Follow us on Twitter
twitter icon@FreshPatents


Ram patents

      

This page is updated frequently with new Ram-related patent applications.




 Mbsfn measurements and drx, different drx settings for different transmission types patent thumbnailMbsfn measurements and drx, different drx settings for different transmission types
Methods and apparatus, including computer program products, are provided for mbsfn measurements. In one aspect there is provided a method.
Nokia Technologies Oy


 Predicting resource scheduling patent thumbnailPredicting resource scheduling
The invention relates to methods and nodes for scheduling resource blocks in a wireless communications network. The invention further relates to computer programs performing the methods according to the invention, and computer program products comprising computer readable medium having the computer programs embodied therein.
Telefonaktiebolaget Lm Ericsson (publ)


 Method and network node for obtaining required latency based on context detectable by sensor modules patent thumbnailMethod and network node for obtaining required latency based on context detectable by sensor modules
A method and a network node (130) for obtaining a required latency for transmissions between a wireless device (110) and a controller node (120) are disclosed. The network node (130) receives (202) at least one parameter relating to a context of at least one of the wireless device (110) and the controller node (120).
Telefonaktiebolaget Lm Ericsson (publ)


 Method and device for controlling an autonomous device patent thumbnailMethod and device for controlling an autonomous device
It is presented a method for controlling an autonomous device (4) of a cellular network (5). The method is performed by a network device (20) and comprises the steps of: predicting (43) a need to increase coverage of the cellular network or a need to increase capacity of the cellular network, comprising the steps of: inputting live data features into a trained classifier (80); and outputting a launch class from the classifier (80); and activating (45) an autonomous device (4) of the cellular network, to improve the cellular network.
Telefonaktiebolaget Lm Ericsson (publ)


 Secure short message service (sms) communications patent thumbnailSecure short message service (sms) communications
Systems, methods, and computer program products for providing secure messaging communications are disclosed. For example, a computer-implemented method may include receiving an encrypted message and a key from a sender associated with a first computing device where the encrypted message is generated by the first computing device, verifying the received key at least in part based on a comparison with a pre-determined key, processing one or more unique factors associated with the sender in view of verifying the received key, decrypting the encrypted message, re-encrypting a result of the decrypting using a key of a receiver associated with a second computing device, and sending the re-encrypted result to the receiver associated with the second computing device..
Paypal, Inc.


 Mobile device location proofing patent thumbnailMobile device location proofing
A computer implemented method, a computer program product and a computer system are disclosed that verify the location specified by a mobile device, for example when trying to gain access to a location-restricted service hosted by a computer system. This may be achieved by identifying at least one reference mobile device in the vicinity of the identified location of the first mobile device of which an identified location is to be verified, requesting from the at least one reference mobile device a reference location report including further pairing information identifying mobile devices with which the reference mobile device is paired; receiving the reference location report from the at least one reference mobile device; and verifying the location identification in a first location report received from the first mobile device by identifying the first mobile device in the further pairing information in the received at least one reference location report..
International Business Machines Corporation


 Video-production system with dve feature patent thumbnailVideo-production system with dve feature
In one aspect, an example method includes (i) receiving, by a computing system, a first command; (ii) responsive to receiving the first command, executing, by the computing system, a first portion of a digital-video effect (dve) by sequentially performing a first subset of ordered steps, wherein executing the first portion of the dve causes the computing system to generate a first portion of video content at a first frame rate; (iii) receiving, by the computing system, a second command that is different from the first command; and (iv) responsive to receiving the second command, executing, by the computing system, a second portion of the dve by sequentially performing a second subset of ordered steps, wherein executing the second portion of the dve causes the computing system to generate a second portion of the video content at a second frame rate that is different than the first frame rate.. .
Tribune Broadcasting Company, Llc


