Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,007,3769 Data storage device and data maintenance method thereof
The present invention provides a data storage device including a random access memory and a controller. The random access memory has a cache area. The...
US-1,007,3768 Smart migration/remediation engine
A Post Migration platform that has a Remediation Engine that checks for errors and warnings in the generated code from the source code, both in a different...
US-1,007,3767 Trace Management
Systems, methods, and computer program products for trace management in a distributed computing environment are described. A trace manager receives a request to...
US-1,007,3766 Building signatures of application flows
An example device in accordance with an aspect of the present disclosure includes a screen identification engine to identify a screen(s) of a test run, an...
US-1,007,3765 Method and system of testing software using real time replication
Method and system of testing software using real time replication. At least some illustrative examples include interacting by a human tester with a first...
US-1,007,3764 Method for instruction sequence execution analysis and visualization
Various technologies pertaining to computer-executable instruction sequence forensics are described herein. In a general embodiment, an application development...
US-1,007,3763 Touchless testing platform
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a touchless testing platform employed to, for example,...
US-1,007,3762 Debug device, debug method, and debug program
A debug device to more accurately compute current consumption or a current consumption quantity from a computer program to be executed in a mobile terminal when...
US-1,007,3761 Legacy system
An example method for creating and operating a mobile application for an existing legacy system is provided in accordance with an aspect of the present...
US-1,007,3760 System and method for troubleshooting software configuration problems using application tracing
In a general aspect, a tracer is configured to instrument an application by injecting at least one interrupt instruction at a function entry point in a memory...
US-1,007,3759 Identification and handling of nested breakpoints during debug session
Provided are techniques for identification and handling of nested breakpoints during debug session. Program code having functions, nested breakpoints, and an...
US-1,007,3758 Performance of a wrapped application
Systems, methods, and computer-readable media for securing a mobile device application using an application wrapper while preserving and/or improving...
US-1,007,3757 System and method for controlling computer performance
The computer performance control system includes a performance management unit, a performance integration unit, and an activation unit. A user initiates the...
US-1,007,3756 Optimizing a virtualized computing environment
A method and associated systems for optimizing a computing platform. A processor joins sets of configurable parameters into groups that each identifies a...
US-1,007,3755 Tracing source code for end user monitoring
Example embodiments relate to tracing source code for end user monitoring. In example embodiments, an application is monitored to obtain an interaction log,...
US-1,007,3754 Systems and methods for collecting, tracking, and storing system performance and event data for computing devices
A system is configured to track and store system and event data for various computing devices. The system is configured to associate the various computing...
US-1,007,3753 System and method to assess information handling system health and resource utilization
A method and information handling system configured to store, via a monitoring system data repository memory device, aggregate information handling system...
US-1,007,3752 Universal smart connection pad
The present invention is a pad for connecting a host device to a slave device through a slave adapter. The host may provide services to the slave, including...
US-1,007,3751 Determining cable connections in a multi-cable link
A method for determining cable connections identifies a plurality of cables connected to a link included in a first device. The method identifies a first cable...
US-1,007,3750 Serial data link measurement and simulation system
A serial data link measurement and simulation system for use on a test and measurement instrument presents on a display device. A main menu having elements...
US-1,007,3749 Fault tolerant industrial automation control system
A combination of a component-based automation framework, software-based redundancy patterns, and a distributed, reliable runtime manager, is able to detect host...
US-1,007,3748 Failover system and method of deciding master-slave relationship therefor
A failover system and a method of deciding master-slave relationship therefor are provided. The failover system includes a first electronic device, a second...
US-1,007,3747 Reducing recovery time in disaster recovery/replication setup with multitier backend storage
The first computer receives a signal that a second computer is back online after being offline, wherein the second computer was offline because of a failure....
US-1,007,3746 Method and apparatus for providing distributed checkpointing
Methods and apparatus presented herein provide distributed checkpointing in a multi-node system, such as a network of servers in a data center. When...
US-1,007,3745 Automated disaster recovery system and method
Methods and systems for recovering a host image of a client machine to a recovery machine comprise comparing a profile of a client machine of a first type to be...
US-1,007,3744 Power-down interrupt of nonvolatile dual in-line memory system
A nonvolatile memory module includes volatile memory devices; a nonvolatile memory device; and a controller suitable for backing up data stored in the volatile...
