Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1134 results about "Java" patented technology

Java is a general-purpose programming language that is class-based, object-oriented (although not a pure object-oriented language, as it contains primitive types), and designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation. Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of the underlying computer architecture. The syntax of Java is similar to C and C++, but it has fewer low-level facilities than either of them. As of 2019, Java was one of the most popular programming languages in use according to GitHub, particularly for client-server web applications, with a reported 9 million developers.

Ontology for database design and application development

A system and method lets a user create or import ontologies and create databases and related application software. These databases can be specially tuned to suit a particular need, and each comes with the same error-detection rules to keep the data clean. Such databases may be searched based on meaning, rather than on words-that-begin-with-something. And multiple databases, if generated from the same basic ontology can communicate with each other without any additional effort. Ontology management and generation tools enable enterprises to create databases that use ontologies to improve data integration, maintainability, quality, and flexibility. Only the relevant aspects of the ontology are targeted, extracting out a sub-model that has the power of the full ontology restricted to objects of interest for the application domain. To increase performance and add desired database characteristics, this sub-model is translated into a database system. Java-based object-oriented and relational application program interfaces (APIs) are then generated from this translation, providing application developers with an API that exactly reflects the entity types and relations (classes and methods) that are represented by the database. This generation approach essentially turns the ontology into a set of integrated and efficient databases.
Owner:KYNDI

Fault tolerance software system with periodic external self-test failure detection

ActiveUS7096388B2Simple and rapid developmentImproved failure detectionSoftware testing/debuggingClient-sideMonitoring program
Fault tolerance is improved in a computing system which includes one or more computing machines by (i) executing a control thread or other control program in conjunction with a fault tolerance software system running on at least one of the machines, and (ii) initiating via the control program a test script program which sends one or more requests to a monitored program. The test script program also processes corresponding responses to the one or more requests, and generates a return value utilizable by the control program to indicate a failure condition in the monitored program. The computing system may be configured in accordance with a client-server architecture, with the fault tolerance software system and the monitored program both running on a server of the system. The test script program is preferably implemented in an object-oriented programming language such as Java, such that one or more components of the test script program comprise a base class from which one or more other components of the test script program are generatable for use with the monitored program.
Owner:AVAYA INC

Interactive development tool and debugger for web services

A development environment, comprising: text editing means (810); an interface (860) for passing amended code to a live running application (880) on a Java EE platform, and for receiving an exception in the event that said exception is generated by the application; means (830) for parsing said received exception in order to identify an associated portion of the amended code as identified in the exception; and means (810) for identifying the associated line of the class within the text editing means (810).
Owner:BRITISH TELECOMM PLC

Determining a number of users behind a set of one or more internet protocol (IP) addresses

IP address-user number estimates may be determined by accepting IP address usage information associating various IP addresses with various client identifiers, and generating an estimate of a number of users for at least one of the IP addresses using the IP address usage information. If the client identifiers include cookies, the estimate of a number of users for at least one of the IP address might be generated, in part, by determining a number of cookies for the at least one IP address for a given period of time, and multiplying the first ratio by a second, predetermined, ratio of a number of users per cookie for the given time period. If the client identifiers are user-agent parameters and / or browser parameters (e.g., screen setting information, time zone, history length, whether or not Java enabled, number of plug-ins, mime types, etc.), the estimate of a number of users per IP address might be generated, in part, by determining a ratio of unique sets of user agent and / or browser parameters for an IP address.
Owner:GOOGLE LLC

System and method for implementing click-through for browser executed software including ad proxy and proxy cookie caching

ActiveUS7475404B2Inability to overcomeExpanded advertisingDigital data information retrievalAdvertisementsThird partyIp address
An improved proxy is disclosed for allowing click-through on an ad URL delivered on a web page within a Java® applet executing on a client machine. The proxy caches cookie information for the browser, to support java applications that do not allow for planting of cookies directly. When the user clicks on the ad URL, the proxy retrieves the relevant cookie and link information from a host side database, and uses the same to help the browser open the correct URL associated with the ad. Additional controls are provided for the proxy including the ability to filter ads in an appropriate fashion for the applet, to cache ads from third party servers, to monitor applet behavior, to cache/pass on client IP address information, and to perform administrative tasks for the applet within the browser to enhance and facilitate ad delivery between advertisers and their intended audiences. The proxy thus acts to extend the reach and access of a conventional applet beyond the resources of a download host associated with such applet. In another embodiment, the applet controls a hidden frame within the browser, which hidden frame, unlike the applet frame, is able to download and plant a cookie from an ad server within the browser. When the user clicks on the ad URL, the browser uses the cooked from the hidden frame and passes it on to the Ad Server along with the URL, so that the user experiences a seamless and smooth transfer as would occur from a conventional HTML tag within the page.
Owner:RATEZE REMOTE MGMT LLC

Object model for Java TM

The mechanism includes three data structures: object data associated with each object O1, O2, O3 ... of a program, a class descriptor associated with the classes to which the objects O1, O2, O3 ... belong, and interface references. For each class Ci, the class descriptor corresponding to the class Ci includes: i) a class method table comprising one or more entries, wherein each entry identifies an implementation of a method inherited or defined by the class Ci; and ii) for each interface implemented by the class Ci, an interface method table comprising one or more entries, wherein each entry identifies an implementation of a method declared by the particular interface or an implementation of a method declared by an interface extended by the particular interface. An interface reference for an interface declaration ID associated with a given object OI, wherein the object OI implements methods that are declared by an interface declaration ID includes a pointer to the interface method table corresponding to the interface declaration ID within the class descriptor corresponding to the object OI. An efficient mechanism for method invocations is provided by generating an index that identifies the entry corresponding to the appropriate method in the interface method table pointed to by the pointer of the interface reference, reading the data stored by the entry identified by the index, and controlling the computer processing apparatus to jump to the address identified by the data.
Owner:IBM CORP

Province-city secondary system integrated comprehensive monitoring and process management system in power dispatching and implementation method for system

InactiveCN103745322AFull displaySolve the problem of managing processes that do not form a closed loopResourcesData informationClosed loop
The invention discloses a province-city secondary system integrated comprehensive monitoring and process management system in power dispatching and an implementation method for the system. The system is designed on the basis of SOA (service-oriented architecture), a bottom layer is programmed by adopting standard C, a front end is constructed by applying a J2EE (java 2 enterprise edition) technology, and the system is a cluster-type integrated architecture system which is arranged on a plurality of servers; the system is characterized by comprising a real-time monitoring module and a management function module, wherein the real-time monitoring module is used for IT (information technology) monitoring, machine room environment monitoring and service data validating (RTU (remote terminal unit) and OCS (office communication server) monitoring); the management function module comprises IT asset management, operation and maintenance management and professional reports. The system and the implementation method have the beneficial effects that a comprehensive platform is realized, and the automatic monitoring situations can be displayed comprehensively; province-city two-level automatic system data sharing is realized, and valuable data information can be provided for operators on duty automatically; the problem that a closed-loop process is not formed in the conventional automatic internal management is solved.
Owner:YUNNAN ELECTRIC POWER DISPATCH CONTROL CENT +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products