[ { "title": "", "publication_date": "2017/23/06", "number": "", "url": "/2017/06/23/2013-09-30-mapping-rdma-semantics-to-high-speed-storage/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "", "publication_date": "2017/23/06", "number": "", "url": "/2017/06/23/2013-08-23-systems-and-methods-for-network-communications/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "", "publication_date": "2017/23/06", "number": "", "url": "/2017/06/23/2013-03-13-system-and-method-for-facilitating-secure-self-payment-transactions-of-retail-goods/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Electronically binding to a lost mobile device", "publication_date": "2013/19/12", "number": "09191775", "url": "/2013/12/19/electronically-binding-to-a-lost-mobile-device/", "abstract": "A first mobile device detects a second mobile device in the vicinity of the first mobile device and determines that the second mobile device is lost. The first mobile device electronically binds to the second mobile device and obtains information relating to the second mobile device. The first mobile device sends the information relating to the second mobile device to a designated party. The first mobile device receives an indication that the second device is no longer lost. The first mobile device, in response to receiving the indication that the second device is no longer lost, unbinds from the second mobile device.", "owner": "International Business Machines Corporation", "owner_city": "Armonk", "owner_country": "US" }, { "title": "Indexed electronic book annotations", "publication_date": "2013/17/12", "number": "09323733", "url": "/2013/12/17/indexed-electronic-book-annotations/", "abstract": "A request for annotations identifying a user, an electronic content item (e.g., an electronic book), and a portion of the electronic content item is received from a client device. A set of annotations is identified that correspond to the identified portion of the electronic content item and an unlocked subset of this set of annotations is determined based on an access history of the identified user that indicates electronic content the identified user has previously accessed. At least one annotation from the unlocked subset is sent to the client device for presentation in conjunction with the identified electronic content item.", "owner": "Google Inc.", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Optimized log storage for asynchronous log updates", "publication_date": "2013/02/12", "number": "09223843", "url": "/2013/12/02/optimized-log-storage-for-asynchronous-log-updates/", "abstract": "A log-structured data store may implement optimized log storage for asynchronous log updates. In some embodiments, log records may be received indicating updates to data stored for a storage client and indicating positions in a log record sequence. The log records themselves may not be guaranteed to be received according to the log record sequence. Received log records may be stored in a hot log portion of a block-based storage device according to an order in which they are received. Log records in the hot log portion may then be identified to be moved to a cold log portion of the block-based storage device in order to complete a next portion of the log record sequence. Log records may be modified, such as compressed, or coalesced, before being stored together in a data block of the cold log portion according to the log record sequence.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "System and method for running a multi-module telephony application", "publication_date": "2013/11/11", "number": "09210275", "url": "/2013/11/11/system-and-method-for-running-a-multimodule-telephony-application/", "abstract": "A system and method of a telephony application platform can include receiving a communication session request specifying a destination endpoint, connecting the communication session through a first application module according to the destination endpoint, receiving an instruction to transition communication control to a second application module, transitioning communication control of the communication session to the second application module, independently metering resource usage of the communication session of each application module, and accounting the metered usage of the communication session.", "owner": "Twilio, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Node repair in a mesh network", "publication_date": "2013/10/10", "number": "09001653", "url": "/2013/10/10/node-repair-in-a-mesh-network/", "abstract": "In embodiments of the present invention improved capabilities are described for sensing a change in a network topology using a discovery node in a mesh network; transmitting an explore frame, based at least in part on the sensed change, from the discovery node to a destination node using an intermediate node; receiving a response to the explore frame from the destination node; determining at least one functional network route from the discovery node to the destination node based at least in part on route information received in association with the response to the explore frame, wherein the route information includes a node path; and transmitting an instruction to the destination node from the discovery node based on a reverse node path.", "owner": "Sigma Designs, Inc.", "owner_city": "Milpitas", "owner_country": "US" }, { "title": "Social media provocateur detection and mitigation", "publication_date": "2013/07/10", "number": "09451085", "url": "/2013/10/07/social-media-provocateur-detection-and-mitigation/", "abstract": "A contact center system can receive messages from social media sites or centers. The messages may include derogatory or nefarious content. The system can review messages to identify the message as nefarious and identify the