|| List of recent Den-related patents
|Isolated polynucleotides and polypeptides and methods of using same for increasing plant yield, biomass, growth rate, vigor, oil content, abiotic stress tolerance of plants and nitrogen use efficiency|
Provided are isolated polynucleotides encoding a polypeptide at least 80% homologous to the amino acid sequence selected from the group consisting of seq id nos: 757, 456-756, 758-774, 8385-10836, and 10838-14462; and isolated polynucleotide comprising nucleic acid sequences at least 80% identical to seq id no: 377, 1-376, 378-455, and 775-8384. Also provided are nucleic acid constructs comprising same, isolated polypeptides encoded thereby, transgenic cells and transgenic plants comprising same and methods of using same for increasing yield, biomass, growth rate, vigor, oil content, fiber yield, fiber quality, abiotic stress tolerance, and/or nitrogen use efficiency of a plant..
|Client device, server, and storage medium|
Provided is a client device, including an identification unit that identifies a person included in content information acquired by a content information acquisition unit, and generates first identification information indicating an identified person, a communication unit that associates and transmits the content information and the first identification information to an external device, and a generation unit that generates an access request for content information stored in the external device. The access request includes second identification information specifying a user who accesses the content information stored in the external device, and the communication unit transmits the access request to the external device, and from the external device receives content information that is at least partially access-restricted based on a comparison by the external device between the second identification information included in the access request and the first identification information associated with the content information stored in the external device..
|System and method to associate a private user identity with a public user identity|
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network.
|Testing device for removing customer personal information from an electronic device|
A testing device, system, and method for removing customer personal information (cpi). The testing device includes a user interface for communicating information and receiving user input.
|Method for removing customer personal information from an electronic device|
A system and method for processing electronic devices to determine removal of customer personal information (cpi). An electronic device is connected to a test device.
|Privacy-enhanced car data distribution|
In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges and pursuant different levels of security. In some embodiments, the data may be authenticated by a cloud service without revealing the identity of vehicle owner.
|Anonymous shipment brokering|
A request is received for a brokered shipment from a particular entity to an anonymous user. A shipping identifier is obtained from a shipping entity, on behalf of the particular entity, for the shipment from the particular entity to the anonymous user.
|Method and device for prompting program uninstallation|
The present disclosure discloses method and device for prompting program uninstallation and belongs to the field of the internet. The method comprises: performing a security assessment of an application program installed on a mobile terminal, thereby obtaining a security assessment result; obtaining security identification information corresponding to the security assessment result based on pre-stored correlations between security assessment results and security identification information; establishing a correlation between the obtained security identification information and the application program, and displaying the correlation to a user.
|System and method for detecting behavior anomaly in information access|
A system and method for identifying anomalies in information requests. The information requests are modeled into a plurality of basic elements and association among the basic elements are tracked.
|System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface|
A system, method and computer program product are provided. In use, execution of a portion of internal code of an interface is identified.
|System and method for computer inspection of information objects for shared malware components|
Embodiments of a system and method for computer inspection of information objects, for example, executable software applications for common components that may include elements of computer viruses, items from hacker exploit libraries, or other malware components. Information objects may contain identified sequences of instructions, each of which may be identified and hierarchically grouped based on their structural relationship(s).
|Local secure service partitions for operating system security|
Systems and methods provide multiple partitions hosted on an isolation technology such as a hypervisor where at least one of the partitions, a local secure service partition (lssp), provides security services to other partitions. The service partitions (lssps) host those high assurance services that require strict security isolation, where the service can be shared across partitions and accessed even when the user is not connected to a network.
|Systems and methods for dual reader emulation|
Systems and methods for emulating credentials are disclosed. In some cases, the systems include an access credential reader and an access credential writer.
A method of authenticating a user includes using at least one computer and connected scanner to obtain biometric measurements of a plurality of biometric parameters of the user. The parameters are stored as templates for comparison, as well as a sequence in which the plurality of biometric parameters are to be scanned in order to perform a valid authentication.
|Method for producing dynamic data structures for authentication and/or password identification|
A method for generating a changing authentication input or password for a user is provided for accessing a computing device such as a smartphone or computer. Using objects displayed in sequential positions on a graphic display, and input strings of text or alphanumeric characters the user has related to each object, a password can be generated by placing the input strings in an order the same as the sequence.
|Device identification for externalizing password from device coupled with user control of external password service|
Information and data stored by a mobile device is protected by comprising applying password-protection to the locally-stored information without persistently storing the corresponding password locally. Rather, the corresponding password is stored by a remote password server.
|Method and system for controlling access to applications on mobile terminal|
Various embodiments provide methods and systems for controlling an access to applications on a mobile terminal. In an exemplary method, an opened application can be scanned and an application identification can be obtained.
|Methods and apparatuses for providing internet-based proxy services|
A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers. At least some of the origin servers belong to different domains and are owned by different entities.
|Methods, apparatuses & computer program products for utilizing visual authentication tokens as cross-platform credentials|
An apparatus is provided for facilitating cross-platform authentication. The apparatus may include at least one memory and at least one processor configured to detect that a visual token includes data indicating one or more authentication credentials for accessing a communication device in response to scanning the visual token.
|Fraud-proof location identification system|
Systems and methods for facilitating check-ins that are resistant to common fraud scenarios while also being relatively inexpensive. One or more embodiments include displaying unique tokens in quick succession on a display positioned at the check-in location (e.g., a store, restaurant, or other business or location).
|Hardware-based credential distribution|
This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile..
|Controlling access to an accessible object with an online access control list|
Software on a router receives configuration data that specifies a social networking service as a source for authentication according to an authentication protocol. Subsequently, the router software receives packet data from a client device for a destination other than the social networking service.
