At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Remote direct memory access socket aggregation
Byte utilization is improved in Remote Direct Memory Access (RDMA) communications by detecting a plurality of concurrent messages on a plurality of application...
Distributed multimedia server system, multimedia information distribution
method, and computer product
A distributed multimedia server system includes a buffer server module, a storage server module, and an intercluster connection network. Based on memory...
Managing global cache coherency in a distributed shared caching for
clustered file systems
Systems. Methods, and Computer Program Products are provided for managing a global cache coherency in a distributed shared caching for a clustered file systems...
Interpreted computer language to analyze business object data with defined
The present disclosure is directed to systems and methods including receiving a source code at a parser, the source code comprising a statement, the statement...
Human-computer interface system
A human-computer interface system which includes a computer, the computer includes a central processing unit, a first memory, a second memory, at least one...
Computer implemented method for a recycling company to increase recycling
Proposed is a computer-implemented method for a recycling company to increase recycling demand, the computer including a processor system having at least one...
System and method for speech personalization by need
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable storage media for speaker recognition personalization. The method...
Data analysis and predictive systems and related methodologies
A method, computer system, and computer memory medium optimizing a transductive model Mx suitable for use in data analysis and for determining a prognostic...
Portable computing device and method for asset management in a logistics
Systems, methods, and computer program products are provided for tracking one or more items. In one exemplary embodiment, there is provided a device for...
Apparatus and associated methods
An apparatus, the apparatus comprising at least one processor, and at least one memory including computer program code, the at least one memory and the computer...
Methods and systems for generating frictionless social experience
Methods for implementing shared experiences using mobile computing devices comprise capturing audio waves associated with a media using a built-in microphone of...
Methods, apparatus, and articles of manufacture to measure geographical
features using an image of a...
Methods, apparatus, and articles of manufacture to measure geographical features using an image of a geographical location are disclosed. An example method...
Timing error estimate of UL synchronization
The specification and drawings present a new method, apparatus and software related product (e.g., a computer readable memory) for a timing offset/error...
Parallel processing of object subtrees for multiprocessor systems
A system may include a memory that stores instructions and a processor to execute the instructions to receive data for graphical rendering and distribute a...
A small device for projecting images from a video generating device such as a computer, television receiver, or similar device onto a screen or other surface is...
Liquid crystal display device, display method, display program, and
computer readable recording medium
The liquid crystal display device (1) includes a liquid crystal panel (69) having, for each of pixels (60), a digital memory element (68) for holding an...
Image forming apparatus and image forming method
An image forming apparatus has acoustic transducers; and an image processing unit which calculates intensity of acoustic waves irradiated from regions inside a...
Mobile device for tracking evidence
A system for tagging, organizing and tracking evidence during the course of an investigation has one or more mobile communication devices that collect physical,...
Systems and methods for the tracking of evidence
A system for the tagging, organization and tracking of evidence during the course of an investigation. The system generally utilizes an onsite handheld mobile...
Detecting a return-oriented programming exploit
A method and apparatus for detecting a Return-Oriented Programming exploitation. At a computer device, a mechanism to detect a control transfer of a code...
Method and system for creating and accessing a secure storage area in a
non-volatile memory card
In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification...
Policy based application suspension and termination
In accordance with one or more aspects, an application that is to be suspended on a computing device is identified based on a policy. The policy indicates that...
Sharing virtual functions in a shared virtual memory between heterogeneous
processors of a computing platform
A computing platform may include heterogeneous processors (e.g., CPU and a GPU) to support sharing of virtual functions between such processors. In one...
Analysis of operator graph and dynamic reallocation of a resource to
An operator graph analysis mechanism analyzes an operator graph corresponding to an application for problems as the application runs, and determines potential...
Hypervisor-based server duplication system and method and storage medium
storing server duplication computer...
Disclosed herein are a server duplication system and method and a storage medium storing a server duplication computer program. The server duplication system...
