Subscribe: Untitled
http://www.freepatentsonline.com/rssfeed/rsspat719.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
application  data  device  function  information  message  method  operating system  operating  process  request  service  system 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Untitled

Untitled





 



Integrated business system for web based telecommunications management

Tue, 24 Nov 2015 08:00:00 EST

The specification discloses a method of doing business over the public Internet, particularly, a method which enables access to legacy management tools used by a telecommunications enterprise in the management of the enterprise business to the enterprise customer, to enable the customer to more effectively manage the business conducted by the customer through the enterprise, this access being provided over the public Internet. This method of doing business is accomplished with one or more secure web servers which manage one or more secure client sessions over the Internet, each web server supporting secure communications with the client workstation; a web page backplane application capable of launching one or more management tool applications used by the enterprise. Each of the management tool applications provide a customer interface integrated within said web page which enables interactive Web/Internet based communications with the web servers; each web server, supports communication of messages entered via the integrated customer interface to one or more remote enterprise management tool application servers which interact with the enterprise management tool applications to provide associated management capabilities to the customer.



Use of a warning track interruption facility by a program

Tue, 18 Aug 2015 08:00:00 EDT

A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup.



Warning track interruption facility

Tue, 18 Aug 2015 08:00:00 EDT

A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup.



Providing by one program to another program access to a warning track facility

Tue, 11 Aug 2015 08:00:00 EDT

A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup.



Providing by one program to another program access to a warning track facility

Tue, 11 Aug 2015 08:00:00 EDT

A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup.



Use of a warning track interruption facility by a program

Tue, 04 Aug 2015 08:00:00 EDT

A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup.



Handling dynamically linked function calls with respect to program code conversion

Tue, 26 May 2015 08:00:00 EDT

A technique is provided for handling dynamically linked subject function calls arranged pass subject control flow to an intermediate control structure such as a procedure linkage table, then to subject linker code for modifying link information associated with the subject function calls during translation of subject code into target code in a dynamic binary translator. The subject code for execution on a subject processor is received by a translator, and corresponding target code for execution on the target processor is generated. The translator is arranged to build a function linkage table containing an entry giving the location of each function called by the subject code, so that code can be generated by the translator in which subject function calls are associated with code for performing the function, without generating target code corresponding to the intermediate control structure.



Programming language conditional event dispatcher

Tue, 26 May 2015 08:00:00 EDT

Methods and systems of monitoring events occurring in a computer system are provided. An event monitoring instruction including a condition is parsed, the event monitoring instruction expressed using syntax defined in source code, the parsing resulting in an event channel to monitor and the condition. Then execution of an application is paused. The event channel is monitored until an event occurs on the event channel. Then an event handler for the event is run in response to the event occurring on the event channel. The condition is evaluated to determine whether the condition is satisfied. Execution of the application is resumed in response to the condition being satisfied.



Dispatcher framework to provide inter-application communication

Tue, 26 May 2015 08:00:00 EDT

A dispatcher framework to provide non-blocking inter-application communication is disclosed. In various embodiments, a call to a service that is blocking with respect to the service is received from a calling process. The service is called on behalf of the calling process in a manner that does not require the calling process to remain blocked during at least a portion of a time during which the call to the service is performed.



Inmate information center for correctional facility processing

Tue, 26 May 2015 08:00:00 EDT

A platform application and methods of operation that integrate both native and third-party modules into an integrated environment on an inmate computing device is disclosed. Third-party modules or systems are applications meant to operate independent from the platform application. Information is communicated between the platform application and third-party module or system to add audit, alarm and other functions across all modules or systems controlled by the platform software. The third-party module or system is audited to allow triggering of rules that cause remedial action to be taken. Triggers can be on actions not monitored by a particular third-party module or system.



Dynamic rule management for kernel mode filter drivers

Tue, 26 May 2015 08:00:00 EDT

A method for providing rules for a plurality of processes from a user mode to a kernel mode of a computer is disclosed. The method includes providing to the kernel mode a policy for at least a first process of the plurality of processes, the policy indicating at least when and/or how notifications are to be provided from the kernel mode to the user mode upon detection in the kernel mode of launching of the first process. The method further includes selecting, from the rules stored in the user mode, rules related to the launching of the first process, in response to receiving from the kernel mode a first notification in accordance with the policy, and providing the selected rules related to the launching of the first process from the user mode to at least one of the one or more filter drivers in the kernel mode.



