Systems and methods for generating custom products using configurable services platforms are disclosed. A method for generating a custom financial instrument may include: (1) uploading, by a custom card engine computer program executed by a backend electronic device, a plurality of options for financial instrument features to a database; (2) presenting, by the custom card engine computer program, the plurality of options for financial instrument features to a customer on a customer electronic device; (3) receiving, by the custom card engine computer program, a selection of a subset of the plurality of options for financial instrument features from the customer electronic device; (4) generating, by the custom card engine computer program, a custom financial instrument based on the subset of the plurality of options for financial instrument features; and (5) issuing, by the custom card engine computer program, the custom financial instrument to the customer.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Systems and methods for using a device wallet identifier are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for generating a device wallet identifier may include: (1) receiving a wallet identifier for an electronic wallet or payment application executed by an electronic device; (2) retrieving an issuer identifier for a customer associated with the electronic wallet or payment application; (3) generating a device wallet identifier; and (4) storing a mapping of the device wallet identifier to the issuer identifier for the customer.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
3.
SYSTEM, METHOD, AND PATTERN FOR INTEGRATING INCOMPATIBLE OIDC IMPLEMENTATIONS
Various methods, apparatuses/systems, and media for integrating incompatible open identity connect (OIDC) implementations are disclosed. A processor creates a custom protocol within an API gateway that understands data coming in from the aIDC protocol; receives data from the OIDC protocol; and determines, based on analyzing the data received from the aIDC protocol, any communication gap between an application and an identity layer, wherein the API gateway is implemented between the application and the identity layer. The processor then converts, in response to determining a communication gap, the data received from the aIDC protocol into a formatted data that is understandable by the application; transmits the formatted data to the application; and automatically eliminates any communication gap between the application and the identity layer based on the received formatted data.
Systems and methods for integrating pay by bank services are disclosed. A method may include a merchant computer program: (1) receiving a request to add funds to a merchant account or wallet; (2) receiving a selection to add an online banking account to the merchant account or wallet; (3) receiving a selection of a funding amount; (4) receiving a selection of a user financial institution; (5) receiving user login credentials for the user financial institution; (6) receiving, from a user financial institution backend, one or more bank accounts associated with the user login credentials; (7) receiving a selection of one of the bank accounts; (8) receiving a token for the selected bank account from a merchant financial institution backend; (9) storing the token in a merchant wallet; and (10) conducting a funding transaction for the funding amount using the token.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
5.
METHOD AND APPARATUS FOR AUTOMATICALLY GENERATING AN APPLICATION CODE AND FRAMEWORK
Various methods, apparatuses/systems, and media for automatically building an application framework are disclosed. An internal database stores available design patterns and code snippets for developing an application. A receiver receives, as input, a requirement document that includes one or more requirements for developing the application. A processor parses the requirement document by implementing a natural language processing algorithm; creates, based on the parsed requirement document, a plurality of code blocks for generating a structure and a design pattern to be used to develop the application by matching the one or more requirements with the available design patterns; accesses the database to obtain the code snippets for the plurality of code blocks; and automatically builds an application framework based on the code snippets.
System and methods for managing third party tokens and transaction across issuer ecosystems are disclosed. In one embodiment, in an information processing device comprising at least one computer processor, a method for managing payment tokens may include: (1) a first computer program associated with a financial institution and executed by the information processing device accessing a payment token associated with a second computer program executed by the information processing device; (2) the first computer program identifying the payment token as associated with a financial instrument issued by the financial institution; (3) a backend for the financial institution generating an association between the payment token and the financial institution; and (4) the backend for the financial institution communicating the association to an authorization platform for the financial institution.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
7.
SYSTEM AND METHOD FOR CONFIGURABLE AND AUTOMATED DATA EXTRACTION, FORMATTING AND DISTRIBUTION
Various methods, apparatuses/systems, and media for implementing an automated data extraction, formatting, and distribution module are disclosed. A receiver receives input data to create a feed from a user via a user interface (UI). A processor operatively coupled to the receiver defines reusable data sets to be utilized for creating the feed; and selects desired number of a plurality of first selectable icons for selecting exact data from the reusable data sets required for creating the feed. Each of the selected first selectable icon is associated with a corresponding data source having columns to supply the exact data from the reusable data sets. The processor selects desired number of a plurality of second selectable icons for selecting a desired transformation or formatting process needed for the columns of each data source; creates the feed and defines a custom distribution process of the created feed from the UI.
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
A method and system for detecting whether a person is engaged in an online meeting are provided. The method includes: receiving a streaming input image of a face of the person; capturing, from the streaming input image, still images of the face of the person; extracting facial features from the still images; labeling each still image as being either engaged or not engaged; and determining, based on the labels, a score that indicates a level of engagement of the person with respect to the online meeting. The labeling is performed by applying an artificial intelligence (AI) algorithm to the still images and the facial features. The AI algorithm is then applied to images of other meeting participants in order to obtain a composite score that indicates a global level of engagement for the online meeting.
A method for providing high-speed storage and retrieval of information from a plurality of sources is disclosed. The method includes retrieving data from the sources; identifying a deterministic perfect hash function based on the retrieved data for stock symbols and corresponding stock information, the perfect hash function relating to a mapping of distinct elements in the corresponding stock information with the stock symbols; generating, by using the retrieved data, a parameter that relates to an instruction to calculate the identified perfect hash function, the parameter including a host file, a simulation file, and a hash state file; programming a register and a memory that are associated with the processor by using the parameter; and determining, via the programmed register and the programmed memory, a hash value for incoming stock symbols, the hash value relating to a symbol index that locates information corresponding to the incoming stock symbols.
G06Q 40/04 - Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
10.
METHOD AND SYSTEM FOR SEAT ASSIGNMENT IN HYBRID WORKING MODEL
A method for automatically assigning seats to a group of persons is provided. The method includes: receiving a first user input that relates to building space availability and a second user input that relates to employer requirements for seat occupancy; determining, based on the first and second user inputs, a building section within which seats are to be assigned to the group; and assigning, to each respective person within the group based on the first and second user inputs, a respective seat within the determined building section and a respective schedule during which the respective seat is to be occupied by the respective person. The assigning may be implemented by applying a machine learning algorithm that is trained by using historical data that relates prior seat occupancies of each respective person with the group.
Systems and methods for gateway communications between non-distributed ledger systems and distributed ledger systems are disclosed. In one embodiment, a method for gateway communication may include: (1) receiving, at a listener comprising a computer processor and from an application in a first domain, a message for a destination distributed ledger system that is one of a plurality of distributed ledger systems in a second domain; (2) generating, by the listener, a payload for the message, wherein the payload identifies the destination distributed ledger system for the message; and (3) encrypting, by the listener, the payload and passing a payload message comprising the encrypted payload to one of a plurality of adapters in a gateway communication service using an API. The adapter may receive the payload message, decrypt the payload, identifies the destination distributed ledger system, and communicate the decrypted payload to the destination distributed ledger system.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
12.
SYSTEM AND METHOD FOR PASSWORD-LESS AUTHENTICATION THROUGH DIGITAL DRIVING LICENSE
Password-less authentication and login onto an application are disclosed. A processor extracts Digital Driver's License (DDL) data from a user's computing device; extracts the DDL data of the user from an external database (i.e., DMV); validates the DDL data by comparing with the DDL data from the external database; creates, in response to validating, a DDL secret private key; allows successful registration of the computing device to utilize DDL data for login; and stores the DDL secret private key onto an internal database and a secured environment of the computing device. At login request by the user, when the processor determines that the computing device is successfully registered, it validates the DDL secret private key by comparing with data from the internal database; creates a new DDL secret private key and updates the internal database and the secured environment with the new DDL secret private key for subsequent login.
G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 67/133 - Protocols for remote procedure calls [RPC]
13.