poster as a social media provocateur. The system may then automatically respond to the nefarious content. Further, the system may prevent future nefarious conduct by the identified social media provocateur by executing one or more automated procedures.", "owner": "Avaya Inc.", "owner_city": "Basking Ridge", "owner_country": "US" }, { "title": "Policy-based application management", "publication_date": "2013/03/10", "number": "09213850", "url": "/2013/10/03/policybased-application-management/", "abstract": "Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.", "owner": "Citrix Systems, Inc.", "owner_city": "Fort Lauderdale", "owner_country": "US" }, { "title": "Provisioning dedicated network resources with API services", "publication_date": "2013/27/09", "number": "09197709", "url": "/2013/09/27/provisioning-dedicated-network-resources-with-api-services/", "abstract": "Embodiments are disclosed that provision a cloud-based service together with a dedicated network connection to provision a cloud-based service element. In response to the request both the cloud-based service element and a dedicated network connection are provisioned. Provisioning the cloud-based service element together with the dedicated network connection enables the cloud-based service element to utilize the dedicated network connection.", "owner": "LEVEL 3 COMMUNICATIONS, LLC", "owner_city": "Broomfield", "owner_country": "US" }, { "title": "Object store management operations within compute-centric object stores", "publication_date": "2013/26/09", "number": "08898205", "url": "/2013/09/26/object-store-management-operations-within-computecentric-object-stores/", "abstract": "Object store management operations within compute-centric object stores are provided herein. An exemplary method may include transforming an object storage dump into an object store table by a table generator container, wherein the object storage dump includes at least objects within an object store that are marked for deletion, transmitting records for objects from the object store table to reducer containers, such that each reducer container receives object records for at least one object, the object records comprising all object records for the at least one object, generating a set of cleanup tasks by the reducer containers, and executing the cleanup tasks by a cleanup agents.", "owner": "Joyent, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Log-structured distributed storage using a single log sequence number space", "publication_date": "2013/25/09", "number": "09552242", "url": "/2013/09/25/logstructured-distributed-storage-using-a-single-log-sequence-number-space2/", "abstract": "A distributed database system may implement log-structured distributed storage using a single log sequence number space. A log for a data volume may be maintained in a log-structured distributed storage system. The log may be segmented across multiple protection groups according to a partitioning of user data for the data volume. Updates to the log may be assigned a log sequence number from a log sequence number space for the data volume. A protection group may be determined for an update according to which partition of user data space the update pertains. Metadata to be included with the log record may indicate a previous log sequence number of a log record maintained at the protection group. The log record may be sent to the protection group and identified as committed based on acknowledgments received from storage nodes implementing the protection group.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Index structure navigation using page versions for read-only nodes", "publication_date": "2013/20/09", "number": "09519664", "url": "/2013/09/20/index-structure-navigation-using-page-versions-for-readonly-nodes/", "abstract": "Read-only nodes of a distributed database system may implement index structure navigation using page versions. A read request may be received at a read only node of a distributed database for select data. Data pages linked together to form an index structure for data stored for the distributed database may be navigated according to versions maintained for the data pages in order to identify one or more locations to access for the select data. One or more prior versions of data pages may be selected as part navigating the index structure according to a consistent view of the distributed database associated with the read request. Change notifications may also be received at the read-only node modifying the data pages of the index structure. The index structure modifications may be applied without blocking the index structure navigation for servicing the read request.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Efficient replication of system transactions for read-only nodes of a distributed database", "publication_date": "2013/20/09", "number": "09280591", "url": "/2013/09/20/efficient-replication-of-system-transactions-for-readonly-nodes-of-a-distributed-database/", "abstract": "A distributed database system may efficiently replicate system transactions one or more read-only nodes. An update to a distributed database may be received. One or more system transactions may be performed to apply the update. For each system transaction, one or more change notifications may be generated which indicate changes to be applied in order to perform the system transaction. A particular one of the change notifications may be identified as the last change to be applied in order to complete the system transaction. The change notifications may be sent to one or more read-only nodes. The read-only nodes may process read requests for the distributed database system. The identified change notification may indicate to the read-only nodes the last change to be applied prior to presenting a state of the database that includes the system transaction when servicing read requests.