f Undercut stone bumper structure for vehicle tire groove By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A tire (10) having a tread (12) includes a plurality of laterally spaced, circumferentially extending continuous ribs (11) defining grooves (14). Each groove has oppositely facing sidewalls (20, 22) and a bottom surface (30). A first set of stone bumpers is provided with each stone bumper (18) projecting laterally from one of the sidewalls with an end (24) extending towards the other sidewall of the groove. A second set of stone bumpers is provided with each stone bumper (18') projecting from the other sidewall with an end (26) extending towards the one sidewall of the groove. Each stone bumper of the first and second sets of stone bumpers 1) is integral with the associated sidewall and with a portion of the bottom surface of the groove, and 2) includes a cutout (34) defining a surface that is spaced from and in opposing relation to the bottom surface of the groove. Full Article
f Tire comprising carcass reinforcement wires having different perviousnesses By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A tire with a radial carcass reinforcement made up of at least one layer of metal reinforcing elements, the tire comprising a crown reinforcement itself capped radially with a tread, the tread being connected to two beads via two sidewalls. At least 70% of the metal reinforcing elements of at least one layer of the carcass reinforcement are non wrapped cables which, in what is known as the air-wicking test, display a flow rate of less than 2 cm3/min, and at least 10% of the metal reinforcing elements of the at least one layer of the carcass reinforcement are cables which, in what is known as the air-wicking test, display a flow rate of greater than 4 cm3/min. Full Article
f Pneumatic tires for commercial vehicles By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A pneumatic tire for a commercial vehicle with a tread, wherein at least the part of the tread which comes into contact with the road contains a sulphur-vulcanized rubber mixture. The sulphur-vulcanized rubber mixture contains 90 to 50 phr (parts by weight, based on 100 parts by weight, of all of the rubbers in the mixture) of natural rubber, 10 to 50 phr of at least one polybutadiene having a glass transition temperature Tg of −110 to −65° C. and 5 to 50 phr of at least one aliphatic and/or aromatic hydrocarbon resin having a softening point (ring and ball to ASTM E 28) of 0 to 150° C., and a mean molecular weight Mn of less than 2000 g/mol and a polydispersity D=Mw/Mn of 1 to 5. Full Article
f Heavy load pneumatic tire for construction vehicles By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Side lug rows are provided at both side regions of a tread surface and are formed by a plurality of lugs defined by lug grooves opening to edges in the tread width direction, and a central block row aligned on the tire equator and formed by a plurality of blocks is disposed between positions at ¼ of the tread surface width from the tire equator. The tire has a directional tread pattern, with a designated rotation direction, formed by circumferential grooves and width direction grooves that define the blocks of the central block row and are narrow grooves with a narrower groove width than the lug grooves. The distance from the tire equator to the groove wall in each of the circumferential grooves defining the blocks is set to be larger at a leading edge of each block than at a trailing edge of each block. Full Article
f Dependency-Aware Transformation Of Multi-Function Applications For On-Demand Execution By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT An on-demand executable system includes an application acquisition engine configured to acquire a first application that is programmed to perform a first function and a second function. An applet extractor includes a function analyzer configured to analyze the first application to identify functions that the first application is programmed to perform. The identified functions include the first function. The applet extractor includes a code analyzer configured to analyze code of the first application to identify first code segments that implement the first function. The applet extractor includes an applet packager configured to package the first code segments into a first executable. An executable request servicer is configured to, in response to a request, transmit the first executable to a user device. Full Article
f TECHNIQUE FOR EFFICIENTLY UPGRADING SOFTWARE IN A VIDEO CONTENT NETWORK By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT At a carousel origin server, an indication is obtained that at least one of a plurality of consumer premises equipment connected to a video content network requires a software upgrade. Responsive to obtaining the indication, the carousel origin server loads onto a carousel at least one image required for the software upgrade. The at least one image required for the software upgrade is broadcast from the carousel to the at least one of the plurality of consumer premises equipment, for a predetermined period. Subsequent to the predetermined period, the at least one image required for the software upgrade is removed from the carousel. Full Article
f MONITORING APPLICATION STATES FOR DEPLOYMENT DURING RUNTIME OPERATIONS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Interaction between development environments and runtime environments to ensure that underlying process components are in an acceptable state before deploying application updates. A deploy state monitor in a development environment interacts with runtime values in executing applications to manage deployment requests and states of executing applications. Full Article
