a Pneumatic tires for commercial vehicles By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A pneumatic tire for a commercial vehicle with a tread, wherein at least the part of the tread which comes into contact with the road contains a sulphur-vulcanized rubber mixture. The sulphur-vulcanized rubber mixture contains 90 to 50 phr (parts by weight, based on 100 parts by weight, of all of the rubbers in the mixture) of natural rubber, 10 to 50 phr of at least one polybutadiene having a glass transition temperature Tg of −110 to −65° C. and 5 to 50 phr of at least one aliphatic and/or aromatic hydrocarbon resin having a softening point (ring and ball to ASTM E 28) of 0 to 150° C., and a mean molecular weight Mn of less than 2000 g/mol and a polydispersity D=Mw/Mn of 1 to 5. Full Article
a Pneumatic tire By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A pneumatic tire includes first and second side members at first and second sides and a tread section between the first and second side members. The tread section has a tread pattern including a pair of main grooves extending linearly in a circumferential direction of the tire and a land section extending in the circumferential direction between the main grooves. The land section includes a sub groove extending in the circumferential direction without connecting to the main grooves, and a first sipe connecting between the sub groove and one of the main grooves. The sub groove includes a first groove section extending diagonally toward the first side at 0 to 30 degrees with respect to the circumferential direction and a second groove section connecting to the first groove section and extending diagonally toward the second side at 10 to 45 degrees with respect to the circumferential direction. Full Article
a Heavy load pneumatic tire for construction vehicles By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Side lug rows are provided at both side regions of a tread surface and are formed by a plurality of lugs defined by lug grooves opening to edges in the tread width direction, and a central block row aligned on the tire equator and formed by a plurality of blocks is disposed between positions at ¼ of the tread surface width from the tire equator. The tire has a directional tread pattern, with a designated rotation direction, formed by circumferential grooves and width direction grooves that define the blocks of the central block row and are narrow grooves with a narrower groove width than the lug grooves. The distance from the tire equator to the groove wall in each of the circumferential grooves defining the blocks is set to be larger at a leading edge of each block than at a trailing edge of each block. Full Article
a Pneumatic tire By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The pneumatic tire 1 includes a belt layer 14 that includes a circumferential reinforcing layer 145 and a pair of cross belts 142, 143. Also, the pneumatic tire 1 includes at least three or more circumferential main grooves 21 to 23 in the tread portion having groove bottoms that are convex in the groove depth direction. Also, the curvature radius RA of the groove bottom of an arbitrary first circumferential main groove 21, 22 and the curvature radius RB of the groove bottom of an arbitrary second circumferential main groove 23 have the relationship RA Full Article
a Pneumatic tire By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A pneumatic tire comprises a tread portion, at least two circumferentially and continuously extending longitudinal grooves being provided with the tread portion, a land portion divided between the longitudinal grooves, a plurality of lateral grooves being provided with the land portion, each lateral grooves with one end communicating with one of the longitudinal grooves and the other end extending toward a tire equator, the longitudinal groove with a groove wall to which lateral grooves are connected, in each section between lateral grooves adjacent to a circumferential direction of the tire, the groove wall having a protruded portion and a dent portion being formed the nearest side of the tire equator, the protruded portion inclined with respect to the circumferential direction of the tire so as to gradually reduce a width of the longitudinal groove toward at least one lateral groove. Full Article
a Pneumatic tire unit By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A pneumatic tire unit comprises a front tire to be mounted on a leading side of a vehicle, and a rear tire to be mounted on a trailing side of the vehicle. A plurality of recesses is provided in at least one tire side portion of the front tire, and a plurality of protrusions is provided on at least one tire side portion of the rear tire. A negative pressure region that can be generated at a back surface side of the vehicle is reduced and, therefore, air resistance of the vehicle is reduced and fuel economy is enhanced. Full Article
a Dependency-Aware Transformation Of Multi-Function Applications For On-Demand Execution By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT An on-demand executable system includes an application acquisition engine configured to acquire a first application that is programmed to perform a first function and a second function. An applet extractor includes a function analyzer configured to analyze the first application to identify functions that the first application is programmed to perform. The identified functions include the first function. The applet extractor includes a code analyzer configured to analyze code of the first application to identify first code segments that implement the first function. The applet extractor includes an applet packager configured to package the first code segments into a first executable. An executable request servicer is configured to, in response to a request, transmit the first executable to a user device. Full Article
