files and generates metadata that indicates the order of division of the file, and transmits them to the file-sharing computer for storage therein. Upon request for check-out of the file, the check-out file agent receives the metadata from the file-sharing computer, and based on the metadata, sequentially receives the divided files to generate a file to be checked out. | 2012-01-19 |
20120016855 | INTERPROCESS COMMUNICATION USING A SINGLE SEMAPHORE - A method to enable communication between software processes includes initiating a plurality of processes, the processes including both attachment processes and target processes. A single semaphore is created and initialized for use by the plurality of processes such that each of the target processes wait on the semaphore. An attachment process writes a message file, identifying a specific target process, to a location accessible by the target processes. The attachment process then increments the semaphore by the number of target processes, thereby unblocking the target processes and allowing them to check the message file. When the specific target process determines that the message file is intended for that target, a connection is established between the attachment process and the specific target process. The attachment process then decrements the semaphore to zero to block the target processes. A corresponding computer program product and apparatus are also disclosed herein. | 2012-01-19 |
20120016856 | CONTENT EXTRACTOR - Systems and methods for extracting data related to product sales and businesses that sell products are disclosed. The method may include obtaining a database connection parameter and a remote system connection parameter. The method also may include establishing a connection with a database using the database connection parameter, where the database has a table with a table attribute. Additionally, the method may include obtaining a mapping of one of the table attributes to a predefined attribute so that data may be extracted from the database using the mapping. The method may further include establishing a connection with a remote system using the remote system connection parameter and transmitting the extracted data to the remote system. | 2012-01-19 |
20120016857 | SYSTEM AND METHOD FOR PROVIDING SEARCH ENGINE OPTIMIZATION ANALYSIS - A system and method for providing search engine optimization analysis. A starting URL for a starting web resource is obtained and analyzed. A text-based portion of the starting web resource is processed to determine potential target terms, and a relevancy test is performed based on the potential target terms. Referred URLs are determined and recursively analyzed. A text-based portion of the referred web resource is processed to determine potential target terms, and a relevancy test is performed based on the potential target terms. A link index is analyzed to determine web resources linking to the starting and referred URLs. An internal search engine optimization score and an external search engine optimization score are calculated. A graphical report including a visualization of statistical information related to search engine optimization and a domain visualization map including a graphical network representation of the statistical information are provided. | 2012-01-19 |
20120016858 | SYSTEM AND METHOD FOR COMMUNICATION, PUBLISHING, SEARCHING AND SHARING - A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module. | 2012-01-19 |
20120016859 | Method/system for prior art searching - An automated method/system used over an extended time period implemented by an information technology (IT) system for determining “prior art” relating to an inventive concept. Such information can facilitate drafting an invention disclosure from this initial invention concept using steps and means for parsing either an invention statement, using an automated iterative search protocol of the prior art. The invention is used for continual search the prior art as to novelty of an inventive concept from an initial invention statement written in normal sentences and entered into the IT system. Also, the invention can be used for determining undiscovered prior art during a post patent grant period to challenge or correct validity of a patent in view of new prior art findings. | 2012-01-19 |
20120016860 | SCALABLE SEARCH SYSTEM USING HUMAN SEARCHERS - A system allowing a query to be submitted to a server that locates a human searcher to perform a search. The searcher performs a search including using conventional tools, browser, and provides results to the user. A searcher who produces result(s) accepted by the user is rewarded and the results can be used when a similar query is submitted by another user. The searcher is bested by comparing keywords of the query to keywords for which the searcher has registered and a high ranking searcher may be chosen by the system based on various factor(s). While the search is performed, information including videos, games, advertisements, etc., may be provided to the user based on keywords of the query and selection by the searcher. The reward for the searchers can be based on revenue from advertisements. | 2012-01-19 |
20120016861 | REGISTRATION OF APPLICATIONS AND UNIFIED MEDIA SEARCH - An application programming interface (API) includes an interface implemented by a software program or firmware program which enables an application to interact with other software or with firmware. An API can facilitates interaction between different software programs. Registration of an application can be the notification, by an API which corresponds to a non-native application, to native applications and to a core search framework of a mobile communications device. A core search framework provides a mechanism which enables an application to register as a provider of searchable data. A media application provides a search API media subset which enables non-native applications to register and enables non-native applications to indicate media type categories for which non-native applications may be searched. Registered non-native applications are launched based upon the type of media utilized by a media application. | 2012-01-19 |
20120016862 | Methods and Systems for Extensive Crawling of Web Applications - In one embodiment, a method may include accessing a particular page of Web application that includes a form having at least one field for entry of data by a user of the Web application, the Web page rendered by the Web application based on code for the Web page. The method may also include analyzing the code. The method may further include generating one or more sets of inputs for the at least one field based on the analysis. The method may additionally include automatically entering, into the at least one field, the one or more sets of inputs. The method may also include automatically submitting the form, including the one or more sets of inputs into the at least one field. | 2012-01-19 |
20120016863 | ENRICHING METADATA OF CATEGORIZED DOCUMENTS FOR SEARCH - Methods for enriching metadata associated with a document that is categorized in a document category are described. Documents are pre-categorized within a document category. Uniform resource locaters (URL) that are related to a document category are identified and linked to the document category. Indications of tokens and relationships between the tokens and the URLs are received. The tokens are linked to the URLs. The tokens are propagated to the document categories and to the documents therein based on linking between the token, URL, and document category. As such the document category, and documents therein, are provided with metadata that is descriptive thereof. The documents and their associated metadata tokens are useable to generate a searchable index of the documents. The linking between the tokens, URLs, and categories is also useable to identify tokens that are too specific, too general, or documents that are miscategorized. | 2012-01-19 |