 Method and device for controlling program broadcasting patent thumbnailMethod and device for controlling program broadcasting
Disclosed in the present disclosure are a method and a device for controlling program broadcasting. The method for controlling program broadcasting includes the following steps: receiving a program switch instruction and current program information broadcasted by a broadcasting terminal, the current program information containing a broadcasting time point and/or a broadcasting code stream keyframe of a current program; determining a start broadcasting position of a destination program according to the program switch instruction and the current program information; and sending a code stream signal to the broadcasting terminal according to the start broadcasting position of the destination program..
Zte Corporation


 Synchronization of live audio and video data streams patent thumbnailSynchronization of live audio and video data streams
Embodiments of the present invention disclose a method, computer program product, and system for audio and video synchronization. A plurality of audio and video data streams are received on a computer system through a network.
International Business Machines Corporation


 Method for extracting features from a flow of digital video frames, and corresponding system and computer program product patent thumbnailMethod for extracting features from a flow of digital video frames, and corresponding system and computer program product
In an embodiment, digital video frames in a flow are subjected to a method of extraction of features including the operations of: extracting from the video frames respective sequences of pairs of keypoints/descriptors limiting to a threshold value the number of pairs extracted for each frame; sending the sequences extracted from an extractor module to a server for processing with a bitrate value variable in time; receiving the aforesaid bitrate value variable in time at the extractor as target bitrate for extraction; and limiting the number of pairs extracted by the extractor to a threshold value variable in time as a function of the target bitrate.. .
Stmicroelectronics S.r.l.


Information processing apparatus, information processing method, computer program, and image display system

An image processing apparatus may include a control device configured to detect an abnormality in accordance with at least one of (i) position or orientation information of a display or (ii) information indicating movement of head motion an image of contents to be displayed to the display; and generate a free viewpoint image in accordance with the image of contents and the position or orientation information of the display.. .
Sony Corporation

Television with built-in dual membrane resonance sound box

Left and right sides in the television are provided symmetrically with independent sound boxes. Each sound box comprises a box body and a loudspeaker group, a front passive radiator and a rear passive radiator that are located in the box body.
Shen Zhen Neusound Co., Ltd

Method and system for stabilizing video frames

A method, system, and computer program product for stabilizing frames, the method comprising: receiving a frame sequence comprising three or more frames, including a current frame; determining salient feature points within the frames; matching the salient feature points between the frames; dropping salient feature points associated with advancing objects; dropping salient feature points associated with objects moving in shaking movements; computing a transformation between pairs of consecutive frames from amongst the at least three frames, based upon non-dropped salient feature points, thereby obtaining a multiplicity of transformations; determining a center position for the frames based upon the multiplicity of transformations; determining a stabilizing transformation from a current frame to the center position; and applying the stabilizing transformation to the current frame to obtain a stabilized frame.. .
Agt International Gmbh

Imaging device, controlling imaging device, and control program

An imaging unit images an object in a state where first to third infrared lights are each selectively and sequentially projected so as to generate first to third frames. An electronic shutter controller controls a period and timing in which the imaging unit is exposed such that an interval between a first timing, which is the middle point of the period in which the imaging unit is exposed in the state where the second infrared light is projected, and a second timing, which is the middle point of the period in which the imaging unit is exposed in the state where the first or third infrared light is projected, is set shorter than an interval between the first timing and a third timing, which is the middle point of the one frame period of the first or third frame..
Jvc Kenwood Corporation

Printing result estimation apparatus and computer program

A printing result estimation apparatus includes a print condition obtaining unit configured to obtain condition information indicating a print condition set by a user, a print result estimation unit configured to estimate an execution result of the printing process based on the condition information, wherein the print result estimation unit estimates the result of the printing process based on print effect data on cost factors, environmental factors, and a time required to print, and a display device operatively connected to the print result estimation apparatus, wherein the display device is configured to display a print result estimate of the print estimation unit.. .
Toshiba Tec Kabushiki Kaisha

Mobile device pairing

Tools (systems, apparatuses, methodologies, computer program products, etc.) for pairing electronic devices including touchscreen-enabled electronic devices, and for facilitating communication between paired electronic devices.. .
Linkedln Corporation

