At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Low-profile swing gate to support service element interface hardware
An apparatus for positioning service element interface devices is provided. A gate is affixed to a computing rack by a gate hinge that rotates on a first axis....
Renderable content partitioning and portability
A mobile device controls content partitioning at a separate renderable content storage device of an item of renderable content into multiple partitioned content...
Pre-setting the foreground view of a photograph via a camera
A method, computer program product, and computer system for pre-setting the foreground view of a photograph. A reference image is captured by a camera. The...
Digital camera having multiple image capture systems
A digital camera system having a digital camera and a remote control module is disclosed. The digital camera includes an image capture system, memory and...
Method and apparatus for generating a multi-layer correlation mark key
A method, non-transitory computer readable medium and apparatus for generating a multi-layer correlation mark key are disclosed. For example, the method...
Security feature in graphic documents
A printing system receives a graphic document having a security area. The graphic document identifies a secure color to print in the security area. The graphic...
Lightweight software management shell
A lightweight software management shell that intelligently and autonomously provides a suitable execution environment for software agents by creating new...
Trusted contact name validation
Embodiments of the present invention address deficiencies of the art in respect to validating a specified identity for a participant to a chat session and...
Method and system for sensitive data abstraction
According to an embodiment of the present invention, a system and method for transmitting sensitive data in a contact center environment comprising a transient...
Leveraging online identities to grant access to private networks
An authentication service running on a processing device receives a request from a local area network (LAN) to authenticate a computing device (and/or a user of...
Single sign on for a remote user session
A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (SSO) process. The SSO process...
Messaging system and method
A method of cross-platform messaging including receiving, by a messaging system, at least one initial message having a message format, an initial message layout...
Redirecting notifications to an alternative computing device and allowing
subsequent SMS interactions to...
A method, system and computer program product for handling notifications. An instruction from the user is received to redirect notifications to alternative...
Time conversion in an instant message
Embodiments of the present invention provide methods, program products and systems for displaying a corrected time included in the text of an instant message....
Destination-configured topic information updates
A target travel destination is configured with a topic of conversation planned by a user to occur with at least one person at the target travel destination. A...
Remotely controlled message queue
Embodiments are directed to a computer system for managing data transfer. The computer system includes a memory, a processor communicatively coupled to the...
Network data congestion management probe system
A method to investigate congestion in a computer network may include network devices to route data packets throughout the network. The method includes, for...
Ethernet link aggregation with shared physical ports
Techniques are disclosed for providing Ethernet link aggregation for logically independent entities that share a plurality of physical ports. A client operating...
Policy driven auto-transitioning framework for governed objects in service
A method for automated policy-driven transitioning of governed objects in a service registry is provided. The method includes receiving a request in a service...
Network testbed creation and validation
Embodiments of network testbed creation and validation processes are described herein. A "network testbed" is a replicated environment used to validate a target...
Operating a dual chipset network interface controller (`NIC`) that
includes a high performance media access...
Operating a dual chipset network interface controller (`NIC`) that includes a high performance media access control chipset and a low performance media access...
Managing network connection of a network node
A method and apparatus of managing a network connection of a network node comprising a NIC of a first type and a NIC of a second type. The method comprises:...
Method and system for recognizing radio link failures associated with
HSUPA and HSDPA channels
A method and system for detecting radio link (RL) failures between a wireless transmit/receive unit (WTRU) and a Node-B are disclosed. When signaling radio...
Decision feedback equalizer
A decision-feedback equalizer for use in a receiving unit for receiving an incoming data stream and for providing a stream of bit data outputs, including at...
Mobile cart with capacitive power supply
A mobile system includes a mobile cart and an electronic device supported by the mobile cart. The mobile cart includes integral power storage structures that...
Composite electrolyte including polymeric ionic liquid matrix and embedded
nanoparticles, and method of making...
A composite electrolyte comprising includes a polymeric ionic liquid matrix; and a plurality of functionalized nanoparticles embedded therein, wherein at least...
Photodiode structures and methods of manufacture are disclosed. The method includes forming a waveguide structure in a dielectric layer. The method further...
Semiconductor devices with an etch stop layer on gate end-portions located
above an isolation region
A device includes a gate structure having an axial length that is positioned above an active region of a semiconductor substrate and includes a first gate...
Semiconductor device with trench epitaxy and contact
A semiconductor device comprises a semiconductor fin arranged on a substrate, a gate stack arranged over a channel region of the fin, a spacer arranged in...
Methods of forming FINFETs with locally thinned channels from fins having
in-situ doped epitaxial cladding
In one aspect, a method of forming finFET devices is provided which includes patterning fins in a wafer; forming dummy gates over the fins; forming spacers on...
Support for long channel length nanowire transistors
A nanowire device includes a first component formed on a substrate and a second component disposed apart from the first component on the substrate. A nanowire...
Integrated circuit having strained fins on bulk substrate and method to
A method includes forming a set of fins composed of a first semiconductor material. The method further heats the set of fins to condense the fins and cause...
Efficient back-projection operation using precomputed table
A method and system are provided. The method includes pre-computing, by a computing device having a processor, a plurality of coefficients for a given...
Machine learning customer valuation functions
A computing device determines one or more first degree correlations based on valuation information. The computing device determines one or more important...
Predicting API storytelling mapping
A first indication from a user is received. The indication includes a task to be performed using at least one application programming interface. A machine...
Compact biometric acquisition system and method
A method of determining the identity of a subject while the subject is walking or being transported in an essentially straight direction is disclosed, the two...
Trusted public infrastructure grid cloud
Systems and methods of implementing a secured cloud environment allow for design and instantiation of a security policy at the infrastructure level. An example...
Search scheduling and delivery tool for scheduling a search using a search
A search request from a user is received wherein the search request includes a search framework profile and at least one search term. Scheduling information is...
Adapting a relational query to accommodate hierarchical data
A method, system and computer program product for processing hierarchical data is provided. A method for processing hierarchical data in a relational database...
Photo album creation based on social media content
A method of creating a physical representation of digital information located on a social networking environment comprises retrieving a number of digital images...
Dynamically manipulating tables based on a font
A computer system receives a request to combine tabular data of a first table with tabular data of a second table. The computer system creates a profile for the...
Managing queues in an asynchronous messaging system
A method of managing an asynchronous messaging queue with a client computer in an asynchronous messaging system, where the client computer is programmed to...
Reducing operand store compare penalties
Embodiments relate to reducing operand store compare penalties by detecting potential unit of operation (UOP) dependencies. An aspect includes a computer system...
Relative offset branching in a fixed-width reduced instruction set
Embodiments relate to a method and computer program product for relative offset branching in a reduced instruction set computing (RISC) architecture. One aspect...
eMMC functionality expander
An eMMC functionality expander, and methods there for, are provided herein. For example, provided herein is a device comprising: a first processor; a multimedia...
Adjusting eraser size in drawing applications
The method includes identifying, by one or more computer processors, a first location and a second location of input on a touch-sensitive surface. The method...
System for data sampling of control valves using confidence scores
A computer-implemented method for monitoring characteristic data includes selecting a first operable system device and receiving a first plurality of data from...
Systems and methods for interfacing automation control systems to external
A system includes an industrial controller comprising a first processor. The first processor is configured to execute a substantially deterministic control...
Laser module and system
Laser modules and systems are provided that are smaller, lighter, and less complex and while more reliably generating collimated laser beams having limited...
Air jetted micro-cable with super low resistance and dramatically improved
for air blockage
A cable, and method and system for deploying the cable are described. The cable includes a jacket having a plurality of outer grooves formed on its outer...