METHOD AND APPARATUS FOR AUTOMATICALLY MAPPING PHYSICAL DATA MODELS/OBJECTS TO LOGICAL DATA MODELS AND BUSINESS TERMS
Various methods, apparatuses/systems, and media for automatically mapping physical data models or objects to logical data models which in turn are automatically mapped to business terms are disclosed. A database stores a raw physical data model of an application. A processor extracts the raw physical data model of the application from the database. The processor also converts physical object names associated with the raw physical data model into English terms based on a taxonomy expansion list; applies a plurality of standardization and contextualization rules to the English terms generated from converting the physical object names; outputs names based on applying the plurality of standardization and contextualization rules to the English terms; applies fuzzy logic and machine learning routines and matching algorithms for matching the names to predefined logical terms; and automatically generates a mapping of physical objects or elements in the application with logical attributes and related business terms.
A method for performing reducing noise and false positive event detection in testing is disclosed. The method includes performing scanning of a source file including multiple strings; determining, an entropy value of each string included in the multiple strings; acquiring, from a central repository, a first threshold value; identifying one or more strings having an entropy value higher than the first threshold value; removing the one or more strings having the entropy value higher than the first threshold value from the source file; deriving a second threshold value based on the determined entropy values and the first threshold value; identifying one or more strings having an entropy value lower than the second threshold value; removing the one or more strings having the entropy value lower than the second threshold value from the source file; and executing one or more tests on strings remaining in the source file.
Various illustrative aspects are directed to a data storage device comprising one or more disks, an actuator arm assembly comprising one or more disk heads and a voice coil motor (VCM), the VCM configured to operate in a PWM mode and a linear mode, and one or more processing devices configured to: seek the VCM towards a target track in the PWM mode; transition the VCM from the PWM mode to the linear mode, wherein the transitioning comprises switching an offset compensation value from a first offset compensation value to a second compensation offset value to compensate for a transition offset induced while transitioning the VCM from the PWM to the linear mode, wherein the first and the second offset compensation values correspond to the PWM and linear modes, respectively, and seek the VCM towards the target track in the linear mode for a linear mode time.
A data storage device comprises a lead actuator that actuates a first read-write head over a first disk and a support actuator that actuates a second read-write head over a second disk. A spindle motor rotates the first and second disks. In response to an emergency power off (EPO) event, a processing device retracts and parks the actuators using an internal supply voltage generated from a back electromotive force (BEMF) voltage of the spindle motor, and brakes the spindle motor. The spindle motor is not braked until both the lead and support actuators have been retracted and parked.
Example channel circuits, data storage devices, and methods for using an extendable parity code matrix are described. A data unit may be read from a storage medium. Multiple sets of parity bits may be available for the data unit, each set of parity bits having a different number of parity bits corresponding to different parity matrices, including a primary parity matrix and at least one extended parity matrix. The extended parity matrix includes the primary parity matrix and additional rows for increased decoding. Error correction code (ECC) decoding may be selectively performed based on the different sets of parity bits and corresponding parity matrices, resulting in the output of a decoded data unit based on the data unit from the read signal.
H03M 13/35 - Unequal or adaptive error protection, e.g. by providing a different level of protection according to significance of source information or by adapting the coding according to the change of transmission channel characteristics
H03M 13/37 - Decoding methods or techniques, not specific to the particular type of coding provided for in groups
H03M 13/11 - Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
H03M 13/01 - Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
H03M 13/00 - Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
18.
SYSTEMS AND METHODS FOR MANAGING PRIVACY POLICIES USING MACHINE LEARNING
Systems, methods, and devices for managing privacy policies are disclosed. In one embodiment, a method for management of a user’s privacy preferences may include: identifying a computer application installed on a user electronic device, or a website accessed using a browser executed by the user electronic device; retrieving a privacy policy document analysis for a privacy policy document associated with the computer application or the website, the privacy policy document analysis comprising a valuation of a plurality of privacy policy segments within the privacy policy document; receiving a privacy preference analysis for the user, the privacy preference analysis comprising a valuation of a plurality of privacy preferences for the user; identifying a recommended action in response to the valuation of one of the privacy policy segments being outside the scope of the valuation of one of the plurality of privacy preferences; and executing the recommended action.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Data storage devices function by communication between a controller and a memory device over a data bus. The memory device can, at times, be busy. Attempting to communicate with the memory device while the memory device is busy causes delays. Holding back communications when the memory device is not busy causes avoidable delays. Correctly predicting the timing of when the memory device is available will reduce delays. An adaptive prediction timer is used that increases the time between communications if a status check of the memory device returns a busy indication, and decreases the time between communications if the status check returns a not busy indication.
Various methods, apparatuses/systems, and media for qualitative and quantitative data analysis are disclosed. A processor accesses a plurality of data sources to extract a plurality of supervision data; creates a data model based on the plurality of supervision data; implements a rule engine that is configured to apply qualitative and quantitative data analysis algorithm on the extracted plurality of supervision data and the data model; implements artificial intelligence or machine learning algorithm to generate a knowledge graph based on the data model; detects outlier behavior data from the plurality of supervision data by integrating the rule engine and the AI/ML algorithm; analyzes the outlier behavior data; generates alerts data based on analyzing the outlier behavior data; and transmits the alerts data to a user computing device for taking remedial actions in correspondence with the alerts data.
G06Q 40/04 - Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Disclosed herein is a data storage device. A data port transmits data between a host computer system and the data storage device. A non-volatile storage medium stores encrypted user content data and a cryptography engine connected between the data port and the storage medium uses a cryptographic key to decrypt the encrypted user content data. The access controller generates authorization request data indicative of multiple devices to be authorized, and stores the authorization request data on non-volatile configuration memory of the data storage device. Upon approval of the authorization request data by a manager device that is registered with the access controller as a manager device, the access controller locates the authorization request data of one of the multiple devices to be authorized and registers the one of the multiple devices to be authorized as an authorized device.
Disclosed herein is a data storage device. A data port transmits data between a host computer system and the data storage device. A non-volatile storage medium stores encrypted user content data and a cryptography engine connected between the data port and the storage medium uses a cryptographic key to decrypt the encrypted user content data. The access controller generates a challenge for a manager device. The challenge comprises a blinded public key of an ephemeral unlock key pair that is blinded by an unlock blinding key. The challenge further comprises the unlock blinding key in encrypted form. The access controller further provides the challenge to the device to be authorized for sending the challenge to the manager device; receives a response to the challenge; decrypts the unlock blinding key and calculates a shared secret; and upon determining that the response indicates approval of registering the device, registers the device to be authorized as an authorized device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Disclosed herein is a data storage device. A data port transmits data between a host computer system and the data storage device. A non-volatile storage medium stores encrypted user content data and a cryptography engine connected between the data port and the storage medium uses a cryptographic key to decrypt the encrypted user content data. Multiple manager device records each comprise a first key identical for each of the records, and a second key that different for each of the records. The controller generates an authorization request using the first key and receives a response to the request generated by a manager device. The response is specific to that manager device. The controller uses the response to locate the record; decrypts the located manager device record to obtain key data; and generates configuration data based on the key data to register the device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
24.
Tape Drive Having Independently Controlled Tilting Tandem Tape Heads
The present disclosure generally relates to a tape drive. The tape drive comprises a first tape head and a second tape head linearly aligned with one another, where the first tape head and the second tape head are configured to concurrently operate. The first tape head and the second tape head each comprise a plurality of write transducers, a plurality of read transducers, and a plurality of servo transducers. The tape drive further comprises a first actuator coupled to the first tape head and a second actuator coupled to the second tape head. The first and second actuators are configured to independently tilt and move the first and second tape heads, respectively. Tilting and moving the first and second tape heads individually enables the tape drive to compensate for non-linear tape dimensional stability effects.
