At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods for calibrating an imager
One example discloses a method for calibrating an imager. A plurality of images of a target, each having an associated integration time, are captured at the...
Modifying captured image based on user viewpoint
An image capture system is described that includes: a first image capture device for capturing a first image, the first image capture device having a first...
Presented is a skew detection apparatus. In one form, the apparatus estimates skew based on the locations of a set of foreground content pixels or a set of edge...
Selection of a countermeasure
Examples disclose a method, executable by a processor, to assign a metric of vulnerability to a virtual machine. Based on the metric of vulnerability, the...
Security system for protecting networks from vulnerability exploits
A system for protecting networks from vulnerability exploits comprises a security engine operable to receive a packet destined for a user's network and forward...
Communication access control system
A communication access control system includes a messaging service facility and a computing system. The computing system has a permanent memory and hosts a...
A method for managing identifiers can include receiving, in an identifier management system, a request for an identifier in a computing system. The method can...
System and method for selective direct memory access
A method of selective direct memory access (DMA) in a computer system having a network interface card (NIC), a processor subsystem, and a memory accessible to...
Ingress traffic classification and prioritization with dynamic load
According to one embodiment, a method comprises an operation of determining whether an ingress control message is locally terminated control traffic on a...
Determination of whether storage domain paths for storage devices include
a common routing module
Examples disclosed herein relate to determination of whether storage domain paths for storage devices include a common routing module. Examples include...
Requesting a service from a multicast network
Services are provided via a multicast tree. A request to receive a service is received at a node. Stored information at the node is searched to identify a...
Optical polarization multiplexing using laser arrays
An optical data system and method are disclosed. An optical data system includes an array of lasers that are modulated by the plurality of modulation signals to...
Negative differential resistance device
Apparatus and methods related to negative differential resistance (NDR) are provided. An NDR device includes a spaced pair of electrodes and at least two...
Digital watermarking using saturation patterns
An example method includes dividing the image into blocks of pixels of a predefined size; for each block, selecting one of a plurality of saturation patterns...
Building a standardized web form
One embodiment is a method that builds a standardized web form that includes information extracted from multiple web forms retrieved over a web from different...
System and method for managed distribution of publication assets
A system and method is disclosed for managed distribution of publication assets. The method discloses: protecting a set of assets, retrieved from the server...
Estimating a number of unique values in a list
A method determines a number of unique values in a sample of a list of values and estimates a number of the unique values for an unsampled portion of the list...
Determining impact of virtual storage backup jobs
Systems and methods for determining impact of a backup job on virtual storage resources are disclosed. An exemplary method includes determining an estimated...
Monitoring thread starvation using stack trace sampling and based on a
total elapsed time
The present disclosure includes methods and systems for monitoring thread starvation. A number of embodiments include determining an amount of time a thread is...
Formatting system monitoring information
Embodiments disclosed herein relate to formatting system monitoring information. In one embodiment, a processor formats information related to monitoring a...
Error control coding
A data writer is described comprising: a memory to store at least one amount of source data that is to be written to a data storage medium; a processor to...
Input/output operations at a virtual block device of a storage server
Example embodiments disclosed herein relate to input/output (I/O) operations at a virtual block device of a storage server. Example embodiments include...
Recommending and installing scheduled delivery print applications
A system and method for recommending and installing scheduled delivery (SD) print applications is disclosed. In one example, one or more SD print applications...
Printer application states
In one embodiment, first data is received at a computer system from a first network-connected printer. The first data includes state data describing a state of...
Liquid inkjettable materials for three-dimensional printing
The present disclosure is drawn toward compositions, systems, and methods for printing of three-dimensional objects. In one embodiment, a liquid inkjettable...
Surface-crosslinked latex particulates
The present invention is drawn to surface-crosslinked latex particulates, corresponding latex suspensions, ink-jet inks, and methods for making the latex...
Fluid ejection system and method of controlling ejection of fluid from a
fluid ejection nozzle array
The invention relates to a fluid ejection system comprising a print head unit including a fluid ejection nozzle array, wherein the fluid ejection nozzle array...
Continuous ink supply apparatus, system and method
A continuous ink supply (CIS) apparatus, a CIS printer system and a method of CIS employ a one-way valve having a minimum negative activation pressure. The...
Fluid ejection device with two-layer tophat
In an embodiment, a fluid ejection device includes a substrate with a fluid slot, and a chamber layer over the substrate that defines a firing chamber and a...
Movement of fluid within printhead channels
In one embodiment, an actuator connected to a printhead structure is activated with a waveform to cause vibration of the structure sufficient to move fluid...
Fluid ejection device
A fluid ejection device is described. In an example, the fluid ejection device includes a substrate having a chamber formed thereon to contain a fluid. A...
Computing device displaying graphical user interface for providing
Directly transferring data between devices
A method for directly transferring data between devices includes, with a first computing system that is able to wirelessly associate with a computer network,...
Methods and apparatus for creating in-video objects for a video file include identifying a number of segments of the video file, creating a metadata file...
System and method for determining the active talkers in a video conference
The present invention describes a method of determining the active talker for display on a video conferencing system, including the steps of: for each...
System and method for controlling handling of terminating a communication
An apparatus, system, and method for facilitating communication handing of a terminating communication, terminating or originating, at a mobile station. User...
Methods and devices for implementing network policy mechanisms
Embodiments of the invention provide a network device for implementing a host-based network policy mechanism, having a port for receiving packets wherein each...
Method and apparatus to control TX/RX AMSDU size based on the negotiated
maximum transmission unit in the...
A method includes selecting upstream and downstream aggregated MAC service data unit (AMSDU) sizes for communications between a client device, an access point,...
Logical server management interface displaying real-server technologies
An administrator selects a logical server for deployment. In response, a logical-server management program displays representations of potential real-server...
Liquid drop detection using backscattered light with amplifiers
A system includes a photodetector, a first amplifier, a second amplifier, and a filter. The photodetector is to detect backscattered light from liquid drops to...
Damage detection for an anti-theft interface
An electronic device is provided, the electronic device having an anti-theft interface. If damage to the anti-theft interface is detected, the electronic device...
Providing a flexible protection model in a computer system by decoupling
protection from computer privilege level
Methods and systems for providing a flexible protection model in a computer system by decoupling protection from privilege are described. Information describing...
Visual approach to searching databases
A visual approach to searching a database includes displaying a plurality of logical rules for searching a database, narrowing a search scope in response to a...
Displaying recommended entities in a relevance map
According to an example, data pertaining to a plurality of entities recommended for a user may be accessed, in which the data identifies relationships between...
Determining file allocation based on file operations
A storage system may store files on multiple nodes. One or more logs may indicate operations performed on the files stored in the storage system and may...
Methods for configuration management using a fallback configuration
A method of configuring a network managed device in a network is described herein. A fallback configuration is determined. The fallback configuration is...
Performing recovery of a headless computer
To perform recovery of a headless computer, a direct connection is established by the headless computer with a recovery computer over a network link. After...
Notifying listeners of change events
Plural change events are associated with corresponding listeners, where the plural change events represent distinct groups of one or more changes made to a...
Optimizing execution and resource usage in large scale computing
A method for tuning workflow settings in a distributed computing workflow comprising sequential interdependent jobs includes pairing a terminal stage of a first...
Method and device for customizing software
A method of configuring software on a computer is disclosed herein. The software comprises at least one module and the computer comprises a nonvolatile storage...