Checksum friendly timestamp update

A network device in a network is provided that is configured to implement a process for modifying a timestamp in a packet that is a timing protocol packet. The timing protocol packet is encapsulated by a user data protocol (udp) datagram, where the modified timestamp is written into the packet, but does not require a checksum of the udp datagram to be changed.
Telefonaktiebolaget L M Ericsson (publ)

Dynamic application programming interface builder

A method beginning with adding new resource to an enterprise system. Responsive to adding, an api builder executed by the computer automatically builds a new api exclusively for the new resource.
Adp, Llc

Enterprise application ecosystem operating system

A method for increasing a speed of access to resources in an enterprise system. A gateway receives a request from the client to find a resource executed by a computer within the enterprise system.
Adp, Llc

Populating a secondary cache with unmodified tracks in a primary cache when redirecting host access from a primary server to a secondary server

Provided are a computer program product, system, and method for populating a secondary cache with unmodified tracks in a primary cache when redirecting host access from a primary server to a secondary server. Host access to tracks is redirected from the primary server to the secondary server.
International Business Machines Corporation

Inter-platform management of computing resources

A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients.
International Business Machines Corporation

Inter-platform management of computing resources

A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients.
International Business Machines Corporation

Inter-platform management of computing resources

A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients.
International Business Machines Corporation

Enhanced intrusion prevention system

As disclosed herein a method, executed by a computer, includes detecting, by an intrusion prevention system, intruder network traffic addressed to a computing device, creating a decoy virtual machine, and redirecting the intruder network traffic to the decoy virtual machine. The method further includes determining one or more attack characteristics of the intruder network traffic, and generating a new intruder signature corresponding to the attack characteristics.
International Business Machines Corporation

Anomalous network monitoring, user behavior detection and database system

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise.
Palantir Technologies Inc.

User configurable message anomaly scoring to identify unusual activity in information technology systems

Embodiments include method, systems and computer program products for identifying unusual activity in an it system based on user configurable message anomaly scoring. Aspects include receiving a message stream for the it system and selecting a plurality of messages from the message stream that correspond to an interval.
International Business Machines Corporation

Data driven role based security

Aspects extend to methods, systems, and computer program products for controlling performance of a requested user operation. It is determined if a requested user operation can access data on behalf of a user based on an obtained user context associated with the user.
Microsoft Technology Licensing, Llc

Accessing network services using a network access service

A network access service operates as an intermediary between client applications and network services. The network access service is configured to perform one or more authentication processes required by the network services on behalf of the client applications.
Ricoh Company, Ltd.

Secure analysis application for accessing web resources

Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine.
Authentic8, Inc.

Udp-based control command transmission method, sender and receiver

Provided is a user datagram protocol (udp)-based control command transmission method, in which a sender sends a control command packet to a receiver based on a udp; and the receiver sends an acknowledgement (ack) packet to the sender based on the udp after receiving the control command packet. A sender and a receiver are also provided..
Beijing Xiaoniao Tingting Technology Co., Ltd.

Systems and methods for transferring message data

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for providing messages to client devices. In certain examples, a stream of messages is provided to a messaging application on a client device at a desired message feed rate.
Machine Zone, Inc.

Service elastic method and apparatus in cloud computing

A service-based elastic method in a cloud environment includes detecting, an elastic event that occurs in running of a service, determining, a node that needs to be elastic and corresponds to the elastic event, determining, according to an identifier of the node that needs to be elastic, a service topology diagram of the service, and an elastic method identifier of the service in a cloud service archive, a connection relationship that needs to be established, and creating and running the newly added node instance according to information of the node that needs to be elastic in the cloud service archive and the connection relationship. The present disclosure, running of a service can be optimized more effectively..
Huawei Technologies Co., Ltd.

