Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

42218 results about "Computer equipment" patented technology

Your desktop or laptop computer is the cornerstone of your computer equipment; it includes internal components your computer requires to function and ports to attach peripherals that work in tandem with the computer. Computer equipment also includes peripherals that depend on a computer to operate properly.

Method and apparatus for managing digital media content

Various aspects and embodiments are directed to a streamlined computer device and a graphical user interface that organizes interface elements into views of computer content for presentation to a user. Various views of digital media content permits users to easily and efficiently access various digital media content. Different views are used to provide an interface that is responsive to configurations of the device and responsive to activity being performed by the user. Aspects include permitting the user to maintain and manage digital media content libraries. According to some embodiments, the libraries comprise user digital media content and references digital media content. Functionality provided to a user can be tailored to the type of content displayed, accessed and / or managed. According to various aspects, methods and systems are provided for accessing and managing digital media libraries on a streamlined computing device with a plurality selectable I / O profiles. According to some embodiments, the methods may include displaying a GUI on a device, wherein the GUI comprises at least a plurality of views of digital media content, providing for transition between the plurality of views in response to selection of an I / O profile and in response to activation of a view selector component by a user, executing an association with the at least one of the plurality of visual representations with digital media content in response to selection, transitioning a display on the computing device to a view of the digital media content, and providing for display of user digital media content and referenced digital media content in the view of the digital media content.
Owner:LITL

Methods and apparatus for implementing a virtualized computer system

In one aspect, a method of creating a virtualized computer environment that represents a real world computer environment is provided. The real world computer environment comprises a plurality of components, the plurality of components comprising a plurality of computer devices and at least one network device that implements a network that interconnects the plurality of computer devices, the real world computer environment comprising at least one security facility that implements at least one security function in the real world computer environment. The method comprises acts of including in the virtualized computer environment a virtualized representation of at least one of the plurality of computer devices in the real world computer environment and implementing the at least one security function in the virtualized computer environment. In another aspect, a virtualized representation of the at least one network device is provided. In another aspect, software is executed in the virtual computer environment.
Owner:MICROSOFT TECH LICENSING LLC

Blockchain-based cross-chain interconnection method, device and system

The invention provides a blockchain-based cross-chain interconnection method, a blockchain-based cross-chain interconnection system, computer equipment and a computer readable storage medium, and relates to the technical field of information processing. The system comprises a cross-chain gateway node and a plurality of service chains, each service chain comprises an authority management node, a gateway node and a plurality of verification nodes, and the gateway node in the plurality of service chains and the cross-chain gateway node form a cross-chain gateway; and the cross-chain gateway is used for realizing message format standardization and a cross-chain conversion protocol among the plurality of service chains so as to promote adaptation and forwarding of cross-chain messages, support error processing of request message timeout during cross-chain interconnection and finally realize mutual access and intercommunication of cross-chain data. Mutual access among the alliance chains of a plurality of different block chain technologies is achieved by introducing the bridging gateway chain, the problem of information island among a plurality of block chain systems is solved, and application and popularization of the block chain technology can be accelerated.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

System and method for gathering, personalized rendering, and secure telephonic transmission of audio data

An audio information delivery system collects electronic data via Internet or other conveyance, and responsive to customer inquiries, selectively retrieves data from local stores in areas of interest to the inquiring customers, formats the data, and transmits the data in audio form to the customers via their telephones. Initially, an information delivery agency makes advance arrangements with remotely located content providers to repeatedly obtain information of prescribed character. Agency computers continually gather digitally stored audio and text information from the predefined content providers and assemble the gathered information into a universal database. Separately, the agency enrolls a number of individual customers, which includes obtaining each customer's preferences regarding information content and playback order. Responsive to a telephone call from a registered customer, agency's computers retrieve the caller's pre-stored preferences and proceed to identify information in the universal database that pertains to the caller's subject matter preferences. After preparing vocalizations of the text information, agency computer equipment audibly presents the audio information and vocalizations to the caller in predetermined order via the caller's telephone connection. This is achieved, for example, by using an intermediate telephone network such as a wireless carrier network.
Owner:ORACLE INT CORP

