Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

314results about How to "Disadvantages can be reduced eliminated" patented technology

Computer-implemented PDF document management

A PDF file is received from an external application and key information from the PDF file, concerning a PDF document contained in the PDF file, is extracted. The extracted key information is compared with analogous reference information stored for previously received PDF documents to determine a status for the received PDF document, which is provided to the external application from which the PDF file was received. The received PDF document is a duplicate if all the extracted key information matches analogous reference information, is an updated document if certain but not all the extracted key information matches analogous reference information, or is a new document if at least certain extracted key information does not match analogous reference information. If the PDF document is a duplicate document, processing of the PDF file is returned to the application without storing any extracted key information as reference information. If the PDF document is an updated document, certain extracted key information is stored to update the reference information and processing of the PDF file is returned to the application. If the PDF document is new, all extracted key information is stored as reference information and processing of the PDF file is returned to the application.
Owner:JDA SOFTWARE GROUP

Mobile transactions using authorized tokens

Conducting mobile transactions comprises determining, using a processor, whether a network is available to facilitate a mobile transaction. An interface, communicatively coupled to the processor, receives an encrypted token from a mobile device without using the network if the network is not available. The processor is further operable to process the encrypted token to complete the mobile transaction.
Owner:BANK OF AMERICA CORP

Generating a risk assessment regarding a software implementation project

InactiveUS7359865B1Disadvantages can be reduced eliminatedImplementation be reduced eliminatedFinanceResourcesRisk levelItem generation
A computer-implemented method for generating a risk assessment regarding a software implementation project includes accessing a previously specified importance value and maximum score for each of a multiple of risk factors. The importance value for each risk factor reflects experience of an implementing entity regarding the extent to which the factor may negatively impact a software implementation project if the factor is not adequately addressed, the importance value and maximum score for each factor being multiplied to define a potential weighted score for the factor. An actual score for a particular software implementation project is received for each factor based on an analysis specific to the particular project. An actual weighted score for the particular project is generated for each factor by multiplying the importance value and actual score for the factor, and a relationship between the potential weighted score and actual weighted score for each factor. A risk level for the particular project is assigned to each factor according to the relationship between the potential weighted score and the actual weighted score for the factor. The risk level for each factor represents an assessment regarding the extent to which the factor may negatively impact the particular project if the factor is not adequately addressed. A risk assessment is generated for the particular project including one or more of the assigned risk levels for the particular project for one or more corresponding factors.
Owner:BLUE YONDER GRP INC

Managing information technology (IT) infrastructure of an enterprise using a centralized logistics and management (CLAM) tool

InactiveUS20050159969A1Disadvantages can be reduced eliminatedReducing and eliminating ambiguity and misunderstandingSpecial data processing applicationsLogistics managementKnowledge management
In one embodiment, a process for managing information technology (IT) infrastructure of an enterprise includes: (1) capturing and storing IT infrastructure information regarding the IT infrastructure of the enterprise; (2) defining a plurality of roles within the enterprise, each role specifying a particular job function within the enterprise; (3) associating items of IT infrastructure with roles within the enterprise such that each role is associated with one or more predetermined items of IT infrastructure; (4) assigning roles to one or more employees of the enterprise such that each of the one or more employees is associated with one or more roles and is assigned the one or more predetermined items of IT infrastructure associated with each of these one or more roles; (5) automatically modeling a change in the IT infrastructure for one or more impacted employees; and (6) automatically initiating deployment of one or more IT infrastructure assets for the one or more impacted employees by organizing delivery of the one or more IT infrastructure assets to the one or more impacted employees to implement the change modeled.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP

System and method for a directory secured user account

A system and method for providing network access includes identifying an available network resource, providing an access token to the available network resource, tracking the access token, and terminating the access token.
Owner:CAPITAL ONE FINANCIAL

System And Method For Distributed Processing

In one embodiment, a first portion and a second portion of a data set are identified. The first portion of the data set is sent to a first node that stores it in a first primary storage. The first primary storage is configured such that a first processor of the first node accesses information stored in the first primary storage without accessing another storage device. The second portion of the data set is sent to a second node that stores it in a second primary storage. The second primary storage is configured such that a second processor of the second node accesses information stored in the second primary storage without accessing another storage device. The first node generates a first set of results by processing the first portion of the data set. The second node generates a second set of results by processing the second portion of the data set.
Owner:CALLIDUS SOFTWARE

System and Method for Providing Communication Services to Mobile Device Users Incorporating Proximity Determination

In certain embodiments, a method for proximity determination includes receiving one or more network identifiers, each associated with a corresponding network, from a first mobile device. The method further includes receiving one or more network identifiers, each associated with a corresponding network, from a second mobile device. The method further includes processing the network identifiers received from the first and second mobile devices to determine whether the first mobile device and the second mobile device are in proximity to one another.
Owner:JAMBO NETWORKS

Routing shipments according to criticality

A computer-implemented method for routing shipments according to criticality includes accessing an initial solution to an optimization problem of routing multiple shipments to multiple locations using multiple vehicles, the initial solution including multiple loads such that each shipment is routed within exactly one load and a global cost across all loads is minimized, the initial solution being generated independent of the criticality of the shipments. Into each of one or more critical loads in a current solution, one or more non-critical shipments are inserted that are within a neighborhood of the critical load, a critical load being a load containing at least one critical shipment. One or more local search operations are executed to improve the initial solution, the operations including at least one of: (a) splitting each of one or more selected critical loads in a current solution into two new critical loads; (b) for each of one or more selected critical load pairs in a current solution, move a sequence of stops from one critical load in the pair to the other critical load in the pair and / or swap two sequences of stops between the critical loads in the pair; and (c) for each of one or more selected critical loads in a current solution that are indirect critical loads having at least one in-transit stop, break up the indirect critical load into a plurality of new direct critical loads having no in-transit stops and execute operation (b) on each of one or more selected critical load pairs, each selected critical load pair including at least one new direct critical load.
Owner:BLUE YONDER GRP INC

System and method for generating a unified accounting record for a communication session

A method for creating an accounting record in a policy server in a communication network. The method also includes receiving policy data from one or more application layer elements. The method includes receiving accounting data from one or more lower layer elements, such that the accounting data is associated with the policy data. The method also includes consolidating the accounting data and the policy data received.
Owner:CISCO TECH INC

Interactive approach for managing risk and transparency

A network interface accesses project data, wherein the project data comprises a metric for a project. A processor determines a project completeness based on the project data. The network interface receives a project assessment and also accesses updated project data, wherein the updated project data comprises an updated metric for the project. The processor then determines an updated completeness of the project, and determines a change in the completeness of the project. When the change in the completeness of the project is over a threshold, the processor sets a material change flag. The processor also determines a low-granularity project status. The processor then generates a project heat map. The project heat map is displayed in a tabular format. The project heat map presents the completeness of the project, material change flag, and the low-granularity project status for the project simultaneously.
Owner:JPMORGAN CHASE BANK NA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products