Storage devices are configured to be utilized in a variety of blockchain related activities that rely on a proof of space consensus model. These storage devices are required to process a lot of read and write cycles on their memory devices to generate the desired proof of space consensus data. The generation and storing of this generated data require very different types of memory device usage. As these operations increase in popularity, the need to segment storage devices meant for proof of space usage and those which are not becomes more important. Storage devices may be configured to throttle these different usage types upon detecting these proof of space blockchain activities. Throttling may include reducing clock frequencies, selecting slower performing trim parameters, and programming memory devices with a reduced voltage window, among other processes. Detecting whether throttling should commence, or end can be done via a deployed machine learning classifier.
Systems and methods for account validation are disclosed. A method may include: receiving, at a validation computer program and from a client device, a request to validate payment information; querying, by the validation computer program, a plurality of validation systems with at least some of the payment information; receiving, at the validation computer program, a query response from each validation system; calculating, by the validation computer program, a risk score for each validation system based on a comparison between the payment information and the query response; weighting, by the validation computer program, the risk score for each validation system, wherein the weighting may be based on an accuracy of past risk scores for each validation system; aggregating, by the validation computer program, the weighted risk scores into a cumulative risk score; and outputting the cumulative risk score to the client device.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Systems, methods, and devices described herein can configure a cryptocurrency wallet or other blockchain-based account to be self-aware and alert the owner of the wallet to one or more potentially fraudulent situations occurring with at least one account they own. The wallet may be a hardware-based cryptocurrency wallet or may be a blockchain-based account operating by an external financial institution that allows for the management of cryptocurrency assets. The self-aware wallet can be configured to track all relevant previously known and/or approved transactions associated with a user's private cryptocurrency key. A subsequent scan on one or more blockchains is performed to detect new transactions associated with the user's private key. If a newly detected blockchain transaction is not in the list of previously known or approved user transactions, a potential compromise may be occurring. Once detected, the wallet can generate a notification to the user alerting them to the issue.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to receive a shutdown notification, fetch one or more command identifiers from a submission queue of a host device, generate error indications for the one or more command identifiers, and send a completion message, including the generated error indication, for each of the one or more command identifiers to the host device. The controller is further configured to push non-processed pending commands to a completion finite state machine, where the controller generates an error indication for each of the non-processed pending commands and sends a completion message, including the generated error indication, for each of the non-processed pending commands to the host device. While the controller is fetching command identifiers and pushing non-process commands, the controller is configured to continue processing processed commands in parallel.
To remedy short term data retention issues, a non-volatile memory performs a multi-pass programming process to program data into a set of non-volatile memory cells and identifies non-volatile memory cells that experienced downward threshold voltage drift after a first pass of the multi-pass programming process and prior to a final pass of the multi-pass programming process. The final pass of the multi-pass programming process comprises programming non-volatile memory cells not identified to have experienced the downward threshold voltage drift to a set of final target threshold voltages and purposefully overprogramming non-volatile memory cells identified to have experienced the downward threshold voltage drift to threshold voltages greater than respective final target threshold voltages by one or more offsets.
G11C 11/56 - Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
G11C 16/04 - Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS
Disclosed herein is a data storage device. A data port transmits data between a host computer system and the data storage device. A non-volatile storage medium stores encrypted user content data and a cryptography engine connected between the data port and the storage medium uses a cryptographic key to decrypt the encrypted user content data. The access controller generates an authorization request for a manager device. The authorization request comprises a certificate. The certificate comprising key data. In response to receiving the key data in a response to the authorization request generated by the manager device, the access controller generates configuration data based on the key data to register the device to be authorized as an authorized device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
31.
DATA STRUCTURE VALIDATION USING INJECTED DYNAMIC BEHAVIOR
Implementations generally relate to validating data files. In some implementations, a method includes receiving at least one schema file, where the at least one schema file includes data fields. The method further includes adding annotations to the at least one schema file. The method further includes generating an object model based on the at least one schema file and the annotations. The method further includes receiving at least one data file. The method further includes validating the at least one data file based on the object model to ensure that the at least one data file complies with a requirements contract.
A data storage device and method for host-initiated transactional handling for large data set atomicity across multiple memory commands are provided. In one embodiment, a data storage device is provided comprising a memory and a controller. The controller is configured to commence performance of a plurality of atomic operations; and prior to successful completion of the plurality of atomic operations: determine an available capacity of the memory, wherein memory locations storing data written by the plurality of atomic operations are considered unavailable even though the data is not yet committed to the memory locations; and inform the host of the determined available capacity of the memory. Other embodiments are possible, and each of the embodiments can be used alone or together in combination.
Systems, methods, and non-transitory computer-readable media for providing a network interface card implementing a C-ZNS architecture. The network interface card including an electronic processor configured to identify two or more host applications configured to access a storage device connected to the network interface card, divide the storage device into a plurality of zones, wherein each zone is associated with one of the two or more host applications, receive, from one of the two or more host applications, a command to write data to the storage device, and write the data into the zone associated with the one of the two or more host applications.
Systems, methods, and non-transitory computer-readable media for providing a cloud storage device implementing C-ZNS architecture. The cloud storage device including a housing and a plurality of blades, with at least one blade including a plurality of storage devices and an electronic processor. The electronic processor is configured to receive data and a command from a host application to write the data to a corresponding zone of a first storage device of the plurality of storage devices, initialize a buffer in response to receiving the data, store the data in the buffer that is initialized, determine one or more parameters in response to receiving the command, determine that the command is error-free based on the one or more parameters, and write the data from the buffer into the corresponding zone in response to determining that the command is error-free.
A tray for holding a plurality of storage drives includes a sheet of material formed to include: a plurality of tray sidewalls, each having a top edge and a bottom edge; a plurality of tray ends walls arranged relative to the plurality of tray sidewalls to define a plurality of corner regions, each tray end wall having a top edge and a bottom edge; at least one side extension included in each of the tray sidewalls; at least one corner extension included in a corner region; and a tray top spanning the tray sidewalls and the tray ends walls. The tray top includes a pair of top-side surfaces that extend inward from the top edge of a respective one of the tray sidewalls, and a central slotted structure spanning the top-side surfaces. The central slotted structure forms a plurality of slots, each configured to receive one of the plurality of storage drives.
B65D 81/133 - Containers, packaging elements, or packages, for contents presenting particular transport or storage problems, or adapted to be used for non-packaging purposes after removal of contents specially adapted to protect contents from mechanical damage maintaining contents at spaced relation from package walls, or from other contents using rigid or semi-rigid sheets of shock-absorbing material of a shape specially adapted to accommodate contents, e.g. trays
B29C 51/08 - Deep-drawing or matched-mould forming, i.e. using mechanical means only
B65D 85/68 - Containers, packaging elements or packages, specially adapted for particular articles or materials for machines, engines or vehicles in assembled or dismantled form
36.
Position and risk reconstruction in shingled magnetic recording data storage devices
Various illustrative aspects are directed to a data storage device comprising data tracks N and N−1, and one or more processing devices, configured to measure signal to noise ratio (SNR) metrics for corresponding sectors of at least one of the data tracks N−1 and N, where the measuring is based at least in part on reading one or more of the data tracks N and N−1 using one or more read offsets, estimate a position of at least one of the data tracks based on measuring the one or more SNR metrics, and reconstruct one or more of risk values for at least a portion of the data track N−1 based on the one or more SNR metrics for the data track N−1, and a position error signal (PES) for at least one of the data tracks N−1 and N based on the corresponding estimated positions.
G11B 5/596 - Disposition or mounting of heads relative to record carriers with provision for moving the head for the purpose of maintaining alignment of the head relative to the record carrier during transducing operation, e.g. to compensate for surface irregularities of the latter or for track following for track following on disks
G11B 5/56 - Disposition or mounting of heads relative to record carriers with provision for moving the head for the purpose of adjusting the position of the head relative to the record carrier, e.g. manual adjustment for azimuth correction or track centering
G11B 5/012 - Recording on, or reproducing or erasing from, magnetic disks
37.