A brokered authentication request is received corresponding to an interaction between a particular user and a particular online entity. An identity provider corresponding to the particular user is identified that stores user data identifying the particular user.
|Method and system for transmitting authentication context information|
A system of the present invention uses an identity provider to provide the authentication services for multiple service providers. An identity provider communicates with one or more service providers.
|Apparatus, system and method for accessing internet webpage|
The present invention discloses an apparatus, system and method for accessing internet webpage. The system includes a user terminal and a proxy server.
|Arrangement and method for anonymous user profiling and targeted content provision|
An electronic arrangement, optionally including at least one network server, including a media profile entity configured to store and maintain at least one user-adjustable personal media profile for a user capable of accessing a network, optionally the web, and related sites, services and/or applications via a number of terminal devices, wherein the personal media profile describes the user's interests preferably excluding identifiable information, optionally at least name and/or e-mail, and wherein the interests are represented on a number of levels including interest categories, such as automotive or travel categories, and further wherein the interests are at least partially determined based on monitoring the user behavior relative to the network, optionally the web, an authentication entity configured to associate a terminal utilized by the user with the media profile of the user based on profile-identifying data provided to/by the terminal, such as a numeric or alphanumeric, optionally encrypted, code.. .
|Method and system for facilitating isolated workspace for applications|
A system maintains a workspace environment of enterprise applications on a mobile device. The system receives enterprise applications for installation on the mobile device, wherein functionality has been inserted into binary executables of the enterprise applications to force the enterprise applications to communicate with an application management agent to obtain a security policy including a validity time period value related to keeping the workspace valid.
|Digital broadcasting receiver and method for controlling the same|
According to one embodiment, a method of processing broadcast data in a broadcast transmitter includes: encoding the broadcast data for broadcast service; encoding signaling information for signaling the broadcast data; assigning the encoded broadcast data and the encoded signaling information into a signal frame; and transmitting a broadcast signal including the signal frame. The broadcast signal further includes a signaling table having access information of the broadcast data.
|Video buffer management technique|
The video data buffering apparatus and associated methods provide audio and video data buffering in a video processing device. Specifically, the system relates to the use of a circular buffer and linked list fifo employed in a video processing system, wherein video data packets from multiple video streams are stored in a common buffer to compensate for transport packet jitter.
|System and method of content acquisition and delivery|
A method includes receiving, at an electronic device, a first input from a user identifying a program and a viewing time and creating a first calendar event corresponding to the viewing time in an electronic calendar associated with the user. The method also includes determining a first device to deliver the program to, where the first device is associated with the user.
|Context-aware video systems and methods|
Media-playback devices may render context-aware media along with a continually updated set of selectable asset identifiers that correspond to assets (e.g., actors, locations, articles of clothing, business establishments, or the like) currently presented in the media. Using the currently-presented assets or asset controls, a viewer can access contextually relevant information about a selected asset..
|Processing emergency alert system messages|
Disclosed are methods and apparatus for processing an emergency alert message (e.g., a national warning system message e.g., an emergency alert system (eas) message). The methods may comprise a digital media server receiving the message.
|In-band data recognition and synchronization system|
A method and apparatus for recognizing and synchronizing to in-band data at a multimedia device is provided. A content stream includes in-band data.
Systems and methods are provided for displaying a short message service (sms) message on user media equipment, in which the user media equipment includes a set-top box and a display. In some embodiments, the set-top box receives an sms message, wherein the sms message includes information identifying a triggering event for displaying the sms message.
|Media processing methods and arrangements|
The present technology concerns cell phones and other portable devices, and more particularly concerns use of such devices in connection with media content (electronic and physical) and with other systems (e.g., televisions, digital video recorders, and electronic program directories). In certain arrangements, identification of audio or visual content to which the user is being exposed is determined—in part—using information about one or more other people who are known to be present with the user.
|Resolution of tuner conflicts|
Method, device, and storage medium to identify that a resource conflict exists pertaining to tuners of a device that tune to programs; notify a user that the resource conflict exists; receive a request to release a tuner; release the tuner in response to the request; determine whether a program offer is to be made; and provide the program offer in response to determining that the program offer is to be made.. .
|Image capture and identification system and process|
A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object..
|Method and system for identifying and replacing system calls|
One embodiment of the system disclosed herein facilitates identifying a system call in an application and replacing the identified system call with a customized function call. During operation, the system executes an executable file of the application, wherein the executable file has been modified to execute a hooking and injection manager at run time.
|Consolidated data services apparatus and method|
An apparatus for consolidated data services comprising a plurality of devices, a plurality of data services and a content application programming interface (api). A user api provides user identification for each of the plurality of devices using one or more of a plurality of user api methods.
|Method and system for processing administration commands in a cluster|
The disclosure relates in particular to the processing of commands targeting at least one element of a cluster including a plurality of elements, the at least one element having a link of dependency according to the at least one command with at least one other element. After having identified the at least one element and at least one dependency rule from the at least one command, a dependency graph is generated from the at least one identified element, by applying the at least one identified dependency rule, the dependency graph including peaks representing at least the element and the at least one other element, an action linked with the at least one command being associated with the peaks of the dependency graph.
|Dependency management in task scheduling|
A task is marked as dependent upon a preceding task. The task that is attempted to be taken for execution from a head of a pending task queue that is marked is deferred.
|Computer-readable recording medium on which schedule management program is recorded, schedule management apparatus and schedule management method|
A processor registers a scheduled start timing and a scheduled end timing for each of a plurality of processes in advance into a storage unit, decides, based on the scheduled start timings and the scheduled end timings registered in the storage unit, whether or not the processes have a dependency relationship therebetween, and extracts a plurality of schedule paths by connecting those of the processes decided to have the dependency relationship therebetween to each other. A schedule path of the processes can be produced in a simplified maker without significantly breaking the accuracy of the time relationship among the processes..
|Resource allocation in multi-core architectures|
Technologies are generally described for a method, device and architecture effective to allocate resources. In an example, the method may include associating first and second resources with first and second resource identifiers and mapping the first and resource identifiers to first and second sets of addresses in a memory, respectively.
|Task scheduling in big and little cores|
One aspect provides a method including: identifying a task to be scheduled for execution on an information handling device having two or more cores of different size; determining an appropriate scheduling of the task for execution on the two or more of cores of different size, wherein the appropriate scheduling of the task is determined via a core signature for the task; directing the task to an appropriate core for execution based on the appropriate scheduling determined; and executing the task on the appropriate core. Other aspects are described and claimed..
|Processing execution requests within different computing environments|
A computerized method, computer system, and computer program product for processing an execution request within different computing environments. Execution requests and generated reference information are forwarded to the different computing environments, where the requests are executing using the reference information.
|Using preprovisioned mutated templates|
Illustrative embodiments include a system, and computer program product for creating a virtual machine using a preprovisioned mutated template. A template to use for creating the virtual machine is identified, a template including data usable to create the virtual machine on a data processing system.
|Virtual machine state tracking using object based storage|
A virtual machine state tracking mechanism that uses object based storage in order to track state information for at least some of the virtual machines that are operating in an environment. In some cases, the virtual machine environment includes virtual machine appliances on which virtual machines are run, and a centralized storage.