f MAINTAINING DEPLOYMENT PIPELINES FOR A PRODUCTION COMPUTING SERVICE USING LIVE PIPELINE TEMPLATES By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Techniques are presented for managing a deployment pipeline using an inheritable and extensible source code template—generally referred to as a live pipeline template (LPT). As described, live pipeline templates may be used to manage deployment pipelines which, in turn, are used to launch, maintain, and update the services and systems used to host and provide computing services. Full Article
f DYNAMIC DATA DIFFERENCE GENERATION AND DISTRIBUTION By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A method of updating data may include receiving an update request from a computing device, the update request including a profile of a current set of data stored on the computing device; determining, based at least in part on the profile of the current set of data, an updated set of data is available; determining if a delta set of data has previously been generated to transform the current set of data to the updated set of data; and based on determining that the delta set of data has not been previously generated: generating the delta set of data; and transmitting an address, to the computing device, for obtaining the delta set of data by the computing device. Full Article
f SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment. Full Article
f DYNAMIC SETUP OF DEVELOPMENT ENVIRONMENTS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A computer-implemented method includes receiving a request from a user at a local machine to access a project. One or more programming languages used in the project are identified. Resource availability at the local machine is analyzed. An integrated development environment (IDE) is selected for the project, based at least in part on the one or more programming languages and the resource availability of the local machine. The IDE is provisioned automatically, by a computer processor, for the user in response to the request to access the project. Full Article
f IDENTIFYING USER MANAGED SOFTWARE MODULES By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A method for identifying user managed software modules includes: receiving a query that includes an input module name or an input address range. The method further includes, responsive to determining that the input module name or input address range of the received query is not stored in one or more data structures identifying one or more software modules that have been loaded into memory without a directed load, searching a data structure identifying software modules that have been loaded into memory via directed loads for the respective input module name or input address range. Full Article
f LOGICAL LEVEL DIFFERENCE DETECTION BETWEEN SOFTWARE REVISIONS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A comparison system includes a memory including a first compiled version and a second compiled version of a target application, at least one processor, and a comparison engine, executing on the at least one processor. The comparison engine is configured to identify a method in the first compiled version, locate the method in the second compiled version, compare the method in the first compiled version to the method in the second compiled version, and providing an indication that the method is an altered method from the first compiled version to the second compiled version of the target application. Full Article
f METHOD AND APPARATUS FOR EXECUTION OF DISTRIBUTED WORKFLOW PROCESSES By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT The system provides a method and apparatus for the dynamic distribution, deployment, and configuration of optimizable code modules for use with software workflows running on a single compute device or across a network connected grid of compute devices. The system comprises one or more collections of software and data modules stored in a content catalog, conforming to a defined interface, and having metadata conforming to a schema that enables the modules to be statically or dynamically optimized by the controlling workflow and a workflow manager. The system provides a service that enables code modules to be located, deployed, configured, and updated by the controlling workflow, the workflow manager, or a remote manager. Full Article
f MAINTAINING AND UPDATING SOFTWARE VERSIONS VIA HIERARCHY By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT The described technology is directed towards maintaining and using a version-based hierarchy of software resources (e.g., file system files) to return version-specific responses to clients. A client sends its version information with each data request, and gets back a response based upon that version. Version changes are made by maintaining the current version of each software code resource and overriding the current version with a previous version for clients as needed. The technology allows updates (e.g., for new devices and new software resource versions) to be supported by inserting resources into the resource hierarchy and moving resources therein based upon versioning. A system based on deltas is also contemplated, in which only parts of a file may be changed relative to a different version, instead of overriding the entire file. Full Article
f GENERATING AND MANAGING APPLICATIONS USING ANY NUMBER OF DIFFERENT PLATFORMS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT At least one application is received from a user. The at least one application is stored on a communication platform. A catalog is received. The catalog includes at least one service. Each service of the at least one service is associated with a platform. An indication of a selection, from the user, is received. The selection comprises a first service associated with a first platform, and a second service associated with a second platform. The first service stores the at least one application from the user. The second service runs the at least one application from the user. Responsive to receiving the indication, the at least one application is deployed to the indicated first platform. Additionally, responsive to receiving the indication, a service bridge from the communication platform to the second platform is deployed. The at least one application is run, on the first platform utilizing the service bridge. Full Article
