At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for peer-to-peer PCIe storage transfers
Techniques for peer-to-peer Peripheral Component Interconnect Express (PCIe) storage transfers are disclosed. In some embodiments, the techniques may be...
Various embodiments for inserting data are disclosed. One embodiment is a system that comprises a stylus device and a computing device. The stylus device...
Control device, data processing device, controller, method of controlling
thereof and computer-readable medium
A control device according to embodiments comprises a data-copying unit, a data-processing instructing unit, and a power-control unit. The data-copying unit...
Rotation detection apparatus, motor control apparatus, motor driven
apparatus, method of correcting rotation...
The rotation detection apparatus includes a rotatable member rotatable with rotation of a motor and having multiple pattern element portions in its rotational...
Apparatus, a method and a computer program for interconnecting multiple
An apparatus for interconnecting multiple computer networks, each computer network using a different protocol suite and comprising multiple nodes, the apparatus...
Edge continued evolution, improved channel request method and system
The present invention is a method and system adapted to facilitate, between a mobile station (MS) and network, an indication of support for reduced time...
Apparatus, method and computer program product providing synchronized
A method is described which provides a synchronized HO of a mobile device. The method includes receiving a HO command. A determination is made of whether the HO...
Comprehensive tsunami alert system via mobile devices
Embodiments of the present invention address deficiencies of the art in respect to navigation in GPS-enabled mobile computing devices and provide a novel and...
Augmenting physical appearance using illumination
A system for augmenting the appearance of an object including a plurality of projectors. Each projector includes a light source and a lens in optical...
Service providing apparatus, service providing system, service providing
method, and non-transitory...
A service providing apparatus includes a detection section, an acquisition section, a memory, and a notification section. The detection section detects states...
Controlling resource deployment thresholds in a distributed computer
Some embodiments disclosed herein are directed to a resource management node that controls deployment of resource nodes in a distributed computing system. The...
Managing interactions in a virtual world environment
Methods and apparatus associate a computed trust level to avatars that interact with one another in a simulated environment. The avatars may represent...
Impedance matching device
An impedance matching device includes an input port connected to a high-frequency power supply, an output port connected to a load, an impedance variable...
Nonvolatile memory device having a current limiting element
Embodiments of the invention generally include a method of forming a nonvolatile memory device that contains a resistive switching memory element that has an...
Kernel masking of DRAM defects
Systems, methods, and computer programs are disclosed for kernel masking dynamic random access memory (DRAM) defects. One such method comprises: detecting and...
Disabling a display refresh process
A method performed by a physical computing system, the method includes disabling a display refresh process of a video controller (202) of the physical computing...
Preemptive context switching
Methods, systems, and computer readable media embodiments are disclosed for preemptive context-switching of processes running on a accelerated processing...
Method, apparatus and computer readable recording medium for managing a
reference face database to improve face...
Various embodiments of the present disclosure presents a method for managing a reference face database to improve face recognition performance under a...
Method for protecting the integrity of a fixed-length data structure
One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be...
Privacy-protective data transfer
A method is performed at a computer system having one or more processors and memory storing one or more programs executed by the one or more processors. The...
Health data collection tool
A portable health data tool permits a health care provider to assimilate and display a plurality of health care data from a patient and to associate the data...
Semiconductor circuit design method, memory compiler and computer program
A method of designing a semiconductor circuit includes generating a model of the semiconductor circuit. The model includes a functional area corresponding to a...
System and method for designing irrigation systems
A computing device is described that is configured to display a graphic visualization for modeling an irrigation system, such as a center pivot irrigation...
Method and apparatus to facilitate discrete-device accelertaion of queries
on structured data
A method for parallel processing of data, including accessing a sub-graph of an execution plan for a query used for accessing a database by a host processor,...
Local bypass in memory computing
Embodiments include a method for bypassing data in an active memory device. The method includes a requestor determining a number of transfers to a grantor that...