US-1,007,3743 Data storage arrangement and key distribution
In some examples, a data backup system may comprise a removable data storage item, wherein a manufacturer of the removable data storage item creates and stores...
US-1,007,3742 Manageability redundancy for micro server and clustered system-on-a-chip deployments
Technologies for providing manageability redundancy for micro server and clustered System-on-a-Chip (SoC) deployments are presented. A configurable...
US-1,007,3741 Memory system with reduced program time and method of operating the same
In one aspect of the present disclosure, there is provided a memory system comprising a memory device configured to temporarily store data therein, the data...
US-1,007,3740 Failure resiliency provisioning
Aspects of provisioning computing units based on improved failure resiliency are described. In one embodiment, an infrastructure component shared between a pair...
US-1,007,3739 Methods, apparatus and system for selective duplication of subtasks
A method for selective duplication of subtasks in a high-performance computing system includes: monitoring a health status of one or more nodes in a...
US-1,007,3738 XF erasure code for distributed storage systems
An encoding apparatus includes a processor and a communication interface operably coupled to a distributed storage system (DSS) that includes n storage device...
US-1,007,3737 Slice location identification
A method for execution by a dispersed storage and task (DST) client module includes obtaining a data identifier for slice location identification. A source name...
US-1,007,3736 Proxying slice access requests during a data evacuation
A method begins by a processing module receiving a checked write slice request from a requesting entity. The method continues by determining that locally stored...
US-1,007,3735 Seeding mechanism for error detection codes
Systems and methods are disclosed for a seeding mechanism for error detection codes. An error detection code may be generated using specifically modified seed...
US-1,007,3734 Flash memory read error recovery with soft-decision decode
An apparatus comprising a memory and a controller. The memory may be configured to store data. The controller may process a plurality of input/output requests...
US-1,007,3733 System and method for in-memory computing
A memory capable of carrying out compute-in-memory (CiM) operations is disclosed. The memory includes a matrix of bit cells having a plurality of bit cells...
US-1,007,3732 Object storage system managing error-correction-code-related data in key-value mapping information
An object storage system includes a plurality of memory devices; and a memory controller configured to, receive a value and a key from a host, the key...
US-1,007,3731 Error correction in memory
Apparatus, systems, and methods for error correction in memory are described. In one embodiment, a controller comprises logic to receive a read request from a...
US-1,007,3730 Single quorum verification of erasure coded data
Techniques described and suggested herein include various methods and systems for verifying integrity of redundancy coded data, such as erasure coded data...
US-1,007,3729 Fault management method, entity, and system
Embodiments provide a fault management method, which can implement fault reporting and processing in an NFV environment. The method includes acquiring first...
US-1,007,3728 System, method and computer-accessible medium for fault analysis driven selection of logic gates to be camouflaged
Exemplary systems, methods and computer-accessible mediums can be provided that can, for example, determine a camouflaging location(s) of the logic gate(s)...
US-1,007,3727 Heap management for memory corruption detection
Memory corruption detection technologies are described. A method can include receiving, from the application, an allocation request for an allocation of one or...
US-1,007,3726 Detection of outage in cloud based service using usage data based error signals
Outage detection in a cloud based service is provided using usage data based error signals. Usage data is collected from component of the cloud based service or...
US-1,007,3725 Distributed input/output virtualization
The present disclosure includes apparatuses and methods related to distributed input/output (I/O) virtualization. A number of embodiments include an apparatus...
US-1,007,3724 Method of intuition generation
An apparatus and a method are disclosed herein for improving predictive and preventive analytics, event tracking and processing of large combinations of data....
US-1,007,3723 Dynamic range-based messaging
Methods and systems for dynamic range-based messaging may include one or more processors configured to implement a dynamic range-based messaging system...
US-1,007,3722 Extensible system action for sharing while remaining in context
An operating system provides an extensible share action to broker content sharing between applications executing on a computing platform such as a personal...
US-1,007,3721 Non-blocking writes to file data
Techniques and systems are disclosed for implementing non-blocking writes to eliminate the fetch-before-write requirement by creating an in-memory patch for the...
US-1,007,3720 Restricted application visibility
Disclosed are various examples of providing a secured application launcher for initiating execution of access-restricted applications. A computer disables a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.