f SYSTEM AND METHOD OF RECONSTRUCTING COMPLEX CUSTOM OBJECTS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A system and method is provided for reconstructing one or more collections of objects across platforms. More particularly, Java Annotations are used to assist a Web Services Description Language (WSDL) wizard in reconstructing a collection of objects. In implementation, the system and method parses the object types such that a wizard can recreate or reconstruct the collection of objects for use by a receiving service. The method includes reconstructing a collection using one or more annotations that document a base object of the collection. Full Article
f DYNAMICALLY IDENTIFYING PERFORMANCE ANTI-PATTERNS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Dynamically identifying performance anti-patterns in a software system is based on a set of documented symptoms that are evaluated in real-time. The evaluation is based on the observed system behavior and its comparison against the documented symptoms of different types of performance issues. Full Article
f System and Method for Production Testing of an Application By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A method includes receiving an updated application instance, a database instance, or any combination thereof, provisioning a first subset of application servers with the updated application instance or access to the updated database instance, and identifying a subset of users from a plurality of users to provide access to the updated instance for testing purposes. The method further includes authenticating users of the plurality of users, providing users of the subset of users with access to the updated instance and other users of the plurality of users with access to a production instance during a testing period, and, after the testing period, providing the other users with access to the updated instance. Full Article
f EVENT-DRIVEN SOFTWARE TESTING By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A computer implemented method of software testing may include obtaining multiple interactive elements from an event-driven software application. The interactive elements may be configured to be selected by a user and when selected result in an event in the event-driven software application. The method may also include determining which of the interactive elements may be user interactive in a first state of the event-driven software application. In some embodiments, determining which of the interactive elements may be user interactive may include obtaining one or more coordinates of a first interactive element and determining if the first interactive element is a top layer interactive element at any one of the one or more coordinates. The method may further include testing the event-driven software application based on the user interactive elements. Full Article
f METHOD FOR VERIFYING THE FUNCTIONALITIES OF A SOFTWARE INTENDED TO BE INTEGRATED INTO A CRYPTOGRAPHIC COMPONENT, SYSTEM By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT The method for validating the status of a memory of a simulator of a cryptographic component able to save data generated by a cryptographic function, includes a step carried out in the simulator including a first execution of a first cryptographic function generating: a first status of the first memory, and a first result of the first command; a step carried out in a test bench including a second execution of a second simplified cryptographic function, with the first and the second functions carrying out the same operations generating: a second status of the memory, and a second result of the second command; a step of validating including comparisons: of the first status and of the second status and of the first result and of the second result. Full Article
f IDENTIFYING USER MANAGED SOFTWARE MODULES By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A computer system for identifying user managed software modules includes program instructions for: receiving a request for a directed load of a software module into memory, wherein the request includes an address; storing the software module at the address in the received request; adding a name and an address range of the stored software module to a data structure identifying software modules that have been loaded into memory via directed loads; receiving a query that includes an input module name or an input address range; and responsive to determining that the input module name or input address range of the received query is not stored in one or more data structures identifying one or more software modules that have been loaded into memory without directed loads, searching the data structure identifying software modules that have been loaded into memory via directed loads for the respective query. Full Article
f AUTOMATIC GENERATION OF VALIDATORS TO VALIDATE DEPLOYMENT CODE USED FOR CONFIGURING SERVERS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A validation system is configured to automatically generate validators for one or more target systems. The validation system includes: a memory storing a computer process, a network interface configured to interface with the one or more target systems over a computer network, and a processor executing the computer process. The computer process is configured to parse the deployment code to identify components in deployment code, generate validator code for each identified component, and use the network interface to transmit the validator codes to the one or more target systems. Full Article