a UPDATING EXTENSION IN RESPONSE TO OPENING ASSOCIATED DOCUMENT By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A non-transitory computer-readable storage medium may comprise instructions stored thereon. When executed by at least one processor, the instructions may be configured to cause a backend server to at least receive, from an administrator webserver, an extension, store the extension and an associated timestamp in a repository, the associated timestamp indicating a time at which the extension was received from the administrator webserver, receive a request for the extension from a customer webserver, the request for the extension identifying the extension, and in response to receiving the request for the extension, fetch the extension from the repository, and send the extension to the customer webserver. Full Article
a TECHNIQUE FOR EFFICIENTLY UPGRADING SOFTWARE IN A VIDEO CONTENT NETWORK By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT At a carousel origin server, an indication is obtained that at least one of a plurality of consumer premises equipment connected to a video content network requires a software upgrade. Responsive to obtaining the indication, the carousel origin server loads onto a carousel at least one image required for the software upgrade. The at least one image required for the software upgrade is broadcast from the carousel to the at least one of the plurality of consumer premises equipment, for a predetermined period. Subsequent to the predetermined period, the at least one image required for the software upgrade is removed from the carousel. Full Article
a MONITORING APPLICATION STATES FOR DEPLOYMENT DURING RUNTIME OPERATIONS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Interaction between development environments and runtime environments to ensure that underlying process components are in an acceptable state before deploying application updates. A deploy state monitor in a development environment interacts with runtime values in executing applications to manage deployment requests and states of executing applications. Full Article
a AUTOMATIC ONLINE SYSTEM UPGRADE By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Automatically upgrading a computing environment system may include automatically identifying a set of timeframes and nodes running user applications on physical machines, containers, or virtual machines (VMs) whose disruption during the identified timeframes minimally impact the user applications. The timeframes may be intelligently determined by leveraging the monitoring data obtained automatically and/or the hints supplied by the user. Full Article
a MAINTAINING DEPLOYMENT PIPELINES FOR A PRODUCTION COMPUTING SERVICE USING LIVE PIPELINE TEMPLATES By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Techniques are presented for managing a deployment pipeline using an inheritable and extensible source code template—generally referred to as a live pipeline template (LPT). As described, live pipeline templates may be used to manage deployment pipelines which, in turn, are used to launch, maintain, and update the services and systems used to host and provide computing services. Full Article
a DYNAMIC DATA DIFFERENCE GENERATION AND DISTRIBUTION By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A method of updating data may include receiving an update request from a computing device, the update request including a profile of a current set of data stored on the computing device; determining, based at least in part on the profile of the current set of data, an updated set of data is available; determining if a delta set of data has previously been generated to transform the current set of data to the updated set of data; and based on determining that the delta set of data has not been previously generated: generating the delta set of data; and transmitting an address, to the computing device, for obtaining the delta set of data by the computing device. Full Article
a SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment. Full Article
a DYNAMIC SETUP OF DEVELOPMENT ENVIRONMENTS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A computer-implemented method includes receiving a request from a user at a local machine to access a project. One or more programming languages used in the project are identified. Resource availability at the local machine is analyzed. An integrated development environment (IDE) is selected for the project, based at least in part on the one or more programming languages and the resource availability of the local machine. The IDE is provisioned automatically, by a computer processor, for the user in response to the request to access the project. Full Article
a IDENTIFYING USER MANAGED SOFTWARE MODULES By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A method for identifying user managed software modules includes: receiving a query that includes an input module name or an input address range. The method further includes, responsive to determining that the input module name or input address range of the received query is not stored in one or more data structures identifying one or more software modules that have been loaded into memory without a directed load, searching a data structure identifying software modules that have been loaded into memory via directed loads for the respective input module name or input address range. Full Article
