s Synthetic resin-made sliding bearing By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A synthetic resin-made thrust sliding bearing 1 includes a synthetic resin-made upper casing 2 which is fixed to a vehicle body side via a mounting member; a synthetic resin-made lower casing 3 which is superposed on the upper casing 2 so as to be rotatable about an axis O in a circumferential direction R relative to the upper casing 2; and a synthetic resin-made sliding bearing piece 5 disposed in a space 4 between the upper casing 2 and the lower casing 3. Full Article
s Perforated collapsible spacer By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A perforated collapsible spacer controllably takes up space between two bearings on an automotive pinion. The perforated collapsible spacer is formed from a steel sheet having longitudinal edges that are joined together in a form of a tube having longitudinal perforated sections formed in its central portion. As a pinion nut is tightened, an axial clamping force is applied to the collapsible spacer that is located between tail and head bearing cones, where the central portion of the collapsible spacer is caused to buckle, so as to adjust the final space between the bearing cones while a spring force is maintained on the bearings. Yield points of the central portion with the perforated sections that buckle, are controllable depending on the steel sheet material thickness, and the size, shape and quantity of perforations in the steel sheet. Full Article
s Tapered roller bearing resin cage and tapered roller bearing By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT There is provided a resin cage of a tapered roller bearing. The cage includes a small diameter annular portion, a large diameter annular portion, and a plurality of bar portions arranged at intervals in a circumferential direction to connect the annular portions. The bar portion has a pair of circumferentially-directed side surfaces, each having a roller guide surface, and an inner-side inner peripheral surface, a circumferential width of which is smaller on a side of the large diameter annular portion than on a side of the small diameter annular portion, and has a roller retaining region in which a radially outer side pocket width and a radially inner side pocket width between the opposed circumferentially-directed side surfaces of the adjacent bar portions are smaller than a diameter of the roller. Full Article
s Segmented bearing retainer By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A bearing cage assembly (100) comprises a plurality of discrete bridge elements (206) disposed between adjacent rolling elements (112) and coupled between first and second axially spaced cage support wire rings (102, 104) which are appropriately tensioned. Spacers (110) are disposed between adjacent bridge elements and engage the bridge elements in a piloted engagement. The bridge elements maintain a separation between rolling elements, retain the rolling elements within the bearing assembly, and function as a lubrication reservoir for grease lubricated bearings. Profiled surfaces on the bridge elements position the bearing cage assembly on at least one axial end of the rolling elements. Full Article
s Cage and thrust roller bearing including cage By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A cage, which is annular, and is used in a thrust roller bearing, includes a plurality of cage segments arranged in a circumferential direction. Each of the cage segments includes an arc portion; and a bar portion that extends radially inward from the arc portion and that maintains a circumferential interval between rollers adjacent to each other. A groove portion extending along an axial direction is formed at each of end faces of the arc portions, the end faces facing each other in the circumferential direction. In the cage, elastic bodies are inserted into the groove portions and urge the arc portions in the circumferential direction, each of the elastic bodies is disposed between the end faces facing each other, and the cage segments are connected to each other by the elastic bodies. Full Article
s Allowing inter-process communication via file system filter By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT In one embodiment, a method allows an application running in a first process to communicate with a second process. A file system filter driver receives a command from the application for a file. The file system filter driver is configured to process file system commands. The file system filter driver determines that the command is for an inter-process communication with a service running in the second process based on the command being for the file. Then, the file system filter driver sends the command to the service running in the second process where the command is processed by the service. A response from the service is received based on the command being processed by the service and the file system filter driver sends the response to the application. Full Article
s System and method for providing additional functionality to existing software in an integrated manner By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT An improved system and method are disclosed for improving functionality in software applications. In one example, the method includes a mobile device having a network interface, a processor, and a memory configured to store a plurality of instructions. The instructions include instructions for a superblock application having instructions for a function block included therein. The function block is configured to provide functions that are accessible to the superblock application via an application programming interface (API). The functions are provided within the superblock application itself and are accessible within the superblock application without switching context to another application on the mobile device. Full Article
s Administering message acknowledgements in a parallel computer By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT Administering message acknowledgements in a parallel computer that includes compute nodes, with each compute node including a processor and a messaging accelerator, includes: storing in a list, by a processor of a compute node, a message descriptor describing a message and an acknowledgement request descriptor describing a request for an acknowledgement of receipt of the message; processing, by a messaging accelerator of the compute node, the list, including transmitting, to a target compute node, the message described by the message descriptor and transmitting, to the target compute node, the request described by the acknowledgement request descriptor; receiving, by the messaging accelerator from the target compute node, an acknowledgement of receipt of the message, including notifying the processor of receipt of the acknowledgement; and removing, by the processor from the list, the message descriptor and the acknowledgment request descriptor. Full Article