Design validation using natural language processing

Aspects of the present disclosure relate to systems and methods that help automate the validation of a configuration of a functional product. Every functional product, be it a service, device, or combination thereof, has one or more documents associated with it.
Dell Products L.p.

Data network controlled and optimized using layered architectures

Data network components and frameworks for the control and optimization of network traffic using layered architectures, according to embodiments of the invention, are disclosed. In one embodiment, a data network comprises a switch, a data link, a tracking processor, and a planning processor.
California Institute Of Technology

Vector signaling codes with high pin-efficiency for chip-to-chip communication and storage

An alternative type of vector signaling codes having increased pin-efficiency normal vector signaling codes is described. Receivers for these permutation modulation codes of type ii use comparators requiring at most one fixed reference voltage.
Kandou Labs, S.a.

On demand network service in 5th generation mobile networks

The present invention addresses method, apparatus and computer program product for on demand virtual switching in 5th generation mobile networks. When a condition is detected that one or more user equipments need a network service, a locally switched or routed virtual network between the user equipments is created, on demand, within a radio access network.
Nokia Solutions And Networks Oy

Bluesalt security

Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information.
International Business Machines Corporation

Bluesalt security

Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information.
International Business Machines Corporation

Personalized whitebox descramblers

The invention prevents intercepted keys from being used in unauthorized whitebox descrambler modules for the decryption of a ciphertext. Hereto a receiver with a personalized whitebox descrambler is proposed, whereby a part of the descrambling operation of the personalized descrambler is performed in a preprocessing module external to the descrambler..
Irdeto B. V.

Phase and amplitude detection in wireless energy transfer systems

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting characteristics of an input signal. One aspect includes a first finite input response (fir) filter, a second fir filter, and a controller coupled with the first and second fir filters.
Witricity Corporation

Safe battery solvents

An ion transporting solvent for use with batteries can be improved by simultaneously shortening a phosphazene compound's pendent groups, eliminating most or all of the distal ion carriers, and randomizing the solvent molecules so as to intentionally disrupt symmetry to the maximum degree possible. The combination of these strategies dramatically improves battery performance to the point where the performance recorded is comparable to batteries using conventional organic solvents..
Princess Energy Systems, Inc.

Method and processing fabricating a magnetic resistive random access memory device

Methods of fabricating mram devices are provided along with a processing apparatus for fabricating the mram devices. The methods may include forming a ferromagnetic layer, cooling the ferromagnetic layer to a temperature within a range of between about 50° k to about 300° k, forming and oxidizing one or more mg layers on the cooled ferromagnetic layer to form an mgo structure, forming a free layer on the mgo structure, and forming a capping layer on the free layer..

Spin torque mram based on co, ir synthetic antiferromagnetic multilayer

Magnetic memory devices having an antiferromagnetic reference layer based on co and ir are provided. In one aspect, a magnetic memory device includes a reference magnetic layer having multiple co-containing layers oriented in a stack, wherein adjacent co-containing layers in the stack are separated by an ir-containing layer such that the adjacent co-containing layers in the stack are anti-parallel coupled by the ir-containing layer therebetween; and a free magnetic layer separated from the reference magnetic layer by a barrier layer.
International Business Machines Corporation

Mim/rram structure with improved capacitance and reduced leakage current

Some embodiments of the present disclosure provide an integrated circuit (ic) device including a metal-insulator-metal (mim) capacitor structure. The mim capacitor structure includes a lower metal capacitor electrode, an upper metal capacitor electrode, and a capacitor dielectric separating the lower metal capacitor electrode from the upper metal capacitor electrode.
Taiwan Semiconductor Manufacturing Co., Ltd.