a LOGICAL LEVEL DIFFERENCE DETECTION BETWEEN SOFTWARE REVISIONS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A comparison system includes a memory including a first compiled version and a second compiled version of a target application, at least one processor, and a comparison engine, executing on the at least one processor. The comparison engine is configured to identify a method in the first compiled version, locate the method in the second compiled version, compare the method in the first compiled version to the method in the second compiled version, and providing an indication that the method is an altered method from the first compiled version to the second compiled version of the target application. Full Article
a METHOD AND APPARATUS FOR EXECUTION OF DISTRIBUTED WORKFLOW PROCESSES By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT The system provides a method and apparatus for the dynamic distribution, deployment, and configuration of optimizable code modules for use with software workflows running on a single compute device or across a network connected grid of compute devices. The system comprises one or more collections of software and data modules stored in a content catalog, conforming to a defined interface, and having metadata conforming to a schema that enables the modules to be statically or dynamically optimized by the controlling workflow and a workflow manager. The system provides a service that enables code modules to be located, deployed, configured, and updated by the controlling workflow, the workflow manager, or a remote manager. Full Article
a MANAGING CHANGE-SET DELIVERY By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT An approach that analyzes and manages unresolved (i.e., pending, outgoing) change-sets is provided. Specifically, this approach parses the change-set into a plurality (i.e., one or more) of changes having interdependencies within a java class file to determine the impact each change may have. More specifically, a change-set management tool provides this capability. The change-set management tool includes a parsing module configured to receive an outgoing change-set and to parse the change-set into a plurality of changes having interdependencies within a java class file. The change-set management tool further comprises an evaluation module configured to evaluate an impact that each of the plurality of changes within the change-set has on source code external to the change-set in the java class file based on the interdependencies. Full Article
a MAINTAINING AND UPDATING SOFTWARE VERSIONS VIA HIERARCHY By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT The described technology is directed towards maintaining and using a version-based hierarchy of software resources (e.g., file system files) to return version-specific responses to clients. A client sends its version information with each data request, and gets back a response based upon that version. Version changes are made by maintaining the current version of each software code resource and overriding the current version with a previous version for clients as needed. The technology allows updates (e.g., for new devices and new software resource versions) to be supported by inserting resources into the resource hierarchy and moving resources therein based upon versioning. A system based on deltas is also contemplated, in which only parts of a file may be changed relative to a different version, instead of overriding the entire file. Full Article
a GENERATING AND MANAGING APPLICATIONS USING ANY NUMBER OF DIFFERENT PLATFORMS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT At least one application is received from a user. The at least one application is stored on a communication platform. A catalog is received. The catalog includes at least one service. Each service of the at least one service is associated with a platform. An indication of a selection, from the user, is received. The selection comprises a first service associated with a first platform, and a second service associated with a second platform. The first service stores the at least one application from the user. The second service runs the at least one application from the user. Responsive to receiving the indication, the at least one application is deployed to the indicated first platform. Additionally, responsive to receiving the indication, a service bridge from the communication platform to the second platform is deployed. The at least one application is run, on the first platform utilizing the service bridge. Full Article
a SYSTEM AND METHOD OF RECONSTRUCTING COMPLEX CUSTOM OBJECTS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A system and method is provided for reconstructing one or more collections of objects across platforms. More particularly, Java Annotations are used to assist a Web Services Description Language (WSDL) wizard in reconstructing a collection of objects. In implementation, the system and method parses the object types such that a wizard can recreate or reconstruct the collection of objects for use by a receiving service. The method includes reconstructing a collection using one or more annotations that document a base object of the collection. Full Article
a DYNAMICALLY IDENTIFYING PERFORMANCE ANTI-PATTERNS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Dynamically identifying performance anti-patterns in a software system is based on a set of documented symptoms that are evaluated in real-time. The evaluation is based on the observed system behavior and its comparison against the documented symptoms of different types of performance issues. Full Article
a System and Method for Production Testing of an Application By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A method includes receiving an updated application instance, a database instance, or any combination thereof, provisioning a first subset of application servers with the updated application instance or access to the updated database instance, and identifying a subset of users from a plurality of users to provide access to the updated instance for testing purposes. The method further includes authenticating users of the plurality of users, providing users of the subset of users with access to the updated instance and other users of the plurality of users with access to a production instance during a testing period, and, after the testing period, providing the other users with access to the updated instance. Full Article