20120016864 | HIERARCHICAL MERGING FOR OPTIMIZED INDEX - Methods, systems, and media are provided for an optimized search engine index. The optimized index is formed by merging small lower level indexes of fresh documents together into a hierarchical cluster of multiple higher level indexes. The optimized index of fresh documents is formed via a single threaded process, while a fresh index serving platform concurrently serves fresh queries. The hierarchy of higher level indexes is formed by merging lower and/or higher level indexes with similar expiration times together. Therefore, as some indexes expire, the remaining un-expired indexes can be re-used and merged with new incoming indexes. The single threaded process provides fast serving of fresh documents, while also providing time to integrate the fresh indexes into a long term primary search engine index, prior to expiring. | 2012-01-19 |
20120016865 | DYNAMIC LANGUAGE TRANSLATION OF WEB SITE CONTENT - Methods, systems, and computer readable medium for providing translated web content with translated URLs. A request is received content in a second language translated from content in a first language. The content in the first language is obtained from the first Internet source. One or more links are identified from the content in the first language. Each original URL is divided into one or more translatable URL components in the first language. Whether the one or more translatable URL components in each original URL have been previously translated into the second language and stored as translated URL components is determined. If there is at least one translatable URL component previously translated and stored as a corresponding translated URL component, a translated URL in the second language for each original URL is generated. The content in the second language with translated URLs is created. | 2012-01-19 |
20120016866 | SCALED MANAGEMENT SYSTEM - An exemplary system for managing an applications and data space includes a strategy layer configured to receive a query statement and to formulate one or more custom queries based on the query statement and a query scheduler layer configured to schedule issuance of the one or more custom queries to one or more query response modules associated with the applications and data space. Other methods, devices and systems are also disclosed. | 2012-01-19 |
20120016867 | Displaying changes to versioned files - Presenting changes to versioned files. The method can include presenting a first view comprising a plurality of indicators, each of the indicators corresponding to a respective version of a file. A selection of a particular version of a file can be detected. A selection of another version of the file can be detected. In response to the selection of the other version of the file, the versions of the file can be compared to identify differences between the versions. Comparison information based on the differences can be generated. The comparison information can be filtered so that the comparison information fits within a second view having a desired size. | 2012-01-19 |
20120016868 | DATA ENTRY MANAGEMENT - A data entry management system includes computer executable instructions tangibly embodied on non-transitory media. The data entry management system includes a processing logic which may control a display area. The processing logic may determine a display area content. The display area content may include one of a working context search screen, a search screen, a data entry help screen, and a single-dimensional selector screen. The processing logic may determine which of the working context search screen, the search screen, the data entry help screen, and the single-dimensional selector screen to display in display area based on a profile. | 2012-01-19 |
20120016869 | Collecting and Presenting Temporal-Based Action Information - Functionality is described for collecting and presenting action information. The action information describes actions that take place on items at specified times. Among other applications, the functionality assists a user in identifying and accessing relevant items. In one illustrative case, the functionality can display action information in a timeline presentation. | 2012-01-19 |
20120016870 | DOCUMENT SCORING BASED ON QUERY ANALYSIS - A system may determine an extent to which a document is selected when the document is included in a set of search results, generate a score for the document based, at least in part, on the extent to which the document is selected when the document is included in a set of search results; and rank the document with regard to at least one other document based, at least in part, on the score. | 2012-01-19 |
20120016871 | DOCUMENT SCORING BASED ON QUERY ANALYSIS - A system may determine an extent to which a document is selected when the document is included in a set of search results, generate a score for the document based, at least in part, on the extent to which the document is selected when the document is included in a set of search results; and rank the document with regard to at least one other document based, at least in part, on the score. | 2012-01-19 |
20120016872 | METHODS AND APPARATUSES FOR USE IN GENERATING AN ENCODED ROUTEABILITY GRAPH DESCRIPTION - Methods and apparatuses are provided that may be implemented in one or more electronic devices to generate an encoded routeability graph description corresponding to a diagram of a structure. The methods and apparatuses may, for example, implement a reduction process to reduce a number of grid points within an encoded routeability graph description, or which may be otherwise used to generate an encoded routeability graph description. | 2012-01-19 |
20120016873 | METHOD AND SYSTEM FOR RANKING SEARCH RESULTS BASED ON CATEGORIES - Described herein are methods and systems for promoting item listings that satisfy a query based on the item listings being assigned to certain categories that have, based on historical click data, exhibited high demand characteristics for the query. Consistent with some embodiments, a certain number of leaf-level categories are identified based on demand data for those categories, and the item listings assigned to those categories are promoted through a weighting factor derived in part based on the click probability score associated with the category. In some embodiments, certain sub-categories may be selected when the demand associated with the child categories of the sub-category is well balanced. | 2012-01-19 |
20120016874 | DOCUMENT SCORING BASED ON QUERY ANALYSIS - A system may determine an extent to which a document is selected when the document is included in a set of search results, generate a score for the document based, at least in part, on the extent to which the document is selected when the document is included in a set of search results; and rank the document with regard to at least one other document based, at least in part, on the score. | 2012-01-19 |
20120016875 | PERSONALIZED DATA SEARCH UTILIZING SOCIAL ACTIVITIES - Embodiments relate personalized data searches utilizing social activities. In one embodiment, a search query is received from a user. A set of search results that satisfy the search query is received from a search engine. A user interest profile associated with the user is identified. The user interest profile includes information associated with a set of activities performed by the user on one or more social systems. A ranking score is assigned to each result in at least a subset of search results in the set of search results based at least on the user interest profile. The subset of search results are sorted based on the score that has assigned to each result in the subset of results. The subset of search results that has been sorted is sent to the user. | 2012-01-19 |