Virtual machine communication

Tue, 26 May 2015 08:00:00 EDT

Two or more virtual machines may be co-located on a same physical machine, and the virtual machines may communicate with each other. To establish efficient communication, memory mapping information for respective virtual machines can be exchanged between the respective virtual machines. An instance of a virtualized network interface can be established, and a direct communications channel can be mapped between respective virtualized network interfaces. Data packet routing information can be updated, such that data packets transferred between two of more co-located virtual machines can be transferred using the virtualized network interface communications channel.



Interfacing between native and web applications utilizing a mobile module

Tue, 26 May 2015 08:00:00 EDT

According to one embodiment of the present disclosure, interfacing between a plurality of applications for display on a mobile device includes receiving, by an interface, a request to open a plurality of applications. The plurality of applications are associated with a plurality of business units and comprise one or more native applications and one or more web applications. A processor opens the plurality of applications in a container according to a configuration file. The processor is communicatively coupled to the interface. The container is operable to be displayed on a user interface of the mobile device.



OData service provisioning on top of GenIL layer

Tue, 26 May 2015 08:00:00 EDT

The disclosure generally describes computer-implemented methods, software, and systems for allowing provisioning of open data protocol (OData) services on top of a generic interaction layer (GenIL). One computer-implemented method includes receiving an OData-compliant request for data, determining a GenIL data provider to receive the OData-compliant request for data, determining the memory location of the data, requesting the data from the determined memory location, receiving the requested data from the determined memory location, converting, using at least one computer, the received data into an OData-compliant format, rendering an OData-compliant response, and transmitting the OData-compliant response.



State management of operating system and applications

Tue, 26 May 2015 08:00:00 EDT

A method and a processing device may be provided for state management of an operating system and applications. A framework may be provided for separating behaviorless state information from code or instructions for executing a method. Applications may have instances of state information derived from, or completely different from, instances of state information of an operating system. Instances of state information for an application may be layered over corresponding instances of state information of the operating system, such that the application and the operating system may have different views of the instances of the state information. At least one policy may be defined, which may include rules for resolving conflicts, information for providing a merged view of data from multiple repositories, default values for instances of data, as well as other information. In various implementations, referential integrity of state information may be guaranteed.



Application gateway in a browser based environment

Tue, 26 May 2015 08:00:00 EDT

An application gateway enables controlled communication between application components within a browser based environment while maintaining a level of isolation of the individual application components. A dispatching API wrapper and a listening API wrapper are registered for each of a plurality of application components. The registered API wrappers are used to send and receive communications from the associated application components. For example, a first application component can dispatch an action to a second application component via the first application component's dispatching API wrapper. The second application component can receive the action via the second application component's listening API wrapper. As another example, a first application component can dispatch an event that broadcasts a state to other application components via the first application component's dispatching API wrapper. A listening API wrapper of at least one other application component receives the state and may perform other functions dependent on the state.



Asynchronous callback driven messaging request completion notification

Tue, 26 May 2015 08:00:00 EDT

Through an asynchronous callback enhancement, a thread makes a non-blocking request (e.g., send, receive, I/O) to a message passing interface library, and a callback routine is associated with the request as an asynchronous callback to the thread. The callback is queued for execution in the requesting thread and so has a deterministic execution context. Callback queuing may occur in response to another thread detecting that the request is complete. Further control over callback execution is provided by state transitions which determine whether the thread is open to processing (e.g., executing) an asynchronous callback. Callback association is done by a broad or by narrow association routines. An application which has processes organized in ranks, each including a communication thread with associated callback(s), and multiple worker threads. Interruptible wait enhancements may also be present.



System and method for event-driven live migration of multi-process applications

Tue, 26 May 2015 08:00:00 EDT

A system, method, and computer readable medium for asynchronous live migration of applications between two or more servers. The computer readable medium includes computer-executable instructions for execution by a processing system. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. Asynchronous live migration is provided through a combination of process replication, logging, barrier synchronization, checkpointing, reliable messaging and message playback. The live migration is transparent to the application and requires no modification to the application, operating system, networking stack or libraries.