Imprinted memory

Although photolithography is the preferred pattern-transfer method for even the 10 nm electrically-programmable memory (epm, which comprises only periodic patterns), imprint-lithography is the preferred method to form the sub-25 nm printed memory (which comprises at least one non-periodic data-pattern). Accordingly, the present invention discloses an imprinted memory..
Chengdu Haicun Ip Technology Llc

Metal strap for dram/finfet combination

A metal strap is formed in a middle-of-line (mol) process for communication between an edram and a finfet. An oxide is deposited in a trench over the edram to prevent development of an epitaxial film prior to formation of the metal strap.
International Business Machines Corporation

Heating member, electrostatic chuck, and ceramic heater

A heating member includes a ceramic substrate having a structure in which a plurality of ceramic layers are laminated together; a resistance heat-generating element embedded in the ceramic substrate; an electricity supply element disposed on a surface of the ceramic substrate; and an electricity supply path embedded in the ceramic substrate and electrically connecting the resistance heat-generating element and the electricity supply element. The electricity supply path includes a plurality of conductive layers disposed along the planar direction of the ceramic layers at different positions in the thickness direction of the ceramic substrate, and a plurality of vias disposed along the thickness direction of the ceramic substrate.
Ngk Spark Plug Co., Ltd.

Method to produce a high-purity zr-89 through physical irradiation and measurement thereof

A method to produce a high-purity zr-89 on a solid target through physical irradiation and measurement by selecting a target barn value of the cross-sectional area of nuclear reaction, drawing a horizontal line to intersect at two points on the function diagram curve and drawing a vertical line downward from each of the two points intersecting at x-axis to obtain incident energy values at the two intersecting points on the x-axis, and followed by plotting an attenuation function diagram curve of penetration depth versus incident energy of y-89(p,n)zr-89, selecting an attenuation function diagram curve and a minimum attenuation position of the selected attenuation function diagram curve in correspondence to the incident energy in the interval of incident energy absorption range to obtain an optimal plating thickness value on the solid target.. .

Method for fabricating semiconductor memory device having integrated dosram and nosram

A method for fabricating a semiconductor memory device is disclosed. A semiconductor substrate having a main surface is prepared.
United Microelectronics Corp.

Sram bit-line and write assist lowering dynamic power and peak current, and a dual input level-shifter

Described is an apparatus comprising a plurality of memory arrays, local write assist logic units, and read/write local column multiplexers coupled together in a group such that area occupied by the local write assist logic units and the read/write local column multiplexers in the group is smaller than it would be when global write assist logic units and the read/write global column multiplexers are used. Described is a dual input level-shifter with integrated latch.
Intel Corporation

Dual port sram cell

An sram cell includes first and second inverters which are cross-coupled to one another to establish first and second data storage nodes, which are complementary. A first access transistor includes a first source/drain region coupled to the first data storage node, a first drain/source region coupled to a first bitline, and a first gate region coupled to a wordline.
Taiwan Semiconductor Manufacturing Co., Ltd.

Sram cell for interleaved wordline scheme

In some embodiments, the present disclosure relates to a static random access memory (sram) device. The sram device includes a plurality of sram cells arranged in a plurality of rows and a plurality of columns, wherein respective sram cells include respective pairs of complementary data storage nodes to store respective data states.
Taiwan Semiconductor Manufacturing Co., Ltd.

Sram with stacked bit cells

Static random access memories (sram) are provided. The sram includes a plurality of bit cells.
Taiwan Semiconductor Manufacturing Co., Ltd

Self-referenced multibit mram cell having a synthetic antiferromagnetic storage layer

A multibit mram cell including a magnetic tunnel junction including a sense layer having a freely orientable sense magnetization; a tunnel barrier layer; and a synthetic antiferromagnet storage layer having a first and second storage layer. The sense magnetization induces a dipolar field having a magnitude above a spin-flop field of the storage layer.
Crocus Technology Sa

Video replay systems and methods

A video replay system which allows for the playback of video files from a buffer in random access memory and from disk to minimize the delay between capturing and replaying a desired video portion. In one embodiment, a portion of ram is allocated to provide a buffer for holding video files in memory before the files are written to a hard drive or other non-volatile storage.
Nfl Enterprises Llc