20120016876 | METHOD AND DEVICE FOR GENERATING AND DETECTING A FINGERPRINT FUNCTIONING AS A TRIGGER MARKER IN A MULTIMEDIA SIGNAL - A device is configured to perform a method that detects a trigger marker for an action corresponding to a segment of a multimedia signal. A fingerprint is generated based on the segment of the multimedia signal at a trigger time point. The generated fingerprint is stored in a database and communicated to the device. During playback of the multimedia signal, fingerprints of segments of the multimedia signal are generated and matched against fingerprints in the database. When a match is found, one or more associated actions for the segment are retrieved by the device. The trigger time point may be determined as a time point near or at the segment of the multimedia signal with the matched fingerprint. In this way, trigger markers for actions may be enabled without modifying the multimedia signal. | 2012-01-19 |
20120016877 | CLUSTERING OF SEARCH RESULTS - One particular embodiment clusters a plurality of documents using one or more clustering algorithms to obtain one or more first sets of clusters, wherein: each first set of clusters results from clustering the documents using one of the clustering algorithms; and with respect to each first set of clusters, each of the documents belongs to one of the clusters from the first set of clusters; accesses a search query; identifies a search result in response to the search query, wherein the search result comprises two or more of the documents; and clusters the search result to obtain a second set of clusters, wherein each document of the search result belongs to one of the clusters from the second set of clusters. | 2012-01-19 |
20120016878 | CONSTRAINED NONNEGATIVE TENSOR FACTORIZATION FOR CLUSTERING - Methods and systems for clustering information items using nonnegative tensor factorization are disclosed. A processing device receives one or more class labels, each corresponding to an information item, a selection for a nonnegative tensor factorization model having an associated objective function and one or more parameter values, each corresponding to one of one or more penalty constraints. The processing device determines a constrained objective function based on the objective function associated with the selected nonnegative tensor factorization model, the one or more parameter values and the one or more class labels and including the one or more penalty constraints. The processing device determines clusters for the plurality of information items by evaluating the constrained objective function. Pairwise constraints may be received in addition to or instead of the class labels. | 2012-01-19 |
20120016879 | SYSTEMS AND METHODS OF USER INTERFACE FOR IMAGE DISPLAY - Approaches to displaying image search results, and image content of computer readable media include providing a matrix display of images, with an interface to insert and remove floating date dividers, each indicative of a day on which one or more of the images was created. Available images can be abstracted according to a respective month in which the images were created, up to a determined maximum number of months, after which images are abstracted according to a year in which they were created. Selecting a month causes display of a matrix of images created during that month, while selecting a year causes display of a list of months. A selected thumbnail can be displayed for each month or year of a displayed list. Search results can grouped according to how each result satisfied the search criteria, such as a separate group for images that had names matching a search criteria, and one or more separate groups for images that satisfied a date range criteria. | 2012-01-19 |
20120016880 | DATA ELEMENT CATEGORIZATION IN A SERVICE-ORIENTED ARCHITECTURE - A method and system for specifying categories of data elements during a service specification phase of a service-oriented architecture (SOA) life cycle defined in a service modeling methodology like Service-Oriented Modeling and Architecture (SOMA). A Unified Modeling Language based SOA modeling tool for SOMA methodology includes a middleware based integration plug-in that categorizes retrieved service-specific data elements as transaction elements, optional controller elements, glue elements, optional extension patterns, extension elements and core Common Information Model entities, and associates the categorized data elements with corresponding operations of the service being modeled. A user interface provided by the plug-in enables input of the data elements into the categories and input of the associations between the categorized data elements and corresponding operations of the service being modeled. Furthermore, the plug-in generates and initiates storing of a service specification based on the categorization of the data elements. | 2012-01-19 |
20120016881 | Automatic Maintenance of a Set of Indexes with Different Currency Characteristics in a Database Management System - Methods and apparatus, including computer program products, for maintaining a set of indexes in a database management system (DBMS) having at least one table. A current, stale or deferred status is defined for at least a part of the indexes, resulting in at least a part of a set of current, stale, or deferred indexes in the DBMS. Current indexes are maintained by refreshing a current index synchronously with a table change relating to the current index. Stale indexes are maintained by refreshing a stale index continuously and asynchronously to table modifications of tables relating to the stale index based on log information relating to the modifications. Deferred indexes are maintained by building a deferred index in response to a query to a table relating to the deferred index, thereby bringing the deferred index in accordance with the current query time status to the table relating to the deferred index. | 2012-01-19 |
20120016882 | DELTA CHUNKS AND DELTA HASHES - Example apparatus, methods, and computers control processing delta chunks with delta hashes. One example method includes computing a first hash for a chunk for which a duplicate determination is to be made. The first hash is suitable for making the duplicate chunk determination. The method also includes computing a delta hash for the chunk. The delta hash is suitable for making a delta chunk determination. The method controls a de-duplication logic to process the chunk as a duplicate upon determining that the first hash matches a stored first hash. The method controls the de-duplication logic to process the chunk as a delta chunk upon determining that the first hash does not match a stored first hash and that the delta hash matches a stored delta hash. Processing a chunk as a delta chunk may include storing a reference to a stored chunk and storing delta hash information. | 2012-01-19 |
20120016883 | Enhanced Query Performance Using Fixed Length Hashing of Multidimensional Data - Methods, systems and apparatus, including computer program products, for enhancing query performance through fixed length hashing of multidimensional data. According to one method, a fixed length hash of a multidimensional data record is created where the hash has respective fixed length sections for each data dimension of the record being hashed. The composite fixed length hash is stored with a reference to the original data record to which it corresponds. Query parameters are hashed and compared to a corresponding section of the fixed length hash to determine a set of candidate records. | 2012-01-19 |
20120016884 | PERSONAL COMPUTING DEVICE-BASED MECHANISM TO DETECT PRESELECTED DATA - A method and apparatus for detecting pre-selected data stored on a personal computing device is described. In one embodiment, contents of data storage media of a personal computing device are searched for pre-selected sensitive data. In one embodiment, if at least a portion of the pre-selected sensitive data is detected, a notification of the detection of the pre-selected data is sent to a system via a network. In another embodiment, if at least a portion of pre-selected sensitive data is detected, the access to this data is blocked. | 2012-01-19 |
