Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: computer memory





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,864,616 Extending functionality of legacy services in computing system environment
Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing...
US-9,864,523 Background threshold voltage shifting using base and delta threshold voltage shift values in non-volatile memory
In one embodiment, a computer-implemented method includes determining, by a processor, after the writing of data to a non-volatile memory block, one or more...
US-9,864,519 Performing write operations in a network on a chip device
Systems and methods are provided for performing write-with-response operations in a network on a chip architecture. In response to receiving an instruction to...
US-9,863,984 Power monitoring system
The subject matter described herein is directed to a power monitoring system for managing power in a data center. In one embodiment, the power monitoring system...
US-9,862,317 Automated defrost and defog performance test system and method
A system for evaluating performance of a vehicle window defrosting/defogging apparatus includes at least one computing device having at least a processor and a...
US-9,862,212 Printer
The disclosure discloses a printer including a memory storing computer-executable instructions. In an index value detecting process, pulse count index values...
US-9,862,089 Systems and methods for allocating tasks to a plurality of robotic devices
Methods and systems for allocating tasks to robotic devices are provided. An example method includes receiving information associated with task logs for a...
US-9,860,865 Roaming encoded information reading terminal
A portable encoded information reading (EIR) terminal for incorporation in a data collection system having a host computer, a plurality of peer EIR terminals,...
US-9,860,584 Interactive television program guide with simultaneous watch and record capabilities
An interactive television program guide system is provided in which a user may use the program guide to watch one program while simultaneously recording another...
US-9,860,445 Dual node composite image system architecture
When employing a multi-node computing architecture for commercial articulated vehicles to generate a composite surround view of the vehicle, each processing...
US-9,860,371 Method, device and system of providing caller identification information to a user of a wireless device
The invention is a method, system, and computer-readable medium for gathering and communicating caller identification information on a wireless device. The...
US-9,860,341 Tailoring content to be delivered to mobile device based upon features of mobile device
A method, system and computer program product for delivering tailored specific content to a mobile device. A shim application is provided to the mobile device...
US-9,860,262 Methods and systems for encoding computer processes for malware detection
A method for encoding computer processes for malicious program detection. The method includes the steps of (a) randomly sampling a trace of system calls...
US-9,860,192 Distributed computing architecture
A system includes a plurality of servers and a border server. The border server receives a request for a transaction that can be accomplished by performing...
US-9,860,085 Signal estimator
A Least Mean Squares (LMS) polynomial estimator is disclosed. The LMS polynomial estimator may be a LMS moving window polynomial estimator capable of performing...
US-9,860,061 Methods and systems of securely storing documents on a mobile device
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field...
US-9,859,953 Systems, methods, and computer program products for identifying remote computing systems
Systems, methods, and computer program products are provided for using proximity sensing systems, such as Bluetooth low energy (LE) beacons, to uniquely...
US-9,859,925 Low-complexity flash memory data-encoding techniques using simplified belief propagation
Technologies and implementations for encoding and storing data in a solid-state memory device with a reduced number of erasures using a simplified...
US-9,859,005 Memory device
Disclosed is a method of selecting a data candidate having a maximum value from a plurality of data candidates stored in columns in a memory array. The method...
US-9,858,689 Fast and memory efficient redundant wavelet regularization with sequential cycle spinning
A computer-implemented method of performing image reconstruction with sequential cycle-spinning includes a computer system acquiring an input signal comprising...
US-9,858,637 Systems and methods for reducing motion-to-photon latency and memory bandwidth in a virtual reality system
Systems, methods, and computer programs are disclosed for reducing motion-to-photon latency and memory bandwidth in a virtual reality display system. An...
US-9,858,531 Fault tolerant scalable modular quantum computer architecture with an enhanced control of multi-mode couplings...
A modular quantum computer architecture is developed with a hierarchy of interactions that can scale to very large numbers of qubits. Local entangling quantum...
US-9,858,310 Maintaining in-memory database consistency by parallelizing persistent data and log entries
A database operation is initiated in an in-memory database that stores persistent data in a secondary storage and has at least one associated log. The database...
US-9,858,273 Speculative rendering during cache revalidation
A method may include storing, in a memory associated with a computer device, cached content associated with a document and receiving a request to access the...
