Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

196 results about "Event object" patented technology

An event object is a synchronization object whose state can be explicitly set to signaled by use of the SetEvent function. Following are the two types of event object. The event object is useful in sending a signal to a thread indicating that a particular event has occurred.

Method and apparatus for exchanging event information between computer systems that reduce perceived lag times by subtracting actual lag times from event playback time

Mechanisms and techniques provide the system that allows a sending computer system to capture and store event information related to events that transpire on a sending computer system in event batches. The event information can include event functionality related to event object in the timestamp related to the event. Periodically, in response to the occurrence of the batch transfer condition, the sending computer system transmits an event batch monthly computer network for receipt by a receiving computer system. The event batch may be processed through a collaboration adapter on the networks while prior to being send to the receiving computer system. Upon receipt of an event batch at the receiving computer system, the receiving computer system can compute a lag time required to receive the event batch. The receiving computer system can then recreate events based on the event information in the event batches while compensating for network lag time incurred during transmission of the event batch between a sending and receiving computer systems. By compensating for network lag during the recreation or playback of events, the system of the invention avoids the receiving computer system from reproducing events in a choppy or discontinuous manner or from getting left behind during event recreation due to accumulations of network lag time.
Owner:CISCO TECH INC

Method and system for synchronization and display of a plurality of calendars on a device

A method and system are provided for synchronizing a plurality of calendars on a mobile device. An embodiment includes responsive to receiving a plurality of event objects, parsing each event object into event information and a calendar identifier. The method includes associating each event object with a calendar based on the calendar identifier. The method includes displaying the event objects on a calendar client executing on the consumer device, wherein each event object indicates the calendar with which it is associated.
Owner:T MOBILE USA

Comprehensive security structure platform for network managers

A computer system for detecting and monitoring network intrusion events from log data received from network service devices in a computer network, the computer system having discrete modules associated with a function performed on the log data received, the computer system having an event parser in communication with at least one network service device, the event parser being able to receive log data in real time from the device, the log data including information detailing a network intrusion event received from the network service device if an intrusion has occurred, the event parser being able to parse the information to create a corresponding event object concerning the intrusion event. The compute system also includes an event manager in communication with the event parser, the event parser being able to receive the event object, the event manager being configured to evaluate the event object according to at least one predetermined threshold condition such that, when the event object satisfies the predetermined threshold condition, the event manager designates the event object to be broadcast in real time, and an event broadcaster in communication with the event manager for receiving event objects designated by the event manager for broadcast, the event broadcaster being able to transmit the event object in real time as an intrusion alarm. The computer system may use a graphical user interface in communication with the event broadcaster, the graphical user interface having a display screen for displaying an intrusion alarm and the information contained within the corresponding event object received from the event broadcaster. The graphical user interface may be configured to allow a user to initiate queries and communicates with a report servlet coupled to the graphical user interface, the report servlet recalling stored event objects in response to user queries from the graphical user interface and displaying recalled event objects on the graphical user interface display screen. An application reporter coupled to the report servlet receives and processes user queries and performs searches of stored event objects within a database accessible by the application reporter. The database is configured to recall event objects in response to searches executed by the application reporter.
Owner:BLACKSTRATUS

Functional coverage analysis systems and methods for verification test suites

Coverage metrics are expressed with an intuitive graphical interface based upon data flow. Coverage analysis and presentation objects are integrated to produce coverage results which enable device functionality in a device under test to be modeled as objects, subject to event occurrence. Event objects are introspected at run-time, allowing the user to determine the event object's attributes with specification of coverage metrics subject to a selected combination of the event object's attributes. The event objects are serialized into permanent storage, allowing the user to specify and execute new coverage metrics at any time after simulation. Operations used to describe coverage metrics are modeled as analysis objects. Such analysis objects accept event objects as inputs, using a predetermined, well-defined interface. The combination of event objects and analysis objects allows coverage metrics to be specified in a simple data flow manner. With such a coverage metric, the user attaches or wires (metaphorically) the analysis objects together in a visual builder environment. Using the analysis objects, the user specifies desired coverage metrics, such as coverage of sequences of events and/or coverage of events that occur during the same time window of a simulation. The display functionality of the coverage tool is expandable because the presentation objects use the same event object interface as the analysis operator objects. Coverage metrics are subject to specification either before or after event occurrence. The user specifies coverage metrics using an intuitive graphical interface based upon data flow, without any specific programming language skills being necessary. Functional events in the device under test are treated as event objects. Each event object may be passed to selected analysis tools chosen by the user, such as analyzers, logic gates, and coincidence counters.
Owner:CIRRUS LOGIC INC