20120016885 | ADAPTIVE AND PERSONALIZED TAG RECOMMENDATION - Embodiments of the invention relate to techniques for personalized tag recommendation for enterprise social bookmarking systems. According to one embodiment of the invention, a method comprises computing at least one set of candidate tags for a document in accordance with at least one factor, and combining the at least one set of candidate tags from different factors into an overall recommendation list of candidate tags. At least one suggested tag from the overall recommendation list is returned as a result of the combination. At least one applied tag that is applied to the document by a user of a computer system is recorded, and the combination is adjusted based on the at least one applied tag. | 2012-01-19 |
20120016886 | DETERMINING A SEASONAL EFFECT IN TEMPORAL DATA - To determine a seasonal effect in temporal data, for each of a plurality of candidate seasons, the following is performed. An interval is defined for the corresponding candidate season. The interval is divided ( | 2012-01-19 |
20120016887 | IDENTIFYING INADEQUATE SEARCH CONTENT - Systems and methods for identifying inadequate search content are provided. Inadequate search content, for example, can be identified based on statistics associated with the search queries related to the content. | 2012-01-19 |
20120016888 | DOCUMENT SCORING BASED ON QUERY ANALYSIS - A system may determine an extent to which a document is selected when the document is included in a set of search results, generate a score for the document based, at least in part, on the extent to which the document is selected when the document is included in a set of search results; and rank the document with regard to at least one other document based, at least in part, on the score. | 2012-01-19 |
20120016889 | DOCUMENT SCORING BASED ON QUERY ANALYSIS - A system may determine an extent to which a document is selected when the document is included in a set of search results, generate a score for the document based, at least in part, on the extent to which the document is selected when the document is included in a set of search results; and rank the document with regard to at least one other document based, at least in part, on the score. | 2012-01-19 |
20120016890 | ASSIGNING VISUAL CHARACTERISTICS TO RECORDS - Systems, methods and computer program products are disclosed herein for assigning visual characteristics to records of a data structure and displaying those records. In response to an attribute being selected, records of the data structure may be sorted by values of the selected attribute of the records. A first set of records having values of the selected attribute that correspond to a first value may be identified. A second set of records having values of the selected attribute that correspond to a second value also may be identified. A first visual characteristic may automatically be assigned to each record of the first set of records and a second visual characteristic, that is different from the first visual characteristic, may be automatically assigned to each record of the second set of records. | 2012-01-19 |
20120016891 | HIERARCHICAL REGISTRY FEDERATION - Some embodiments of a system and a method to implement a hierarchical registry federation have been presented. For instance, a registry federation can be stored in a set of one or more storage devices, the registry federation including multiple registries, each registry having one or more records. The registries can be organized in an oriented graph such that each registry is logically connected to another registry in the registry federation as a parent registry or a child registry. | 2012-01-19 |
20120016892 | ORGANIZING IMAGES CAPTURED BY MULTIPLE IMAGE CAPTURE DEVICES - A method for organizing images from multiple image capture devices includes allowing the determination of an offset between image capture times recorded in a first image capture device and image capture times recorded in a second image capture device, adjusting the image capture times recorded in the second image capture device by the offset to produce adjusted image capture times by a computer processor, and sequencing images taken by the first image capture device and the second image capture device in an chronological order. The sequencing is based on the image capture times for the images captured by the first image capture device and the adjusted image capture times for the images captured by the second image capture device. | 2012-01-19 |
20120016893 | ELECTRONIC PUBLICATION SYSTEM - A system and method for modifying publication data in a publication system are described. An example embodiment includes receiving proposed publication data and accessing a success measurement associated with past publications within a publication system. The success measurement may indicate a measurement of success associated with the past publications. An example system and method may generate modification data to be used to modify the proposed publication data. The modification data may be based on the success measurement and proposed publication data. | 2012-01-19 |
20120016894 | SOLUTION-SPECIFIC BUSINESS OBJECT VIEW - A computer-implemented system may include one or more storage devices storing first metadata defining an instance of a first metaobject, second metadata defining an instance of a solution supplement metaobject, wherein the second metadata comprises annotations to the first metadata, and wherein the first metaobject and the solution supplement metaobject are instances of a meta-metaobject. Also stored is executable program code of a service to determine merged metadata based on the first metadata and the annotations to the first metadata. A processor is included to execute the executable program code. | 2012-01-19 |
20120016895 | SYSTEMS AND METHODS EMPLOYING DELIMITER SEARCHES TO IDENTIFY SENSITIVE INFORMATION IN DATA - A data string that includes potentially sensitive information, such as an account number for a payment card, may be evaluated using a delimiter search to provide an increased level of confidence that the data string encodes the sensitive information of interest. A delimiter search may include an evaluation of the bytes adjacent to the beginning and end of the data to determine whether or not those bytes have values that correspond to the values of known delimiters. A data string that is not surrounded by known delimiters may be disregarded (i.e., considered not to comprise sensitive information of interest), while a data string that is surrounded by known delimiters may warrant further evaluation. | 2012-01-19 |
20120016896 | SYSTEMS AND METHODS EMPLOYING SEARCHES FOR KNOWN IDENTIFIERS OF SENSITIVE INFORMATION TO IDENTIFY SENSITIVE INFORMATION IN DATA - A data string that includes potentially sensitive information, such as an account number for a payment card, may be evaluated to determine whether or not any portion of the data string encodes a known identifier of sensitive information, such as a known bank identification number (BIN). A fixed number of bytes of the data string may be analyzed using a trie algorithm, in which the value of a first byte is compared with the value of a corresponding first character of the known identifier. A second byte is then compared with a set of values of corresponding second characters, which accompany the first character of the known identifier. Then the value of a third byte of the data string is compared with a set of values of corresponding third values, which accompany the first and second characters of the known identifier. The use of a trie algorithm decreases the length of the search process by several orders of magnitude. | 2012-01-19 |