Method, apparatus and computer program product for use in the upgrade of nodes in a group of nodes in a data communications network. One or more nodes in the group to which a given upgrade is yet to be applied are identified.
|Injection of updated classes for a java agent|
Technology is disclosed for updating an agent. One embodiment comprises running the agent for the application while the application is also running.
|Systems and methods for providing class loading for java applications|
A mechanism for providing class loading for a java application is disclosed. A method of the invention includes retrieving, by a processing device, a java class file.
|Systems and methods for editing a computer application from within a runtime environment|
Embodiments allow a runtime environment to link to an editing environment. An object or other feature may be identified for editing in a runtime environment using a specific tool or gesture.
|Method for object oriented programming of programmable logic controllers in graphical programming languages|
A method for implementing object oriented programming in programmable logic controller graphical programming languages. The method for creating, executing and controlling objects and object subroutines, including allocation of private data memory, passing of parameters and parameter references and passing of program control.
|Method and system for facilitating rapid development of end-to-end software applications|
A method and system for rapidly generating software applications is provided. An application model of a software application is generated which comprises modeled components and technology stack information.
|Generating root cause candidates for yield analysis|
Aspects of the invention relate to yield analysis techniques for generating root cause candidates for yield analysis. With various implementations of the invention, points of interest are first identified in a layout design.
|Method and system for replacing a pattern in a layout|
A received layout identifies a plurality of circuit components to be included in an integrated circuit (ic) layer for double patterning the layer using two photomasks, the layout including a plurality of first patterns to be included in the first photomask and at least one second pattern to be included in the second photomask. A selected one of the first patterns has first and second endpoints, to be replaced by a replacement pattern connecting the first endpoint to a third endpoint.
|Method for preparing a pattern to be printed on a plate or mask by electron beam lithography, corresponding printed circuit design system and computer program|
A method for preparing a pattern to be printed on a plate or mask by electron beam lithography comprising the following steps: modelling of the pattern by breaking down this pattern into a set of elementary geometric shapes intended to be printed individually in order to reproduce said pattern and, for each elementary geometric shape of the model; determination of an electrical charge dose to be applied to the electron beam during the individual printing of the elementary shape, this dose being chosen from a discrete set of doses including several non-zero predetermined doses recorded in memory. The set of elementary geometric shapes is a bidimensional paving of identical elementary geometric shapes covering the pattern to be printed.
|Mobile terminal and display control method for the same|
A mobile terminal and a display control method for the same are provided. The display control method enables the mobile terminal to detect hovering input of a pen and to display a different pointer according to the attribute of the hovering input position.
|Execution method and mobile terminal|
The present invention relates to an application execution method and a mobile terminal supporting the same and, more particularly, to an application execution method and mobile terminal supporting the same wherein, when one of icons displayed on a touchscreen is selected, an application associated with the selected icon is executed. The method for application execution in a mobile terminal having a touchscreen includes displaying an icon associated with an application, detecting a touch related to the icon, identifying movement of the touch, and executing a function corresponding to the touch movement among functions of the application..
|Display device, user interface method, and program|
A display apparatus includes: a display having a screen in which an image is displayed; an input unit having a surface on which a user's touch is sensed; a display controller that displays a plurality of individual icons and one or more category icons each of which represents a category of one or more individual icons; and a motion recognition unit that detects a pinching-out motion to widen a distance between two points of touch on the surface based on a motion sensed by the input unit, wherein the display controller changes a state of one or more individual icons associated with at least one category from an enfolded state in which the one or more individual icons are not displayed to an unfolded state in which the one or more individual icons are displayed.. .
|Contextualization of machine indeterminable information based on machine determinable information|
A system for contextualizing machine indeterminable information based on machine determinable information may include a memory, an interface, and a processor. The memory may store an electronic document image which may include information determinable by a machine and information indeterminable by a machine the processor may be operative to receive, via the interface, the electronic document image.
|Virtual reality applications|
Augmented reality technology is described. The technology can detect objects in a scene, identifying one or more installed or available applications based on the detected objects, and place icons representing the identified applications proximate to the detected objects in a display of the scene, e.g., so that a user can start or install the identified applications.
|Data visualization system|
Apparatus and methods of generating a display representing a number of interactions occurring over a period of time is disclosed. Data defining a set of interactions is processed to determine an ordering for the interacting elements identified by the data based on calculated distance values for relative positions of pairs of interacting elements corresponding to interactions in the set.
|Care label method for a self service dashboard construction|
Embodiments of the present invention address deficiencies of the art in respect to user interfaces and provide a novel and non-obvious method, system and computer program product for graphically labeling widgets in a mashup dashboard. In an embodiment of the invention, a method for graphically labeling widgets in a mashup dashboard can be provided.
|Method and apparatus for processing user input|
A method processes a user input according to an identified input mode among a set of input modes. The method for processing an input in a portable device, includes detect a user input from an input region, identifying an input mode from a set of input modes including at least one of a text input, a drawing input, an equation input, and a drawing input, and processing the user input according to the input mode to create a message, wherein the message comprises at least one input content processed according to the identified input mode..
|Message handling method and terminal supporting the same|
Provided is a message handling function of a terminal and, particularly, a message handling method and a terminal for supporting the same, the message handling method including displaying plural messages, receiving a predetermined input event instructing aggregation of the plural messages, and aggregating at least one of the messages per user identification information to generate per-user aggregated messages according to the input event.. .
|Social network for media topics of information relating to the science of positivism|
Social media network environment for topics of information to impact social measurements, bringing generational awareness to improve community cultural and economic values. The network environment is a platform for sharing knowledge relating to fashion media, model media, and dress code media “fmdc” for human observations.
|Personalized timeline presentation|
Described herein are techniques and mechanisms for personalized timeline presentation. According to various embodiments, information characterizing a plurality of pause events associated with playback of a video content item for a content management account may be presented on a display screen at a computing device.