SYSTEMS AND METHODS FOR COLLECTION AND PROCESSING OF TRANSACTIONAL DATA
Techniques for collection and processing of transactional data are disclosed. An exemplary method includes receiving, at a capture module, a document; determining, by an aggregation engine, a plurality of transactions recorded in the document; categorizing, by the aggregation engine, the plurality of transactions into categorized transactional data; storing the categorized transactional data in a storage module; publishing consumption application programming interfaces (APIs); and providing the categorized transactional data for consumption via the consumption APIs.
Various methods, apparatuses/systems, and media for automating a process of receiving documentation are provided. A first computing device initiates an electronic communication process to request documentation from a second computing device utilized by a user. A processor receives identification information of the user for generating a unique barcode to be provided with the requested documentation in response to the initiation of the electronic communication. One or more processors generate the unique barcode based on the received identification information of the user; create an application programming interface (API) link for the generated barcode; transmit the electronic communication with the API link attached therein to the second computing device; and automatically obtain the unique barcode upon receiving an input to open the API link from the second computing device, the unique barcode to be attached as a cover sheet with the requested documentation for scanning by a multi-functional device.
G06F 21/36 - User authentication by graphic or iconic representation
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
H04N 1/00 - PICTORIAL COMMUNICATION, e.g. TELEVISION - Details thereof
G06F 21/40 - User authentication by quorum, i.e. whereby two or more security principals are required
A method for performing workflow comparisons for determining data migration readiness is provided. The method includes initiating a comparison run for a batch file, and splitting the batch file into multiple component workflows. Each of the component workflows are then scheduled for processing across multiple processing stages. When a component workflow is determined to have completed all of the processing stages: compute a difference between a baseline and a target system for the component workflow, and cross reference the difference generated with prestored rules as well as machine learning techniques to determine whether the difference can be ignored (e.g., excluded) or explained (e.g., already encompassed in the book of work). When all of the component workflows originating from the batch file passes, merging reports for all of the component workflows for generating a merged report.
A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to relocate first valid data from a first source block to a destination block, relocate second valid data from a second source block to the destination block, determine that the destination block is closed, re-mark the first and second source block with a second indication, and erase the source blocks that have the second indication. The first source block and the second source block are marked with a first indication after each respective data is relocated. The first indication indicates that the source block cannot be freed. The second indication indicates that the destination block is closed and the associated source blocks can be erased. Prior to closing the destination block, parity data may be generated for the data of the destination block and programmed to the destination block.
Systems and methods for rule-based machine learning model promotion are disclosed. In accordance with aspects, a method may include providing a rules engine that defines a software object model, and an evaluation framework. A model metadata file having a format that is based on the software object model can be generated. The model metadata file can store metadata associated with the model. A model rule file having a format based on the software object model and that defines rule criteria for evaluating the metadata can be generated. The rules engine can instantiate a software object based on the software object model and parse the model rule file to determine rule criteria and parse the model metadata file to determine a parameter value associated with the rule criteria. The rules engine can evaluate the parameter value against a rule and provide a promotion decision for the model.
Systems and methods for configuration driven integration of services in business process models agnostic of a workflow system are disclosed. An exemplary method includes receiving, at a service executor, a generic service call from a business process management notation (BPMN), wherein the generic service call includes a service name parameter, wherein the service name parameter is associated with a service task of the BPMN, and wherein the service name parameter is associated with a service. The service executor can construct a call to the service including required data from a transient data store. The service executor can then receive return data from the service, store the data in the transient data store and respond to the BPMN that the service task has been completed.
Systems and methods for building and querying an architecture knowledge graph are disclosed. In one aspect, a method includes determining an intended state and a functional state of a plurality of evaluated architectures of an evaluating organization; generating a knowledge graph, including an intended state dimension and a functional state dimension based on the determined intended state and the functional state, respectively, of the plurality of evaluated architectures; receiving, at a query engine, a natural language query; processing the natural language query with a natural language query processing engine; generating, as a result of processing the natural language query, a plurality of graph properties; querying the architecture knowledge graph using the plurality of graph properties as parameters; and displaying the results of the querying through an interface.
Systems and methods for building a unified asset graph are disclosed. In one aspect, a method includes determining an intended state and a functional state of a plurality of evaluated architectures of an evaluating organization; generating a knowledge graph, wherein the knowledge graph includes an intended state dimension and a functional state dimension, and wherein the intended state dimension is based on the determined intended state of the plurality of evaluated architectures and the functional state dimension is based on the determined functional state of the plurality of evaluated architectures; and generating a social knowledge dimension of the knowledge graph, wherein the social dimension is based on one or more architecture nodes included in the knowledge graph, and wherein values of attribute nodes of the social knowledge dimension are at least partially based on user-generated data received by the knowledge graph.
Systems and methods for determining an amount of architecture drift are disclosed. In one aspect, a method comprises determining a logical architecture node. The logical architecture node is in operation on a technology infrastructure of an evaluating organization. The logical architecture node can be included as an architecture graph node that represents the logical architecture node in a knowledge graph. A functional attribute of the logical architecture node and an intended attribute of the logical architecture node can be determined and included in the knowledge graph as a functional attribute graph node and an intended attribute graph node, respectively. The functional attribute graph node and the intended attribute graph node can be of the same type but can have different values. An amount of architecture drift can be determined based on the difference in the values of the functional attribute graph node and the intended attribute graph node.
A method for providing vulnerability management to facilitate application development and deployment is disclosed. The method includes receiving a monitoring request that includes an identifier, the identifier corresponding to an application; onboarding the application by using the identifier; generating a scheduled task for the application based on an outcome of the onboarding, the scheduled task relating to source code vulnerability analytics; automatically initiating, via an application programming interface, the scheduled task based on a predetermined parameter; determining whether a set of source codes that corresponds to the application includes a vulnerability based on a result of the automatically initiated scheduled task; and generating a ticket when the vulnerability is included in the set of source codes.
A node includes a memory configured to be used at least in part as a shared cache in a distributed cache. A network interface of the node is configured to communicate with one or more other nodes in a network. Each of the one or more other nodes is configured to provide a respective shared cache for the distributed cache. At least one processor of the node is configured to execute a kernel of an Operating System (OS) for allocating resources of the node. The kernel is used to collect cache access information for the shared cache for identifying malicious operations in the distributed cache.
A data storage device comprises a disk having a plurality of data tracks and a plurality of servo wedges wherein the plurality of servo wedges comprise a plurality of wedge repeatable runout (WRRO) fields configured to store a plurality of WRRO compensation values in connection with the plurality of data tracks. The data storage device may also include a read/write head configured to be actuated over the disk, and a controller configured to gather position error signal (PES) data needed for computation of the WRRO compensation values during a field operation of the data storage device. The data storage device may be further configured to adjust a position of the read/write head based on the WRRO compensation values.
A data storage device and method for host-determined proactive block clearance are provided. In one embodiment, a data storage device is provided comprising a memory and a controller. The controller is configured to receive a command from a host that specifies a parameter of an upcoming burst mode; and in response to receiving the command, proactively perform a garbage collection operation according to the parameter to create available storage space in the memory to store data from the host during the upcoming burst mode. Other embodiments are possible, and each of the embodiments can be used alone or together in combination.
A storage system receives a request to read data that is located in a wordline undergoing a program operation. Instead of waiting for the program operation to complete, which would increase read latency, the storage system aborts the program operation and reconstructs the data from successfully-programmed memory cells in the wordline and from data latches associated with unsuccessfully-programmed memory cells in the wordline. The reconstructed data is then sent to the host. The program abort command can be similar to one used to provide a graceful shutdown in a power-loss situation.