s Communication among execution threads of at least one electronic device By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A method of communication in at least one electronic device is presented. In the method, a first execution thread and a second execution thread are created in the at least one electronic device. Also created is a message service for receiving messages for the first thread. A message to be transferred from the second thread to the message service of the first thread is generated. One of multiple data transfer mechanisms is selected for transferring the message from the second thread to the message service of the first thread based on a relationship between the first and second threads. This relationship may be one in which the first and second threads are executing within a single process, within different processes of the same device, or within different devices. The message is transferred to the message service of the first thread using the selected data transfer mechanism and processed in the first thread. Full Article
s Status management device, status management method, and recording medium By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A status management device is presented, the device including multiple first application units for monitoring status information indicating a status of a management target, multiple second application units for outputting first acquisition request information of the status information with identification information of the management target, a search unit for outputting a storage location corresponding to the identification information when the first acquisition request information is received from the second application unit, a request unit for outputting second acquisition request information of the status information to the first application unit corresponding to the outputted storage location, and a transmission unit for outputting the status information supplied from the first application unit in response to the second acquisition request information to the second application unit which corresponds to a request source of the first acquisition request information. Full Article
s Information output device, method, and recording medium for outputting notification information corresponding to a state of a computer By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT An information output device includes a first processor configured to execute a process to determine a type of notification information which is outputted from a computer and which notifies a state of the computer; and a second processor configured to execute a process to create a chart, in which a first coordinate axis represents time when the notification information is outputted from the computer, a second coordinate axis represents the type of the notification information, and the notification information is drawn at a corresponding position, and output the chart. Full Article
s Methods and apparatus for constructing a secure and flexible operating system By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT The present disclosure provides methods and apparatus for constructing a secure and flexible operating system. The presently disclosed system executes different user applications in different operating systems on different virtual machines. Each user application communicates with other processes via the hypertext transfer protocol (HTTP). In particular, each user application's user interface is implemented in a web browser that is running in its own operating system on its own virtual machine, and each user application interacts with the user interface by exchanging HTTP messages between the virtual machines. Full Article
s Methods for analyzing, limiting, and enhancing access to an internet API, web service, and data By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT The invention includes an API gateway server that monitors and controls the distribution of API elements from API sources to application developers based on a distribution rule set. Full Article
s Method and system for performing security monitoring on file downloading By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT The present invention discloses method and system for performing security monitoring on file downloading, and a non-transitory computer-readable medium that stores instructions for performing security monitoring on file downloading. The method includes upon detecting a file downloading operation, performing security detection on a downloaded file to determine whether the downloaded file is secure; if the downloaded file is secure, determining whether a downloading tool adopted when the file is downloaded is instant messenger (IM) software; and if the adopted downloading tool is IM software, modifying a filename extension of the downloaded file to ensure that the downloaded file is capable of being directly opened or run. Full Article
s Method and computer device for inserting attachments into electronic message By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method for inserting attachments into an electronic message is provided. The method may include searching a keyword database to determine if a content of the electronic message includes a keyword, a key phrase, or a key sentence defined in the keyword database. The method may also include applying a condition to a file database, if the determination is affirmative, so as to search for at least a candidate item. The candidate item may be presented in a menu to the user. The method may further include enabling, in response to the user's confirmation of the candidate item, the confirmed candidate item to be inserted into the electronic message automatically to become an attachment thereto. Full Article
s Web-based interaction with a local system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Systems, methods, and computer program products for facilitating web-based interaction with a local system are disclosed. Such systems, methods, and computer program products provide an approach that allows a web client within in a web browser environment to access local hardware and local software—via a web server contained in the local system—in a local computer system. In response to a user input, the web client directs local hardware and local software to perform actions (e.g., writing files and taking pictures). Information related to such actions is returned to the web client via the local web server. The local computer system may be remotely located from the web client and such returned information may be stored and/or executed at a remote site (e.g., cloud database). Security layers may be provided to authenticate the user as well as user permissions for accessing the local computer system. Full Article
