At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Extrapolating channel state information ("CSI") estimates from multiple
packets sent over different frequency...
A method for extrapolating channel state information ("CSI") estimates from multiple packets sent over different channels to generate a combined CSI estimate...
Apparatus and method of establishing optical communication channels
between a steerable array of laser emitters...
An array of light beam emitter sections comprises: a substrate having a surface divided into an array of sections; and a grouping of light emitters disposed at...
Coding for crossbar architecture
A method for encoding bits to be stored within a crossbar memory architecture performed by a physical computing system includes designating, with the physical...
Magnetic-tape drive and magnetic-tape head compatible with multiple tape
Embodiments of the present invention are directed to the design and implementation of backward-compatible magnetic tape drives (102) that are read/write...
Display diagnostics using two-dimensional barcodes
Techniques for performing diagnostics on an electronic display are described in various implementations. In one example implementation, a method may include...
System and method for ranking anomalies
Probable anomalies associated with at least one data metric may be detected across a series of windows of time series data by comparison of data to a threshold....
A method and apparatus for encoding, in a simultaneous multiple security application, independently encrypted security data elements within a single matrix of...
Rendering permissions for rendering content
A print request is received via network connection from a registered user. Content from the print request is rendered according to the registered user's...
Authenticating a replaceable printer component
A replaceable printer component includes a first memory device and a communication link. The first memory device is configured to store a first secret. The...
Monitoring for anomalies in a computing environment
A method of monitoring for anomalies in a computing environment comprises, with a processor building an anomaly detection system based on topology guided...
Identification of data objects within a computer database
Provided are, among other things, systems, methods and techniques for identifying matching objects in a computer database. In one representative technique, a...
System and method for optimizing queries
There is provided a computer-implemented method of optimizing a query. An exemplary method comprises receiving a first request from an optimizer that specifies...
Executing user-defined function on a plurality of database tuples
According to an example, in a method for executing a user-defined function on a plurality of database tuples, the user-defined function and an analysis function...
Copying a differential data store into temporary storage media in response
to a request
A plurality of differential data stores are stored in persistent storage media. In response to receiving a first request to store a particular data object, one...
System and method for error reporting in a network
A system is provided for managing error reporting in a network. The system comprises a buffer for storing traps, a timer that measures a time period and a...
Scheduling mapreduce job sets
Determining a schedule of a batch workload of MapReduce jobs is disclosed. A set of multi-stage jobs for processing in a MapReduce framework is received, for...
Capturing and restoring an appliance image
A method of capturing and restoring an appliance image is described. An appliance image comprising one or more partitions of an appliance is accessed, wherein...
Systems and methods for implementing a guest operating system on a host
One example embodiment of a system for implementing a guest operating system on a host operating system is disclosed. The computer system comprises a memory for...
Procedural concurrency graph generator
A parallel-code optimization system includes a Procedural Concurrency Graph (PCG) generator. The PCG generator produces an initial PCG of a computer program...
Inversion of control for executable extensions in a run-time environment
A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of...
Chargeback based storage recommendations for datacenters
Systems, computer readable media, and methods are provided. An example method can include classifying a plurality of storage mapping systems as a plurality of...
Rendering object icons associated with a first object icon upon detecting
fingers moving apart
A method comprises detecting two fingers touching a first object icon on a touch sensitive display and then moving in generally opposing directions. The first...
Operation mode of processor
A computing device to detect a communication protocol between the computing device and a second computing device, to identify operating parameters associated...
Interface card mount
Interface card mounts to storage device connections, systems and methods are provided. An example of the interface card mount to storage device connection...
Methods for diagnosing the condition of an electrical system
Diagnosing the condition of an electrical system includes identifying the intended operating status of the system. An electrical consumption in the system is...
Thermally actuated valve
A thermally actuated valve is provided herein. The thermally actuated valve includes a valve fitting, a valve body, and a movement control mechanism. The valve...
Sensor positioning system
A sensor positioning system including a moveable sensor holder having a following surface, the sensor holder configured to hold an optical sensor at a selected...
Fluid ejection device
A fluid ejection device includes a plurality of address lines and a fire line for communicating a fire signal. The device also includes a plurality of nozzle...
Hard drive tray device
Controlled client roaming
The present disclosure discloses a network device and method for controlled client roaming. The disclosed network device receives an update of a signal strength...
Method for detecting rogue devices operating in wireless and wired
computer network environments
A management of wireless and wired computer network environments in which rogue and other devices that may affect the performance and/or security of the...
Compressing image data
A method of compressing a digital image comprises dividing 12 the image into cells of constant physical size regardless of resolution of the image to produce...
System and method for projecting multiple image streams
One form of the present invention provides a method of displaying multiple image streams that includes providing a first plurality of image streams, processing...
Systems and methods for obtaining a resource
One example discloses a network system for obtaining a network resource for printing. The network system can comprise a system comprising a memory for storing...
Centralized configuration with dynamic distributed address management
The present disclosure discloses a network device and/or method for centralized configuration with dynamic distributed address management. The disclosed network...
Memory-mapped buffers for network interface controllers
Systems and methods for providing network interface controllers (NICs) with memory-mapped buffers are described. A processing system includes a plurality of...
System and method for dynamically allocating resources
A computer network has a number of resources. One or more trusted localization provider certifies the location of the resources. Encrypted data is closely...
Configuring devices in a secured network
An exemplary method for configuring a device to enable it to become a member of an established network comprises reading, using a portable device, a first token...
Key pair updates based on digital signature states
Example embodiments relate to updating key pairs based on digital signature states. In example embodiments, first credentials that are generated using a first...
Hybrid platform for a software defined radio
A hybrid platform for a software defined radio (SDR) includes a receive/transmit antenna, a radio frequency (RF) frontend, a baseband processor, and a SDR...
Electronic storage device mounts
In one example, a mounting device includes a single piece screwless cradle for mounting an electronic storage device to a mounting plane. A method for tool-less...
Processing image data strips
An apparatus and methods for processing image data in multi-row strips to generate print data for colorizers of a printer.
Fiducial marks on scanned image of document
A scanned image of a document includes a pair of fiducial marks, and a code mark between and at least substantially collinear with the pair of fiducial marks. A...
Distributing update information based on validated license information
Example embodiments disclosed herein relate to distributing updated execution information to a cluster of nodes. Licensing information about whether the nodes...
Expander interrupt processing
In one example in accordance with aspects of the present disclosure, an expander is provided. The expander comprises a workload scheduling module to cause the...
Sequence indicator for command communicated to a sequential access storage
A command is communicated by a computer and received by a sequential storage access device. The command includes a sequence indicator. The sequential storage...
Capacity planning for computing systems hosting multi-tier application
based on think time value and resource...
A method comprises receiving, by a workload profiler, a representative workload of a computing system under analysis. The workload profiler determines a...
Evaluating performance of workload manager based on QoS to representative
workload and usage efficiency of...
A system comprises a workload manager evaluator operable to receive a representative workload that is representative of competing workloads that share access to...
Selecting processing techniques for a data flow task
A method for data flow processing includes determining values for each of a set of parameters associated with a task within a data flow processing job, and...
A system for secure printing is disclosed herein. An example of the system includes a client that initiates a print request, creates an identifier, transmits...