A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to store data mappings in an uLayer, where the uLayer includes a plurality of mSet updates, and where the uLayer is organized into a sorted section and an unsorted section, sort one or more of the plurality of mSet updates of the uLayer, and provide, to a host device, data stored in the memory device corresponding to a most recent update of a data mapping by ignoring non-recent updates for a read command associated with an mSet group of the sorted section.
Systems, methods, and devices described herein achieve a more efficient plotting method for proof of space cryptocurrency processes, such as the Chia cryptocurrency system. Storage devices that are configured for use with proof of space cryptocurrency processing can be configured to utilize less space within a memory array during the initial farming or plotting process. This can be done by engaging in one or more data redundancy processes during the forward propagation step of table generation. Furthermore, additional efficiency can be achieved by using a modified backward propagation method during plotting that looks back fewer steps than traditional methods. Finally, additional efficiency can be achieved by utilizing modified compression methods as well as changing the configurations of the park settings within the tables. By utilizing these modified techniques and tuning them for increased efficiency, the amount of space and resources needed to generate new cryptocurrency plots can be reduced.
System and methods for proximity-based mobile device person-to-person payments are disclosed. In one embodiment, a method for proximity-based mobile device person-to-person payments may include: (1) receiving, at a payment recipient computer application executed on a payment receiving mobile device, a requested payment amount for a payment from a payment recipient from a payment sender; (2) causing, by the payment recipient computer application, the payment receiving mobile device to enter a listening mode; (3) receiving, by the payment recipient computer application, a communication from a payment sender computer application executed by a payment sending mobile device; (4) wirelessly communicating, by the payment recipient computer application, the requested payment amount to the payment sender computer application; (5) wirelessly receiving, by the payment recipient computer application and from the payment sender computer application, payment information; and (6) executing, by the payment recipient computer application, the payment using the payment information.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for identifying and remediating architecture risk are disclosed. In one aspect, a method includes generating a first chaos graph pattern and a second chaos graph pattern; training a machine learning model to recognize the first chaos graph pattern and the second chaos graph pattern; identifying an architecture graph pattern of an evaluated architecture; including the architecture graph pattern in an architecture testing graph; recognizing by the machine learning model that a shape of the architecture graph pattern is similar to a shape of the first chaos graph pattern and that the shape of the architecture graph pattern is similar to a shape of the second chaos graph pattern; and predicting a remedial reconfiguration, wherein the remedial reconfiguration includes a reconfiguration of a design of the evaluated architecture.
Systems and methods for identifying and remediating architecture design defects are disclosed. In one aspect, a method includes generating a new architecture graph pattern based on an architecture design document of an evaluated architecture; determining a model graph pattern, wherein a shape of the model graph pattern is similar to a shape of the architecture graph pattern; determining, based on a comparison of the shape of the model graph pattern with the shape of the new architecture graph pattern, that the new architecture graph pattern includes a design defect; generating, based on the shape of the model graph pattern, a remediated graph pattern; and determining, based on the differences between the remediated graph pattern and the new architecture graph pattern, a suggested remedial change to the architecture design document.
A surface mount device having features on contacts to prevent the surface mount device from tombstoning. The feature may be channel defined by the contact that helps balance a torque/force applied on each side of the surface mount device during a reflow soldering process. The feature may also be a solder mask that helps balance a torque/force applied on each side of the surface mount device during a reflow soldering process.
H05K 1/18 - Printed circuits structurally associated with non-printed electric components
H05K 3/34 - Assembling printed circuits with electric components, e.g. with resistor electrically connecting electric components or wires to printed circuits by soldering
57.
SEMICONDUCTOR WAFER AND SEMICONDUCTOR DIES FORMED THEREFROM INCLUDING GROOVES ALONG LONG EDGES OF THE SEMICONDUCTOR DIES
A semiconductor wafer includes semiconductor dies and laser grooves formed in the scribe lines along the long edges of the semiconductor dies. A laser groove extends between the long edges of two adjacent semiconductor dies to encompass the corners of the two adjacent semiconductor dies. This prevents die cracking, for example during backgrind of the wafer. Moreover, the absence of laser grooves along the short edges of the semiconductor dies prevents die cracking, for example along short edges of dies overhanging empty space that are stressed during portions of the packaging process.
H01L 23/544 - Marks applied to semiconductor devices, e.g. registration marks, test patterns
H01L 25/065 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices all the devices being of a type provided for in the same subgroup of groups , or in a single subclass of , , e.g. assemblies of rectifier diodes the devices not having separate containers the devices being of a type provided for in group
58.
Systems and methods multi-tenant and omni-channel routing
Systems and methods for multi-tenant and omni-channel routing are disclosed. In one embodiment, a method for multi-tenant and omni-channel routing may include: (1) a multi-tenant and omni-channel routing computer program executed by an information processing apparatus comprising at least one computer processor receiving, from a first platform in a multi-tenant system, a call to transfer an interaction between the first platform and a third party to a second platform in the multi-tenant system; (2) the multi-tenant and omni-channel routing computer program collecting a context of the interaction from the first platform; (3) the multi-tenant and omni-channel routing computer program identifying the second platform based on the context of the interaction; and (4) the multi-tenant and omni-channel routing computer program routing the interaction to the second platform and communicating the context to the second platform.
Aspects of the present disclosure generally relate to a magnetic recording head that includes a main pole, a leading shield, a first side shield disposed on a first side of the main pole, a second side shield disposed on a second side of the main pole, and a trailing shield. The trailing shield is disposed on a trailing side of the main pole. One or more approaches are disclosed to control return-fluxes. In some embodiments, at least one of the upper return pole, the leading shield, the trailing shield, the first side shield, and the second side shield includes a laminate structure having at least a pair of ferromagnetic layers, and a non-magnetic spacer layer disposed between adjacent ferromagnetic layers. In some embodiments, one or more shunts are positioned, such as connecting the leading shield to the upper return pole in order to create circuits to control magnetic flux.
G11B 5/31 - Structure or manufacture of heads, e.g. inductive using thin film
G11B 5/48 - Disposition or mounting of heads relative to record carriers
G11B 5/187 - Structure or manufacture of the surface of the head in physical contact with, or immediately adjacent to, the recording medium; Pole pieces; Gap features
G11B 5/11 - Shielding of head against electric or magnetic fields
G11B 5/127 - Structure or manufacture of heads, e.g. inductive
60.
SYSTEM AND METHOD FOR IMPLEMENTING AN OPEN DIGITAL RIGHTS LANGUAGE (ODRL) VISUALIZER
According to an embodiment of the present invention, an innovative ODRL Visualizer is a graphical web-based tool that loads a digital contract, resolves various ontologies that are referenced, parses standard forms (such as ISO 8601 standard guiding the way to notate periods of time) and converts the digital contract to a human-readable form.
A hard disk drive flexible printed circuit (FPC) includes a plurality of fingers extending from a main portion, with each finger having a first wiring layer including a first electrically conductive trace layout, a second wiring layer including a second electrically conductive trace layout, and a base film interposed between the first and second wiring layers, where the first conductive trace layout includes at least one thermally conductive protective island overlaying a respective portion of the second trace layout to provide a protective thermal barrier to the base film. Hence, maximum temperatures across various layers of the FPC laminate can be reduced, damage to the FPC prevented, and manufacturing yields improved.
H05K 1/11 - Printed elements for providing electric connections to or between printed circuits
H05K 3/10 - Apparatus or processes for manufacturing printed circuits in which conductive material is applied to the insulating support in such a manner as to form the desired conductive pattern
A storage device includes multiple memory dies and a controller configured to: (i) perform XOR parity computations for parity bins based, at least in part, on updated contents of a first user data memory cell and contents of each user data memory cell also assigned to the first parity bin, (ii) storing the first parity data into a first parity memory cell associated with the first parity bin; (iii) identify a second parity memory cell for dynamic reconfiguration based, at least in part, on performance data of the non-volatile memory device, the second parity memory cell being assigned to a second parity bin; (iv) copy the second parity memory cell to a third memory cell of the plurality of memory cells; and (v) associate the third memory cell with the second parity bin, thereby making the third memory cell a parity memory cell of the plurality of parity memory cells.