a EVENT-DRIVEN SOFTWARE TESTING By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A computer implemented method of software testing may include obtaining multiple interactive elements from an event-driven software application. The interactive elements may be configured to be selected by a user and when selected result in an event in the event-driven software application. The method may also include determining which of the interactive elements may be user interactive in a first state of the event-driven software application. In some embodiments, determining which of the interactive elements may be user interactive may include obtaining one or more coordinates of a first interactive element and determining if the first interactive element is a top layer interactive element at any one of the one or more coordinates. The method may further include testing the event-driven software application based on the user interactive elements. Full Article
a METHOD FOR VERIFYING THE FUNCTIONALITIES OF A SOFTWARE INTENDED TO BE INTEGRATED INTO A CRYPTOGRAPHIC COMPONENT, SYSTEM By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT The method for validating the status of a memory of a simulator of a cryptographic component able to save data generated by a cryptographic function, includes a step carried out in the simulator including a first execution of a first cryptographic function generating: a first status of the first memory, and a first result of the first command; a step carried out in a test bench including a second execution of a second simplified cryptographic function, with the first and the second functions carrying out the same operations generating: a second status of the memory, and a second result of the second command; a step of validating including comparisons: of the first status and of the second status and of the first result and of the second result. Full Article
a IDENTIFYING USER MANAGED SOFTWARE MODULES By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A computer system for identifying user managed software modules includes program instructions for: receiving a request for a directed load of a software module into memory, wherein the request includes an address; storing the software module at the address in the received request; adding a name and an address range of the stored software module to a data structure identifying software modules that have been loaded into memory via directed loads; receiving a query that includes an input module name or an input address range; and responsive to determining that the input module name or input address range of the received query is not stored in one or more data structures identifying one or more software modules that have been loaded into memory without directed loads, searching the data structure identifying software modules that have been loaded into memory via directed loads for the respective query. Full Article
a AUTOMATIC GENERATION OF VALIDATORS TO VALIDATE DEPLOYMENT CODE USED FOR CONFIGURING SERVERS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A validation system is configured to automatically generate validators for one or more target systems. The validation system includes: a memory storing a computer process, a network interface configured to interface with the one or more target systems over a computer network, and a processor executing the computer process. The computer process is configured to parse the deployment code to identify components in deployment code, generate validator code for each identified component, and use the network interface to transmit the validator codes to the one or more target systems. Full Article
a ANALYZING DEPLOYMENT PIPELINES USED TO UPDATE PRODUCTION COMPUTING SERVICES USING A LIVE PIPELINE TEMPLATE PROCESS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Techniques are presented for managing a deployment pipeline using an inheritable and extensible source code template—generally referred to as a live pipeline template (LPT). As described, live pipeline templates may be used to manage deployment pipelines which, in turn, are used to launch, maintain, and update the services and systems used to host and provide computing services. Full Article
a SYSTEM AND METHOD FOR VALIDATING SOFTWARE DEVELOPMENT REQUIREMENTS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT System and method for validating software development requirements are disclosed. The method comprises accessing a software development requirement, extracting a plurality of tokens from the software development requirement, tagging each of the plurality of tokens to a corresponding part of speech, and deriving a pattern based on the plurality of tokens and the plurality of corresponding parts of speech. The method further comprises determining at least one of a context and a business domain of the software development requirement and identifying pre-defined rules for the plurality of tokens and pre-defined patterns for the pattern. In response to a positive identification, the software development requirement are validated by analyzing the plurality of tokens against the pre-defined rules and by analyzing the pattern against the pre-defined patterns. In response to a negative identification, a learning process is initiated based on intelligence gathered from a manual validation of the software development requirement. Full Article
