At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Techniques for dynamic network optimization using geolocation and network
Techniques for dynamic network optimization using geolocation and network modeling are disclosed. In one particular exemplary embodiment, the techniques may be...
System, method, and computer program for performing mobile network related
tasks based on performance data...
A system, method, and computer program product are provided for performing mobile network related tasks based on performance data acquired by an unmanned...
System and method for use in analyzing vibrations
A system for use in analyzing vibrations of an electrical machine is provided. The system includes a conversion computing device including at least one...
Browser optimization through user history analysis
The present invention relates to systems, apparatus, and methods of using real user history data to improve prefetching for a web page transaction. In one...
Systems, methods, user interfaces, and computer-readable media for
investigating potential malicious communications
A data analysis system receives potentially undesirable electronic communications and automatically groups them in computationally-efficient data clusters,...
Data link layer switch frame forwarding analysis
Systems and methods to analyze layer-2 data frame switch forwarding are provided. A first switch may be coupled to a second switch. The first switch may...
End-to-end analysis of transactions in networks with traffic-altering
In a network that includes intermediary nodes, such as WAN accelerators, that transform messages between nodes, an end-to-end path of the messages is...
Best practice analysis, migration advisor
Embodiments of the present disclosure are directed to, among other things, providing resource allocation advice, configuration recommendations, and/or migration...
Method and system for managing a writing cycle of a data in a EEPROM
An operation for writing at least one datum in at least one memory cell of the electrically erasable and programmable read-only memory type comprises at least...
Systems and user interfaces for holistic, data-driven investigation of bad
actor behavior based on clustering...
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically...
Systems and methods for providing product recommendations
Apparatuses, methods, and non-transitory computer readable medium that provide recommendations include determining personality traits of a sender and a...
Semantically aware, dynamic, multi-modal concordance for unstructured
An apparatus includes a data processing system for generating and displaying a semantic type concordance. The data processing system includes memory storing a...
Data analysis apparatus and method
The present invention relates to a heterogeneous data cluster generation apparatus and method and a data clustering method and apparatus, and more particularly,...
Method and a consistency checker for finding data inconsistencies in a
A consistency checker and (200) a method performed by a consistency checker (200) for finding inconsistencies of data posts stored in a data repository (220) is...
Method for separately executing software, apparatus, and computer-readable
The present disclosure provides method, system, and computer readable medium for shared execution of software. The present disclosure relates to method, system,...
Memory leak analysis by usage trends correlation
Tools and techniques assist developers with the detection of memory leaks by using correlation of data type memory usage trends. In particular, investigations...
Modeling and testing of interactions between components of a software
A first network connection is identified between a first software component and a second software component. First data is received from the first software...
Data center physical infrastructure threshold analysis
Analyzing one or more physical infrastructure elements of a data center by generating a plurality of outputs from a stochastic process for a set of inputs to...
SAN performance analysis tool
The present invention is directed to a method and information handling system (IHS) for improving system performance in a storage area network. An embodiment of...
Systems and methods for classifying and analyzing runtime events
A system may be able classify events that occur during the runtime of applications (e.g., exceptions). The system may receive an indication of the event and may...
Methods and apparatus for data lifecycle analysis
Methods and apparatuses to determine similarity among data lifecycles of data sets protected via a backup store having one or more storage devices are...
Results generation for state machine engines
A state machine engine includes a storage element, such as a (e.g., match) results memory. The storage element is configured to receive a result of an analysis...
Method for extracting curb of road using laser range finder and method for
localizing of mobile robot using...
The invention relates to a method for extracting a curb of a road using a laser range finder and a method for localizing of a mobile robot using curb...
Method for recording vehicle-relevant data, in particular for detecting
and for evaluating minor damage, sensor...
A method for recording vehicle-relevant data, in particular for detecting and evaluating damage to a vehicle in which structure-borne noise caused by an event,...
Hand-manipulable, ECG and acoustic, cardiography device
Compact, single-handedly manipulable, cardiography devices, structured for personal use in two, selectively different, functional-cardiography styles, enabling,...