20120016897 | SYSTEM AND METHOD FOR IMPROVING WEBPAGE INDEXING AND OPTIMIZATION - A system and method may include a processor that normalizes dynamic URLs by sorting URL parameters and removing duplicative URL parameters. The processor may additionally or alternatively provide redirects from one URL to another, where the two URLs are associated with duplicative content. The processor may additionally or alternatively insert a canonical tag into content associated with a URL, where the canonical tag points to another URL whose content is a near duplicate of the content associated with the first URL. The processor may additionally or alternatively apply transformation rules to content of a webpage based on the matching of portions of the URL of the webpage to various character strings. | 2012-01-19 |
20120016898 | Method and System for URL Autocompletion using Ranked Results - A set of ordered predicted completion strings are presented to a user as the user enters text in a text entry box (e.g., a browser or a toolbar). The predicted completion strings can be in the form of URLs or query strings. The ordering may be based on any number of factors (e.g., a query's frequency of submission from a community of users). URLs can be ranked based on an importance value of the URL. Privacy is taken into account in a number of ways, such as using a previously submitted query only when more than a certain number of unique requestors have made the query. The sets of ordered predicted completion strings is obtained by matching a fingerprint value of the user's entry string to a fingerprint to table map which contains the set of ordered predicted completion strings. | 2012-01-19 |
20120016899 | MATCHING DATA FROM DISPARATE SOURCES - Apparatus, systems, and methods may operate to receive a first identification of two or more records that match and to search at least two sources of data to locate a set of potential matching records, based on element transformation to determine common characteristics of the two or more records. Further activities may include publishing the set of potential matching records, receiving a second identification of matching members of the set, and searching at least one repository to locate further matching records based on the second identification and the common characteristics. Additional apparatus, systems, and methods are disclosed. | 2012-01-19 |
20120016900 | IDENTIFICATION OF THIRD PARTY PIM REPOSITORIES STORING A USER'S CONTACT INFORMATION - A system comprises a database containing information concerning uniquely identified individuals, and a processor to identify linkages between the individuals. The linkages are in the form of unique identifiers stored in a contact repository, and provide a first user the ability to use the linkages to construct a database of second individuals that have an identifier of the first individual in a contact repository of one or more second individuals. | 2012-01-19 |
20120016901 | Data Storage and Processing Service - In general, the subject matter described in this specification can be embodied in methods systems, and program products. A request to store data is received. The data is stored as an object in a repository. A request to create a table is received, where the request identifies a name for the table. The table is created with the name. A request to import the data into the table is received. The data is imported into the table, where importing the data in the object into the table includes converting the data in the object into columnar stripes, and storing the columnar stripes in association with the table. A request to perform a query on the table is received, where the request includes the query and identifies the table. The query is performed on the table, where performing the query includes querying one or more of the columnar stripes. | 2012-01-19 |
20120016902 | Providing Profile Information to Partner Content Providers - In some implementations, a computer-implemented method includes receiving a search query, at an information provider, from a mobile device; generating a plurality of search results that are responsive to the search query and directed to corresponding content providers that are external to the information provider; identifying one or more search results from the plurality of search results that are directed to partners of the information provider; and providing, to the mobile device, the plurality of search results, wherein the one or more search results directed to partners of the information provider include location information that is stored in a profile maintained by the information provider and associated with the mobile device, wherein the location information is passed to the corresponding partners upon selection of the one or more search results. | 2012-01-19 |
20120016903 | IDENTITY MANAGEMENT USER EXPERIENCE - Upon requesting to share one or more types of identity information, a user is automatically presented with an interface through which the user can interact in selecting an amount of identity items to share. A subset of the total identity items selected may then be shared with specified entities. Interfaces can also be used to assist the user in managing identity information that has been shared with others by providing the user with a visual list of entities for which the user has shared specified identity information and to whom updated information can be sent. | 2012-01-19 |
20120016904 | System and Method for Remote Updates - Software on a server accesses a batch file including a plurality of events generated by a remote game client application executing an instance of the computer-implemented game. The software accesses a game state data object associated with the instance of the computer-implemented game. The game state data object includes one or more game state parameters formatted as a serialized unstructured string of text data. The software parses the game state data object to identify the one or more game state parameters. The software processes the plurality of events in the batch file against game logic to update one or more of the game state parameters in the game state data object. The game logic incorporates information extracted from a social graph. And the software stores the game state data object in a memory cache. | 2012-01-19 |
20120016905 | Systems and Methods for Server Management - Exemplary systems and methods for server management are provided. An exemplary system comprises a plurality of servers, with each server having the ability to access a database or, in some embodiments, be configured to perform a calculation, computation or make a determination of a particular value, values or other information. A communications network delivers queries to each server whereby a look-up table directs query processing by the servers. Further embodiments of the system feature a program logic controller for rebalancing the workload of the network servers. Exemplary methods of processing queries on the system comprise submitting a query to the network, communicating the query to each server in the network and each server looking-up on a look-up table the processing responsibilities of the servers in the network. The query is processed by the server having primary responsibility for processing the query while other the servers monitor query processing. Transmission of a query result to a user typically completes the process. | 2012-01-19 |
20120016906 | COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR ENABLING THE AUTOMATED SELECTION OF KEYWORDS FOR RAPID KEYWORD PORTFOLIO EXPANSION - A computer-implemented method and system for enabling the automated selection of keywords for rapid keyword portfolio expansion are disclosed. Various embodiments are operable to normalize a plurality of keywords received from a source, filter the normalized plurality of keywords against one or more keyword filtration lists, produce site-specific variants of the filtered plurality of keywords, associate at least one level of dimension data with each of the plurality of keywords, and store the processed plurality of keywords and dimension data in a keyword database. | 2012-01-19 |