a System and Method for Dynamically Composing an Integrated Open Source Stack By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT System and method for dynamically composing an integrated open source stack are disclosed. In one embodiment, the method comprises generating a stack specification. The method further comprises extracting a list of products from an open source product repository based on the stack specification and determining a product strength value for each product present in the list of product. The method further comprises generating one or more stack options comprising at least one of the products based on the product strength value and determining a stack strength value for each of the one or more stack options based on the product strength value and the user requirements. The method further comprises selecting a stack from the one or more stack options as the integrated open source stack and composing the integrated open source stack based on at least one of product metadata, adaptor metadata, or product scripts. Full Article
a GENERATION OF A DEVICE APPLICATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Examples of the disclosure enable the recalculation of device chaining in a user interface. In some examples, a first element representing a first hardware device is received at a design surface of a computing device user interface. A second element representing a second hardware device is received at the design surface. A selection of an output associated with the first element is received. A function that binds a property of the second element to a property of the output associated with the first element is automatically generated. Aspects of the disclosure enable the automatically generated function to be displayed at the design surface. Full Article
a Adaptive Function-Based Dynamic Application Extension Framework By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A mobile device includes a processor and a non-transitory computer-readable medium storing instructions. The instructions include, in response to a state of a first application being instantiated from a first state template of the first application, selecting a first function module identifier from a plurality of predetermined function module identifiers. Each predetermined function module identifier corresponds to a first function offered by the first state template. The instructions include transmitting a function module request to a developer exchange system using a wireless transceiver. The function module request includes the first function module identifier, which uniquely identifies a first function module. The instructions include receiving the first function module from the developer exchange system, storing and executing the first function module, and presenting display data generated by execution of the first function module. The display data is presented in an area reserved for the first function by the first state template. Full Article
a PARSING AND COMPILING DATA SYSTEM QUERIES By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Described are methods, systems and computer readable media for parsing and compiling data system queries. Full Article
a Technologies for native code invocation using binary analysis By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Technologies for native code invocation using binary analysis are described. A computing device for invoking native code from managed code using binary analysis receives a call from a thread executing a managed code segment to execute a native code segment. The computing device performs a binary analysis of the native code segment and generates, from the binary analysis, a complexity indicator that indicates a level of complexity of the native code segment by comparing the native code segment to at least one predefined complexity rule. Additionally, the computing device stores a status of the thread based on the complexity indicator and executes the native code segment. Other embodiments are described and claimed. Full Article
a SLOPPY FEEDBACK LOOP COMPILATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A system, method, and a computer-readable storage device for sloppy feedback loop compilation are described herein. For example, a dataflow application definition can be obtained. The dataflow application definition may include a feedback loop bounding a compute block. It may then be determined that the feedback loop is to be compiled as a sloppy feedback loop. The dataflow application can then be compiled as an executable object that pipelines the compute block of the dataflow application. Full Article
a APPLICATION PROGRAM UNINSTALLATION METHOD AND APPARATUS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Embodiments of the present application provide an application program uninstallation method and apparatus. The method comprises: receiving an uninstallation instruction for a target application program (S101); deleting a specific directory in a local device to which the target application program corresponds, according to the received uninstallation instruction (S102); extracting an identifier of the target application program (S103); searching a local pre-set directory residual database to determine whether there exist any directory data that correspond to the identifier (S104), the directory data comprising at least a directory path; if such directory data exist, deleting a directory in the local device to which the directory path found corresponds, according to the search result (S105). By applying the embodiments of the present application, when the specific directory corresponding to the uninstalled application program is deleted, other directories, other than the specific directory, to which the uninstalled application program corresponds are also deleted, so that after the uninstall of the application program is completed, file residue is avoided, and the occupation of the device storage space is reduced. Full Article