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Efficient replication of distributed storage changes for read-only nodes of a distributed database", "publication_date": "2013/20/09", "number": "09507843", "url": "/2013/09/20/efficient-replication-of-distributed-storage-changes-for-readonly-nodes-of-a-distributed-database/", "abstract": "A distributed database system may efficiently replicate distributed storage system changes on one or more read-only nodes. Storage metadata that indicates an access scheme for obtaining data for a particular view of the database from a distributed storage system may be maintained at a read-only node. An update to the storage metadata may be received that indicates a change to the distributed storage system that affects the validity of read requests for a different particular view of the database. In some embodiments, the change may indicate which storage nodes may be storing data according to the different particular view of the database, such as a change in membership of a protection group for the data at the distributed storage system. The storage metadata at the read-only node may be updated according to the received update such that a subsequent read request for the different particular view of the database is sent to the distributed storage system according to the updated access scheme.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Efficient garbage collection for a log-structured data store", "publication_date": "2013/20/09", "number": "09460008", "url": "/2013/09/20/efficient-garbage-collection-for-a-logstructured-data-store/", "abstract": "A log-structured data store may implement efficient garbage collection. Log records may be maintained in data blocks according to a log record sequence. Based, at least in part, on a log reclamation point, the log records may be evaluated to identify data blocks to reclaim that have log records in the log sequence prior to the log reclamation point. New versions of data pages updated by log records in the identified data blocks may be generated and stored in base page storage for the log structured data store. The identified data blocks may then be reclaimed for storing new data.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "System and method for processing image data", "publication_date": "2013/19/09", "number": "09213781", "url": "/2013/09/19/system-and-method-for-processing-image-data/", "abstract": "The PLACEMETER PLATFORM APPARATUSES, METHODS AND SYSTEMS (“PM-PLATFORM”) transform sensor data and/or feedback via PM-PLATFORM components into notifications, updates, coupons, promotions, transactions and/or activitiesnotifications, updates, coupons, promotions, transactions and/or activities. In one implementation, the PM-PLATFORM comprises a sensor, a memory, and a processor disposed in communication with the sensor and memory, the memory storing processor-issuable instructions to receive raw environment data at a sensor for at least two discrete points in time, analyze the received raw environment data locally to determine an at least one occupancy metric, store the occupancy metric, receive further raw environment data for a further point in time, process the further raw environment data to determine a further occupancy metric, compare the further occupancy metric to at least one previous occupancy metric, and issue a notification based on the comparison.", "owner": "Placemeter LLC", "owner_city": "New York", "owner_country": "US" }, { "title": "Techniques for topical customer service menu reconfiguration based on social media", "publication_date": "2013/12/09", "number": "09426289", "url": "/2013/09/12/techniques-for-topical-customer-service-menu-reconfiguration-based-on-social-media/", "abstract": "Techniques for topical customer service menu reconfiguration based on social media are claimed. In one embodiment, for example, an apparatus may comprise a social media gateway and an adjustment component. The social media gateway may be operative to receive social media information from one or more social media networks. The adjustment component may be operative to data mine the social media information to extract one or more characteristics, infer a trend from the extracted one or more characteristics, and adjust a customer service menu tree based upon the inferred trend. Other embodiments are described and claimed.", "owner": "Avaya Inc.", "owner_city": "Basking Ridge", "owner_country": "US" }, { "title": "Dialog compatability", "publication_date": "2013/10/09", "number": "09020135", "url": "/2013/09/10/dialog-compatability/", "abstract": "A contact center system can receive messages from consumers. The system can then interact with the consumer or customer using a dialog. Before conducting the session with the consumer, past interactions using the dialog are reviewed to determine words, phrases, and other information that caused the dialog to be successful. The information is stored as norms. Upon beginning a new interaction with the dialog, the norms and the past successful dialogs are retrieved and compared to the active dialog while the interaction is on-going. The comparison is then used to ensure that the present active dialog will lead to a successful outcome or to resolve any issued if the outcome is not likely to be successful.", "owner": "Avaya Inc.", "owner_city": "Basking Ridge", "owner_country": "US" }, { "title": "Cross-lingual seeding of sentiment", "publication_date": "2013/09/09", "number": "09438732", "url": "/2013/09/09/crosslingual-seeding-of-sentiment/", "abstract": "A contact center system can receive messages from social media sites or centers. The messages may be in a foreign language. The system can review messages