A system and a method for reconstructing an electronic data processing facility is provided. The method includes: accessing information that indicates a predetermined arrangement of hardware components included in the electronic data processing facility; verifying that the hardware components are operational based on the predetermined arrangement; accessing information that indicates a predetermined order of software modules to be installed in the electronic data processing facility; installing the software modules based on the predetermined order; accessing information that indicates a predetermined data set to be stored in a memory of the electronic data processing facility; and verifying that the installed software modules and the stored data set are operational based on a predetermined standard.
Systems and methods for token-based cross-currency interoperability are disclosed. In one embodiment, in a first financial institution information processing apparatus comprising at least one computer processor, a method for conducting a token-based cross-currency transaction may include: (1) receiving, from a first party, a transaction initiation request for a transaction amount to a second party; (2) deducting the transaction amount from a fiat currency account for the first party; (3) creating a token amount of tokens for the transaction amount; (4) writing the token amount to a distributed ledger; and (5) transferring the token amount of tokens to a second financial institution for the second party.
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing a website through which property owners and lessors can review prospective tenants' application information Banking services for property owners and lessors; loan services for property owners and lessors Providing temporary use of online non-downloadable property management software for marketing and managing residential and commercial real estate; Providing a website for use by residents of a real estate community featuring technology that enables users to make electronic payments and obtain credit scores
66.
Redundant video storage among networked video cameras
Systems and methods for redundant storage among networked video cameras are described. Video data for a group of video cameras in a backup cluster determined from a network topology is received by a peer video camera. A backup order of the backup cluster is received. The peer video camera sends its source video data for to a backup storage device located at a target peer video camera of the group of video cameras according to the backup order.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
43 - Food and drink services, temporary accommodation
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
Goods & Services
Promoting the use of credit cards by granting access to incentive benefits, privileges, and loyalty programs and the provision of special offers and promotions of others; customer services, namely, responding to customers in the field of travel inquiries and travel emergencies 24 hours a day, seven days a week; customer service support, namely, the provision of online and telephone services to respond to customers in the field of travel inquiries and travel emergencies 24 hours a day, seven days a week Provision of information and assistance regarding the purchase of travel insurance plans; currency exchange services; currency exchange and advice; financial exchange of virtual currency; financial services, namely, providing for the exchange of foreign currency via the Internet Travel agency services, namely, making reservations and bookings for transportation, cruises, temporary lodging, restaurants and meals, flights, hotels, tours, attractions, and excursions; travel information services; travel agency services, namely, making reservations and bookings for transportation; travel consulting services; arranging city tours; travel booking agencies; providing information concerning transport and travel matters; providing travel guide and travel information services; travel consultancy services; booking of travel tickets, namely, airline flights, cruises, coach, and rail travel; organizing travel for others; organization of travel and boat trips; booking of seats for air travel; booking of seats for rail travel; booking of seats for coach travel; providing information about travel via the Internet; on-line transportation reservation and travel ticket reservation services; car rental services; car rental, garage, and parking space rental services; travel planning services; group travel planning services; travel route planning; customized travel planning and travel route planning services based upon preferences, requirements, and budget; provision of travel package offers, namely, pre-arranged travel offers inclusive of airfare and accommodations; arranging for travel visas, passports, and travel documents for persons traveling abroad; coordinating travel arrangements for individuals and for groups; providing information, news, and commentary in the field of travel; travel information services, namely, the provision of information relating to travel advisories, safety recommendations, and destination-specific information to insure safe travel; provision of travel information, namely, travel advisories, weather conditions in departure and arrival locations, flight arrival, departure, delay, and cancellation information; providing access to travel blogs, destination guides, and travel information of others; providing access to review of travel service providers, namely, hotels, airlines, attractions, and restaurants Travel agency services, namely, making reservations and bookings for restaurants and meals and temporary lodging; providing online reservations and bookings for temporary lodging and accommodations; providing information in the field of temporary lodging and accommodations for solo travelers, business travelers, couples, and families; room reservations for travelers; arranging temporary housing accommodations Health guidance and information for international travelers
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
Goods & Services
Promoting the use of credit cards through the administration of incentive benefits and programs and the provision of special offers and promotions to customers Provision of free benefits and privileges for consumers who book through preferred partners using applicant's credit card, namely, access to exclusive accommodations, hotels, resorts, lodges, upgrades, property credits, meal packages, wireless services, early check-in, late check-outs, and spas worldwide Booking and arranging of access to exclusive accommodations, namely, hotels, resorts, lodges, and spas worldwide
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
Goods & Services
Promoting the use of credit cards through the administration of incentive benefits and programs and the provision of special offers and promotions to customers Provision of free benefits and privileges for consumers who book through preferred partners using applicant's credit card, namely, access to exclusive accommodations, hotels, resorts, lodges, upgrades, property credits, meal packages, wireless services, early check-in, late check-outs, and spas worldwide Booking and arranging of access to exclusive accommodations, namely, hotels, resorts, lodges, and spas worldwide
A method for providing proxy event visualization is disclosed. The method includes aggregating, via an application programming interface, event data from various sources, the event data including information that relates to future proxy events; parsing the event data to identify an attribute that corresponds to each of the future proxy events, the attribute including a security identifier; mapping each of the future proxy events to client portfolios based on the attribute; generating a graphical element for each of the client portfolios, the graphical element including the information that relates to the future proxy events; and displaying, via a graphical user interface, the graphical element.
The present disclosure relates to a magnetic recording head having an exchange biased leading shield or leading edge shield (LES). The LES is a bilayer structure. One or more layers are coupled below the LES such that the LES is disposed between the main pole and the one or more layers. The one or more layers exchange bias the LES such that the upper layer of the LES has a magnetization parallel to the magnetization of the trailing shield. The lower layer of the LES has a magnetization that is antiparallel to the magnetization of the upper layer of the LES. The one or more layers set the preferred direction for the lower layer of the LES and sets the LES as a two-domain state without relying upon the anisotropy field (Hk) of either the upper or lower layers of the LES.
The present disclosure generally relates to improved lifetime of a data storage device utilizing an energy assist element. Rather than applying the same current to each energy assist element of a device, each energy assist element has a write current specific to the energy assist element. The unique applied current results in the corresponding energy assist elements having substantially the same temperature during operation. Obtaining substantially the same temperature during operation provides predictable and repeatable device performance and increases the lifetime of the entire data storage device as all energy assist elements should have substantially the same lifetime.
A semiconductor package includes a substrate having a first surface, and a second surface opposite the first surface. The substrate includes a connection region having a first array of contact pads, and a peripheral region surrounding the connection region and having additional contact pads. A semiconductor die having an array of electrical contacts and thermal contacts, is connected to the first array of contact pads and to the additional contact pads. A plate is coupled to a top surface of the semiconductor die and there is at least one pin projecting from the plate toward the first substrate. The pin is disposed within a channel that extends between the plate and the additional contact. The plate, channel and pin improve the heat dissipation capabilities of the semiconductor device package.
H01L 23/00 - SEMICONDUCTOR DEVICES NOT COVERED BY CLASS - Details of semiconductor or other solid state devices
H01L 25/065 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices all the devices being of a type provided for in the same subgroup of groups , or in a single subclass of , , e.g. assemblies of rectifier diodes the devices not having separate containers the devices being of a type provided for in group
H01L 23/367 - Cooling facilitated by shape of device
H01L 23/31 - Encapsulation, e.g. encapsulating layers, coatings characterised by the arrangement
H01L 23/48 - Arrangements for conducting electric current to or from the solid state body in operation, e.g. leads or terminal arrangements
H01L 23/528 - Layout of the interconnection structure
H01L 23/49 - Arrangements for conducting electric current to or from the solid state body in operation, e.g. leads or terminal arrangements consisting of soldered or bonded constructions wire-like
74.