Electronic simulation of events via computer-based gaming technologies

Systems and methods for electronic simulation of events via computer-based gaming technologies are provided. Data relating to an event such as a sports games is received containing event object information. Events objects can be, for example, players on a field or objects relating to the event environment. A game object processing module correlates the event objects to game event objects. A video game console performs a game simulation using the game event objects, by applying the event data to the event objects, and then displaying the game simulation on the game console. The result is a simulation of the event via the game console.
Owner:ELECTRONICS ARTS INC

Vault controller dispatcher and methods of operation for handling interaction between browser sessions and vault processes in electronic business systems

A vault controller in an electronic business system includes a dispatcher for servicing browser requests initiated by a user for conducting business with an enterprise or organization using a vault process. The dispatcher further responds to a secure depositor receiving requests from other vault processes running in the controller. The request is in the form a URL containing an application domain/local context and application name. The request is detected and processed by event creator which forms an event object definitive of the request in the URL. An event handler parses the event object and enters a vault system application registry to locate the application in a shared memory. The location of the application is passed to a server pool, which assign a processing thread to handle the request. The thread engages a context manager which decrypts and imports application domain, application function and local context information from external storage to process the request. The application is located in the shared memory and the request implemented. The context manager encrypts and exports the processed information to external storage and provides a return code in the response to the user. The return code is used to locate the context information in a subsequent request by the user. The requests received from other vault processes through the secure depositor are handled in like manner to the user request. After execution of a user request, the vault process loops for some defined time during which other requests are received from the user. The absence of requests causes the vault process to shut down and store the variables for the next user request which retraces the steps of the original request.
Owner:IBM CORP

System and method for creating structured event objects

The present invention envisages a system and method for converting a voluminous stream of unstructured short text messages into event-objects of specific event type that may be of potential interest to users at far away locations. The method of structuring involves detecting long tail of events in spite of their sparsity. This is followed by extracting and correlating detected short text messages that describe same event type to create structured event objects.
Owner:TATA CONSULTANCY SERVICES LTD

Incident Response Plan based on Indicators of Compromise

A system and method for responding to incidents in an enterprise network is disclosed. The system tracks incidents by creating, in an incident Manager, incident objects for each incident. Each incident object includes details for the incidents, also known as incident characteristics. The system also creates one or more indicators of compromise (IOCs) associated with the incident characteristics for each incident. When processing a new incident or an update to an incident, the system compares IOCs associated with the incident object for the incident being processed to stored IOCs for other incidents to determine if other incidents are related to the incident being processed. In embodiments, the system can then generate tasks for responding to new incidents based on incident characteristics of and IOCs associated with the new incidents, and can regenerate tasks for responding to incidents based on updates to incident characteristics of and IOCs associated with the incidents.
Owner:IBM CORP

Time-based event processing using punctuation events

Methods, systems, and computer-readable media are disclosed for time-based event processing using punctuation events. A particular method includes receiving a first event object comprising a first validity start time and a first validity end time, where the first validity end time is initially undefined. A punctuation object is received after the first event object. The punctuation event object has a punctuation timestamp indicating a time subsequent to the first validity start time. The punctuation event object indicates that event objects to be received at the computer system after the punctuation event object have validity start times later than the time indicated by the punctuation timestamp. The method includes setting the first validity end time to a value later than or equal to the time indicated by the punctuation timestamp.
Owner:MICROSOFT TECH LICENSING LLC

Methods and Apparatus for Collecting, Searching, and Aggregating Historical Events in an Online System

Systems and methods for aggregating, processing, and displaying historical data—including actions and ideas—are provided. Based on a singular endpoint event or range of endpoint events, a plurality of historical threads both forward and backward looking in time are computed and displayed to the user via an interface in a manner that can assist the user in determining the relative importance of events along a thread. Event objects are created from data aggregated from cameras, global positioning software, social networking sites, direct user input, news feeds, and other sources. Connections between the objects are based on historical attributes including actors, descriptions, places, and time.
Owner:HUCK MARK MALLEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products