f SYSTEM AND METHOD FOR VALIDATING SOFTWARE DEVELOPMENT REQUIREMENTS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT System and method for validating software development requirements are disclosed. The method comprises accessing a software development requirement, extracting a plurality of tokens from the software development requirement, tagging each of the plurality of tokens to a corresponding part of speech, and deriving a pattern based on the plurality of tokens and the plurality of corresponding parts of speech. The method further comprises determining at least one of a context and a business domain of the software development requirement and identifying pre-defined rules for the plurality of tokens and pre-defined patterns for the pattern. In response to a positive identification, the software development requirement are validated by analyzing the plurality of tokens against the pre-defined rules and by analyzing the pattern against the pre-defined patterns. In response to a negative identification, a learning process is initiated based on intelligence gathered from a manual validation of the software development requirement. Full Article
f System and Method for Dynamically Composing an Integrated Open Source Stack By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT System and method for dynamically composing an integrated open source stack are disclosed. In one embodiment, the method comprises generating a stack specification. The method further comprises extracting a list of products from an open source product repository based on the stack specification and determining a product strength value for each product present in the list of product. The method further comprises generating one or more stack options comprising at least one of the products based on the product strength value and determining a stack strength value for each of the one or more stack options based on the product strength value and the user requirements. The method further comprises selecting a stack from the one or more stack options as the integrated open source stack and composing the integrated open source stack based on at least one of product metadata, adaptor metadata, or product scripts. Full Article
f GENERATION OF A DEVICE APPLICATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Examples of the disclosure enable the recalculation of device chaining in a user interface. In some examples, a first element representing a first hardware device is received at a design surface of a computing device user interface. A second element representing a second hardware device is received at the design surface. A selection of an output associated with the first element is received. A function that binds a property of the second element to a property of the output associated with the first element is automatically generated. Aspects of the disclosure enable the automatically generated function to be displayed at the design surface. Full Article
f Adaptive Function-Based Dynamic Application Extension Framework By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A mobile device includes a processor and a non-transitory computer-readable medium storing instructions. The instructions include, in response to a state of a first application being instantiated from a first state template of the first application, selecting a first function module identifier from a plurality of predetermined function module identifiers. Each predetermined function module identifier corresponds to a first function offered by the first state template. The instructions include transmitting a function module request to a developer exchange system using a wireless transceiver. The function module request includes the first function module identifier, which uniquely identifies a first function module. The instructions include receiving the first function module from the developer exchange system, storing and executing the first function module, and presenting display data generated by execution of the first function module. The display data is presented in an area reserved for the first function by the first state template. Full Article
f Technologies for native code invocation using binary analysis By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Technologies for native code invocation using binary analysis are described. A computing device for invoking native code from managed code using binary analysis receives a call from a thread executing a managed code segment to execute a native code segment. The computing device performs a binary analysis of the native code segment and generates, from the binary analysis, a complexity indicator that indicates a level of complexity of the native code segment by comparing the native code segment to at least one predefined complexity rule. Additionally, the computing device stores a status of the thread based on the complexity indicator and executes the native code segment. Other embodiments are described and claimed. Full Article
f SLOPPY FEEDBACK LOOP COMPILATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A system, method, and a computer-readable storage device for sloppy feedback loop compilation are described herein. For example, a dataflow application definition can be obtained. The dataflow application definition may include a feedback loop bounding a compute block. It may then be determined that the feedback loop is to be compiled as a sloppy feedback loop. The dataflow application can then be compiled as an executable object that pipelines the compute block of the dataflow application. Full Article
f UPDATE SYSTEM FOR LINUX OPERATING SYSTEM AND METHOD THEREOF By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT An update system for the Linux operating system and a method thereof are disclosed. In the system and method, an update program can be obtained via distributed clients, to reduce a server's loading. When updating the operating system, allocation data on a user data sector is backed up and restored, so as to complete the update for the operating system. With the present technical features, the technical effect of backing up and restoring the allocation data on the user data sector, and reducing the loading of the server can be achieved. Full Article
