At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Coordinated reliability management of virtual machines in a virtualized
A system and methods for reliability management of virtual machines in a host system. The reliability of the host system is monitored and compared with a...
Systems and methods for controlling error reporting and resolution
Various system and method embodiments are disclosed that include using a first node to receive messages including error information from a plurality of client...
Processing batch database workload while avoiding overload
Processing batch database workload while avoiding overload. A method for efficiently processing a database workload in a computer system comprises receiving the...
System and method for printing relevant content via a cloud print service
A system and method for printing relevant content via a cloud print service upon completion of an entertainment event in media from an associated one of one or...
Mechanism that allows initiating print without being aware of the printer
In one implementation, a request for a print job for a printer having an email address is received. An identifier value for the requested print job is provided...
Zone group reassignment using storage device signatures
A method and apparatus for assigning zone groups to a storage enclosure is disclosed. When a storage enclosure is added to a switch in a fabric, a signature of...
Analyzer and method for sensing using the same
An analyzer is disclosed herein. The analyzer encompasses a substrate having a surface with a plurality of distinct V-grooves formed therein. An input flow...
Uncoated recording media
An uncoated recording medium includes a blend of hardwood and softwood chemical pulp fibers, and thermomechanical pulp (TMP) fibers, with total fiber content at...
Perfluoropolyethers as ink additives
An ink is disclosed. The ink composition includes an ink vehicle, a colorant, and a fluorosurfactant, wherein the fluorosurfactant is a polymer having the...
Printing media supportable on movable pallets
A media transport assembly includes a plurality of pallets arranged to circulate on an endless track through a print zone and a handling zone. In the print...
Ad Hoc network connection
Example disclosed herein relate to an ad hoc network connection. A first mobile device initiates a request for an ad hoc wireless local area network (WLAN)...
Prioritising data processing operations
The invention relates to a system and method for prioritizing one or more data processing operations in a computer storage system, the computer storage system...
Optical multiplexing using laser arrays
An optical data system and method are disclosed. The system can be an integrated optical data transmission system that includes an array of lasers that are...
Circuit and method for reading a resistive switching device in an array
A read circuit for sensing a resistance state of a resistive switching device in a crosspoint array utilizes a transimpedance equipotential preamplifier...
Memory module having multiple memory banks selectively connectable to a
local memory controller and an external...
A memory module includes memory banks, a local memory controller to access data in the memory banks, and an interface to an external memory controller that is...
Generating a calendar graphical visualization including pixels
representing data records containing user feedback
A calendar graphical visualization is generated that includes an arrangement of blocks including pixels representing data records containing user feedback,...
Application based on node types associated with implicit backtracking
Example embodiments disclosed herein relate to development of an application. An interface can be provided to develop an application using multiple nodes...
System and method for cable monitoring
Embodiments include methods, apparatus, and systems for cable monitoring. One embodiment includes a method that receives data from an optical transceiver...
One example discloses a data manager of a data collector (DCDM) executing on a virtual machine for managing sensitive data. The DCDM can have a conformance...
Information scanning across multiple devices
Provided are, among other things, systems, methods and techniques for scanning information across multiple different devices. In one representative system,...
An example system includes at least one memory and at least one processing device. The at least one memory comprises instructions that when executed by the at...
Detecting duplicative hierarchical sets of files
To detect duplicative hierarchically arranged sets of files in a storage system, a method includes generating, for hierarchically arranged plural sets of files,...
System having an apparatus that uses a resource on an external device
A system comprises a media player adapted to receive a removable medium. The media player is adapted to couple to a display device. A device external to and...
Storage array reservation forwarding
A method is provided for a destination storage system to join a storage area network with a source storage system. The method includes discovering a volume on...
Method of restoring backup data
An embodiment of a method of restoring backup data comprises first and second steps that preferably are executed at least partially in parallel. The first step...
Analysis of health indicators of a system
A signal from a system, such as a reactive system, that reflects health indicators of the system may be selected. A signal analyzer may extract the health...
Storing data in presistent hybrid memory
Storing data in persistent hybrid memory includes promoting a memory block from non-volatile memory to a cache based on a usage of said memory block according...
Managing processing of user requests and data replication for a mass
A technique includes determining a workload on mass storage system that is associated will user requests during a time in which mass storage system is...
Event determination can include selecting a time lag, calculating a dependency value at the time lag between event pairs within a first textual stream and a...
Configuration space with pseudo device identifier
Techniques for loading device drivers are provided. A configuration space may contain a device identifier. The configuration space may be modified by replacing...
Mapping high-performance computing applications to platforms
The mapping of High Performance Computing ("HPC") applications to platforms is provided. An HPC application characterization module determines an HPC...
Management of a virtual power infrastructure
A virtual power infrastructure for managing distribution of power to a plurality of power demanding units from a plurality of power generators includes a demand...
Fluid supply systems, methods, and articles of manufacture
Example fluid supply systems, methods and articles of manufacture are disclosed. A disclosed example fluid supply supply system includes a first receptacle to...
Computing device including a computer-generated feature set for providing
Bezel with docking recess
Land grid array socket assembly
A land grid array socket assembly comprises a plurality of cells, with each cell comprising an insulative body having a top surface, and contact conductor that...
Access to migrated tapes
A system including a tape library and a tape drive. The tape library identifies which tapes in the tape library include one or more migrated tapes. The tape...
Data transfer apparatus
A data transfer apparatus comprises drive apparatus to move a received tape along a path in a longitudinal direction of the tape, a transducer head to transfer...
Security token based user authentication in a multi-tenanted application
Systems and methods for security token based user authentication in a multi-tenanted application. An access request, from a user, is received to access at least...
Enabling security of a computer system
Enabling security of a computer system. Physical proximity of an authorized user with the computer system is detected without requiring the authorized user to...
Encrypt data of storage device
A request from a host is received requesting data from a storage device. Data of the storage device is written into a buffer of the host. The data at the buffer...
Enclosure power controller providing plurality of power control signals to
plurality of removable compute nodes...
A system and method for controlling power consumption is described herein. A computer system includes an enclosure. The enclosure is configured to contain a...
Printer event subscription
A printing device is registered at a cloud server and a secure connection is established with the printing device. A subscription packet is sent to the printing...
Data transfer in cluster storage systems
Embodiments include methods, apparatus, and systems for data transfer in storage systems. One embodiment includes a method that transmits a state of cached...
Intelligent air moving apparatus
An intelligent air moving apparatus for cooling an electronics enclosure includes a motor for driving a fan at a variable rotational speed and a microcontroller...
Apparatus for lowering and raising a pick arm
An apparatus for lowering and raising a pick arm is disclosed herein. An example of the apparatus includes a shuttle assembly having a first direction of...
An embossing apparatus comprises an embossing die comprising a printed relief pattern, and a resilient surface for pressing media against the embossing die to...
Paper enhancement treatment with decreased calcium chloride
An inkjet printable media comprises a paper base containing a surface coating comprising calcium chloride and a synergistic amount of a sulfate salt. When the...
A pressure bag for in a fluid cartridge having an opening in open connection with a channel in a wall of the fluid cartridge.