Protecting visible data during computerized process usage

Tue, 26 May 2015 08:00:00 EDT

Embodiments of the present invention provide an approach for protecting visible data during computerized process usage. Specifically, in a typical embodiment, when a computerized process is identified, a physical page key (PPK) is generated (e.g., a unique PPK may be generated for each page of data) and stored in at least one table. Based on the PPK a virtual page key (VPK) is generated and stored in at least one register. When the process is later implemented, and a request to access a set of data associated the process is received, it will be determined whether the VPK is valid (based on the PPK). Based on the results of this determination, a data access determination is made.



Automated service interface optimization

Tue, 19 May 2015 08:00:00 EDT

Disclosed are various embodiments for automated service interface optimization. In one embodiment, a service client and/or a service provider is reconfigured to use an optimized version of a data transfer interface, where the optimized version transfers fewer data items from the service provider to the service client. In another embodiment, service calls from a service client for multiple different data objects are aggregated into an aggregated service call for a data object. In yet another embodiment, an optimized data object is provided to a service client in response to a request for an unoptimized data object. If the service client attempts to use a data item excluded from the optimized data object, the excluded data item is then provided to the service client.



Retrieving service request messages from a message queue maintained by a messaging middleware tool based on the origination time of the service request message

Tue, 19 May 2015 08:00:00 EDT

Systems and methods for retrieving service request messages stored in a messaging queue and received by a queue in real-time. The service request messages are retrieved using a plurality of threads that comprise at least one retrieval criteria. Service request messages may be retrieved from the message queue or retrieved as they are received by the message queue in real-time using criteria in addition to or instead of the arrival time of the service request message which may also be referred to as the put-time. Service request messages may be requested and retrieved in an iterative process wherein multiple threads execute consecutively, concurrently, or a combination of both, in order to retrieve service request messages requested by an application.



Browser window frame-to-frame communication

Tue, 19 May 2015 08:00:00 EDT

Communication facilitated between frames of a browser window. Whenever a particular frame receives a message destined for a target frame from a source frame, the particular frame determines if the particular is indeed the target frame. If so, the particular frame processes the message, but if not, the particular frame determines whether the target frame has registered with the particular frame. If the target frame has registered with the particular frame, the particular frame uses a handle communicated as part of the registration to dispatch the message further towards the target frame. In some cases, this handle may be directly that of the target frame itself, in which case the particular frame communicates the message directly with the target frame. This manner of inter-frame communication may be facilitated by a unique registration process when frames come into existence.



Methods and systems for dynamically establishing one or more connections between a software application and a cluster of message broker

Tue, 19 May 2015 08:00:00 EDT

An exemplary method includes a broker-based messaging system detecting a request provided by a software application for the software application to connect to any one of a plurality of brokers included in a cluster of brokers, dynamically identifying, in response to the request and in accordance with a connection distribution heuristic, a broker included in the cluster of brokers and that is available for connection to the software application, and attempting to establish a connection between the software application and the broker. Corresponding methods and systems are also disclosed.



Batch execution of system calls in an operating system

Tue, 19 May 2015 08:00:00 EDT

A system and a method are disclosed for batch execution of system calls in an operating system. In one implementation, a processing device configures a system call batching buffer table in a user space of an operating system, the system call batching buffer table including a plurality of system call units, associates a system call number with the system call batching buffer table, and issues a trap instruction to a kernel of the operating system to execute at least one of the plurality of system call units, the trap instruction including the system call number.



Detouring in scripting systems

Tue, 19 May 2015 08:00:00 EDT

A system described herein includes a receiver component that receives third party code for execution in a host environment, wherein the third party code corresponds to a dynamic programming language, and wherein the third party code has at least one object reference to a first object that is used by the third party code. A detouring component automatically replaces the first object referenced by the third party code with a proxy object such that the third party code at runtime calls the proxy object instead of the first object.



Multi-source, multi-destination data transfers

Tue, 19 May 2015 08:00:00 EDT

Methods, systems, and products are disclosed for multi-source, multi-destination data transfers that include identifying a plurality of destination points having destination contexts in one or more destination objects; selecting source content for transfer; displaying destination contexts for the destination points; and directing source content to at least one destination point in dependence upon the displayed destination contexts. In typical embodiments, identifying destination points includes recording each identified destination point and storing in association with each recorded destination point a copy of a destination context for each recorded destination point.