by identifying content in the social media messages with negative/positive sentiment and then identify a seed term in the messages. A seed term can be a word in another language, different from the message body. The seed term is then used to find one or more other words, in the foreign language, that are correlated with the seed term. The identification of the found words in other messages can then be used to determine sentiment in the foreign language.", "owner": "Avaya Inc.", "owner_city": "Basking Ridge", "owner_country": "US" }, { "title": "Automatic negative question handling", "publication_date": "2013/06/09", "number": "09432325", "url": "/2013/09/06/automatic-negative-question-handling/", "abstract": "A contact center system can receive messages from social media sites or centers. The system can review long messages by identifying content in the long message with negative sentiment. The content with negative sentiment is further analyzed to determine whether the identified content is actionable. If the identified content is actionable, the communication system can automatically routed the long message to an agent for response.", "owner": "Avaya Inc.", "owner_city": "Basking Ridge", "owner_country": "US" }, { "title": "Providing access to communication plans via multiple access methods", "publication_date": "2013/04/09", "number": "08724783", "url": "/2013/09/04/providing-access-to-communication-plans-via-multiple-access-methods/", "abstract": "One computer-implemented method includes identifying a plurality of communication plans, identifying a first communication associated with a first access method and associated with a first attribute, determining a first communication plan associated with the first communication from the plurality of communication plans, the determination based at least in part on the first attribute associated with the first communication, identifying a second communication different than the first communication and associated with the first access method, the second communication associated with a second attribute different than the first attribute, and determining a second communication plan associated with the second communication from the plurality of communication plans, the determination based at least in part on the second attribute associated with the second communication, wherein the first and second communication plans are associated with a prepaid pay-as-you-go or subscription monetary values.", "owner": "Network Enhanced Telecom, LLP", "owner_city": "Longview", "owner_country": "US" }, { "title": "Dynamic remote procedure call", "publication_date": "2013/30/08", "number": "09602329", "url": "/2013/08/30/dynamic-remote-procedure-call2/", "abstract": "Apparatus, methods and systems are disclosed that provide a dynamic remote procedure call (DRPC) capability. DRPC enables a client of a server to dynamically create, modify, and inactivate the services provided by the server while the server is simultaneously executing and providing those services.", "owner": "INSTANTCAL, INC.", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Configurable platform architecture and method for use thereof", "publication_date": "2013/22/08", "number": "09378055", "url": "/2013/08/22/configurable-platform-architecture-and-method-for-use-thereof/", "abstract": "A platform architecture that is configurable to provide task specific application instances compatible with one or more hosts is provided with a method for using the architecture. In one example, the platform architecture provides a transducer functionality block, a conduit functionality block, an application functionality block, and an application programming interface (API) functionality block on which each task specific application instance is based.", "owner": "Societal Innovations IPCO Limited", "owner_city": "London", "owner_country": "GB" }, { "title": "Database cache survivability across database failures", "publication_date": "2013/14/08", "number": "09251003", "url": "/2013/08/14/database-cache-survivability-across-database-failures/", "abstract": "A database system may implement database cache survivability across database failures. In various embodiments, a database cache may be maintained independent of a failure of a database. A database cache may be maintained in a non-volatile memory device or maintained in a shared memory segment of system memory. Upon recovery from a database failure, a recovery point may be determined that indicates a consistent state of the database. Cache entries of the database cache inconsistent with the consistent state of the database may be invalidated, and the database cache may be made available for access requests directed toward the database. Valid cache entries from before the database failure may be made available without accessing a back-end data store for the database.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Network development and testing as a cloud service", "publication_date": "2013/19/07", "number": "09183121", "url": "/2013/07/19/network-development-and-testing-as-a-cloud-service/", "abstract": "Presented herein are techniques to receive configuration instructions for elements of a network topology to be simulated and tested. In response to receiving and in accordance with the configuration instructions, a plurality of software images (for a plurality of virtual network elements of the network topology) are configured via an Application Programming Interface (API). The plurality of software images run in a cloud host. In response to receiving and in accordance with the configuration instructions, data is configured via the API, which represents one or more connections between the virtual network elements. A plurality of software images for the plurality of virtual network elements