s Virtual machine migration with direct physical access control By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A data processing system facilitates virtual machine migration with direct physical access control. The illustrative data processing system comprises a software-programmable trap control associated with hardware registers of a computer that selectively vectors execution control of a virtual machine (VM) between a host and a guest. The data processing system further comprises a logic which is configured for execution on the computer that programs the trap control to enable the virtual machine to directly access the hardware registers when the virtual machine is not migrated and to revoke direct access of the hardware registers in preparation for virtual machine migration. Full Article
s Message communication of sensor and other data By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A service may be provided that reads sensors, and that communicates information based on the sensor readings to applications. In one example, an operating system provides a sensor interface that allows programs that run on a machine to read the values of sensors (such as an accelerometer, light meter, etc.). A service may use the interface to read the value of sensors, and may receive subscriptions to sensor values from other programs. The service may then generate messages that contain the sensor value, and may provide these messages to programs that have subscribed to the messages. The messages may contain raw sensor data. Or, the messages may contain information that is derived from the sensor data and/or from other data. Full Article
s Method and management agent for event notifications correlation By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Methods and apparatus for correlating event notifications between agents in a management network are provided. An agent constructs a network notification in response to receiving an event notification. If the received event notification is associated with a prior notification already received and stored by the agent, a correlation attribute is added to the constructed network notification. If the received notification matches a peer agent notification category that another agent in the management network is interested in receiving, the constructed network notification is sent to the other agent. Full Article
s Apparatus and method for supporting suspend of composite network device By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT An apparatus and a method support a selective suspend mode in a driver for any one of at least two devices constituting a composite network device. When a device of the driver requests suspend mode transition, a Physical Device Object (PDO) constituting a driver of the composite network device is identified by a PDO check part. A suspend mode transition request information of the device is sent to an operating system through the PDO. When the operating system allows the suspend mode transition, a control part sends suspend mode transition indication information to the device through the PDO. Full Article
s Dependency based configuration package activation By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT An update platform is described that collectively handles driver and firmware updates for hardware resources of a computing device based on dependencies associated with the updates. The update platform may instantiate representations of each individual hardware resource as abstractions through which detection, analysis, acquisition, deployment, installation, and tracking of updates is managed. Using the representations, the update platform discovers available updates, matches configuration packages for the updates to appropriate resources, and initiates installation of the configuration packages. The update platform is further configured to recognize dependencies associated with the configuration packages. When dependencies are detected, corresponding configuration packages are marked to reflect the dependencies and activation is suspended until the dependencies are satisfied. Upon satisfaction of the dependencies, the dependencies are cleared and the configuration packages are activated. Configuration packages that are not associated with dependencies may be installed and activated “normally” at any time. Full Article
s Systems and methods for application reuse By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT System and methods are provided. In one embodiment, a system includes a master data archiver configured to store a data related to a turbomachine system and a first data collector service system configured to collect the data from the master data archiver. The system also includes a second data collector service system communicatively coupled to the first data collector system and configured to pull or to push the data from the first data collector system and a first data archiver configured to receive at least some of the data from the second data collector system. The system further includes an asset model database storing a plurality of turbomachine tags, wherein the turbomachine tags are configured to categorize the data and a data access system (DAS) configured to provide data access to the first data archiver, the asset model database, or a combination thereof. Full Article
s System and method to boost application performance by using a proxy for executing synchronous application programming interface calls By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Techniques are described for utilizing synchronous APIs which normally block callers until a result is returned. In particular, the techniques described herein enable an application or other programming construct to boost performance by executing synchronous APIs (e.g., long running time APIs) within a proxy container rather than executing the synchronous APIs in the context of the application itself. Since the proxy is a separate process or thread, the caller application is thereby released from waiting for the synchronous API call and may proceed with other processing instead of waiting for the synchronous API to return. The application may then monitor the proxy to determine whether a result has been received, such as by periodically polling the proxy. Full Article