DUAL SPINDLE MOTORS AND DUAL SPINDLE MOTOR CONTROL FOR DATA STORAGE
Various illustrative aspects are directed to a data storage device comprising a first spindle motor configured to rotate one or more disks in a first stack of disks, a second spindle motor configured to rotate one or more disks in a second stack of disks, and one or more processing devices configured to detect back electromotive force (BEMF) voltages generated by the first spindle motor and the second spindle motor. In other aspects the one or more processing devices can control speeds of the first spindle motor and the second spindle motor based on the detected BEMF voltages.
G11B 25/04 - Apparatus characterised by the shape of record carrier employed but not specific to the method of recording or reproducing using flat record carriers, e.g. disc, card
H02K 16/00 - Machines with more than one rotor or stator
75.
Magnetic Recording Device Having Redundant Servo Readers and Method for Using Same
The present disclosure is generally related to a tape drive comprising a tape head and a controller coupled to the tape head. The tape head comprises one or more modules, each module comprising a plurality of write heads aligned in a first row, a plurality of read heads aligned in a second row parallel to the first row, and at least four first servo heads aligned in the second row. Two or more first servo heads of the at least four first servo heads are configured to concurrently read first servo data from a first servo track. The controller is configured to concurrently process the first servo data, to compute the position of the tape head based on a known spacing between the at least two servo heads, and to dynamically adjust a position of the tape head based on the processed first servo data.
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Advertising; marketing services; compiling, providing and updating an index of securities values; business consultation regarding securities investing; Abstracting services in the nature of extracting and summarizing information from financial and securities publications and reports Financial affairs; monetary affairs; financial information services provided on-line from a global computer network or a data network, namely, providing financial data in the nature of financial indices; providing financial data and financial and investment indices; financial investment in the field of securities; funds investment; financial affairs and monetary affairs, namely, financial information and analysis services for securities investing Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence for use in computer software selection of financial securities and financial assets. Software as a service (SAAS) services featuring software using artificial intelligence for Generative Pre-trained Transformer models in the field of financial services. Providing consumer product information for the purpose of selecting artificial intelligence (AI) hardware and software to meet the consumer's specifications; software as a service (SAAS) services featuring software for analyzing and selecting securities tailored to customer needs
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
Goods & Services
Promoting the use of credit cards through the administration of incentive benefits and programs and the provision of special offers and promotions to customers Provision of free benefits and privileges for consumers who book through preferred partners using applicant's credit card, namely, access to exclusive accommodations, hotels, resorts, lodges, upgrades, property credits, meal packages, wireless services, early check-in, late check-outs, and spas worldwide Booking and arranging of access to exclusive accommodations, namely, hotels, resorts, lodges, and spas worldwide
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
Goods & Services
Promoting the use of credit cards through the administration of incentive benefits and programs and the provision of special offers and promotions to customers Provision of free benefits and privileges for consumers who book through preferred partners using applicant's credit card, namely, access to exclusive accommodations, hotels, resorts, lodges, upgrades, property credits, meal packages, wireless services, early check-in, late check-outs, and spas worldwide Booking and arranging of access to exclusive accommodations, namely, hotels, resorts, lodges, and spas worldwide
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
43 - Food and drink services, temporary accommodation
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
Goods & Services
Promoting the use of credit cards by granting access to incentive benefits, privileges, and loyalty programs and the provision of special offers and promotions of others; customer services, namely, responding to customers in the field of travel inquiries and travel emergencies 24 hours a day, seven days a week; customer service support, namely, the provision of online and telephone services to respond to customers in the field of travel inquiries and travel emergencies 24 hours a day, seven days a week Provision of information and assistance regarding the purchase of travel insurance plans; currency exchange services; currency exchange and advice; financial exchange of virtual currency; financial services, namely, providing for the exchange of foreign currency via the Internet Travel agency services, namely, making reservations and bookings for transportation, cruises, temporary lodging, restaurants and meals, flights, hotels, tours, attractions, and excursions; travel information services; travel agency services, namely, making reservations and bookings for transportation; travel consulting services; arranging city tours; travel booking agencies; providing information concerning transport and travel matters; providing travel guide and travel information services; travel consultancy services; booking of travel tickets, namely, airline flights, cruises, coach, and rail travel; organizing travel for others; organization of travel and boat trips; booking of seats for air travel; booking of seats for rail travel; booking of seats for coach travel; providing information about travel via the Internet; on-line transportation reservation and travel ticket reservation services; car rental services; car rental, garage, and parking space rental services; travel planning services; group travel planning services; travel route planning; customized travel planning and travel route planning services based upon preferences, requirements, and budget; provision of travel package offers, namely, pre-arranged travel offers inclusive of airfare and accommodations; arranging for travel visas, passports, and travel documents for persons traveling abroad; coordinating travel arrangements for individuals and for groups; providing information, news, and commentary in the field of travel; travel information services, namely, the provision of information relating to travel advisories, safety recommendations, and destination-specific information to insure safe travel; provision of travel information, namely, travel advisories, weather conditions in departure and arrival locations, flight arrival, departure, delay, and cancellation information; providing access to travel blogs, destination guides, and travel information of others; providing access to review of travel service providers, namely, hotels, airlines, attractions, and restaurants Travel agency services, namely, making reservations and bookings for restaurants and meals and temporary lodging; providing online reservations and bookings for temporary lodging and accommodations; providing information in the field of temporary lodging and accommodations for solo travelers, business travelers, couples, and families; room reservations for travelers; arranging temporary housing accommodations Health guidance and information for international travelers
In one example, a method for modifying a risk model utility is disclosed. The method includes executing, based on the one or more data objects, a selected risk model utility to generate a risk assessment score. Such execution may be by generating for display a risk model modification user interface to display multiple or plural risk model utilities. Each one of the risk model utilities includes logical risk expressions to generate the risk assessment score. Here, the logical risk expressions may be modifiable. The one or more data objects can store the selected risk model utility and any modifications of the logical risk expressions associated with the selected risk model utility.
A multiple-actuator hard disk drive includes a first actuator associated with a first logical unit and configured to operate on a first set of disk surfaces, a second actuator associated with a second logical unit and configured to operate on a second set of disk surfaces greater than the first set, and a controller accessing a mapping of logical memory addresses to physical memory locations. The mapping maps the first logical unit to the physical memory locations of the first set of surfaces and a parasitic portion of the second set of surfaces, and maps the second logical unit to the physical memory locations of the second set of surfaces exclusive of the parasitic portion of the second set of surfaces. Thus, data transfer commands performed on the parasitic portion are executed by one actuator while credit is given to the logical unit associated with the other actuator.
A Data Storage Device (DSD) includes one or more magnetic disks. One or more data blocks are encoded into a first plurality of Error Correction Code (ECC) sub-blocks including a first ECC sub-block. The first plurality of ECC sub-blocks is encoded into a first ECC super-block. The first ECC sub-block is write-verified by reading the first ECC super-block. If the write-verify passes, a second plurality of ECC sub-blocks is encoded into a subsequent ECC super-block. If the write-verify fails, the first ECC sub-block and a subset of the second plurality of ECC sub-blocks are encoded into the subsequent ECC super-block. In another aspect, in response to the first ECC super-block failing to recover the first ECC sub-block, a subsequent ECC super-block is read and a copy of the first ECC sub-block is used if the copy is detected in the subsequent ECC super-block.
Systems and methods for managing write stream workload of video surveillance systems through playback workload triggered dynamic capture are described. A video camera may include a video image sensor for receiving video data. The video data may be written to a storage device. A request for access to the video data may then be received. An impact on a standard data write stream may be determined based on the time window determined for the access to the video data. At least one mitigation option may be initiated at the video image sensor as a result.