is then executed in accordance with the data representing the connections, for development and testing of the network topology.", "owner": "Cisco Technology, Inc.", "owner_city": "San Jose", "owner_country": "US" }, { "title": "System and method for enabling tracking of contract provisions in a service message switching marketplace", "publication_date": "2013/27/06", "number": "08781104", "url": "/2013/06/27/system-and-method-for-enabling-tracking-of-contract-provisions-in-a-service-message-switching-marketplace/", "abstract": "The present system and method comprises an improved marketplace for providing and consuming services. Using the present system, generally via one or more APIs, comprises a method for integrating value added services within a network of participants, for instance, a payment network. The network can use service switching capabilities to route service calls to and from the service consumers and providers using routing elements defined in a message specification. Network participants can be both consumers and providers of services. The network can route service messages to the appropriate provider depending on details in the message.", "owner": "American Express Travel Related Services Company, Inc.", "owner_city": "New York", "owner_country": "US" }, { "title": "System and method for a digital network for switching web service messages", "publication_date": "2013/27/06", "number": "08787554", "url": "/2013/06/27/system-and-method-for-a-digital-network-for-switching-web-service-messages/", "abstract": "The present system and method comprises an improved marketplace for providing and consuming services. Using the present system, generally via one or more APIs, comprises a method for integrating value added services within a network of participants, for instance, a payment network. The network can use service switching capabilities to route service calls to and from the service consumers and providers using routing elements defined in a message specification. Network participants can be both consumers and providers of services. The network can route service messages to the appropriate provider depending on details in the message.", "owner": "American Express Travel Related Services Company, Inc.", "owner_city": "New York", "owner_country": "US" }, { "title": "System and method for secure, high-speed transfer of very large files", "publication_date": "2013/24/06", "number": "09491236", "url": "/2013/06/24/system-and-method-for-secure-highspeed-transfer-of-very-large-files/", "abstract": "A method for parallelized transfer of an electronic file over a network. The method includes sending a first portion of the electronic file from a first sending node and receiving, at the first sending node, information relating to a second portion of the electronic file sent by a second sending node. The method further includes sending a third portion of the electronic file from the first sending node, wherein the third portion is different from the second portion.", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Real time lockdown", "publication_date": "2013/23/05", "number": "08959642", "url": "/2013/05/23/real-time-lockdown/", "abstract": "A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new executables added to the machine as well as previously existent executables that have been modified, moved, renamed or deleted. In certain embodiments, the system will tag the file with a flag as modified or newly added. Once tagged, the system intercepts particular types of file accesses for execution, network or registry. The system determines if the file performing the access is flagged and may apply one or more policies based on the requested access. In certain embodiments, the system intercepts I/O operations by file systems or file system volumes and flags metadata associated with the file. For example, the NT File System and its extended attributes and alternate streams may be utilized to implement the system.", "owner": "Websense, Inc.", "owner_city": "San Diego", "owner_country": "US" }, { "title": "Managing contingency capacity of pooled resources in multiple availability zones", "publication_date": "2013/15/05", "number": "09208032", "url": "/2013/05/15/managing-contingency-capacity-of-pooled-resources-in-multiple-availability-zones/", "abstract": "A network-based services provider may reserve and provision primary resource instance capacity for a given service (e.g., enough compute instances, storage instances, or other virtual resource instances to implement the service) in one or more availability zones, and may designate contingency resource instance capacity for the service in another availability zone (without provisioning or reserving the contingency instances for the exclusive use of the service). For example, the service provider may provision resource instance(s) for a database engine head node in one availability zone and designate resource instance capacity for another database engine head node in another availability zone without instantiating the other database engine head node. While the service operates as expected using the primary resource instance capacity, the contingency resource capacity may be leased to other entities on a spot market. Leases for contingency instance capacity may be revoked when needed for the given service (e.g., during failover).", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "Method for initiating a consumable-based cycle of operation", "publication_date": "2013/08/05", "number": "09277188", "url": "/2013/05/08/method-for-initiating-a-consumablebased-cycle-of-operation/", "abstract": "A method of initiating a cycle of operation based on a consumable includes providing a consumable reader having a software architecture configured to image data, communicate over