a UPDATE SYSTEM FOR LINUX OPERATING SYSTEM AND METHOD THEREOF By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT An update system for the Linux operating system and a method thereof are disclosed. In the system and method, an update program can be obtained via distributed clients, to reduce a server's loading. When updating the operating system, allocation data on a user data sector is backed up and restored, so as to complete the update for the operating system. With the present technical features, the technical effect of backing up and restoring the allocation data on the user data sector, and reducing the loading of the server can be achieved. Full Article
a SOFTWARE UPGRADE METHOD AND APPARATUS, AND DEVICE By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Embodiments of the present invention provide a software upgrade method and apparatus, and a device. The method is applied to a software upgrade of a digital television terminal and includes: obtaining a DSI table in an upgrade data stream according to location information of the upgrade data stream that is carried in an upgrade notification message, where the DSI table carries upgrade software description information; displaying the upgrade software description information and upgrade prompt information to a user if it is determined, according to the upgrade software description information, to upgrade local software; and after the user determines to upgrade software, obtaining an upgrade software mirror in the upgrade data stream, and updating the local software according to the upgrade software mirror. Full Article
a METHODS AND APPARATUS FOR SOFTWARE UPDATING By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A computer-implemented method includes receiving a restore command to restore a vehicle computing system (VCS) system state. The method further includes restoring a base system state to a known, functional state and obtaining a list of applications previously installed on the VCS. The method also includes for each application previously installed on the VCS, finding a version of the application compatible with the restored base system state. Also, the method includes installing the version of each application compatible with the restored base system state. Full Article
a DYNAMIC RECONNECT OF WORK PROCESSES IN A ZERO DOWNTIME MAINTENANCE PROCEDURE By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The disclosure generally describes methods, software, and systems, including a method for updating an application. At least one application instance of an application is managed. Each application instance is associated with a plurality of executing work processes connected with a first database schema. A bridge database schema is generated that is related to the first database schema. The bridge database schema represents a copy of the first database schema and is generated in response to initiation of an update to the application. In response to determining that the generation of the bridge database schema is complete, for each of the plurality of work processes, a commit work action performed by the particular work process is determined. In response to determining performance of the commit work action, the particular work process is connected to the bridge database schema. Full Article
a SYSTEM AND METHOD FOR CREATING AN INTEGRATED DIGITAL PLATFORM By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The embodiments herein disclose a method and a system for creating a singular platform to harness a plurality of technical capabilities in order to deliver multiple digital services such as end user device management, analytics, enterprise mobility, digital identity management, smart device management and so on by orchestrating certain service related support capabilities. The embodiments function as an interface between the user equipment and the applications that are running on several operating systems. Further, an enablement platform is created and modified for a digital ecosystem that sits on the network and user equipment to act as an interface. Essentially, a flexible and extensible API driven platform capable of seamlessly integrating multiple platforms spanning across network services and functions, analytics, device management and orchestration platforms in enabled. Full Article
a METHOD AND SYSTEM FOR CUSTOMIZING SOFTWARE By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A system facilitates modification or adaptation of a software object or platform, developed by a software developer, by a plurality of entities, each entity is assigned a hierarchical level, the lowest hierarchical level being assigned to a software developer and the highest hierarchical level being assigned to an end-user. At each level, when a modification or adaptation is implemented, a separate layer file or layer of a layer file is created and stored in a database. Subsequently, the changes of the respective layers are implemented in sequence according to the hierarchy, so that a higher hierarchical level's modifications that are in conflict with a setting of a lower hierarchical level replace the implementation of the lower hierarchical level's setting during runtime. Full Article
a DEVELOPMENT, DELIVERY, DEPLOYMENT AND OPERATION OF AN APPLICATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A system for development, deliver, deployment and operation of an application includes at least one memory including instructions on a computing device and at least one processor on the computing device. The processor is operably coupled to the at least one memory and is arranged and configured to execute the instructions that, when executed, cause the processor to implement an application within a platform associated with a namespace for the platform, where the platform is one platform of a plurality of platforms. The processor implements a descriptor having an identifier that uniquely associates the descriptor with the application, where the descriptor comprises a single file that is platform independent and that includes a plurality of namespaces and application-specific attributes for each of the namespaces to enable the application to operate on multiple different platforms using the same descriptor. Full Article
