Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,588,862 Distributed object storage system
A distributed object storage system has a monitoring agent and/or a maintenance agent configured to determine for each of a plurality of repair tasks the actual...
US-9,588,861 Method and apparatus for automatically identifying components to monitor in an enterprise environment
One embodiment of the present invention provides a system that facilitates automatically identifying components to monitor in an enterprise environment. During...
US-9,588,860 Systems and methods for random number generation using a fractional rate clock
Systems and methods are provided for generating a pseudo-random bit sequence at an output frequency using a clock signal operating at a first frequency that is...
US-9,588,859 Detecting circuit and related circuit detecting method
A detecting circuit includes: a testing signal generator, arranged to selectively generate a testing signal having a first signal edge or a second signal edge...
US-9,588,858 Periodic data replication
Systems and methods for replicating data from a production server to a backup server include recording at least one operation on one or more data items stored...
US-9,588,857 Raid logical stripe backup to non-volatile memory in response to raid storage device media errors
When a media error occurs on a storage device of a number of storage devices of a redundant array, the logical stripe of data affected by the media error is...
US-9,588,856 Restoring redundancy in a storage group when a storage device in the storage group fails
Provided are a system, computer program, and method for restoring redundancy in a storage group when a storage device in the storage group fails. In response to...
US-9,588,855 Management and utilization of fault domains in distributed cache systems
Fault domains are defined which reflect, either physically or virtually, the topology of a networked computing environment. These defined fault domains are then...
US-9,588,854 Systems and methods for a secondary website with mirrored content for automatic failover
Systems and methods are disclosed for providing a secondary website with content mirrored from a primary website. One method includes accessing a generated...
US-9,588,853 Automatic management of server failures
In embodiments of the invention LPARs can be run on any server in a group of servers. Upon detecting a server has failed, each LPAR then running on the failed...
US-9,588,852 Temporary pipeline marking for processor error workarounds
Embodiments include a method for temporary pipeline marking for processor error workarounds. The method includes monitoring a pipeline of a processor for an...
US-9,588,851 Locality based quorums
Disclosed are various embodiments for distributing data items within a plurality of nodes. A data item that is subject to a data item update request is updated...
US-9,588,850 Network controller failover request to reduce network outages
A system is described that includes a first network controller and a second network controller. The first controller operates as a master controller and the...
US-9,588,849 Synchronizing selected portions of data in a storage management system
Disclosed methods and systems leverage resources in a storage management system to partially synchronize primary data files based on synchronizing selected...
US-9,588,848 System and method of restoring modified data
Disclosed is a system and method for restoring modified data. An example method includes intercepting, by an activity tracking module, a request from a program...
US-9,588,847 Recovering corrupt virtual machine disks
A method and system for recovering a corrupt virtual disk is discussed. A request to recover the disk may be received. A recovery snapshot for the last...
US-9,588,846 Mobile terminal and controlling method thereof
A mobile terminal and controlling method thereof are disclosed, by which restoration and backup operations are performed for the mobile terminal. For example,...
US-9,588,845 Processor that recovers from excessive approximate computing error
A processor includes a storage configured to receive a snapshot of a state of the processor prior to performing a set of computations in an approximating...
US-9,588,844 Checkpointing systems and methods using data forwarding
In one aspect, the invention relates to a fault tolerant computing system. The system includes a primary virtual machine and a secondary virtual machine,...
US-9,588,843 System and method for transferring traditional RAID to distributed array
In one embodiment, a method includes iteratively selecting an original, unmoved stride from an original array until all original strides have been moved,...
US-9,588,842 Drive rebuild
A system and method for efficiently distributing data among multiple storage devices. A data storage array receives read and write requests from multiple client...
US-9,588,841 Using reliability information from multiple storage units and a parity storage unit to recover data for a...
Provided are a method, system, and apparatus using reliability information from multiple storage units and a parity storage unit to recover data for a failed...
US-9,588,840 Memory devices that perform masked write operations and methods of operating the same
A method of operating a memory device includes: generating an internal read command in response to a received masked write command, the internal read command...
US-9,588,839 Methods and systems for using shared logic at network devices
Methods and systems for network devices is provided. In one aspect, a network device includes a plurality of ports, where the plurality of ports are configured...
US-9,588,838 String dataflow error detection
An apparatus for comparing strings comprises a first and a second set of input registers, a matrix of comparator circuits wherein rows of the matrix correspond...