Propagating a diagnostic session for business transactions across multiple servers

Tue, 19 May 2015 08:00:00 EDT

The present technology may determine an anomaly in a portion of a distributed business application. Data can automatically be captured and analyzed for the portion of the application associated with the anomaly. By automatically capturing data for just the portion associated with the anomaly, the present technology reduces the resource and time requirements associated with other code-based solutions for monitoring transactions. In an embodiment, a method for monitoring an application may begin with detecting a diagnostic event. A diagnostic identifier may be associated with the request in response to the diagnostic event. An outgoing call may be detected at a first server associated with processing the request. The outgoing call may be modified at the first server to include the diagnostic identifier, the outgoing call with the diagnostic identifier received by a remote computer.



Routing of performance data to dependent calculators

Tue, 19 May 2015 08:00:00 EDT

A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it.



Information processing apparatus, method and program for writing file system metadata of plural operating systems

Tue, 19 May 2015 08:00:00 EDT

An information processing apparatus includes a transmission unit transmitting a command of a second operating system to the second operating system when receiving the command via a communication path which communicates under a control based on a first operating system, an extraction unit extracting data for the second operating system by analyzing the command transmitted from the transmission unit, and a writing unit writing the data extracted by the extraction unit as data constituting file system metadata of the second operating system.



System and method to boost application performance by using a proxy for executing synchronous application programming interface calls

Tue, 12 May 2015 08:00:00 EDT

Techniques are described for utilizing synchronous APIs which normally block callers until a result is returned. In particular, the techniques described herein enable an application or other programming construct to boost performance by executing synchronous APIs (e.g., long running time APIs) within a proxy container rather than executing the synchronous APIs in the context of the application itself. Since the proxy is a separate process or thread, the caller application is thereby released from waiting for the synchronous API call and may proceed with other processing instead of waiting for the synchronous API to return. The application may then monitor the proxy to determine whether a result has been received, such as by periodically polling the proxy.



Systems and methods for application reuse

Tue, 12 May 2015 08:00:00 EDT

System and methods are provided. In one embodiment, a system includes a master data archiver configured to store a data related to a turbomachine system and a first data collector service system configured to collect the data from the master data archiver. The system also includes a second data collector service system communicatively coupled to the first data collector system and configured to pull or to push the data from the first data collector system and a first data archiver configured to receive at least some of the data from the second data collector system. The system further includes an asset model database storing a plurality of turbomachine tags, wherein the turbomachine tags are configured to categorize the data and a data access system (DAS) configured to provide data access to the first data archiver, the asset model database, or a combination thereof.



Dependency based configuration package activation

Tue, 12 May 2015 08:00:00 EDT

An update platform is described that collectively handles driver and firmware updates for hardware resources of a computing device based on dependencies associated with the updates. The update platform may instantiate representations of each individual hardware resource as abstractions through which detection, analysis, acquisition, deployment, installation, and tracking of updates is managed. Using the representations, the update platform discovers available updates, matches configuration packages for the updates to appropriate resources, and initiates installation of the configuration packages. The update platform is further configured to recognize dependencies associated with the configuration packages. When dependencies are detected, corresponding configuration packages are marked to reflect the dependencies and activation is suspended until the dependencies are satisfied. Upon satisfaction of the dependencies, the dependencies are cleared and the configuration packages are activated. Configuration packages that are not associated with dependencies may be installed and activated “normally” at any time.



Apparatus and method for supporting suspend of composite network device

Tue, 12 May 2015 08:00:00 EDT

An apparatus and a method support a selective suspend mode in a driver for any one of at least two devices constituting a composite network device. When a device of the driver requests suspend mode transition, a Physical Device Object (PDO) constituting a driver of the composite network device is identified by a PDO check part. A suspend mode transition request information of the device is sent to an operating system through the PDO. When the operating system allows the suspend mode transition, a control part sends suspend mode transition indication information to the device through the PDO.



Computation device and computation execution method

Tue, 12 May 2015 08:00:00 EDT

A computation device includes a data path element (300) including a function processing unit (4000) that executes a computation specified in a function using input data included in an event (1000) as an argument; and a control path element (2000) that detects the event (1000) by use of a return value (ret) of the function. The function processing unit (4000) includes a data calculation unit (4001) that executes a computation and outputs a first result (d0); and a control comparison unit (4002) that outputs, to the control path element (2000), a result of comparison between the input data and data for specifying the event (1000), as the return value (ret).