Cellular telephone interactive wagering system

Systems and processes for interactive wagering are provided. A cellular telephone or handheld computing device may be used to access an interactive wagering service. Television equipment and computer equipment may be used to access the service. A user may view information on wagers such as current odds and other racing data for horses or other runners on the cellular telephone or other device. The user may create a corresponding off-track wager with the cellular telephone or other device that may be sent to a transaction processing and subscription management system. The transaction processing and subscription management system may handle the wager transaction and adjust the user's account balance.
Owner:ODS PROPERTIES

System and method for efficient allocation of resources in virtualized desktop environments

A system and method for managing responsiveness of virtual desktops using passive monitoring includes monitoring interactive desktop events for a computer device and measuring a time between the interactive desktop event and a result of the interactive desktop event. Based on the time, desktop responsiveness is evaluated. System resources are reallocated to improve the responsiveness.
Owner:IBM CORP

Computer apparatus and method for caching results of a database query

A query processor caches data retrieved from executing prepared statements, and uses the cached data for subsequent accesses to the data, if certain conditions for using the cached data are met. The preferred embodiments also include a data staleness handler that takes care of issues that arise from data that may have changed in the database but is not reflected in the cache. One way to handle data staleness in the cache is to specifically enable or disable caching in a query. If caching is disabled, the query processor will access the data in the database. Another way to handle data staleness in the cache is to provide a timer that causes the cache to be invalidated when the timer times out. Yet another way to handle data staleness in the cache is to provide specified conditions that must be met for caching to occur, such as time or date limitations. Still another way to handle data staleness in the cache is to provide an update trigger for the data in the database that corresponds to the cached data. When the data in the database is updated, the update trigger fires, causing the cache to be invalidated. Note that invalidating the cache could also be followed by automatically updating the cache. By caching the results of processing a prepared statement, other queries that use the same prepared statement may be able to access data in the cache instead of going to the database.
Owner:INT BUSINESS MASCH CORP

Fast wake-up in a gaze tracking system

A gaze tracking system, leaving a low power mode in response to an activation signal, captures an initial burst of eye pictures in short time by restricting the image area of a sensor, with the purpose of enabling an increased frame rate. Subsequent eye pictures are captured at normal frame rate. The first gaze point value is computed memorylessly based on the initial burst of eye pictures and no additional imagery, while subsequent values may be computed recursively by taking into account previous gaze point values or information from previous eye pictures. The restriction of the image area may be guided by a preliminary overview picture captured using the same or a different sensor. From the gaze point values, the system may derive a control signal to be supplied to a computer device with a visual display.
Owner:TOBII TECH AB

High efficiency heat removal system for rack mounted computer equipment

An efficient method of heat removal from rack mounted computer equipment, network gear and other electronic equipment, consisting of solid heat conducting components in direct contact with the heat generating sources. In particular, this invention is primarily focused on the ability to efficiently and effectively cool computer equipment in standard computer rack cabinets.This invention utilizes a design that retains the general existing form factor of the rack mounted computer equipment, but uses direct contact heat transfer to a metal heat transfer conduit (Copper, Aluminum or other metal or efficient heat conducting material) contained within the computer equipment chassis. Furthermore, it is thermally coupled to an external rack mounted solid-to-fluid heat exchanger as an efficient method of heat transfer and removal. This is much more efficient than air as heat transfer medium which it the common method of heat removal from existing standardized rack mounted computer equipment.This invention covers the design of the heat transfer components within the chassis of rack mounted computer server and the heat transfer system components external to the server within rack enclosure, as well as the external cooling system components necessary to connect to existing fluid based heat transfer and removal systems and processes.
Owner:NEUDORFER JULIUS

Apparatus and methods for interfacing with remote addressing systems

Devices for remotely addressing objects via pointing action are provided with graphical user interfaces. In response to an object being addressed, a computer device and software provide graphical user interfaces which relates to objects being addressed. As different types of objects are addressed, user interfaces provided change in form and function to agree with the type of category of object being addressed at that instant. Devices have position and attitude determining facility in communication with a computer having prerecorded data. The data includes information relating to object types and corresponding graphical user interfaces.
Owner:ELLENBY JOHN +3

Block chain multi-activity high-availability system, computer equipment and method