a network, and identify functionalities of appliances based on a unique identifier associated with each instance of a functionality, imaging data about the consumable using the consumable reader; retrieving cycle data associated with the consumable based on the imaged data; ascertaining in the software architecture at least one functionality associated with the cycle data; selecting from the plurality of appliances an appliance having the at least one functionality using the unique identifier associated with an instance of the at least one functionality; and communicating the cycle data to the selected appliance over the network of appliances wherein the selected appliance can conduct a cycle of operation associated with the consumable using the cycle data.", "owner": "Whirlpool Corportion", "owner_city": "Benton Harbor", "owner_country": "US" }, { "title": "Datacenter managed thread and multi-processing support", "publication_date": "2013/24/04", "number": "09021509", "url": "/2013/04/24/datacenter-managed-thread-and-multiprocessing-support/", "abstract": "Technologies are generally described for datacenter managed thread and multi-processing support. In some examples, a system may be provided for dynamic core allotment and provisioning within a server such that resources can be efficiently used to accomplish available work during lulls shorter than inter-server balancing time scales. A virtual machine manger (VMM) may enact core level provisioning and make optimal performance multi-processing information available via a virtual application programming interface (API) handler that receives and responds to messages sent to the VMM. The messages may not need to reach an external network and may therefore be exchanged at high speeds.", "owner": "Empire Technology Development LLC", "owner_city": "Wilmington", "owner_country": "US" }, { "title": "Apparatus and method for ascertaining the operating hours of a business", "publication_date": "2013/16/04", "number": "09154915", "url": "/2013/04/16/apparatus-and-method-for-ascertaining-the-operating-hours-of-a-business/", "abstract": "Provided is a process and system for ascertaining the operating hours of a business. The process includes obtaining wireless-environment data indicative of the location of business and a timestamp; determining that a user device is located at the business responsive to both the wireless-environment data and wireless-environment data from checked-in user devices that have checked-in to the business via a social network; storing the timestamp in a timestamp data store; estimating operating hours of the business responsive to stored timestamps; and storing the estimated operating hours in a business-hours data store.", "owner": "Google Inc.", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Configurable extractions in social media", "publication_date": "2013/27/03", "number": "09460163", "url": "/2013/03/27/configurable-extractions-in-social-media/", "abstract": "Disclosed are various embodiments for accessing and processing social media content. An extraction configuration comprising definitions for keywords, social networks, extraction times, and/or actions to be initiated upon a detection of a condition may be defined by a user of a site monitoring system. The defined social networks may be accessed at the defined extraction times to obtain data from a post comprising the defined keyword. The presence of some data in association with the post may initiate an action defined by the user.", "owner": "Amazon Technologies, Inc.", "owner_city": "Seattle", "owner_country": "US" }, { "title": "Versioning schemes for compute-centric object stores", "publication_date": "2013/15/03", "number": "09092238", "url": "/2013/03/15/versioning-schemes-for-computecentric-object-stores/", "abstract": "Versioning schemes for compute-centric object stores are provided herein. An exemplary method may include creating a metadata clone of a first object within an object store via a versioning scheme module, the metadata of the first object being stored in the object store on a first path, establishing a copy on write link between the first path and a second path for the first object via the versioning scheme module, and storing the cloned metadata on the second path via the versioning scheme module.", "owner": "Joyent, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Object store management operations within compute-centric object stores", "publication_date": "2013/15/03", "number": "08775485", "url": "/2013/03/15/object-store-management-operations-within-computecentric-object-stores/", "abstract": "Object store management operations within compute-centric object stores are provided herein. An exemplary method may include transforming an object storage dump into an object store table by a table generator container, wherein the object storage dump includes at least objects within an object store that are marked for deletion, transmitting records for objects from the object store table to reducer containers, such that each reducer container receives object records for at least one object, the object records comprising all object records for the at least one object, generating a set of cleanup tasks by the reducer containers, and executing the cleanup tasks by a cleanup agents.", "owner": "Joyent, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Zone management of compute-centric object stores", "publication_date": "2013/14/03", "number": "09104456", "url": "/2013/03/14/zone-management-of-computecentric-object-stores/", "abstract": "Zone management of compute-based object stores is provided herein. An exemplary method may include assigning a virtual operating system container from the reserve zone pool to a task group, the task group including a set of tasks for a phase