US-9,858,220 Computing architecture with concurrent programmable data co-processor
A coprocessor (PL) is disclosed. The PL includes a memory router, at least one collection block that is configured to transfer data to/from the memory router,...
US-9,858,120 Modifying memory space allocation for inactive tasks
Provided are a computer program product, system, and method for modifying memory space allocation for inactive tasks. Information is maintained on computational...
US-9,857,186 System and method for long-haul trip planning for commercial vehicles transportation
A computer system for controlling operation of a vehicle travelling from a starting location to a target location includes a memory and a semiconductor-based...
US-9,855,103 Robotic device and system software, hardware and methods of use for image-guided and robot-assisted surgery
Provided herein are systems, modules and methods of using the same for in-situ real time imaging guidance of a robot during a surgical procedure. The systems...
US-9,854,654 System and method of control of a programmable lighting fixture with embedded memory
A computing device that displays graphic user interface (GUI) icons that represent index mapping of one or more functions of a firmware of a programmable...
US-9,854,168 One-pass video stabilization
A device is disclosed comprising a memory configured for holding video and a processor coupled to the memory. The memory contains computer-executable...
US-9,854,155 Determining camera auto-focus settings
A system and method of determining a tilt angle of a portable computing device using a sensor indicating gravitational pull on the device; determining the tilt...
US-9,854,101 Methods and apparatuses for echo cancellation with beamforming microphone arrays
This disclosure describes a method to manufacture a conferencing apparatus for echo cancelation with beamforming microphone arrays. This method provides a...
US-9,854,051 Using proxy devices as dynamic data relays
A local server is configured to communicate with a plurality of computing devices within a local network. The local server comprises memory for storing...
US-9,854,041 Reducing network traffic when replicating memory data across hosts
Technologies are described herein for reducing network traffic when replicating memory data across hosts. The memory data stored in a main memory of the host...
US-9,853,990 Verification of computer system prior to and subsequent to computer program installation
Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the...
US-9,853,891 System and method for facilitating communication
According to one embodiment, a system includes one or more memory units for storing an Address Resolution Protocol (ARP) table. The system further includes one...
US-9,852,449 System and method for providing advertisement data to a mobile computing device
A mobile computing device includes a processor, a display coupled to the processor, a memory coupled to the processor and configured to store user-specific...
US-9,852,383 Method and apparatus of tracking time worked in a multi-tasking environment
A method and apparatus of maintaining time information for a multi-tasking customer service agent is disclosed. One example method of operation may include...
US-9,852,305 Method for provably secure erasure of data
A method for provably secure erasure of data, performed in a memory available to one or more computing devices, includes generating prover state information...
US-9,852,296 Rollback feature
A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area...
US-9,852,288 Securing data on a computing system
The present subject matter relates to securing data on a computing system. In an example, a request to execute an application instance of the application is...
US-9,852,275 Security device, methods, and systems for continuous authentication
Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The...
US-9,852,247 Area-efficient memory mapping techniques for programmable logic devices
Various techniques are provided to implement a logical memory in programmable logic devices (PLDs) having embedded block RAMs (EBRs). For example, a...
US-9,852,231 Scalable graph propagation for knowledge expansion
Systems and methods for adding labels to a graph are disclosed. One system includes a plurality of computing devices including processors and memory storing an...
US-9,852,200 Systems and methods for restoring data files
The disclosed computer-implemented method for restoring data files may include (1) receiving a request to restore a data file to a particular point in time, (2)...
US-9,852,180 Systems and methods of accessing distributed data
According to one aspect, a computer system configured to access distributed data is provided. The system comprising a memory including a plurality of data...
US-9,852,169 Compression of tables based on occurrence of values
Methods and apparatus, including computer program products, for compression of tables based on occurrence of values. In general, a number representing an amount...
US-9,852,128 Translation validation
A method and/or computer program product validates a translation memory against terminology dictionary of a source and target language. For each source term,...
US-9,852,113 Automatic targeting of browser content to optimal rendering engine
Embodiments of the present invention provide a method, system and computer program product for content driven selection of a rendering engine. In an embodiment...
US-9,852,100 Guest-programmable location of advanced configuration and power interface (ACPI) tables in virtualized systems
A system and method are disclosed for guest-programmable relocation of system tables in a virtualized computer system. In accordance with one embodiment, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.