System for collecting, analyzing, and transmitting information relevant to
When individual persons or vehicles move through a transportation network, they are likely to be both actively and passively creating information that reflects...
System and method for capacity planning for systems with multithreaded
multicore multiprocessor resources
A method for expressing a hierarchy of scalabilities in complex systems, including a discrete event simulation and an analytic model, for analysis and...
Testing an upstream path of a cable network
An apparatus and method for testing an upstream path of a cable network are disclosed. The upstream path is tested by capturing and analyzing upstream data...
Optical communication system, optical transmitter, and optical receiver
An optical communication system includes an optical transmitter, and an optical receiver connected via a transmission line to the optical transmitter, in which...
Two-stage digital down-conversion of RF pulses
A two-stage digital down-conversion device for optimal detection of varying RF pulses incorporates a front end analog to digital converter (ADC), which samples...
Room identification using acoustic features in a recording
Analysis of the audio component in multimedia data is disclosed. Rooms can be described through room impulse responses (RIR), the "fingerprint" of a specific...
Body tracking and identification system and method
A method of identifying and tracking victims of a casualty event includes separating a two-part tag into a tag portion and a container portion, each portion...
Recommendations based on usage and resource consumption data
An electronic device may generate use related information and resource consumption related information corresponding to each of used applications used in the...
Defining actions for data streams via icons
Embodiments provide visual programming constructs including icons representing conditions and actions for processing incoming data streams. A user selects icons...
Methods and systems for dependency network analysis using a multitask
learning graphical lasso objective function
Methods and systems for displaying dependencies within data and illustrating differences between a plurality of data sets are disclosed. In accordance with one...
Systems and methods for generating bookman video fingerprints
Systems and methods for replacing original media bookmarks of at least a portion of a digital media file with replacement bookmarks is described. A media...
Low power hardware algorithms and architectures for spike sorting and
A neuronal recording system featuring a large number of electrodes and a portable wireless front-end integrated circuit for signal processing for low-power...
Security data path verification
A formal verification approach verifies data access and data propagation paths in a circuit design by proving the unreachability of path cover properties of the...
Computer system vulnerability analysis apparatus and method
Apparatus and methods to evaluate computing systems' vulnerability implement a series of steps wherein a system may be selected, and a specific component...
Fingerprint analysis for anti-virus scan
Disclosed are systems and methods for fingerprint analysis for anti-virus scanning. In an embodiment, a method of scanning for infected data items is disclosed....
Data exploration combining visual inspection and analytic search
A computer device displays a graph of a data set. The computer device includes a hybrid data analysis and visualization tool to query implicit properties of...
Generic ontology based semantic business policy engine
Techniques for implementing policies. In an embodiment, first data is stored in a first data store according to a first schema. A second schema is defined based...
Electronic document retrieval and reporting using tagging analysis and/or
An approach is provided for retrieving electronic documents. The approach provides a Web-based graphical user interface that allows users to construct complex...
Data processing analysis using dependency metadata associated with error
A method, apparatus, and/or computer program product analyzes data processing. Dependency metadata, which is used for representing dependency on data among at...
Identifying gestures using gesture data compressed by PCA, principal joint
variable analysis, and compressed...
Systems and method described herein present techniques for identifying a gesture using gesture data compressed by principal joint variable analysis. A...
Data center intelligent control and optimization
Systems and methods of monitoring, analyzing, optimizing and controlling data centers and data center operations are disclosed. The system includes data...
Integrated passive and active seismic surveying using multiple arrays
Microseismic mapping using buried arrays with the integration of passive and active seismic surveys provides enhanced microseismic mapping results. The system...
Cell analyzing apparatus and cell analyzing method
A cell analyzing apparatus includes: a histogram acquirer which is configured to perform measurement of a number of nuclear stained cells, and which, by using a...
Method of toxicological evaluation, method of toxicological screening and
The present invention relates to a method of toxicological evaluation of a candidate substance on at least one tissue or organ, characterized in that it...
Method for detecting fishy water odor from air conditioner, reproducing
fishy water odor and preparing...
A method is provided that identifies the compounds contributing to fishy water odor from an air conditioner, reproduces the fishy water odor, and prepares a...