ActiveCN108134706AImprove reliabilityMeet high availability requirementsData switching networksHigh availabilityChain network
The invention provides a block chain multi-activity high-availability system, a method, computer equipment and a computer readable storage medium, and relates to the technical field of block chains. The system comprises an authentication node and a plurality of block chain nodes, wherein each block chain node is a cluster; a main node in the cluster participates in a block chain; a block chain network is formed by a plurality of clusters; the communication between the block chains is completed by the main node; after the block chains reach the consensus, the main node in each cluster synchronously updates the block chain data to a slave node and a common node; when a main node of a fault cluster in the cluster fails or is has a consensus error, master-slave election is carried out througha master-slave election rule, the slave node is switched to serve as the main node to provide a block chain service, and the authentication node informs other clusters except the fault cluster to update the main node information of the fault cluster. According to the block chain multi-activity high-availability system, the computer equipment and the method, the reliability of the whole block chainis greatly improved, and the requirement for high availability of a bank for 7*24 hours is met.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA +1

Dynamically populated manifests and manifest-based prefetching

Described herein are, among other things, systems and methods for generating and using manifests in delivering web content, and for using such manifests for prefetching. Manual and automated generation of manifests are disclosed. Such manifests preferably have placeholders or variables that can be populated at the time of the client request, based on data known from the request and other contextual information. Preferably though without limitation an intermediary device such as a proxy server, which may be part of content delivery network (CDN), performs the function of populating the manifest given a client request for a page. An intermediary or other computer device with a populated manifest can utilize that completed manifest to make anticipatory forward requests to an origin to obtain web resources specified on the manifest, before receiving the client's requests for them. In this way, many kinds of content may be prefetched based on the manifest.
Owner:AKAMAI TECH INC

Abnormal flow detection method and device, computer equipment and storage medium

The invention discloses an abnormal flow detection method and device, computer equipment and a storage medium. The method comprises the following steps of: screening the historical flow data of the monitoring object; obtaining target traffic data, carrying out regression analysis on the target traffic data; establishing a flow prediction model, predicting the flow data of the monitored object by using the flow prediction model; obtaining a prediction result of the flow data of the monitoring object in a preset time period, carrying out statistical analysis is on a prediction result according to a preset statistical mode; obtaining a traffic alarm threshold value of the monitored object, further obtaining a real-time access log of the monitored object when the real-time traffic data of themonitored object is greater than the traffic alarm threshold value, and performing abnormal traffic alarm if the response time of the real-time access log is greater than the response time threshold value. According to the embodiment of the invention, the accuracy of the alarm threshold can be improved, judgment is carried out by combining the response time of the service, and thus the accuracy ofabnormal flow detection is improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Network security knowledge graph construction method and device and computer equipment

The invention relates to a network security knowledge graph construction method and device, computer equipment and a computer storage medium. The network security knowledge graph construction method comprises the following steps: extracting attack source information and attack target information from a preset network security knowledge base, and respectively identifying an attack entity associatedwith the attack source information and an attacked entity associated with the attack target information; detecting a threat alarm event between the attack entity and the attacked entity, and determining a relationship between entities according to the threat alarm event; and respectively extracting asset attributes of the asset entities, and constructing a network security knowledge graph according to the asset entities, the asset attributes and the relationship between the entities. According to the invention, the network security problem of the target network can be detected more completely, and the detection effect of the network security problem is improved.
Owner:CHINA SOUTHERN POWER GRID COMPANY +1

Computer apparatus and method for caching results of a database query

A query processor caches data retrieved from executing prepared statements, and uses the cached data for subsequent accesses to the data, if certain conditions for using the cached data are met. The preferred embodiments also include a data staleness handler that takes care of issues that arise from data that may have changed in the database but is not reflected in the cache. One way to handle data staleness in the cache is to specifically enable or disable caching in a query. If caching is disabled, the query processor will access the data in the database. Another way to handle data staleness in the cache is to provide a timer that causes the cache to be invalidated when the timer times out. Yet another way to handle data staleness in the cache is to provide specified conditions that must be met for caching to occur, such as time or date limitations. Still another way to handle data staleness in the cache is to provide an update trigger for the data in the database that corresponds to the cached data. When the data in the database is updated, the update trigger fires, causing the cache to be invalidated. Note that invalidating the cache could also be followed by automatically updating the cache. By caching the results of processing a prepared statement, other queries that use the same prepared statement may be able to access data in the cache instead of going to the database.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products