Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

2377 results about "System usage" patented technology

Method for allocating files in a file system integrated with a RAID disk sub-system

The present invention is a method for integrating a file system with a RAID array that exports precise information about the arrangement of data blocks in the RAID subsystem. The file system examines this information and uses it to optimize the location of blocks as they are written to the RAID system. Thus, the system uses explicit knowledge of the underlying RAID disk layout to schedule disk allocation. The present invention uses separate current-write location (CWL) pointers for each disk in the disk array where the pointers simply advance through the disks as writes occur. The algorithm used has two primary goals. The first goal is to keep the CWL pointers as close together as possible, thereby improving RAID efficiency by writing to multiple blocks in the stripe simultaneously. The second goal is to allocate adjacent blocks in a file on the same disk, thereby improving read back performance. The present invention satisfies the first goal by always writing on the disk with the lowest CWL pointer. For the second goal, a new disk is chosen only when the algorithm starts allocating space for a new file, or when it has allocated N blocks on the same disk for a single file. A sufficient number of blocks is defined as all the buffers in a chunk of N sequential buffers in a file. The result is that CWL pointers are never more than N blocks apart on different disks, and large files have N consecutive blocks on the same disk.
Owner:NETWORK APPLIANCE INC

Method and apparatus for data communication

A data acquisition and delivery system for performing data delivery tasks is disclosed. This system uses a computer running software to acquire source data from a selected data source, to process (e.g. filter, format convert) the data, if desired, and to deliver the resulting delivered data to a data target. The system is designed to access remote and/or local data sources and to deliver data to remote and/or local data targets. The data target might be an application program that delivers the data to a file or the data target may simply be a file, for example. To obtain the delivered data, the software performs processing of the source data as appropriate for the particular type of data being retrieved, for the particular data target and as specified by a user, for example. The system can communicate directly with a target application program, telling the target application to place the delivered data in a particular location in a particular file. The system provides an external interface to an external context. If the external context is a human, the external interface may be a graphical user interface, for example. If the external context is another software application, the external interface may be an OLE interface, for example. Using the external interface, the external context is able to vary a variety of parameters to define data delivery tasks as desired. The system uses a unique notation that includes a plurality of predefined parameters to define the data delivery tasks and to communicate them to the software.
Owner:E BOTZ COM INC A DELAWARE +2

Method and Apparatus for Defending Against Zero-Day Worm-Based Attacks

Honey pots are used to attract computer attacks to a virtual operating system that is a virtual instantiation of a typical deployed operational system. Honey nets are a collection of these virtual systems assembled to create a virtual network. The subject system uses a forward deployed honey net combined with a parallel monitoring system collecting data into and from the honey net, leveraging the controlled environment to identify malicious behavior and new attacks. This honey net/monitoring pair is placed ahead of the real deployed operational network and the data it uncovers is used to reconfigure network protective devices in real time to prevent zero-day based attacks from entering the real network. The forward network protection system analyzes the data gathered by the honey pots and generates signatures and new rules for protection that are coupled to both advanced perimeter network security devices and to the real network itself so that these devices can be reconfigured with threat data and new rules to prevent infected packets from entering the real network and from propagating to other machines. Note the subject system applies to both zero-day exploit-based worms and also manual attacks conducted by an individual who is leveraging novel attack methods.
Owner:BAE SYST INFORMATION & ELECTRONICS SYST INTERGRATION INC

Method and system for conducting sentiment analysis for securities research

InactiveUS20060242040A1FinanceData sourceData storing
A computer system performs financial analysis on one or more financial entities, which may be corporations, securities, etc., based on the sentiment expressed about the one or more financial entities within raw textual data stored in one or more electronic data sources containing information or text related to one or more financial entities. The computer system includes a content mining search agent that identifies one or more words or phrases within raw textual data in the data sources using natural language processing to identify relevant raw textual data related to the one or more financial entities, a sentiment analyzer that analyzes the relevant raw textual data to determine the nature or the strength of the sentiment expressed about the one or more financial entities within the relevant raw textual data and that assigns a value to the nature or strength of the sentiment expressed about the one or more financial entities within the relevant raw textual data, and a user interface program that controls the content mining search agent and the sentiment analyzer and that displays, to a user, the values of the nature or strength of the sentiment expressed about the one or more financial entities within the data sources. This computer system enables a user to make better decisions regarding whether or not to purchase or invest in the one or more financial entities.
Owner:AIM HLDG LLC

System and method of using the public switched telephone network in providing authentication or authorization for online transactions

An authentication or authorization system to facilitate electronic transactions uses simultaneous or substantially simultaneous communications on two different networks to verify a user's identity. When a user logs onto a site, via the internet, a telephone number, either pre-stored or obtained in real time from the visitor, where the visitor can be called essentially immediately is used to set up, via the switched telephone network another communication link. Where the user has multiple communication links available, the telephone call is automatically placed via the authentication or authorization software simultaneously while the user is on-line. In the event that the user has only a single communication link, that individual will have to log off temporarily for purposes of receiving the telephone call. Confirmatory information is provided via the internet to the user. The automatically placed telephone call requests that the user feed back this confirmatory information for verification purposes. The telephone number which is being called is adjacent to the user's internet terminal. The user's response, via the telephone network, can be compared to the originally transmitted confirmatory information to determine whether the authentication or authorization process should go forward.
Owner:PAYFONE

Method for allocating files in a file system integrated with a raid disk sub-system

A method is disclosed for integrating a file system with a RAID array that exports precise information about the arrangement of data blocks in the RAID subsystem. The file system examines this information and uses it to optimize the location of blocks as they are written to the RAID system. Thus, the system uses explicit knowledge of the underlying RAID disk layout to schedule disk allocation. The method uses separate current-write location (CWL) pointers for each disk in the disk array where the pointers simply advance through the disks as writes occur. The algorithm used has two primary goals. The first goal is to keep the CWL pointers as close together as possible, thereby improving RAID efficiency by writing to multiple blocks in the stripe simultaneously. The second goal is to allocate adjacent blocks in a file on the same disk, thereby improving read back performance. The method satisfies the first goal by always writing on the disk with the lowest CWL pointer. For the second goal, a new disks chosen only when the algorithm starts allocating space for a new file, or when it has allocated N blocks on the same disk for a single file. A sufficient number of blocks is defined as all the buffers in a chunk of N sequential buffers in a file. The result is that CWL pointers are never more than N blocks apart on different disks, and large files have N consecutive blocks on the same disk.
Owner:NETWORK APPLIANCE INC

Method and apparatus for accessing information, computer programs and electronic communications across multiple computing devices using a graphical user interface

A GUI containing a panel along each of its edges is produced within a computer's display. Each of the four panels are always visible and accessible within the GUI and contain items that display or reference network-based information, communication, navigational systems, computer programs, and other items. These items have been assigned to the panels based upon a hierarchal containment system which, in the preferred embodiment of the invention, uses the categories “people, places, things, and home” as its first logical grouping of the various items and services a user would seek to utilize within the GUI. This organizational system, and its associated visual representation within the panels, enables the GUI to be displayed and operated within multiple computer devices, even though the designs of those devices may include a wide range of display and control systems. This consistency across various computing devices enables a user to quickly apply knowledge gained from having used the GUI on another computing device. Furthermore, the items presented within the GUI, as well as the GUI's configuration, are stored in, and retrieved from, a networked “server” computer thereby enabling a user to produce and access their familiar GUI workspace and items using a variety of networked computer devices. The GUI therefore may be accessed within multiple computing devices and provide access to information, computer programs, and electronic communications.
Owner:MUSCHETTO JAMES EDWARD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products