20120016907 | METHOD AND APPARATUS FOR CONTROLLING REPLICATION PROCESSING OF OBJECT - According to one embodiment, the resource access unit accesses a first resource including a replication target object and policy data assigned to the object. The policy data includes base policy data including a first condition and assertion policy data including a second condition. The first retrieval unit obtains first attribute data for accessing the first resource. The first policy evaluation unit determines whether the first attribute satisfies the first condition. When the first condition is satisfied, the copy processing unit executes the copy processing for copying the object. The second retrieval unit obtains the second attribute data for accessing the second resource. The second policy evaluation unit determines whether the second attribute data satisfies the second condition. When the second condition is satisfied, the paste processing unit executes paste processing for pasting the object to the second resource. | 2012-01-19 |
20120016908 | OPTIMIZING THE STORAGE OF ONE-TO-MANY EXTERNAL REFERENCES TO CONTIGUOUS REGIONS OF HIERARCHICAL DATA STRUCTURES - A volatile memory manager of a data handling system can be configured to convert the one-to-many external reference into an external reference that references the common ancestor node of the contiguous region. Specific pathing and/or termination conditions can be contained in a Relationship_Path parameter of the external reference. The hierarchical data structure can also be loaded into volatile memory by the volatile memory manager as data structure references. The volatile memory manager can be further configured to perform various functions utilizing the external and data structure references. | 2012-01-19 |
20120016909 | QUERY-BASED SEMANTIC ANALYSIS OF AD HOC CONFIGURATION LANGUAGES FOR NETWORKS - A method is provided for analyzing the semantic content of network configuration files, comprising the steps of accessing configuration files associated with corresponding network components, the files containing commands that define the configuration of those components; transforming the commands into a structural database based, at least in part, on a non-grammatical analysis of the commands, wherein the structure of the commands is represented as the structural database; and constructing a semantic database of the configuration files by querying the structural database. | 2012-01-19 |
20120016910 | FIELD EXTENSIBILITY USING GENERIC BOXED COMPONENTS - A system may include reception of a definition of an extension field to be added to a business object node, generation of metadata for a data type enhancement object associated with the extension field, and generation of an ABAP dictionary proxy object based on the data type enhancement object, wherein the ABAP dictionary proxy object describes the extension field in a sub-structure of a first field of the ABAP dictionary proxy object. | 2012-01-19 |
20120016911 | CHILD IMPACT STATEMENT REPORTING SYSTEM - A system for commissioners, citizens, groups, agencies, and other authors of proposals, ordinances, legislation or other acts to prepare, review and submit a Child Impact Statement (CIS). The system comprises a series of computer-based tools implementing a process of creating a CIS to identify areas of child well-being that could be affected by the proposal. The system further comprises a database containing information collected and compiled into graphs, maps, charts, tables, and other forms, to allow users to create and compare evidence relating to the proposal in question. | 2012-01-19 |
20120016912 | TYPE INFERENCE FOR DATALOG WITH COMPLEX TYPE HIERARCHIES - What is disclosed are a novel system and method for inferring types of database queries. In one embodiment a program and associated database schema that includes a type hierarchy is accessed. The program includes query operations to a database that contains relations described by a database schema. Types are inferred from definitions in the program by replacing each database relationship in the program by the types in the database schema. A new program is generated with the types that have been inferred with the new program only accessing unary relations in the database. In another embodiment, testing of each of the types that have been inferred is performed for type emptiness. In response to type emptiness being found for a type that have been inferred, a variety of different operations are performing including removing the type, providing a notification regarding the emptiness found for the type, and more. | 2012-01-19 |
20120016913 | USING XML TO RUN TESTS IN A MULTI-TENANT DATABASE ENVIRONMENT - A method for using extensible markup language (XML) for testing a process in a multi-tenant database system is disclosed. The method includes providing a user interface (UI) for a user of the multi-tenant database system, receiving the process for testing via the UI, where the process is created using the UI, receiving an indication from the UI that an XML file is to be extracted for testing the process, and extracting the XML file in response to the received indication, where the XML file is usable for testing the process. Further, sample data for the process can also be created and received. In addition, modifications of the XML file from the user via the UI can be done, the XML file can be executed for testing the process. | 2012-01-19 |
20120016914 | ELECTRONIC DEVICE AND METHOD FOR SEEKING FILE POSITION - A method for seeking a file position of a file first seeks an estimated file position corresponding to a specified time point in the file, and adjusts the estimated file position according to a preset estimation formula. The method further determines the estimated file position is an accurate file position of the specified time point in the file until a difference between the estimated file position and the specified time point is less than a preset value. | 2012-01-19 |
20120016915 | SYSTEM AND METHOD FOR FILE COPY OF CLOUD METHOD AND DISK CLONING OVER WIDE AREA NETWORK - A system and method for cloud scheme-based file copying and disk cloning over a Wide Area Network (WAN) is provided. The system clones a disk of a server to one or more clients. The server includes a cloud cast server module, and an Internet Virtual Partition (IVP) server module. The cloud cast server module receives an image source drive, and designates the received image source drive as a cloud disk. The IVP server module is loaded into RAM, receives a disk management and control right, clones a file system, receives a request for mount, sends the file system and a file. Each of the clients includes a cloud cast client module for receiving the name of a drive and a mount request, requesting the IVP server module to mount the cloud disk, loading the received cloned file system, creating a virtual disk, and creating its own copy file system. | 2012-01-19 |
20120016916 | Method and Apparatus for Processing and Updating Service Contents in a Distributed File System - The present invention discloses a method for processing service contents of a service node in a distributed file system: after receiving uploaded service contents, generating a file block which is stored in at least one service node, and the service node which doesn't store said file block storing a virtual file block, of which an attribute list is configured. Meanwhile, the present invention discloses a method for updating service contents: after receiving an on-demand request of a file block, the service node judging whether it is a virtual file block, and if yes, according to information of at least one access address of said file block, reading said file block and responding to said on-demand request, and updating an access popularity value of said virtual file block, and judging whether an updated access popularity value reaches a threshold. Meanwhile, the present invention discloses an apparatus implementing above methods. | 2012-01-19 |
20120016917 | MEDIA CONTAINER FILE MANAGEMENT - A media container file ( | 2012-01-19 |