Method and management agent for event notifications correlation

Tue, 12 May 2015 08:00:00 EDT

Methods and apparatus for correlating event notifications between agents in a management network are provided. An agent constructs a network notification in response to receiving an event notification. If the received event notification is associated with a prior notification already received and stored by the agent, a correlation attribute is added to the constructed network notification. If the received notification matches a peer agent notification category that another agent in the management network is interested in receiving, the constructed network notification is sent to the other agent.



Application function library framework

Tue, 12 May 2015 08:00:00 EDT

A component instance manager of a database system generates an instance of the application function. The component instance manager then generates an executor for the application function, and requests an instance of a component class of the application function from a package manager of the database system. A void pointer associated with the instance of the component class and a wrapper function address associated with the application function are accessed by the component instance manager, where the void pointer and wrapper function address comprise runtime parameters of the application function. The application function is thereafter executed by the executor according to the runtime parameters.



Message communication of sensor and other data

Tue, 12 May 2015 08:00:00 EDT

A service may be provided that reads sensors, and that communicates information based on the sensor readings to applications. In one example, an operating system provides a sensor interface that allows programs that run on a machine to read the values of sensors (such as an accelerometer, light meter, etc.). A service may use the interface to read the value of sensors, and may receive subscriptions to sensor values from other programs. The service may then generate messages that contain the sensor value, and may provide these messages to programs that have subscribed to the messages. The messages may contain raw sensor data. Or, the messages may contain information that is derived from the sensor data and/or from other data.



Virtual machine migration with direct physical access control

Tue, 12 May 2015 08:00:00 EDT

A data processing system facilitates virtual machine migration with direct physical access control. The illustrative data processing system comprises a software-programmable trap control associated with hardware registers of a computer that selectively vectors execution control of a virtual machine (VM) between a host and a guest. The data processing system further comprises a logic which is configured for execution on the computer that programs the trap control to enable the virtual machine to directly access the hardware registers when the virtual machine is not migrated and to revoke direct access of the hardware registers in preparation for virtual machine migration.



Web-based interaction with a local system

Tue, 12 May 2015 08:00:00 EDT

Systems, methods, and computer program products for facilitating web-based interaction with a local system are disclosed. Such systems, methods, and computer program products provide an approach that allows a web client within in a web browser environment to access local hardware and local software—via a web server contained in the local system—in a local computer system. In response to a user input, the web client directs local hardware and local software to perform actions (e.g., writing files and taking pictures). Information related to such actions is returned to the web client via the local web server. The local computer system may be remotely located from the web client and such returned information may be stored and/or executed at a remote site (e.g., cloud database). Security layers may be provided to authenticate the user as well as user permissions for accessing the local computer system.



Method and computer device for inserting attachments into electronic message

Tue, 12 May 2015 08:00:00 EDT

A method for inserting attachments into an electronic message is provided. The method may include searching a keyword database to determine if a content of the electronic message includes a keyword, a key phrase, or a key sentence defined in the keyword database. The method may also include applying a condition to a file database, if the determination is affirmative, so as to search for at least a candidate item. The candidate item may be presented in a menu to the user. The method may further include enabling, in response to the user's confirmation of the candidate item, the confirmed candidate item to be inserted into the electronic message automatically to become an attachment thereto.



Method and system for performing security monitoring on file downloading

Tue, 05 May 2015 08:00:00 EDT

The present invention discloses method and system for performing security monitoring on file downloading, and a non-transitory computer-readable medium that stores instructions for performing security monitoring on file downloading. The method includes upon detecting a file downloading operation, performing security detection on a downloaded file to determine whether the downloaded file is secure; if the downloaded file is secure, determining whether a downloading tool adopted when the file is downloaded is instant messenger (IM) software; and if the adopted downloading tool is IM software, modifying a filename extension of the downloaded file to ensure that the downloaded file is capable of being directly opened or run.



Methods for analyzing, limiting, and enhancing access to an internet API, web service, and data

Tue, 05 May 2015 08:00:00 EDT

The invention includes an API gateway server that monitors and controls the distribution of API elements from API sources to application developers based on a distribution rule set.



Methods and apparatus for constructing a secure and flexible operating system

Tue, 05 May 2015 08:00:00 EDT

The present disclosure provides methods and apparatus for constructing a secure and flexible operating system. The presently disclosed system executes different user applications in different operating systems on different virtual machines. Each user application communicates with other processes via the hypertext transfer protocol (HTTP). In particular, each user application's user interface is implemented in a web browser that is running in its own operating system on its own virtual machine, and each user application interacts with the user interface by exchanging HTTP messages between the virtual machines.