a Data valuation based on development and deployment velocity By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT One or more metrics indicative of velocity attributes associated with development and deployment of an application program are obtained. The one or more velocity metrics are stored in an application run-time environment in association with the application program and one or more data sets output by the application program. A valuation is computed for the one or more data sets based on the one or more velocity metrics. Full Article
a ASSOCIATED INFORMATION GENERATION DEVICE, ASSOCIATED INFORMATION GENERATION METHOD, AND RECORDING MEDIUM STORING ASSOCIATED INFORMATION GENERATION PROGRAM By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Provided is an associated information generation device and the like that facilitated estimates relating to a project. The associated information generation device (101) has an associated information generation unit (102) that on the basis of project information including a task identifier is associated with a change causes are associate with the proportion at which the change causes occur identifies the change cause associated with a specific task identifier contained in project information, identifies the proportion associated with the identified change cause, and generates associated information in which the identified proportion and the identified task identifier are associated. Full Article
a BOOTLOADER CONTROL VIA DEVICE IDENTIFIER By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Methods, systems, and apparatus, including computer programs encoded on computer storage media, for placing a device in a bootloader state. One of the methods includes determining, during a boot process of the apparatus, whether a device of a particular type is connected to the apparatus, in response to determining that a device of the particular type is connected to the apparatus, determining a device identifier for the device, comparing the device identifier for the device with a predetermined identifier that indicates a device to which the apparatus should provide control of the boot process to determine whether the device identifier is the same as the predetermined identifier, and in response to determining that the device identifier is the same as the predetermined identifier, maintaining the apparatus in a bootloader state to provide control of the boot process of the apparatus to the device. Full Article
a Scalable points-to analysis via multiple slicing By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A method for analyzing software with pointer analysis may include obtaining a software program, and determining a first independent program slice of the software program describing a first code segment of the software program. The method may further include determining, using a first pointer analysis objective, a first result from performing a first pointer analysis on the first independent program slice, and determining, using the first result, a first dependent program slice of the software program. The method may further include determining, using a second pointer analysis objective, a second result from performing a second pointer analysis on the first dependent program slice. The method may further include generating a report, using these results, indicating whether the software program satisfies a predetermined criterion. Full Article
a Data flow programming of computing apparatus with vector estimation-based graph partitioning By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT In various embodiments, a spectral graph partitioner (“SP”) of a graph partitioning system (“GPS”) may partition a data flow graph associated with a program into a plurality of subgraphs to be used to perform analysis or debugging. The SP may generate estimated eigenvectors for a matrix representing the graph through minimization of a function on the vectors. The SP may generate multiple eigenvectors to perform the clustering in a multi-dimensional space described by the eigenvectors. The SP may refine the clustering by repeating generation of eigenvectors to describe higher-dimensional spaces and perform further clustering. The SP may also determine quality metrics for the clusters and may stop refinement based on the quality metrics. The GPS may select between utilizing the SP or utilizing one or more other partitioners based on various factors such as, for example, graph size or quality metrics. Other embodiments may be described and/or claimed. Full Article
a PROCESSING SPECIAL REQUESTS AT DEDICATED APPLICATION CONTAINERS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Various embodiments of systems and methods to provide processing of special requests at dedicated application containers are described herein. In one aspect, an application instance is downloaded and deployed in an application runtime, at a dedicated application container, to process service requests. In another aspect, the dedicated application container starts a proxy process, independently from the application runtime to intercept incoming service requests. The regular service requests are passed by the proxy process to the application runtime for processing by the executing application instance. In yet another aspect, the proxy process executes special service requests directly to access the dedicated container landscape. Full Article