20120016918 | Method for Compressing Information - Provided is a method of compressing information. The method includes converting compression target information into a binary number, converting the binary number into a decimal number a, performing operation of a discriminant | 2012-01-19 |
20120016919 | EXTENDED-WIDTH SHIFTER FOR ARITHMETIC LOGIC UNIT - A processor includes a shift device for extending the width of a rotator without increasing propagation delays. An extended-width result is obtained by combining a rotation result with a shift result in accordance with a mask that is selected in response to at least a portion of the value of the degree to which a data word is to be shifted. | 2012-01-19 |
20120016920 | DIRECT CURRENT COMPENSATION SYSTEM AND METHOD FOR SCATTERING PARAMETER RATIONAL FUNCTIONS - A direct current compensation method for S-parameter rational functions reads S-parameters f(sk), which are generated at given frequency sk, from a storage unit. An S-parameter, which is generated at frequency sk=0 is supplemented into the S-parameters f(sk), upon the condition that there is no S-parameter which is generated at the frequency sk=0. An S-parameter ration function is generated according to the S-parameters f(sk). A DC level of the S-parameter rational function is compensated to generate a compensated S-parameter rational function. | 2012-01-19 |
20120016921 | Method and Apparatus for Compressive Domain Filtering and Interference Cancellation - A method for compressive domain filtering and interference cancelation processes compressive measurements to eliminate or attenuate interference while preserving the information or geometry of the set of possible signals of interest. A signal processing apparatus assumes that the interfering signal lives in or near a known subspace that is partially or substantially orthogonal to the signal of interest, and then projects the compressive measurements into an orthogonal subspace and thus eliminate or attenuate the interference. This apparatus yields a modified set of measurements that can provide a stable embedding of the set of signals of interest, in which case it is guaranteed that the processed measurements retain sufficient information to enable the direct recovery of this signal of interest, or alternatively to enable the use of efficient compressive-domain algorithms for further processing. The method and apparatus operate directly on the compressive measurements to remove or attenuate unwanted signal components. | 2012-01-19 |
20120016922 | Video Codec and Method thereof - A video codec method is provided, for processing video data processed by a Discrete Cosine Transformation (DCT) operation, comprising: (a) if a transformation matrix having a plurality of coefficients comprises at least one non-integer coefficient among the coefficients, multiplying the transformation matrix by a multiplication factor α to make all coefficients of the transformation matrix integers, (b) estimating a compensation set, (c) performing a Column in Row out IDCT two-dimensional operation on the video data according to the transformation matrix and the compensation set, to obtain a compensated two-dimension operation result, (d) selectively dividing the compensated two-dimension operation result by α | 2012-01-19 |
20120016923 | Circuit and method for implementing FFT/IFFT transform - A circuit and a method for implementing Fast Fourier Transform (FFT)/Inverse Fast Fourier Transform (IFFT) are provided. The method includes: determining the number m of iterations, depth dl of the first and second Random Access Memories (RAMs), depth d | 2012-01-19 |
20120016924 | METHOD AND SYSTEM FOR EMAIL ANALYTICS - An email campaign is analyzed by sending an email message including a tracking code that requests content from an initial-engagement location (e.g., a server). The tracking code requests the content from the initial-engagement location when the email message is opened by a mail user agent operated by a recipient. Requests sent to the initial-engagement location are then tracked to measure the number of recipients that open the email message. A first redirect response is then served from the initial-engagement location to the mail user agent of the recipient after a first delay period to cause the mail user agent of the recipient to then request content from a first redirect location; and requests sent to the first redirect location are tracked to measure the number of recipients that keep the email message open in the mail user agent for through all of the first delay period. | 2012-01-19 |
20120016925 | MILARRS SYSTEMS AND METHODS - An add-on module provides extrinsic management functionality to legacy and other devices. Contemplated modules include: (a) a state agent that provides at least one of the MILARRS function, and (b) a product agent that communicates with the device using at least one serial interface. Implementations are contemplated for both legacy devices that natively provide less than complete MILARRS functionality, and newly developed devices for which the developer desires a ready-made implementation of MILARRS functionality | 2012-01-19 |
20120016926 | SCALABLE TECHNIQUES FOR PROVIDING REAL-TIME PER-AVATAR STREAMING DATA IN VIRTUAL REALITY SYSTEMS THAT EMPLOY PER-AVATAR RENDERED ENVIRONMENTS - Scalable techniques for rendering emissions represented using segments of streaming data, the emissions being potentially perceivable from many points of perception and the emissions and the points of perception having relationships that vary in real time. The techniques filter the segments by determining for a time slice whether a given emission is perceptible to a given point of perception. If it is not, the segments of streaming data representing the emission are not used to render the emissions as perceived from the given point of perception. The techniques are used in networked virtual environments to render audio emissions at clients in a networked virtual reality system. With audio emissions, one determinant of whether a given emission is perceivable at a given point of perception is whether psychoacoustic properties of other emissions mask the given emission. The segments representing the streaming data also contain metadata which is used both in the filtering and in rendering the streaming data for a point of perception at which the emission is perceived. | 2012-01-19 |
20120016927 | AUTOMATED ESTIMATION OF A COUNTRY WHERE A CLIENT COMPUTER IS CONFIGURED TO OPERATE - A method for automatically estimating a country where a client computer is configured to operate. The method gathers information of the client computer (e.g., GMT offset, time zone name, daylight savings status, desktop language, etc.) and estimates a country where the client computer is configured to operate using the gathered information and country estimation programming. The method may send information regarding the identity of the estimated country to a server and then receive information from the server based on the estimated country. In other embodiments, the gathered information is sent to the server and the server estimates the country where the client computer is configured to operate. In some embodiments, the country estimation programming comprises a rule engine implemented by rule programming. In some embodiments, the rule engine comprises a recursive rule program. | 2012-01-19 |
20120016928 | APPARATUS AND METHOD FOR MANAGING REMOTE USER INTERFACE AND SYSTEM FOR THE SAME - A system for managing a Remote User Interface (RUI) includes a Remote User Interface Server (RUIS) for sending an update message indicating that an RUI list including at least one RUI has been updated, and transmitting updated RUI list information upon receiving a request for updated RUI list information; and a Remote User Interface Client (RUIC) for sending a request for updated RUI list information to the RUIS upon recognizing from the update message received from the RUIS that an RUI list has been updated, receiving the updated RUI list information from the RUIS in response to the request, and updating existing RUI list information based on the updated RUI list information. | 2012-01-19 |