f SOFTWARE UPGRADE METHOD AND APPARATUS, AND DEVICE By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Embodiments of the present invention provide a software upgrade method and apparatus, and a device. The method is applied to a software upgrade of a digital television terminal and includes: obtaining a DSI table in an upgrade data stream according to location information of the upgrade data stream that is carried in an upgrade notification message, where the DSI table carries upgrade software description information; displaying the upgrade software description information and upgrade prompt information to a user if it is determined, according to the upgrade software description information, to upgrade local software; and after the user determines to upgrade software, obtaining an upgrade software mirror in the upgrade data stream, and updating the local software according to the upgrade software mirror. Full Article
f METHODS AND APPARATUS FOR SOFTWARE UPDATING By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A computer-implemented method includes receiving a restore command to restore a vehicle computing system (VCS) system state. The method further includes restoring a base system state to a known, functional state and obtaining a list of applications previously installed on the VCS. The method also includes for each application previously installed on the VCS, finding a version of the application compatible with the restored base system state. Also, the method includes installing the version of each application compatible with the restored base system state. Full Article
f DYNAMIC RECONNECT OF WORK PROCESSES IN A ZERO DOWNTIME MAINTENANCE PROCEDURE By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The disclosure generally describes methods, software, and systems, including a method for updating an application. At least one application instance of an application is managed. Each application instance is associated with a plurality of executing work processes connected with a first database schema. A bridge database schema is generated that is related to the first database schema. The bridge database schema represents a copy of the first database schema and is generated in response to initiation of an update to the application. In response to determining that the generation of the bridge database schema is complete, for each of the plurality of work processes, a commit work action performed by the particular work process is determined. In response to determining performance of the commit work action, the particular work process is connected to the bridge database schema. Full Article
f SYSTEM AND METHOD FOR CREATING AN INTEGRATED DIGITAL PLATFORM By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The embodiments herein disclose a method and a system for creating a singular platform to harness a plurality of technical capabilities in order to deliver multiple digital services such as end user device management, analytics, enterprise mobility, digital identity management, smart device management and so on by orchestrating certain service related support capabilities. The embodiments function as an interface between the user equipment and the applications that are running on several operating systems. Further, an enablement platform is created and modified for a digital ecosystem that sits on the network and user equipment to act as an interface. Essentially, a flexible and extensible API driven platform capable of seamlessly integrating multiple platforms spanning across network services and functions, analytics, device management and orchestration platforms in enabled. Full Article
f METHOD AND SYSTEM FOR CUSTOMIZING SOFTWARE By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A system facilitates modification or adaptation of a software object or platform, developed by a software developer, by a plurality of entities, each entity is assigned a hierarchical level, the lowest hierarchical level being assigned to a software developer and the highest hierarchical level being assigned to an end-user. At each level, when a modification or adaptation is implemented, a separate layer file or layer of a layer file is created and stored in a database. Subsequently, the changes of the respective layers are implemented in sequence according to the hierarchy, so that a higher hierarchical level's modifications that are in conflict with a setting of a lower hierarchical level replace the implementation of the lower hierarchical level's setting during runtime. Full Article
f DEVELOPMENT, DELIVERY, DEPLOYMENT AND OPERATION OF AN APPLICATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A system for development, deliver, deployment and operation of an application includes at least one memory including instructions on a computing device and at least one processor on the computing device. The processor is operably coupled to the at least one memory and is arranged and configured to execute the instructions that, when executed, cause the processor to implement an application within a platform associated with a namespace for the platform, where the platform is one platform of a plurality of platforms. The processor implements a descriptor having an identifier that uniquely associates the descriptor with the application, where the descriptor comprises a single file that is platform independent and that includes a plurality of namespaces and application-specific attributes for each of the namespaces to enable the application to operate on multiple different platforms using the same descriptor. Full Article
f ASSOCIATED INFORMATION GENERATION DEVICE, ASSOCIATED INFORMATION GENERATION METHOD, AND RECORDING MEDIUM STORING ASSOCIATED INFORMATION GENERATION PROGRAM By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Provided is an associated information generation device and the like that facilitated estimates relating to a project. The associated information generation device (101) has an associated information generation unit (102) that on the basis of project information including a task identifier is associated with a change causes are associate with the proportion at which the change causes occur identifies the change cause associated with a specific task identifier contained in project information, identifies the proportion associated with the identified change cause, and generates associated information in which the identified proportion and the identified task identifier are associated. Full Article