Hotword recognition

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving audio data corresponding to an utterance, determining that the audio data corresponds to a hotword, generating a hotword audio fingerprint of the audio data that is determined to correspond to the hotword, comparing the hotword audio fingerprint to one or more stored audio fingerprints of audio data that was previously determined to correspond to the hotword, detecting whether the hotword audio fingerprint matches a stored audio fingerprint of audio data that was previously determined to correspond to the hotword based on whether the comparison indicates a similarity between the hotword audio fingerprint and one of the one or more stored audio fingerprints that satisfies a predetermined threshold, and in response to detecting that the hotword audio fingerprint matches a stored audio fingerprint, disabling access to a computing device into which the utterance was spoken.. .
Google Inc.

Hotword recognition

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving audio data corresponding to an utterance, determining that the audio data corresponds to a hotword, generating a hotword audio fingerprint of the audio data that is determined to correspond to the hotword, comparing the hotword audio fingerprint to one or more stored audio fingerprints of audio data that was previously determined to correspond to the hotword, detecting whether the hotword audio fingerprint matches a stored audio fingerprint of audio data that was previously determined to correspond to the hotword based on whether the comparison indicates a similarity between the hotword audio fingerprint and one of the one or more stored audio fingerprints that satisfies a predetermined threshold, and in response to detecting that the hotword audio fingerprint matches a stored audio fingerprint, disabling access to a computing device into which the utterance was spoken.. .
Google Inc.

Hotword recognition

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving audio data corresponding to an utterance, determining that the audio data corresponds to a hotword, generating a hotword audio fingerprint of the audio data that is determined to correspond to the hotword, comparing the hotword audio fingerprint to one or more stored audio fingerprints of audio data that was previously determined to correspond to the hotword, detecting whether the hotword audio fingerprint matches a stored audio fingerprint of audio data that was previously determined to correspond to the hotword based on whether the comparison indicates a similarity between the hotword audio fingerprint and one of the one or more stored audio fingerprints that satisfies a predetermined threshold, and in response to detecting that the hotword audio fingerprint matches a stored audio fingerprint, disabling access to a computing device into which the utterance was spoken.. .
Google Inc.

Speech endpointing

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for speech endpointing are described. In one aspect, a method includes the action of accessing voice query log data that includes voice queries spoken by a particular user.
Google Inc.

Method for recognizing voice signal and electronic device supporting the same

An electronic device is provided including at least one microphone, a communication circuit, a processor and a memory, wherein the memory stores at least one application program or a software program executing a voice instruction, which is triggered in response to a voice input, upon the performance, the memory stores instructions to allow the processor to sequentially receive a plurality of utterances including a first speech element from a first user through the at least one microphone, generate a voice recognition model of the first user on the basis of at least some of the plurality of utterances, store the generated voice recognition model in the memory, and transmit the generated voice recognition model of the first user to the outside through the communication circuit so that a first external device uses the generated voice recognition model of the first user.. .
Samsung Electronics Co., Ltd.

Speech endpointing

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for speech endpointing are described. In one aspect, a method includes the action of accessing voice query log data that includes voice queries spoken by a particular user.
Google Inc.

Information processing system, processing information, and computer program product

The information processing apparatus includes an image information sender configured to send, to the display device, part-selecting image information provided for displaying a part-selecting image including one or more display parts, and a function executing instruction sender configured to send, to the display device, a function executing instruction executing a function corresponding to one of the one or more display parts, the one of the one or more display parts being specified by an instructing operation performed on the part-selecting image displayed on a display by the display device. The display device includes a display controller configured to display the part-selecting image on the display, based on part-selecting image information received from the information processing apparatus and a function executor configured to execute the function in accordance with a function executing instruction received from the information processing apparatus..
Ricoh Company, Ltd.





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Ram for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Ram with additional patents listed. Browse our RSS directory or Search for other possible listings.


0.7037

file did exist - 3432

1 - 1 - 69