Semi-automatic restructuring of offloadable tasks for accelerators
A computer implemented method entails identifying code regions in an application from which offloadable tasks can be generated by a compiler for heterogenous...
Dynamically updating code without requiring processes to restart
A method, system and computer program for dynamically updating code managed by an authorized agent. The method includes executing multiple versions of agent...
Emulation-based functional qualification
Techniques for emulation-based functional qualification are disclosed that use an emulation platform to replace simulation in mutation-based analysis. A method...
Timing delay characterization method, memory compiler and computer program
In a timing delay characterization method, a signal path between an input terminal and an output terminal of a semiconductor circuit is divided into an input...
Integrated view of network management data
In an embodiment, a method comprises: receiving a first request for network management information, the first request identifying at least one of a user, a user...
Method, device and computer program product for decoding a codeword
A method and apparatus for decoding a codeword received from a flash memory. The flash memory comprises multi-level flash memory cells, wherein each multi-level...
Methods, systems, and apparatus for tail termination of turbo decoding
Methods and apparatus for tail termination are provided that include a decoder that includes a processor configured to a forward state metric and a backward...
Management system, computer system, and method of providing information
A management system includes a plurality of analyzers; and a computer system connected to the analyzers via a network, wherein each of the analyzers comprises:...
Devices for indicating a physical layer error
A computing device for indicating a physical layer error is described. The computing device includes a processor and instructions stored in memory that is in...
Method and system for providing storage checkpointing to a group of
independent computer applications
A method and system for checkpointing at least one application in an application group. At least one full checkpoint and at least one incremental checkpoint are...
Hybrid optimized personal computer
An Optimized Personal Computer (OPC) system may be a multi-functional processing unit with ultra-low power consumption and may consist of a single chip having a...
Portable computing device with methodologies for client-side analytic data
A portable computing device with methodologies for client-side analytic data collection are described. In one embodiment, for example, a method performed by a...
Systems and methods for implementing computer security
A computer system includes memory storing an operating system. An agent executive runs within the operating system. The agent executive receives an agent...
Memory class based heap partitioning
The illustrative embodiments provide a computer implemented method, apparatus, and computer usable program code for managing a heap. The heap is partitioned...
Method and system for responding to client requests for information
maintained by storage systems
Method and system for providing information regarding a plurality of storage devices managed by a plurality of storage servers are provided. The storage space...
Systems and methods for migrating data
Various embodiments provide systems and methods for migrating data. One system includes a small computer system interface logical unit number (SCSI LUN)...
Multi-core processor system, cache coherency control method, and computer
A multi-core processor system includes a processor configured to establish coherency of shared data values stored in a cache memory accessed by a multiple...
Bypassing memory requests to a main memory
Some embodiments include a computing device with a control circuit that handles memory requests. The control circuit checks one or more conditions to determine...
Method and apparatus for selectively bypassing a cache for trace
collection in a processor
A method and apparatus for selectively bypassing a cache in a processor of a computing device are disclosed. A mechanism to provide visibility to transactions...
System and method for providing stealth memory
The described implementations relate to computer memory. One implementation provides a technique that can include providing stealth memory to an application....
System and method for auditing memory cards
A system and method for auditing memory cards. A memory card is received in a card reader in communication with a computing device. The memory card is scanned...
Shared cache module and method thereof
Shared cache modules, systems, and methods are provided herein. The shared cache module is useable with at least one initiator on a serial attached small...
Small block write operations in non-volatile memory systems
A first portion of an asymmetric memory is configured as temporary storage for application data units with sizes corresponding to a small memory block that is...
System, method and computer readable medium for generating soft
A system, a method and a non-transitory computer readable medium for generating soft information. The method may include performing a first set of read attempts...
System and method for flash memory management
A method, a computer readable medium and a system for managing flash memory. The method may include receiving multiple data sectors from an interface; writing...