Information output device, method, and recording medium for outputting notification information corresponding to a state of a computer

Tue, 05 May 2015 08:00:00 EDT

An information output device includes a first processor configured to execute a process to determine a type of notification information which is outputted from a computer and which notifies a state of the computer; and a second processor configured to execute a process to create a chart, in which a first coordinate axis represents time when the notification information is outputted from the computer, a second coordinate axis represents the type of the notification information, and the notification information is drawn at a corresponding position, and output the chart.



Status management device, status management method, and recording medium

Tue, 05 May 2015 08:00:00 EDT

A status management device is presented, the device including multiple first application units for monitoring status information indicating a status of a management target, multiple second application units for outputting first acquisition request information of the status information with identification information of the management target, a search unit for outputting a storage location corresponding to the identification information when the first acquisition request information is received from the second application unit, a request unit for outputting second acquisition request information of the status information to the first application unit corresponding to the outputted storage location, and a transmission unit for outputting the status information supplied from the first application unit in response to the second acquisition request information to the second application unit which corresponds to a request source of the first acquisition request information.



Non real-time metrology data management

Tue, 05 May 2015 08:00:00 EDT

The techniques described herein implement an operating system that can reliably process time sensitive information in non real-time manner. Thus, the operating system described herein is capable of processing an instance of time sensitive input during a time period after the instance of time sensitive input is received (e.g., at a future point in time). To accomplish this, the techniques timestamp each instance of time sensitive input when it is received at a device. The techniques then store the timestamped instance of time sensitive input in a temporary queue, and make the timestamped instance available to the operating system at a time period after the time period when it is received, as indicated by the timestamp. Additional techniques described herein prioritize the activation of a driver configured to receive the time sensitive information during a boot sequence or a reboot sequence.



Communication among execution threads of at least one electronic device

Tue, 05 May 2015 08:00:00 EDT

A method of communication in at least one electronic device is presented. In the method, a first execution thread and a second execution thread are created in the at least one electronic device. Also created is a message service for receiving messages for the first thread. A message to be transferred from the second thread to the message service of the first thread is generated. One of multiple data transfer mechanisms is selected for transferring the message from the second thread to the message service of the first thread based on a relationship between the first and second threads. This relationship may be one in which the first and second threads are executing within a single process, within different processes of the same device, or within different devices. The message is transferred to the message service of the first thread using the selected data transfer mechanism and processed in the first thread.



Administering message acknowledgements in a parallel computer

Tue, 05 May 2015 08:00:00 EDT

Administering message acknowledgements in a parallel computer that includes compute nodes, with each compute node including a processor and a messaging accelerator, includes: storing in a list, by a processor of a compute node, a message descriptor describing a message and an acknowledgement request descriptor describing a request for an acknowledgement of receipt of the message; processing, by a messaging accelerator of the compute node, the list, including transmitting, to a target compute node, the message described by the message descriptor and transmitting, to the target compute node, the request described by the acknowledgement request descriptor; receiving, by the messaging accelerator from the target compute node, an acknowledgement of receipt of the message, including notifying the processor of receipt of the acknowledgement; and removing, by the processor from the list, the message descriptor and the acknowledgment request descriptor.



System and method for providing additional functionality to existing software in an integrated manner

Tue, 05 May 2015 08:00:00 EDT

An improved system and method are disclosed for improving functionality in software applications. In one example, the method includes a mobile device having a network interface, a processor, and a memory configured to store a plurality of instructions. The instructions include instructions for a superblock application having instructions for a function block included therein. The function block is configured to provide functions that are accessible to the superblock application via an application programming interface (API). The functions are provided within the superblock application itself and are accessible within the superblock application without switching context to another application on the mobile device.



Allowing inter-process communication via file system filter

Tue, 05 May 2015 08:00:00 EDT

In one embodiment, a method allows an application running in a first process to communicate with a second process. A file system filter driver receives a command from the application for a file. The file system filter driver is configured to process file system commands. The file system filter driver determines that the command is for an inter-process communication with a service running in the second process based on the command being for the file. Then, the file system filter driver sends the command to the service running in the second process where the command is processed by the service. A response from the service is received based on the command being processed by the service and the file system filter driver sends the response to the application.