20120016929 | DYNAMIC LANGUAGE TRANSLATION OF WEB SITE CONTENT - Methods, systems, and computer readable medium for providing content with respect to a website. A request for content is received where the request includes information related to a user. One or more pieces of localized content associated with at least one condition is retrieved when it is determined that the at least one condition is consistent with the information related to the user, where each localized content is localized with respect to the content requested. At least one of the retrieved localized content is identified when the information related to the user meets the associated at least one condition. The identified at least one localized content is sent as a response to the received request for content. | 2012-01-19 |
20120016930 | APPARATUS AND METHOD FOR CONTROLLING REMOTE USER INTERFACE SERVERS USING A MULTICAST MESSAGE IN A HOME NETWORK - An apparatus and method for controlling a Remote User Interface Server (RUIS) in a Remote User Interface Client (RUIC), wherein the method includes rendering an RUI page for controlling RUISs, receiving an input of a control command for controlling the RUISs from a user through the RUI page, generating a multicast control message for transmitting the input control command in a form of multicast, and transmitting the multicast control message to the RUISs. | 2012-01-19 |
20120016931 | META-DATA BASED METHOD FOR LOCAL CACHE UTILIZATION - A system and method for caching data and verifying cached data using a client-server model and meta-data. In particular, a client proxy and a server proxy are in communication with each other and with the client and the server, respectively; client proxy meta-data and server proxy meta-data related to the data cached by the client proxy and server proxy, respectively, are calculated and communicated between the client proxy and the server proxy; and the client proxy meta-data and the server proxy meta-data are compared to determine a cache hit or miss. | 2012-01-19 |
20120016932 | System And Method For Telephony And Communication Services With Message-Based API - A communication application server is provided with a unified framework for call control and media control. The framework supports a unified API having class objects and functions conforming to a telephony object model. The class objects are invoked and manipulated by a finite set of commands and an application program essentially issues a series of such commands to operate the communication application server. More particularly, an API server on the communication application server defining a messaging API protocol enables an application script to pass commands remotely to the communication application server to operate it. This allows application scripts to be processed remotely by appropriate scripting engines. In this way, application scripting is decoupled from the operation of the communication application server, which only needs to focus on providing basic communication services. | 2012-01-19 |
20120016933 | Dynamic Image Delivery System - A dynamic image delivery system receives a client request for an image at an image caching server. The image caching server measures the client's network access speed and looks for an appropriate pre-rendered copy of the requested image that is rendered for the client's network access speed in local storage. If the appropriate rendered copy is found, then the image caching server sends the rendered image to the client. If it is not found, then the image caching server dynamically renders a copy of the image and sends it to the client. | 2012-01-19 |
20120016934 | INTELLIGENT PEER-TO-PEER SYSTEM AND METHOD FOR COLLABORATIVE SUGGESTIONS AND PROPAGATION OF MEDIA - In a network-based system for recommending media content items based on user preferences, clients contact a server on a periodic basis, independent of the user. In addition to client-server interaction, clients also interact with one another in peer-to-peer fashion. Peers query one another and evaluate their similarity to each other in an interactive comparison of user preferences. When two clients are sufficiently similar, the interaction culminates in the originating client downloading content listings from the targeted peer to generate suggestions for their user. If the two clients are dissimilar, the query may be terminated, or the targeted peer may route the query to a second targeted peer. In addition to the lists of preferences, the originating client may download actual content items from the targeted peers. | 2012-01-19 |
20120016935 | System, Method and Service Server for Playing Media Resources - A media resource playing system, method and service server are disclosed. The system includes a service server, a media resource client and a management function client, wherein the service server includes: a playing control unit, which is used for implementing media resource localization and media playing control; a service management unit, which is used for storing and/or managing user configuration information related to services; and a resource management unit, which is used for storing and managing media resource and related information; the media resource client is used for implementing media resource playing and media playing control; the management function client is used for managing user data and personal media resource. Through the above processing, unified playing control can be performed on media, the building and disposing cost of every service system is reduced, which is good for maintaining the system, and a unified user media control experience is provided to users, which makes the using more convenience for the users. | 2012-01-19 |
20120016936 | DEVICE AND METHOD FOR CONTROLLING DISSEMINATION OF CONTENT DATA BETWEEN PEERS IN A P2P MODE, BY USING A TWO-LEVEL RAMDOMIZED PEER OVERLAY AND A DYNAMIC UNCHOKE MECHANISM - A method is intended for controlling dissemination of content data in a peer-to-peer mode between peers connected to different communication networks. This method comprises the steps of: i) building, for each peer, a first peer set comprising active peers that are primary connected neighbours close to this peer in terms of network cost and a second peer set comprising active peers that are secondary connected neighbours of this peer, chosen at random irrespectively of network cost, and ii) dynamically determining into each peer a capacity of content data it is ready to receive from peers of the second peer set, taking into account its current capacity to receive content data from peers of the first peer set, in order to optimize the peer-to-peer dissemination of the content data. | 2012-01-19 |
20120016937 | System and Method for Customized Experiences in a Shared Online Environment - There is provided a system and method for providing customized experiences to a plurality of client stations in a shared environment. There is provided an accounts database having data relating to a plurality of clients, an online server having a server processor and hosting the shared environment for access by the plurality of client stations, and an online client application for execution by a client processor of a client station. The server processor is configured to retrieve client data from the accounts database relating to a client, determine client preferences of the client based on the client data, create a customized environment from the shared environment according to the client preferences, and send the customized environment to the online client application of a client station associated with the client for rendering the customized environment on a client display. User interactions may be filtered to maintain a shared environment perception. | 2012-01-19 |