Systems and methods for presenting information identifying a media item associated with a geographic area are disclosed. In one embodiment, a user device comprises a media player adapted to interact with a media item.
|Appending a uniform resource identifier (uri) fragment identifier to a uniform resource locator (url)|
Embodiments of the present invention disclose a method, computer program product, and system for dynamically appending a uniform resource identifier (uri) fragment identifier to a uniform resource locator (url). A web browser on a client device is displaying a webpage, and is accessing the hypertext markup language (html) coding for the webpage.
|System and method for populating an electronic statement of work template based on corresponding content of another electronic statement of work template|
A method may be used to populate content within an electronic statement of work (sow) template. A computing device may retrieve a first template to generate a sow between a first and second party, wherein the first party is an organization and the second party is either a customer or provider to the organization.
|Arrangement for and method of reading forms in correct orientation by image capture|
An arrangement for, and a method of, electro-optically reading forms, each form having a plurality of form fields arranged at locations relative to one another, by image capture, includes storing form templates, each template having a plurality of template fields arranged at locations relative to one another, and capturing images over a field of view. A form and a correct orientation of the form, whose image is being captured, are automatically identified by matching the locations of the form fields in the captured image of the form with the locations of the stored template fields.
|Novel computing system|
A computing system including a processor, display, pointing device and memory; wherein the memory includes a text file, a graphics file corresponding to said text file and executable instructions to perform at least these actions (i) identify a selection of an alphanumeric identifier within a displayed text file, and then (ii) identify the appearance of the identifier in a corresponding graphics file, and then (iii) display a page of the graphics file comprising the appearance of the identifier.. .
|Accumulating ldpc (low density parity check) decoder|
Accumulating ldpc (low density parity check) decoder. The accumulating decoding architecture described herein is applicable to ldpc codes operating on a parity check matrix, h, consisting of csi (cyclic shifted identity) sub-matrices (or matrix sub-blocks) or permuted identity sub-matrices (or matrix sub-blocks).
|Hard-decision decoding method and low-density parity-check decoder using same|
A hard-decision decoding method includes performing operations necessary for first updating of a check node while loading data, which is input to a decoder, to an input buffer; first updating the check node by using a result of the performing of the operations after storing data, corresponding to one codeword, to the input buffer; and performing low-density parity check (ldpc) decoding by using a result of the first updating of the check node.. .
|Ticket consolidation for multi-tiered applications|
Consolidating problem tickets for a multi-tiered application may comprise identifying a plurality of correlated virtual machines that are running one or more application components of the multi-tiered application. Problem reports may be identified that are generated by one or more of the plurality of correlated virtual machines and caused by a failure of a same single component of the multi-tiered application.
|Ticket consolidation for multi-tiered applications|
Consolidating problem tickets for a multi-tiered application may comprise identifying a plurality of correlated virtual machines that are running one or more application components of the multi-tiered application. Problem reports may be identified that are generated by one or more of the plurality of correlated virtual machines and caused by a failure of a same single component of the multi-tiered application.
|Monitoring apparatus and system|
A monitoring system for response to incidents sensed by at least one sensor of an individual signal unit; said response comprising in a first instance, transmission to a central control facility by a said individual signal unit, of at least a unique identifying code for that individual signal unit, over a communication network; said response comprising in a second instance, transmission of data from said central control facility to one or more recipients nominated by a registered owner of said individual signal unit; and wherein registration of a said individual signal unit and configuration of sensing and of said response is via a web-based interface.. .
|Compliance testing engine for integrated computing system|
A technique tests whether an integrated computing system having server, network and storage components complies with a configuration benchmark expressed as rules in first markup-language statements such as xml. The rules are parsed to obtain test definition identifiers identifying test definitions in a second set of markup-language statements, each test definition including a test value and an attribute identifier of system component attribute.
|Test and measurement instrument with auto-sync for bit-error detection|
Embodiments of the invention include methods, apparatuses, and systems for automatically identifying a synchronization sub-pattern associated with a test pattern. A test and measurement instrument is triggered in response to a first instance of a trigger pattern in a data stream.
|Methods for testing odata services|
The present disclosure describes computer implemented methods, computer systems, and computer readable mediums for recursively testing an odata service. One method may include extracting resource identifiers from an initial service document, and for each of the resource identifiers, retrieving a respective response document from the odata service.
|Protecting paired virtual machines|
A system for monitoring virtual machines includes a master host and a slave host. The slave host includes a primary virtual machine and a secondary virtual machine.
|Proactive resource reservation for protecting virtual machines|
A system for proactive resource reservation for protecting virtual machines. The system includes a cluster of hosts, wherein the cluster of hosts includes a master host, a first slave host, and one or more other slave hosts, and wherein the first slave host executes one or more virtual machines thereon.
|Method and apparatus to save power upon resume in multi-core system|
A method is provided for resuming one or more cores of a multi-core processor that is part of an electronic device, the method comprising: grouping wakeup sources into a plurality of computing domains; receiving an interrupt associated with a wakeup source; identifying a first computing domain from the plurality that the wakeup source is part of; mapping the first computing domain to a first indication of one or more states of a first core of the processor; configuring the first core to enter the one or more states that are indicated by the first indication; and resuming the first core after the first core is configured.. .
|Efficient service advertisement and discovery in a peer-to-peer networking environment|
A local device broadcasts a service advertisement in a wireless network, where the service advertisement includes one or more service identifiers (ids) identifying one or more services being advertised and an availability schedule of the local device. Optionally, the local device reduces power to at least a portion of the local device and wakes up at a time according to the availability schedule.
|Saving power by managing the state of inactive computing devices|
A system method and computer program product for managing readiness states of a plurality of computing devices. In response to a request, a computer system operates to either: provide one or more computing devices from an inactive pool to an active pool, or accept one or more active computing devices into the inactive pool.
|Data protection compliant deletion of personally identifiable information|
The disclosure generally describes computer-implemented methods, software, and systems for modeling and deploying decision services. One computer-implemented method includes encrypting, by operation of a computer, personally-identifiable information (pii) data using a first cryptographic key, wherein the pii data is associated with non-encrypted associated data, encrypting the encrypted first cryptographic key with a second cryptographic key, determining that the occurrence of a pii data disassociation event associated with the second cryptographic key has occurred, and rendering the pii data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key..
|Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method|
An unauthorized connection detecting device, which detects whether or not a power storage device is an unauthorized power storage device, includes: a communications unit receiving first charge/discharge information in which first identification information and first connection information are associated each other, the first identification information identifying an encryption key of the power storage device used for mutual authentication between a charge/discharge device and the power storage device, and the first connection information being on the power storage device and obtained when the power storage device is connected to the charge/discharge device; and an unauthorization detecting unit detecting whether or not the power storage device is the unauthorized power storage device, by determining, using the first identification information and the first connection information, whether or not two or more power storage devices associated with a single first identification information item are present.. .
|Algorithm-based anonymous customer references|
A system and methodology that facilitates management and utilization of domain-specific anonymous customer references (acrs) for protecting subscriber privacy across different domains is disclosed herein. In one aspect, on receiving user authorization, an acr services (acrs) component can generate an acr that is to be inserted in a communication or message transmitted from a user equipment to an untrusted entity.
|Information processing apparatus and activation method|
An information processing apparatus manages activation of a program by a task which is a unit of execution, and executes a task for each sequence in units of process block. The information processing apparatus has a nonvolatile memory which keeps an execution state management table.
|Autonomic hotspot profiling using paired performance sampling|
A processor performance profiler is enabled to for identify specific instructions causing performance issues within a program being executed by a microprocessor through random sampling to find the worst-case offenders of a particular event type such as a cache miss or a branch mis-prediction. Tracking all instructions causing a particular event generates large data logs, creates performance penalties, and makes code analysis more difficult.
|Branch target buffer for emulation environments|
Branch instructions are managed in an emulation environment that is executing a program. A plurality of slots in a polymorphic inline cache is populated.