f BOOTLOADER CONTROL VIA DEVICE IDENTIFIER By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Methods, systems, and apparatus, including computer programs encoded on computer storage media, for placing a device in a bootloader state. One of the methods includes determining, during a boot process of the apparatus, whether a device of a particular type is connected to the apparatus, in response to determining that a device of the particular type is connected to the apparatus, determining a device identifier for the device, comparing the device identifier for the device with a predetermined identifier that indicates a device to which the apparatus should provide control of the boot process to determine whether the device identifier is the same as the predetermined identifier, and in response to determining that the device identifier is the same as the predetermined identifier, maintaining the apparatus in a bootloader state to provide control of the boot process of the apparatus to the device. Full Article
f Data flow programming of computing apparatus with vector estimation-based graph partitioning By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT In various embodiments, a spectral graph partitioner (“SP”) of a graph partitioning system (“GPS”) may partition a data flow graph associated with a program into a plurality of subgraphs to be used to perform analysis or debugging. The SP may generate estimated eigenvectors for a matrix representing the graph through minimization of a function on the vectors. The SP may generate multiple eigenvectors to perform the clustering in a multi-dimensional space described by the eigenvectors. The SP may refine the clustering by repeating generation of eigenvectors to describe higher-dimensional spaces and perform further clustering. The SP may also determine quality metrics for the clusters and may stop refinement based on the quality metrics. The GPS may select between utilizing the SP or utilizing one or more other partitioners based on various factors such as, for example, graph size or quality metrics. Other embodiments may be described and/or claimed. Full Article
f SYSTEMS AND METHODS FOR UNIT TESTING OF FUNCTIONS ON REMOTE KERNELS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The disclosed computer-implemented method may include (1) providing a framework that includes (A) a user-space component that runs at a client site and (B) a kernel-space component that runs at a remote site, (2) identifying attributes of objects that reside at the remote site and whose addresses are unknown at the client site, (3) generating a script to test a function of a kernel running on the remote site based at least in part on the attributes, and (4) performing a remote unit testing of the function of the kernel by executing the script such that the user-space component (A) generates a message that identifies the attributes and (B) sends the message to the kernel-space component to facilitate (I) obtaining references to the objects by way of the attributes and (II) invoking the function by way of the references. Various other methods, systems, and computer-readable media are also disclosed. Full Article
f CODELESS SYSTEM AND TOOL FOR TESTING APPLICATIONS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The application code testing computing device may receive a set of instructions for testing one or more user interface pages of an application under test. The computing device may determine that the set of instructions is written in a first format, and parse the set of instructions to determine an action to perform and to determine data to use for the action to perform in response to determining that the set of instructions is written in the first format. Systems described herein may convert the determined action to perform to a second format to generate a converted action to perform and/or convert the determined data to use for the action to perform to the second format to generate converted data. The application code testing computing device may send, to an application framework, the converted action to perform and the converted data. Full Article
f SYSTEM AND METHOD FOR PREDICTING ESTIMATION OF PROJECT FACTORS IN SOFTWARE DEVELOPMENT ENVIRONMENT By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The present disclosure relates to a method for predicting estimations of project factors in software development environment. The method comprises receiving first input data including at least one type of first software development model and associated one or more first project data from a user. The method further comprises identifying one or more first software agents based on the at least one type of the first software development model. The method further comprises processing the one or more first project data using the identified one or more first software agents to identify one or more first intermediate data required for project factors estimation. The method further comprises calculating estimations of the project factors using the identified one or more first intermediate data. Full Article
