Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

8205 results about "Temporary storage" patented technology

Temporary storage is always allocated from the system disk pool—also known as the system auxiliary storage pool (ASP). This holds true for SQE temporary storage even if the permanent objects (tables and indexes) holding your data are located in user ASPs or in independent auxiliary storage pools (IASPs).

System for transferring customized hardware and software settings from one computer to another computer to provide personalized operating environments

A method and system for transferring information from a first computer-based device to a web site, for temporary storage and later transfer of the stored information from the web site to a second computer-based device. First, a communication link is established between a first computer-based device and the web site. Next, the first computer-based device is scanned, via the web site, to determine the information contained on the first computer-based device. The user then selects which of the scanned information is to be uploaded from the first computer-based device onto the web site for temporary storage. Finally, the selected information is transferred from the first computer-based device onto the web site for temporary storage. Once retrieval of the temporarily stored information is desired, the user establishes a communication link between a second computer-based device and the web site. The second computer-based device is scanned, via the web site, to determine the information contained on the second computer-based device. The temporarily stored information, from the first computer-based device on the web site, is then displayed to the user and the user selects which of this temporary information, from the first computer-based device, is to be downloaded from the web site onto the second computer-based device. The selected information is finally downloaded from the website onto the second computer-based device.
Owner:CLOUDING

Method and apparatus for interacting with broadcast programming

A method of and apparatus for allowing a user using a communications device to interact with first media material that is broadcast on a first broadcast channel y a first broadcast media source and second media material that is broadcast on a second broadcast channel by a second broadcast media source, the first media material and the second media material include a first media item and a second media item, respectively, the first media item and the second media item are associated with a first representation of the first media item and a representation of the second media item, respectively, that are received and presented by a broadcast reception device while the broadcast reception device is tuned to a third broadcast channel. The method includes maintaining in a temporary storage an item identifier, the item identifier identifies one of a first media item-related information and a second media item-related information. Additionally, when the broadcast reception device is tuned to the third broadcast channel and presents the first representation of the first media item, the method includes providing the item identifier as a basis for identifying the first media item-related information, the first media item-related information is a basis for a response to an interactivity activation made in reaction to presentation of the first representation of the first media item by the broadcast reception device. When the broadcast reception device is tuned to the third broadcast channel and presents the first representation of the second media item, the method includes providing the item identifier as a basis for identifying the second media item-related information, the second media item-related information is a basis for a response to an interactivity activation made in reaction to presentation of the representation of the second media item by the broadcast reception device.
Owner:ADAM ALBRETT +1

Method for preventing malicious software installation on an internet-connected computer

A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.
Owner:KYNDRYL INC

Electrical box mounting assembly

An adjustable mounting bar and electrical box assembly for hanging a light fixture, fan, or other electrical device from a ceiling. All hardware required for mounting the electrical device is included with the assembly. The adjustable mounting bar includes sliding tubular members with end flanges for spanning between adjacent overhead joists. An electrical box is connected to the tubular members by a clamp and outer clamping fasteners, which can be loosened to adjust the length of the adjustable mounting bar. The end flanges include penetrable tabs that can be driven into the overhead joists to temporarily secure the adjustable mounting bar to the joists and thereby free the installer's hands. The outer face of the end flanges include a series of rows of slots arranged horizontally thereon and forming a plurality of bend lines. To accommodate ceiling coverings of various thickness, the end flanges can be bent outwards at the proper bend line to position the lower end of the electrical box flush with the ceiling surface. Load bearing bar fasteners threadably engaged in temporary storage receptacles in the sliding tubular members are removed therefrom and fastened through the end flanges to securely fasten the mounting bar to the joists. Load bearing device fasteners threadably engaged in temporary storage receptacles in the electrical box are removed therefrom and driven into receptacles in the clamp to secure the electrical device to the mounting bar. Oversize openings are provided in the top wall of the electrical box to ensure that the entire suspended load is borne by the clamp and mounting bar and not the electrical box.
Owner:ARLINGTON INDS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products