s Information processing apparatus, method and program for writing file system metadata of plural operating systems By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT An information processing apparatus includes a transmission unit transmitting a command of a second operating system to the second operating system when receiving the command via a communication path which communicates under a control based on a first operating system, an extraction unit extracting data for the second operating system by analyzing the command transmitted from the transmission unit, and a writing unit writing the data extracted by the extraction unit as data constituting file system metadata of the second operating system. Full Article
s Routing of performance data to dependent calculators By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it. Full Article
s Propagating a diagnostic session for business transactions across multiple servers By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present technology may determine an anomaly in a portion of a distributed business application. Data can automatically be captured and analyzed for the portion of the application associated with the anomaly. By automatically capturing data for just the portion associated with the anomaly, the present technology reduces the resource and time requirements associated with other code-based solutions for monitoring transactions. In an embodiment, a method for monitoring an application may begin with detecting a diagnostic event. A diagnostic identifier may be associated with the request in response to the diagnostic event. An outgoing call may be detected at a first server associated with processing the request. The outgoing call may be modified at the first server to include the diagnostic identifier, the outgoing call with the diagnostic identifier received by a remote computer. Full Article
s Multi-source, multi-destination data transfers By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Methods, systems, and products are disclosed for multi-source, multi-destination data transfers that include identifying a plurality of destination points having destination contexts in one or more destination objects; selecting source content for transfer; displaying destination contexts for the destination points; and directing source content to at least one destination point in dependence upon the displayed destination contexts. In typical embodiments, identifying destination points includes recording each identified destination point and storing in association with each recorded destination point a copy of a destination context for each recorded destination point. Full Article
s Detouring in scripting systems By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system described herein includes a receiver component that receives third party code for execution in a host environment, wherein the third party code corresponds to a dynamic programming language, and wherein the third party code has at least one object reference to a first object that is used by the third party code. A detouring component automatically replaces the first object referenced by the third party code with a proxy object such that the third party code at runtime calls the proxy object instead of the first object. Full Article
s Batch execution of system calls in an operating system By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system and a method are disclosed for batch execution of system calls in an operating system. In one implementation, a processing device configures a system call batching buffer table in a user space of an operating system, the system call batching buffer table including a plurality of system call units, associates a system call number with the system call batching buffer table, and issues a trap instruction to a kernel of the operating system to execute at least one of the plurality of system call units, the trap instruction including the system call number. Full Article
s Methods and systems for dynamically establishing one or more connections between a software application and a cluster of message broker By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT An exemplary method includes a broker-based messaging system detecting a request provided by a software application for the software application to connect to any one of a plurality of brokers included in a cluster of brokers, dynamically identifying, in response to the request and in accordance with a connection distribution heuristic, a broker included in the cluster of brokers and that is available for connection to the software application, and attempting to establish a connection between the software application and the broker. Corresponding methods and systems are also disclosed. Full Article
s Browser window frame-to-frame communication By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Communication facilitated between frames of a browser window. Whenever a particular frame receives a message destined for a target frame from a source frame, the particular frame determines if the particular is indeed the target frame. If so, the particular frame processes the message, but if not, the particular frame determines whether the target frame has registered with the particular frame. If the target frame has registered with the particular frame, the particular frame uses a handle communicated as part of the registration to dispatch the message further towards the target frame. In some cases, this handle may be directly that of the target frame itself, in which case the particular frame communicates the message directly with the target frame. This manner of inter-frame communication may be facilitated by a unique registration process when frames come into existence. Full Article
s Retrieving service request messages from a message queue maintained by a messaging middleware tool based on the origination time of the service request message By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Systems and methods for retrieving service request messages stored in a messaging queue and received by a queue in real-time. The service request messages are retrieved using a plurality of threads that comprise at least one retrieval criteria. Service request messages may be retrieved from the message queue or retrieved as they are received by the message queue in real-time using criteria in addition to or instead of the arrival time of the service request message which may also be referred to as the put-time. Service request messages may be requested and retrieved in an iterative process wherein multiple threads execute consecutively, concurrently, or a combination of both, in order to retrieve service request messages requested by an application. Full Article