An instruction for parsing a buffer to be utilized within a data processing system including: an operation code field, the operation code field identifies the instruction; a control field, the control field controls operation of the instruction; and one or more general registers, wherein a first general register stores an argument address, a second general register stores a function code, a third general register stores length of an argument-character buffer, and the fourth of which contains the address of the function-code data structure.. .
|Detecting cross-talk on processor links|
A first of a plurality of data lanes of a first of a plurality of processor links is determined to have a weakest of base performance measurements for the plurality of data lanes. A switching data pattern is transmitted via a first set of the remainder processor links and a quiet data pattern is transmitted via a second set of the remainder processor links.
|Load page table entry address instruction execution based on an address tralsnation format control field|
What is provided is a load page table entry address function defined for a machine architecture of a computer system. In one embodiment, a machine instruction is obtained which contains an opcode indicating that a load page table entry address function is to be performed.
|Apparatus and method for recovering partition using backup boot record information|
In a method for recovering a partition using backup boot record information, an unallocated area is separated from a disk or an evidence image. The unallocated area is searched for a location of a backup boot record.
|Recording medium, computer, and information processing system|
A non-transitory computer-readable recording medium storing a program causing a processor to execute a process, the process includes identifying a second virtual machine in charge of storing data onto a storage in accordance with a hash value that is calculated from a key and a hash function, the key corresponding to the data that is to be stored on the storage and is placed on a first virtual machine from among a plurality of virtual machines running in a computer and the hash function commonly used by the plurality of virtual machine; storing the data on the storage using the first virtual machine when the second virtual machine matches the first virtual machine; and performing a control operation so that the first virtual machine does not store the data onto the storage when the second virtual machine fails to match the first virtual machine.. .
|Method for protecting a gpt cached disks data integrity in an external operating system environment|
An invention is provided for protecting the data integrity of a cached storage device in an alternate operating system (os) environment. The invention includes replacing a globally unique identifiers partition table (gpt) for a cached disk with a modified globally unique identifiers partition table (mgpt).
|Row hammer refresh command|
A memory controller issues a targeted refresh command. A specific row of a memory device can be the target of repeated accesses.
|Hybrid nanotube/cmos dynamically reconfigurable architecture and system therefore|
A hybrid nanotube, high-performance, dynamically reconfigurable architecture, nature, is provided, and a design optimization flow method and system, nanomap. A run-time reconfigurable architecture is provided by associating a non-volatile universal memory to each logic element to enable cycle-by-cycle reconfiguration and logic folding, while remaining cmos compatible.
|Methods and structure for identifying support for super-standard features in communications between serial attached scsi devices|
Methods and structure for determining compatibility between a pair of sas devices for support of super-standard features of the devices. Features and aspects hereof provide for exchange of information between a first and second sas device using sas protocol in non-standard manners.
|Streaming media with a server identified at runtime|
A server machine may create a network connection to a device and receive a request to stream media that is managed by a different server machine. The server machine that created the network connection may be unaware of the location of the media at the time the network connection is created, and the location of the media may remain unknown to this server machine until the location is identified by the request, which may be received at runtime.
|Method and apparatus for streaming multimedia data with access point positioning information|
A method and apparatus for streaming multimedia data over a network is provided. A playlist file for a selected multimedia presentation is downloaded by a client device over the network from a streaming server using a transfer protocol.
|System and method for communication session correlation|
A system and method for correlating communication sessions. A globally unique correlation identifier is created and exchanged between the parties during session initiation protocol (sip) session setup to allow for association and correlation of additional sip sessions between the same parties or with additional parties.
|Process for peer-to-peer download of software installer|
A system, method, and computer-readable medium are disclosed for performing automated, peer-to-peer migrations of entitled digital assets. A first identifier corresponding to a source system, and a first set of entitlement data corresponding to a set of digital assets installed on the source system, are processed to generate a first set of entitlements entitling the source system to use the set of digital assets.
|Service segregation according to subscriber service association|
Processing a plurality of packets through at least one service, a privilege granter monitors at least two authentication packets to obtain a source unique network identifier, one of which does not have a vendor specific attribute and detects an authentication packet among the at least two authentication packets, and the authentication packet having the vendor specific attribute. The privilege granter receives at least one response authentication packet having at least one service definition identifier, the service definition identifier corresponding to the source unique network identifier, responsive to detecting the authentication packet having the vendor specific attribute and builds an entitlement database to pair the source unique network identifier to the service definition identifier.
|Monitoring the health of web page analytics code|
A system for monitoring the “analytics health” or “tracking health” of a web page can include one or more modules that render analytics code on the web page. In one implementation, a monitoring service downloads one or more web pages from a web server.
|Method for content change notification in a cloud storage system, a corresponding cloud broker and cloud agent|
A method for notification of content changes across different applications that share same content in a cloud storage system comprises: registering at a cloud io broker applications that require content change notification; informing a cloud io agent about content for which applications registered with the cloud io broker for content change notification; monitoring content changes in the cloud storage system and upon each change of a content item: sending a first content change notification from the cloud io agent to each cloud io broker that requested content change notification for that content item; identifying at the cloud io broker applications registered for content change notification for that content item; and multicasting a second content change notification from the cloud io broker to all applications registered for content change notification for that content item.. .
|Methods and systems for network flow analysis|
A system and method comprising: receiving network flow data; identifying a peer to peer network flow within the network flow data comparing the peer to peer network flow to a known peer to peer application flow; labeling the peer to peer network flow as the known peer to peer application flow when the peer to peer network flow matches the known peer to peer application flow; and creating a data set to be associated with the labeled peer to flow.. .