of a first request, and executing the set of tasks within the assigned virtual operating system container.", "owner": "Joyent, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Providing access to communication plans via multiple access methods", "publication_date": "2013/14/03", "number": "08582739", "url": "/2013/03/14/providing-access-to-communication-plans-via-multiple-access-methods/", "abstract": "One computer-implemented method includes identifying a plurality of communication plans, identifying a first communication associated with a first access method and associated with a first attribute, determining a first communication plan associated with the first communication from the plurality of communication plans, the determination based at least in part on the first attribute associated with the first communication, identifying a second communication different than the first communication and associated with the first access method, the second communication associated with a second attribute different than the first attribute, and determining a second communication plan associated with the second communication from the plurality of communication plans, the determination based at least in part on the second attribute associated with the second communication, wherein the first and second communication plans are associated with a prepaid pay-as-you-go or subscription monetary values.", "owner": "Network Enhanced Telecom, LLP", "owner_city": "Longview", "owner_country": "US" }, { "title": "Radio frequency identification system", "publication_date": "2013/13/03", "number": "09563795", "url": "/2013/03/13/radio-frequency-identification-system2/", "abstract": "A multi-tenant, RFID system that may be Cloud based or run on a local area network (LAN) for distributed RFID devices and RFID applications. The RFID system a central abstraction and translation layer between RFID devices installed in geographically diverse locations and applications. RFID devices initiate communication to a Cloud or LAN network over to send events and receive commands. RFID applications can receive RFID tag data, device health, and requested and derived events from the RFID system to automatically run processes based on the provided data. Applications manage RFID devices and settings in the RFID system using command and configuration interfaces.", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Social recommendations for business process platform", "publication_date": "2013/16/01", "number": "09361653", "url": "/2013/01/16/social-recommendations-for-business-process-platform/", "abstract": "Methods, systems, apparatus, and computer programs encoded on computer storage medium, for integrating business data and social data in execution of a business process, implementations including actions of receiving user input, the user input being associated with a task of the business process and being received during interaction with an application, determining that a social query is triggered, querying business data based on a business query, the business query being generated based on the user input, querying social networking data based on the social query, the social query being generated at least partially based on the user input, receiving business data in response to the business query, receiving social data in response to the social query, and providing at least a portion of the business data and at least a portion of the social data for display to a user that provided the user input.", "owner": "SAP SE", "owner_city": "Walldorf", "owner_country": "DE" }, { "title": "Dynamic security question compromise checking based on incoming social network postings", "publication_date": "2013/14/01", "number": "08856945", "url": "/2013/01/14/dynamic-security-question-compromise-checking-based-on-incoming-social-network-postings/", "abstract": "An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers.", "owner": "International Business Machines Corporation", "owner_city": "Armonk", "owner_country": "US" }, { "title": "Notification of security question compromise level based on social network interactions", "publication_date": "2013/13/01", "number": "09571515", "url": "/2013/01/13/notification-of-security-question-compromise-level-based-on-social-network-interactions2/", "abstract": "An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and security answer associated with the security question are received by the system using a user input to the information handling system. Network-accessible data stores, such as social network accounts, are searched for the security answer resulting in search results. The searching results reveal a risk level which is identified by the system. The identified risk level is provided to the user, such as at a display device.", "owner": "International Business Machines Corporation", "owner_city": "Armonk", "owner_country": "US" }, { "title": "Social network application programming interface", "publication_date": "2013/07/01", "number": "08984541", "url": "/2013/01/07/social-network-application-programming-interface/", "abstract": "Disclosed in one example is a method for interfacing with multiple social networks. The method includes receiving a call from a social networking service agnostic social networking application for one of a plurality of social networking functions in a first format, translating the call in the first format to a call in a second format, the second format being one of a plurality of heterogeneous social networking service application programming interface formats, and passing the call in the second format to a first social networking service by utilizing a first social networking service application programming interface.", "owner": "Zynga Inc.", "owner_city": "San Francisco", "owner_country": "US" } ]