s Automated service interface optimization By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Disclosed are various embodiments for automated service interface optimization. In one embodiment, a service client and/or a service provider is reconfigured to use an optimized version of a data transfer interface, where the optimized version transfers fewer data items from the service provider to the service client. In another embodiment, service calls from a service client for multiple different data objects are aggregated into an aggregated service call for a data object. In yet another embodiment, an optimized data object is provided to a service client in response to a request for an unoptimized data object. If the service client attempts to use a data item excluded from the optimized data object, the excluded data item is then provided to the service client. Full Article
s Protecting visible data during computerized process usage By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Embodiments of the present invention provide an approach for protecting visible data during computerized process usage. Specifically, in a typical embodiment, when a computerized process is identified, a physical page key (PPK) is generated (e.g., a unique PPK may be generated for each page of data) and stored in at least one table. Based on the PPK a virtual page key (VPK) is generated and stored in at least one register. When the process is later implemented, and a request to access a set of data associated the process is received, it will be determined whether the VPK is valid (based on the PPK). Based on the results of this determination, a data access determination is made. Full Article
s System and method for event-driven live migration of multi-process applications By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, method, and computer readable medium for asynchronous live migration of applications between two or more servers. The computer readable medium includes computer-executable instructions for execution by a processing system. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. Asynchronous live migration is provided through a combination of process replication, logging, barrier synchronization, checkpointing, reliable messaging and message playback. The live migration is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. Full Article
s Asynchronous callback driven messaging request completion notification By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Through an asynchronous callback enhancement, a thread makes a non-blocking request (e.g., send, receive, I/O) to a message passing interface library, and a callback routine is associated with the request as an asynchronous callback to the thread. The callback is queued for execution in the requesting thread and so has a deterministic execution context. Callback queuing may occur in response to another thread detecting that the request is complete. Further control over callback execution is provided by state transitions which determine whether the thread is open to processing (e.g., executing) an asynchronous callback. Callback association is done by a broad or by narrow association routines. An application which has processes organized in ranks, each including a communication thread with associated callback(s), and multiple worker threads. Interruptible wait enhancements may also be present. Full Article
s Application gateway in a browser based environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An application gateway enables controlled communication between application components within a browser based environment while maintaining a level of isolation of the individual application components. A dispatching API wrapper and a listening API wrapper are registered for each of a plurality of application components. The registered API wrappers are used to send and receive communications from the associated application components. For example, a first application component can dispatch an action to a second application component via the first application component's dispatching API wrapper. The second application component can receive the action via the second application component's listening API wrapper. As another example, a first application component can dispatch an event that broadcasts a state to other application components via the first application component's dispatching API wrapper. A listening API wrapper of at least one other application component receives the state and may perform other functions dependent on the state. Full Article
s State management of operating system and applications By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and a processing device may be provided for state management of an operating system and applications. A framework may be provided for separating behaviorless state information from code or instructions for executing a method. Applications may have instances of state information derived from, or completely different from, instances of state information of an operating system. Instances of state information for an application may be layered over corresponding instances of state information of the operating system, such that the application and the operating system may have different views of the instances of the state information. At least one policy may be defined, which may include rules for resolving conflicts, information for providing a merged view of data from multiple repositories, default values for instances of data, as well as other information. In various implementations, referential integrity of state information may be guaranteed. Full Article
s OData service provisioning on top of GenIL layer By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosure generally describes computer-implemented methods, software, and systems for allowing provisioning of open data protocol (OData) services on top of a generic interaction layer (GenIL). One computer-implemented method includes receiving an OData-compliant request for data, determining a GenIL data provider to receive the OData-compliant request for data, determining the memory location of the data, requesting the data from the determined memory location, receiving the requested data from the determined memory location, converting, using at least one computer, the received data into an OData-compliant format, rendering an OData-compliant response, and transmitting the OData-compliant response. Full Article
s Interfacing between native and web applications utilizing a mobile module By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT According to one embodiment of the present disclosure, interfacing between a plurality of applications for display on a mobile device includes receiving, by an interface, a request to open a plurality of applications. The plurality of applications are associated with a plurality of business units and comprise one or more native applications and one or more web applications. A processor opens the plurality of applications in a container according to a configuration file. The processor is communicatively coupled to the interface. The container is operable to be displayed on a user interface of the mobile device. Full Article