|Communication block apparatus and communication block method|
A communication block apparatus that blocks communication by an information processing apparatus connected to a network. The communication block apparatus includes a guide unit that guides information transmitted from the information processing apparatus, an identification information acquisition unit that acquires identification information for identifying a notified party of a message from the message of a predetermined protocol higher than a transport layer, the message including information guided by the guide unit, a permission determination unit that determines whether to permit communication by the message at least based on the identification information acquired by the identification information acquisition unit, and a communication permission unit that forwards the message to permit the communication by the information processing apparatus when the permission determination unit determines to permit the communication, regardless of the block of the communication by a communication block unit..
|Method and apparatus for a recommendation system based on token exchange|
Recommendation system based on the actions of a group of users, and not requiring prior metadata, is provided. The recommendation is not limited to from user-to-item (e.g.
|Stream processing with runtime adaptation|
Embodiments of the disclosure include a method for providing stream processing with runtime adaptation includes registering one or more events, wherein each of the events is associated with a stream processing application. The method also includes monitoring, by a processor, for an occurrence of the one or more events associated with the stream processing application, wherein each of the one or more events is associated with one or more runtime metrics.
|Stream processing with runtime adaptation|
Embodiments of the disclosure include a system for providing stream processing with runtime adaptation, having a stream processing application that receives an incoming data stream and a runtime infrastructure configured to execute the stream processing application. The system also includes an orchestrator configured to communicate with the runtime infrastructure and the stream processing application, the orchestrator configured to perform a method.
|System and method for network traffic aggregation and analysis of mobile devices using socket wrappers|
This disclosure describes systems, methods, and apparatus for per-application network traffic monitoring by extending socket functionality to include socket wrappers able to identify network traffic volume, applications responsible for the traffic, the network being loaded, and distinguish between internal device traffic and external network traffic. Network traffic shaping can then be carried out by managing an offending application's traffic..
|Systems and methods for supporting a network profile|
The present solution is directed to a system for specifying a source internet protocol (ip) address used by an intermediary device for a connection to a server. The system includes a device intermediary to a plurality of clients and a server.
|Systems and methods for providing message flow analysis for an enterprise service bus|
A mechanism for providing message flow analysis for an enterprise bus service (esb) system is disclosed. A method includes identifying, by a computing device executing the esb system, messages exchanged in the esb system in a time interval.
|Per flow dynamic metering selection|
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the pcrn, a request for establishment of a new service data flow (sdf) for a subscriber; generating a policy and charging control (pcc) rule based on the request; identifying a first metering object of a plurality of metering objects as currently applicable to the subscriber, wherein the first metering object includes a first monitoring key; and transmitting the pcc rule and the first monitoring key to the pcen for installation. Various embodiments additionally include, after transmitting the pcc rule and the first monitoring key.
|Flow de-duplication for network monitoring|
A method is provided in one example and includes receiving flow data associated with a traffic flow. The flow data can be tagged with a data source identifier identifying a data source exporting the flow data, a source site identifier identifying a site associated with a source device of the traffic flow, and a destination site identifier identifying a destination site associated with a destination device of the traffic flow.
|Request routing management based on network components|
Systems and methods for managing requesting routing functionality associated with resource requests for one or more resources associated with a content provider are provided. A content delivery network (“cdn”) service provider, on behalf of a content provider, can process domain name service (“dns”) requests for resources by computing devices and resolve the dns requests by the identification of a network address of a computing device that will provide the requested resources.
|Joining a computer to a process control system|
A setup control unit is configured to get activated via a first computer that is to become a node in the process control system and which activation is initiated by a setup tool being brought to the first computer. The setup control unit contacts a configuration control computer, supplies a setup tool identifier to the configuration control computer, accesses system information elements in the configuration control computer, presents system nodes to an operator using the system information elements, receives an operator selection of a system node, sends the node selection to the configuration control computer for registering, based on a setup tool identifier investigation, receives node parameter data associated with the selected system node from the configuration control computer and supplies the first computer with the node parameter data for making it into the selected system node..
A networking device may operate according to a first configuration profile adapted to cause the device to conform to restrictions applicable within a plurality of different locations. The networking device may obtain a second, location-aware configuration profile, which may include restrictions applicable to the location where the device is deployed.
|Resource management in dynamic network environments|
A system comprises a communications network configured to support transmission of a plurality of communications streams and a resource manager communicatively coupled to the communications network and configured to provision resources of the communications network to the plurality of communications streams. The system may further comprise a performance test manager communicatively coupled to said communications network and configured to identify a communication stream from said plurality of communications streams, identify a test network path for said identified communication stream that is substantially free of other network traffic, and perform a performance test over said test network path..
|Entertainment systems utilizing field replaceable storage units|
Vehicular entertainment systems where devices in the systems can each utilize a common type of storage units are presented. A vehicular entertainment system can include a media server head unit in communication over a network with a plurality of media players that are installed about the cabin of a vehicle.
|Cloud resource placement using placement pivot in physical topology|
In one embodiment, a method comprises retrieving a request graph specifying request nodes identifying respective requested cloud computing service operations, and at least one request edge specifying a requested path requirements connecting the request nodes; identifying a placement pivot among feasible cloud elements identified in a physical graph representing a data network having a physical topology, each feasible cloud element an available solution for one of the request nodes, the placement pivot having a maximum depth in the physical topology relative to the feasible cloud elements; ordering the feasible cloud elements, according to increasing distance from the placement pivot to form an ordered list of candidate sets of feasible cloud elements; and determining an optimum candidate set, from at least a portion of the ordered list, based on the optimum candidate set having an optimized fitness function in the physical graph among the other candidate sets in the ordered list.. .
|Apparatus and method for managing terminal device|
A management apparatus includes: a determination unit configured to determine whether or not terminal device identification information that is included in received terminal information is correct based on whether or not communication that uses communication module identification information of a terminal device including storage device identification information, included in the terminal management information, that is identical to storage device identification information included in the received terminal information and that corresponds to a terminal device other than a terminal device specified by terminal device identification information included in the received terminal information is established; and an update unit configured to update the terminal management information according to the received terminal information when the determination unit determines that the terminal device identification information included in the received terminal information is correct.. .
|Distributed request processing|
Processing a request is disclosed. A request associated with a first identifier is received.
|Distributed information synchronization|
Processing a prepared update is disclosed. A prepared update associated with a request that has been used by the sender to update a local version of a data associated with the sender is received from a sender.