f ELECTRONIC DEVICE HAVING FLEXIBLE DISPLAY AND METHOD FOR OPERATING THE ELECTRONIC DEVICE By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT An electronic device having a flexible display and a method for operating the same are provided. The method includes displaying a first graphic user interface (GUI) for character input on a flexible display and detecting a change in a bending state of the flexible display. Changing the first GUI to a second GUI based on the detected change of the bending state of the flexible display, and then displaying the second GUI. In some embodiments, the method may include determining a moved area among the first area and the second area and displaying the second GUI based on the determined moved area and the angle between the first area and the second area. Determining the moved area may include detecting a first pressure corresponding to the first area and a second pressure corresponding to the second area, and then determining the moved area based on the first and second pressures. Full Article
f METHOD OF OPERATING A DISPLAY UNIT AND A TERMINAL SUPPORTING THE SAME By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A method of operating a display unit enhances functionality of one hand control and a terminal supports the same. The method of operating the input area, output on the display unit, includes: determining whether one-hand operation mode is set; and displaying a first input module in which a key map area is displayed to be biased to a specific direction based on a center of the display unit when the one-hand operation mode is set. Full Article
f METHOD AND DEVICE FOR INPUTTING INFORMATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The present disclosure relates to a method and device for inputting information. The method includes: establishing a network connection with a relay device; obtaining input information from the relay device, wherein the input information is received at an auxiliary input terminal and is sent from the auxiliary input terminal to the relay device; and displaying the input information at an input position on a main input terminal. Full Article
f SYSTEMS AND METHODS FOR ENABLING REPLAY OF INTERNET CO-BROWSING By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Systems and methods for enabling co-browsing are provided herein. A device, such as a web server, may execute a browser application that initiates co-browsing capabilities between a host computing device and one or more guest computing devices. Activatable code is injected and/or otherwise embedded in one or more web pages. Subsequently, using the activatable code, web browser information on the host computing device is obtained and processed for display on the one or more guest computing devices. Full Article
f USER TERMINAL DEVICE, AND MODE CONVERSION METHOD AND SOUND SYSTEM FOR CONTROLLING VOLUME OF SPEAKER THEREOF By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A user terminal apparatus is disclosed. The user terminal apparatus includes a touch screen which senses a multi gesture that is performed by using at least two fingers or other input tools, and a controller which provides an individual volume control mode by which a volume of one speaker apparatus is independently controllable with respect to a volume of the remainder of a plurality of speaker apparatuses, and which is convertible into a group volume control mode in order to combine a plurality of speaker apparatuses into a group such that volumes of the plurality of speaker apparatuses can be jointly controlled in response to the multi gesture sensed via the touch screen while the individual volume control mode is provided. Full Article
f USER INTERFACES IN A COMPUTER SYSTEM By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The disclosure relates to generation of at least one second instance of a user interface presented by a first device. The first device stores data objects comprising event information associated with user interfaces presented by the first device based on data from a source of data. The first device can generate a user interface based on data from the source of data and at least one of the stored data objects. The at least one data object is communicated from the first device for use by at least one second device in generation of a second instance of the generated user interface by the at least one second device. Full Article
f METHOD AND SYSTEM FOR GENERATING AND CONTROLLING COMPOSITE USER INTERFACE CONTROL By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Embodiments of the present disclosure relate to the field of multimedia technologies and disclose methods for generating and controlling a composite user interface control and an electronic device. The method for generating a composite user interface control includes the following steps: creating at least one composite control, where the composite control includes at least two subcontrols; adding each subcontrol to the composite control; respectively setting a general attribute and a unique attribute of each subcontrol; acquiring a resource of each subcontrol and transmitting the resource to a corresponding subcontrol; and adding an event response mechanism to the composite control. In some embodiments of the present disclosure, the method for generating a composite user interface control may enable a manner for generating a user interface control to be relatively simple, which facilitates control over and modification on all user interface controls or a single user interface control on a user interface. Full Article
f TECHNIQUES FOR PROVIDING PERSONALIZED BEHAVIOR-BASED CONTENT By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Techniques for providing personalized content in substantially real time are disclosed. In one embodiment, a method for providing personalized content in substantially real time includes providing first content including a plurality of user-selectable content elements, detecting an interaction of a user with respect to the provided content including a selection by the user of one of the plurality of the user-selectable content elements displayed on a page of the first content, and providing second content in response to a request. The second content includes at least a portion of the first content modified according to the detected interaction by moving the user-selectable content element up on a page of the second content relative to a position of the content element on the page of the first content. Full Article