Continuous in-memory accumulation of hardware performance counter data
In-memory accumulation of hardware counts in a computer system is carried out by continuously sending count values from full-speed hardware counter units to a...
Optimizing memory bandwidth consumption using data splitting with software
A computer processor collects information for a dominant data access loop and reference code patterns based on data reference pattern analysis, and for pointer...
Managing high-conflict cache lines in transactional memory computing
Cache lines in a computing environment with transactional memory are configurable with a coherency mode. Cache lines in full-line coherency mode are operated or...
Identifying high-conflict cache lines in transactional memory computing
Cache lines in a computing environment with transactional memory are configurable with a coherency mode and are associated with a high-conflict indicator. Cache...
Managing cache memory in a parallel processing environment
An apparatus comprises a plurality of processor cores, each comprising a computation unit and a memory. The apparatus further comprises an interconnection...
Combined rank and linear address incrementing utility for computer memory
Embodiments include a combined rank and linear memory address incrementing utility. An aspect includes an address incrementing utility suitable for...
Semiconductor memory device and computer system including the same
A semiconductor memory device includes a first memory block of a first type of memory; and a second memory block of a second type of memory having a different...
Access control for non-volatile random access memory across platform
A controller is used in a computer system to control access to an NVRAM. The computer system includes a processor coupled to a non-volatile random access memory...
Blacklisting of fault generating software code
Techniques for blacklisting of fault generating software code are provided. An example method includes receiving crash reports of a plurality of browsers, a...
Creating an operating system dump
Creating an operating system dump. A main memory of a computer system is divided into at least three contiguous memory areas, comprising a primary memory area,...
Evaluating and servicing problematic cash-handling machines
A method of tracking repeated performance problems in a machine is disclosed. The method comprises storing the faults in a computer memory, and assigning a...
Performance of emerging applications in a virtualized environment using
transient instruction streams
A method, system and computer-usable medium are disclosed for managing transient instruction streams. Transient flags are defined in Branch-and-Link (BRL)...
Systems and methods for performing hooking in a jitted environment
A computing device configured for replacing a target method in intermediate language code is described. The computing device includes a processor. The computing...
Memory system connector
According to one embodiment a memory system includes a circuit card and a separable area array connector on the circuit card. The system also includes a memory...
Scheduling of I/O in an SSD environment
A system and method for effectively scheduling read and write operations among a plurality of solid-state storage devices. A computer system comprises client...
Memory capacity expansion using a memory riser
A computing system having a memory riser sub-system. The computing system includes a motherboard with a memory module connector and a riser card inserted into...
Preventing double patterning odd cycles
A method, system or computer usable program product for preventing odd cycles caused by design modifications to a double patterning layout including utilizing a...
A fitness monitor comprises a housing, a wrist band, a motion sensor, a display, a non-transitory memory element and a processing element. The wrist band is...
Light control system, light control method and computer readable memory
A plurality of lighting devices are respectively arranged, on a ceiling surface, at a plurality of grid points of the ceiling surface partitioned in a grid...
Systems and methods for coordinating transmission of data packets based on
frame type detection in a base station
A system, method, base station, and computer program product for coordinating communication of data packets between a user device and an application server is...
Apparatus and method to allocate communication resources in a
An apparatus, system and method for providing interference cancellation and communication resource reservation limits to allocate communication resources in a...
Co-primaryspectrum sharing for 4G/5G small cell base stations with long
term fairness criteria
An apparatus includes one or more processors and one or more memories including computer program code. The one or more memories and the computer program code...
Caching at the wireless tower with remote charging services
A RAN based data processing system is configured for content caching with remote charging services. The system can include a base station that includes an...
Communication device and non-transitory computer-readable recording medium
A communication device may include an NFC interface configured to perform communication by using a NFC system and a controller. The controller may include a...
Providing electronic content to residents of controlled-environment
Systems and methods for providing electronic content and applications to residents of controlled-environment facilities are disclosed. The portable computing...