|User virtualization initialization|
Systems and methods are described for providing a user virtualization (uv) system. A non-transitory computer readable medium includes executable instructions that are operable to, when executed by a computing device, cause the computing device to: acquire an input related to user identification (id) information from a non-contact user id input device, determine a user id based on the acquired input, transmit the user id to a uv control server over a network, receive uv information corresponding to the user id from the uv control server, and apply the received uv information to a uv client device..
|Leader node appointment|
Method, apparatus and computer program product for appointing a leader node from a group of nodes in a data communications network. Attribute data comprising status information of one or more nodes in the group is received.
|Computer-based methods and systems for arranging meetings between users and methods and systems for verifying background information of users|
Methods and systems for verifying, authenticating, and/or rating the identity or profile characteristics of users of online social networks and other websites and applications. And improved systems and methods that allow one or more individuals to meet or otherwise network or connect or transact or exchange information, tangibles or intangibles with other individuals and methods and systems for verifying and/or rating the identity or profiles of users of online social networks and other websites or applications..
|Use of backchannel with datacasting via broadcast medium|
Expansion of unidirectional datacasting includes the use of backchannel communication link(s) for clients communication with the datacasting infrastructure, producing a closed-loop or bidirectional system, possibly for both the acknowledgement of datacasting message receipts and a request-response service over datacasting. In one implementation, a server creates a message including a data object and a data object identifier associated with the data object.
|Remote configuration of a hardware setting on one or more target computing device(s)|
A method includes registering one or more target computing device(s) with a request processing module of a server computing device and an application executing on a client computing device communicatively coupled to the server computing device, and initiating, through the application, a request to configure a hardware setting on the one or more target computing device(s) based on a communication mechanism. The method also includes processing, through the request processing module, the request to generate a validated message related to the hardware setting configuration and to extract information related to identifiers of the one or more target computing device(s), a hardware thereof and the hardware setting.
|Sending text messages to multiple devices using a joint services account|
A network device receives a message that identifies a relationship between a wireless user device and a client device, the relationship allowing text messages, intended for the wireless user device, to be sent to the client device. The network device stores the information identifying the relationship.
|Electronic messaging system utilizing social classification rules|
Techniques for identifying and organizing electronic messages are described. With some embodiments, a method receives a user interaction update from a messaging client associated with a first user.
|Formatting rich text data into a json array|
Formatting rich text data into a json array. A parent json object can be created within the json array.
|Real-time notifications and sharing of photos|
A system and method for sending a notification to a user in a social network is disclosed. A controller receives a first photo from a first user.
|System and method for enabling identification of network users having similar interests and facilitating communication between them|
A system and method is provided for enabling identification of network users having similar interests and for facilitating communication between them. An internet-based (or “on-line”) application is provided that: 1) facilitates the identification of users having similar interests using web-browsing behavior; 2) determines the virtual distance between web sites; and 3) utilizes profiling techniques and user-supplied descriptive information to facilitate direct communication between users who need not have had prior contact, and without requiring the participation of the visited'web sites..
|Icebreaker activities using an intelligent beverage container|
Systems, devices, and methods are provided for conducting a social interaction. A first user account may be associated with a first beverage container.
|Broker designation and selection in a publish-subscription environment|
Approaches for designating and/or selecting broker systems in a publication-subscription (pub-sub) messaging environment are provided. In one approach, a subscriber system may be designated as a broker system based on a capability of the subscriber system to function as a broker system for its peers.
|Context aware social callback|
A server executing a context aware social callback application and method are provided. Posts with action tags made on social media sites or pages that identify a monitoring entity or associated offering are identified.
|Constructing a contact sharing history|
Technology for constructing a contact sharing history is disclosed. One method comprises receiving, at a computing device of a second user, a communication contact information element of a first user.
|Program switching method, apparatus, and media server|
Embodiments of the present invention provide a program switching method, apparatus, and media server. A content identifier of a target program is obtained directly, and a message for triggering a media server to transmit data is sent to the media server, so that the media server switches a time-shifted program.
|Network resource identification|
A system, method and computer-readable medium for client-side processing of resource identifiers. A client request for content is returned that includes information for generating a request for translation information and a number of embedded resource identifiers.
|Apparatus and method for processing an interactive service|
A method of processing an interactive service and an apparatus thereof are disclosed. The present invention includes receiving uncompressed audio contents or uncompressed video contents from an external decoding unit, extracting an identifier of a frame from the received content, sending a request containing the identifier to a server and receiving a trigger for the content from the server based on the request, wherein the trigger indicates the current time of the contents and references a particular interactive event in an application parameter table or signals that the event is to be executed now or at a specified future time and the application parameter table includes information about at least one of applications..
|Automated correction and reporting for dynamic web applications|
A run-time application-generated change to dynamic web content, generated during an application run-time by a dynamic web application, is detected in response to user run-time interactions with the dynamic web content rendered by the dynamic web application that changed the dynamic web content during the run-time. The detected run-time application-generated change to the dynamic web content is parsed.
|Unified communication interface for distributed computing|
Implementing a unified communication system allowing different clients to communicate using different communication modalities to access the same functionality of a remote application. A method includes identifying functionality of an application of a service.
|Sharing apparatus for computer peripheral device|
A sharing apparatus for computer peripheral devices includes: a source end connected to a first computer for sending via a first wireless module data of peripheral devices connected to the first computer; at least a target end having an identification code and connected to a second computer, wherein the target end receives and sends the data of the peripheral devices to the second computer, and the second computer performs an operation according to the data of the peripheral devices; and a control program stored in a record medium and installed in the first computer, wherein the source end fetches an identification code from the at least a target end via wireless connection, authenticates the identification code, adds a code corresponding to the identification code to the outgoing data of the peripheral device, and sends the code-containing data to a corresponding one of the target ends.. .
|Dividing device and dividing method|
A dividing device includes: shifting circuits which left-shift the mantissa parts of the dividend and the divisor by a first and a second count values; a digit number arithmetic circuit which calculates a quotient digit number expected value based on the first count value and the second count value; a dividing circuit which outputs a quotient and a remainder in sequence on a digit-by-digit basis based on the mantissa parts of the dividend and the divisor left-shifted by the shifting circuits; a subtracting circuit which subtracts an exponent part of the floating-point number being the divisor from an exponent part of the floating-point number being the dividend to output a resultant value; and a control circuit which outputs a mantissa part and an exponent part of a floating-point number being a quotient.. .