US-9,588,837 Generating a fault tree
A method, computer program product, and system that discards unneeded elements when generating a fault tree of an object to be analyzed. Configuration...
US-9,588,836 Component-level fault detection in virtualized information handling systems
Methods and systems for modular system awareness in virtualized information handling systems (IHSs) include generating, by a chassis management controller...
US-9,588,835 Enterprise level data element review systems and methodologies
An enterprise level data element review system including a data access event collection subsystem operative to collect data access event notifications relating...
US-9,588,834 Methods and apparatus for improved fault analysis
A method includes receiving a signal indicative of a value of a data point associated with a compute device at a first time. The value of the data point...
US-9,588,833 Information processing system monitoring apparatus, monitoring method, and monitoring program
Provided is a method of detecting a warning sign indicating the occurrence of a system failure targeting a plurality of varied information processing systems. A...
US-9,588,832 Data preprocessing device and method associated with a failure risk level of a target system
There are provided a data preprocessing device and a method thereof. A data preprocessing device according to an embodiment of the present disclosure includes a...
US-9,588,831 Preventing recurrence of deterministic failures
Systems, methods, and computer program products to perform an operation comprising receiving, by a management console managing a server, a request to perform an...
US-9,588,830 Local survivability in a distributed contact center environment
A system and method for local survivability in a distributed contact center environment has a first processor in a first contact center node receiving a first...
US-9,588,829 Security method and apparatus directed at removable storage devices
A method of protecting a computer against malware infection. The method includes during operation of the computer, reading master boot record code from a...
US-9,588,828 System and method for routing messages between applications
A system and method for enabling the interchange of enterprise data through an open platform is disclosed. This open platform can be based on a standardized...
US-9,588,827 Single program call message retrieval
Embodiments of the present invention provide a method, system and computer program product for single program code message retrieval for message queues. In an...
US-9,588,826 Shared virtual memory
Embodiments of the invention provide a programming model for CPU-GPU platforms. In particular, embodiments of the invention provide a uniform programming model...
US-9,588,825 System and methods of communicating events between multiple applications
A system and methods of communicating events includes detecting, on a code space of an application, an event at the application; transmitting the detected event...
US-9,588,824 System and methods of communicating events between multiple applications
A system and methods of communicating events includes detecting an event at a first embedded application, the first embedded application being embedded in an...
US-9,588,823 Adjustment of execution of tasks
A system and method for distributed computing, including executing a job of distributed computing on compute nodes. The speed of parallel tasks of the job...
US-9,588,822 Scheduler for data pipeline
Methods and systems for using a scheduler in a data pipeline are disclosed. A plurality of objects in a first layer are created, each representing a respective...
US-9,588,821 Automatic determination of required resource allocation of virtual machines
Virtual machine resources may be monitored for optimal allocation. One example method may include monitoring a virtual machine operating in a network to...
US-9,588,820 Cloud architecture recommender system using automated workload instrumentation
A method, system, and computer program product for of configuring cloud computing platforms. One such method serves for recommending alternative computing...
US-9,588,819 System and method of assigning requests to resources using constraint programming
A data model for application to a constraint programming solver is generated. The data model includes a set of data model elements. A particular data model...
US-9,588,818 Parallel computer system and method for allocating jobs to calculation nodes
A parallel computer system includes a plurality of calculation nodes and a job management apparatus to allocate jobs to the plurality of calculation nodes. The...
US-9,588,817 Scheduling method and scheduling system for assigning application to processor
A scheduling method executed by a scheduler that manages multiple processors, includes detecting based on an application information table when a first...
US-9,588,816 Performance interference model for managing consolidated workloads in QOS-aware clouds
The workload profiler and performance interference (WPPI) system uses a test suite of recognized workloads, a resource estimation profiler and influence matrix...
US-9,588,815 Architecture for data collection and event management supporting automation in service provider cloud environments
An apparatus comprises at least one processing platform implemented using at least one processing device comprising a processor coupled to a memory. The...
US-9,588,814 Fast approximate conflict detection
The present disclosure is directed to fast approximate conflict detection. A device may comprise, for example, a memory, a processor and a fast conflict...
US-9,588,813 Determining cost of service call
Computing platforms may enable clients to use services to perform data processing jobs. A given job may utilize several services in a service call pattern. Each...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.