s Dynamic rule management for kernel mode filter drivers By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for providing rules for a plurality of processes from a user mode to a kernel mode of a computer is disclosed. The method includes providing to the kernel mode a policy for at least a first process of the plurality of processes, the policy indicating at least when and/or how notifications are to be provided from the kernel mode to the user mode upon detection in the kernel mode of launching of the first process. The method further includes selecting, from the rules stored in the user mode, rules related to the launching of the first process, in response to receiving from the kernel mode a first notification in accordance with the policy, and providing the selected rules related to the launching of the first process from the user mode to at least one of the one or more filter drivers in the kernel mode. Full Article
s Inmate information center for correctional facility processing By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A platform application and methods of operation that integrate both native and third-party modules into an integrated environment on an inmate computing device is disclosed. Third-party modules or systems are applications meant to operate independent from the platform application. Information is communicated between the platform application and third-party module or system to add audit, alarm and other functions across all modules or systems controlled by the platform software. The third-party module or system is audited to allow triggering of rules that cause remedial action to be taken. Triggers can be on actions not monitored by a particular third-party module or system. Full Article
s Dispatcher framework to provide inter-application communication By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A dispatcher framework to provide non-blocking inter-application communication is disclosed. In various embodiments, a call to a service that is blocking with respect to the service is received from a calling process. The service is called on behalf of the calling process in a manner that does not require the calling process to remain blocked during at least a portion of a time during which the call to the service is performed. Full Article
s Programming language conditional event dispatcher By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and systems of monitoring events occurring in a computer system are provided. An event monitoring instruction including a condition is parsed, the event monitoring instruction expressed using syntax defined in source code, the parsing resulting in an event channel to monitor and the condition. Then execution of an application is paused. The event channel is monitored until an event occurs on the event channel. Then an event handler for the event is run in response to the event occurring on the event channel. The condition is evaluated to determine whether the condition is satisfied. Execution of the application is resumed in response to the condition being satisfied. Full Article
s Handling dynamically linked function calls with respect to program code conversion By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A technique is provided for handling dynamically linked subject function calls arranged pass subject control flow to an intermediate control structure such as a procedure linkage table, then to subject linker code for modifying link information associated with the subject function calls during translation of subject code into target code in a dynamic binary translator. The subject code for execution on a subject processor is received by a translator, and corresponding target code for execution on the target processor is generated. The translator is arranged to build a function linkage table containing an entry giving the location of each function called by the subject code, so that code can be generated by the translator in which subject function calls are associated with code for performing the function, without generating target code corresponding to the intermediate control structure. Full Article
s Use of a warning track interruption facility by a program By www.freepatentsonline.com Published On :: Tue, 04 Aug 2015 08:00:00 EDT A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. Full Article
s Providing by one program to another program access to a warning track facility By www.freepatentsonline.com Published On :: Tue, 11 Aug 2015 08:00:00 EDT A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. Full Article
s Providing by one program to another program access to a warning track facility By www.freepatentsonline.com Published On :: Tue, 11 Aug 2015 08:00:00 EDT A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. Full Article
s Use of a warning track interruption facility by a program By www.freepatentsonline.com Published On :: Tue, 18 Aug 2015 08:00:00 EDT A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup. Full Article
s Integrated business system for web based telecommunications management By www.freepatentsonline.com Published On :: Tue, 24 Nov 2015 08:00:00 EST The specification discloses a method of doing business over the public Internet, particularly, a method which enables access to legacy management tools used by a telecommunications enterprise in the management of the enterprise business to the enterprise customer, to enable the customer to more effectively manage the business conducted by the customer through the enterprise, this access being provided over the public Internet. This method of doing business is accomplished with one or more secure web servers which manage one or more secure client sessions over the Internet, each web server supporting secure communications with the client workstation; a web page backplane application capable of launching one or more management tool applications used by the enterprise. Each of the management tool applications provide a customer interface integrated within said web page which enables interactive Web/Internet based communications with the web servers; each web server, supports communication of messages entered via the integrated customer interface to one or more remote enterprise management tool application servers which interact with the enterprise management tool applications to provide associated management capabilities to the customer. Full Article