|Making use of a file path to determine file locality for applications|
A processing device identifies a path name of a file that is stored in a file system and sends an extended attribute request comprising the path name to a server computer system to identify a physical location of the file in the file system. The file system includes a virtual extended attributes that identify the physical location of the file that corresponds to the path name in the request.
|Format identification for fragmented image data|
Format identification for fragmented data is disclosed. In some embodiments, an input stream of information that is divided into fragments is received.
|Method and apparatus for structuring a network|
There is provided a method of structuring a network of nodes, comprising: providing link information relating to existing links between the nodes (2); using the link information to partition the network into non-predetermined groups of related nodes (3), thereby forming a group structure for the network; identifying for each group a corpus of information associated with the nodes in that group (4); generating for each group a machine-readable characterisation of that group based on the corpus of information identified for the group (5); and structuring the network of nodes through the groups and their associated characterisations (2 to 7).. .
|System and methods for linking multiple events involving firearms and gang related activities|
Methods for linking multiple events involving firearms submit event information data and firearms information data to a system that includes a database for multiple firearms events and generate a query map that correlates data in the system database with a preselected geographical grid based upon one or more preselected matching criteria to one or more data entries for a selected event. The map is used to generate a request for a possible link analysis which may be initiated by a firearms examiner and is then performed to determine if there is a link.
|System, method and computer program product for selectively caching domain name system information on a network gateway|
A system, method and computer program product is provided for selectively caching domain name system (dns) information on a network gateway. A cpe attached to the network gateway executes an application that searches files in cpe memory to identify frequently accessed domain names.
|Incremental updating of query-to-resource mapping|
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for evaluating resource selection processes. One method includes, updating a query to resource mapping that associates each query of a group of queries with resources that match one or more of the queries for each of a plurality of predetermined periodic time intervals.
|Global media lists for mobile devices|
Systems and methods are disclosed for sharing global lists of media content among multiple apps executing on various client devices. A global list can include a plurality of records for media, each of which can include pointers to media stored elsewhere, a unique identifier for the media, a list identifier for the media, and/or metadata for the media.
|System and method for combining multiple recommender systems|
A system and method for recommending items to a user is provided. The system could combine recommendations provided by multiple recommenders by: a) calculating for each recommender j a maximum score pj for the recommended n items as a function (e.g., sum) of stored recommender ratings for the n items, b) calculating a minimum acceptable score for each recommender system j as a function of the maximum score pj and a predetermined tradeoff factor αj such that the minimum acceptable score for at least one recommender system j is less than the maximum score pj, c) selecting at least one set of items from the plurality of items, such that scores pj (and/or sum of scores pj) calculated for the selected set of items for each recommender system j are greater than the respective minimum acceptable score for that recommender system j, and d) identifying selected set of items to the user..
|Method and system for meta-tagging media content and distribution|
A unique application within video that allows for user generated meta-tagging to be delivered in real time to individual clips is provided. This meta-tag creates its own tail based upon the user generated words population, which is searchable via a “spider network” that runs invisible behind the web pages of the site.
|Identification of content by metadata|
Systems and methods for identifying content in electronic messages are provided. An electronic message may include certain content.
|Computer-implemented system and method for providing visual suggestions for cluster classification|
An embodiment provides a computer-implemented system and method for providing visual suggestions for cluster classification. One or more clusters comprising uncoded documents from a set are obtained.
According to one embodiment, an apparatus stores a plurality of datapoints. A datapoint comprises a first value and a second value that depends upon the value of the first value.
|Indexing and searching dynamically changing search corpora|
Tools and techniques for indexing and searching dynamically changing search corpora are provided. These tools may receive requests to upload documents over a network to an online document repository, and present a user interface to facilitate the upload.
|Node validation in a network|
A method of operating a network of connected nodes comprises the steps of maintaining a trust value for each node in the network, maintaining one or more attributes for each node in the network, each attribute comprising a value and a respective confidence level, and performing a validation of a specific attribute of a specific node. The validation comprises the steps of querying nodes connected to the specific node for specific attribute values for the specific node, creating a results set from the returned attribute values from the connected nodes and the trust values of the connected nodes, and processing the results set according to a predefined algorithm to determine a new value and/or a new confidence level for the specific attribute of the specific node..
|Subject matter context search engine|
A search system associates contextual metadata with search terms and/or stored terms to facilitate identification of relevant information. In one implementation, a search term is identified (4304) from a received search request.
|Format identification for fragmented image data|
Format identification for fragmented data is disclosed. In some embodiments, an input stream of information that is divided into fragments is received.
|Format identification for fragmented image data|
Format identification for fragmented data is disclosed. In some embodiments, an input stream of information that includes a continuity property is received.
|Methods and systems for data cleanup using physical image of files on storage devices|
Methods, systems, and computer program products are provided for optimizing selection of files for deletion from one or more data storage devices to free up a predetermined amount of space in the one or more data storage devices. A method includes analyzing an effective space occupied by each file of a plurality of files in the one or more data storage devices, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for deletion, based on the identified one or more data blocks, and deleting the one or more candidate files for deletion from the one or more data storage devices..
|Data de-duplication in a distributed network|
A computer-implemented method for efficient data storage is provided. A first storage medium associates data stored on one or more data storage media with a unique identification value (id) for the purpose of determining de-duplication status of the data.
|Selecting candidate rows for deduplication|
The present invention extends to methods, systems, and computer program products for selecting candidate records for deduplication from a table. A table can be processed to compute an inverse index for each field of the table.
|Validating system and method|
A computer reads an element information list from a file stored in a database of the computer, and generates first element identifiers according to the element information list. The computer marks a second element identifier in content of the file, in response to a determination that the first element identifier is different from the second element identifier corresponding to the first element identifier..
|Automated data curation for lists|
A processor-implemented method, system, and/or computer program product identifies errant data in an initial data list. An initial data list is composed of multiple data entries, where each of the data entries is associated with a parent hypernym from a group of multiple parent hypernyms.
|Minimizing replication search on failover|
A method, system, and program product are provided for minimizing replication when a new server is replicated with. A replication application for a client computer having a replica of a database thereon is executed by a processor in a computer to receive for a replication service comprising a plurality of servers containing replicas of the database, an indication of each healthy server in the replication service and a determined period of time within which replication is assured to have been completed for each healthy server.
|Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment|
Techniques are disclosed for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment. In one embodiment, a method comprises, in response to a selection, from a user, of a first synchronization state of a first folder in the workspace, synchronizing content of the first folder in the workspace with a corresponding folder on devices of a user (and collaborators) based on the first synchronization state.