Various methods, apparatuses/systems, and media for automating sponsored-search data pipelines are disclosed. A processor generates keyword-level metrics data based on received bidder input data that includes cost-per-acquisition (CPA) data and total spending data for each keyword; determines campaign-level CPA threshold data chosen at previous iteration of search campaign and a target CPA data used for current search campaign; calculates, campaign-level metrics data that includes the CPA data and adjusted total spending data; quantifies a final campaign-level reward data based on the calculated campaign-level metrics data, adjusted total spending data, and the target CPA data; updates a distribution corresponding to CPA-threshold data chosen at previous iteration using the final campaign-level reward data; samples CPA-threshold distributions and determines CPA-threshold data chosen at current iteration; executes campaign-level heuristics using the keyword-level metrics data, campaign-level metrics data, and the CPA-threshold data chosen at current iteration; and displaying final heuristic-execution data onto a GUI.
A method and a system for extracting information from a table in a document is provided. The method includes: receiving a document that includes information that is arranged in a table; determining three sets of coordinates that respectively relate to lines, words, and characters included in the document; extracting a list of lines based on the first set of coordinates; reconstructing the rows of the table based on list of lines and the second set of coordinates; reconstructing the columns of the table based on the reconstructed rows and the third set of coordinates; and outputting a reconstruction of the table. The three sets of coordinates are expressible in an hOCR format that is based on an open standard for representation of scanned information that is obtainable by using an optical character recognition (OCR) technique.
JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT (USA)
Inventor
Curry, Robert M.
Cowe, Andrew B.
Abstract
A heated throttle valve apparatus is disclosed herein, which includes a valve system with a valve driver configured to provide a rotational force to a valve assembly via a thermal isolating drive coupler configured to prevent the transfer of thermal energy from the valve assembly to the valve driver. The valve assembly includes a valve body and a valve closure member, a valve shaft with a valve shaft heater in a first heating zone and one or more body heaters in a second heating zone, permitting the user to control temperature in the heating zones independently. An electrical conductor strain relief is provided, configured to eliminate strain in the shaft heater electrical conductors when the valve closure member undergoes a change in angular orientation. The electrical conductor strain relief includes a curvilinear flexible member wound between a first connection area and a second connection area.
F16K 49/00 - Means in or on valves for heating or cooling
F16K 31/04 - Operating means; Releasing devices magnetic using a motor
H01R 13/58 - Means for relieving strain on wire connection, e.g. cord grip
F16L 59/16 - Arrangements specially adapted to local requirements at flanges, junctions, valves, or the like
F16K 37/00 - Special means in or on valves or other cut-off apparatus for indicating or recording operation thereof, or for enabling an alarm to be given
87.
SYSTEMS AND METHOD FOR AUTOMATED CODE ANALYSIS AND TAGGING
Systems and methods for automated code analysis and tagging are disclosed. In one embodiment, a method for automated code analysis and tagging may include: (1) receiving, by a code annotation computer program executed by a computer processor, a training code snippet from a training codebase; (2) parsing, by the code annotation computer program, the training code snippet into a data structure; (3) quantifying, by the code annotation computer program, the data structure, (4) parsing, by the code annotation computer program, a docstring associated with the training code snippet into a plurality of keywords; (5) quantifying, by the code annotation computer program, the plurality of keywords; and (6) training, by the code annotation computer program, a code annotation model based on a similarity between the quantified data structure and a smoothing parameter for a Dirichlet prior smoothing estimate.
Disclosed herein are devices, systems, and methods that can improve the SNR of nanopore measurements by mitigating the effect of parasitic capacitance between the sense electrode and the counter electrode. In some embodiments, a feedback circuit is used to inject a charge into the sense electrode to at least partially cancel the parasitic capacitance between the sense electrode and the counter electrode. In some embodiments, bootstrapping of a signal from the amplifier output or from the sense electrode is used to inject a charge on the counter electrode to substantially cancel the parasitic capacitance.
G01N 27/22 - Investigating or analysing materials by the use of electric, electrochemical, or magnetic means by investigating impedance by investigating capacitance
H03F 3/04 - Amplifiers with only discharge tubes or only semiconductor devices as amplifying elements with semiconductor devices only
G01N 33/487 - Physical analysis of biological material of liquid biological material
Disclosed herein are systems and devices for detecting molecules. In some embodiments, a system for detecting molecules comprises an amplifier and a nanopore unit, wherein the nanopore unit comprises a nanopore, a sense electrode, a counter electrode, and a shield situated between the sense electrode and the counter electrode and coupled to an output of the amplifier. The shield may be recessed from a hole in the nanopore. A system or device may include an array of nanopore units that may share some components, such as a read amplifier, a digitizer, drive circuitry, control logic, and/or a multiplexer.
G01N 27/22 - Investigating or analysing materials by the use of electric, electrochemical, or magnetic means by investigating impedance by investigating capacitance
H03F 3/04 - Amplifiers with only discharge tubes or only semiconductor devices as amplifying elements with semiconductor devices only
G01N 33/487 - Physical analysis of biological material of liquid biological material
90.
SYSTEM AND METHOD FOR INJECTING LATENCY FOR ENTERPRISE SYSTEMS
A method for providing varying amounts of simulated latencies for a mainframe is disclosed. The method includes modifying routing to pass through a simulated latency injector system; setting an initial latency amount for the target mainframe; when the mainframe application is determined to be unstable, modifying the OSA routing to bypass the simulated latency injector system; when the mainframe application is determined to be stable in the first monitoring, initiating a planned latency injection schedule for injecting latencies in differing amounts until a target latency amount is reached; performing monitoring for the stability of the mainframe application; modifying an injected latency amount back to the initial latency amount when the mainframe application is determined to be unstable in the monitoring; and applying another latency amount specified in the planned latency injection schedule when the mainframe application is determined to be stable.
Solid State Drive devices with hardware accelerators and methods for apportioning storage resources with tokens in the SSD are disclosed. SSDs typically comprise an array of non-volatile memory devices and a controller which manages access to the memory devices. The controller may also comprise one or more accelerators to either improve the performance of the SSD itself or to offload specialized computation workloads of a host-computing device. Different accelerators may be dynamically assigned portions of the non-volatile memory array according to the type of data being accessed and/or the throughput required. Provision is also made for the data to be accessed directly by the accelerators bypassing the controller. The accelerators may also share data bus bandwidth and resources with each other or the storage device controller. To minimize conflicts and improve the storage device performance, a system of tokens for both cache memory and bus bandwidth is used to dynamically assign these resources.
A semiconductor device includes a first semiconductor die having a top planar surface and a second semiconductor die having a bottom planar surface and a top planar surface. A protective layer including a bottom planar surface and a top planar surface is positioned between the first semiconductor die and the second semiconductor die. An adhesive layer having a top planar surface and a bottom planar surface is between the protective layer and the second semiconductor die. A periphery of the top planar surface of the first semiconductor die is covered by a periphery of the bottom planar surface of the protective layer after cutting a portion of the protective layer that extended past the periphery of the surface of the first semiconductor die. The protective layer reduces the occurrence of peeling of the second semiconductor die and first semiconductor die coupled to the protective layer.
H01L 23/00 - SEMICONDUCTOR DEVICES NOT COVERED BY CLASS - Details of semiconductor or other solid state devices
H01L 25/065 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices all the devices being of a type provided for in the same subgroup of groups , or in a single subclass of , , e.g. assemblies of rectifier diodes the devices not having separate containers the devices being of a type provided for in group
A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to determine that a hint calibration operation is needed, select a first hint mode out of a plurality of hint modes, generate one or more hints based on a selected hint mode, and select a hint mode based on one or more of a performance, quality of service, and power consumption of the data storage device. The controller is further configured to iterate through the plurality of hint modes during the hint calibration operation and operate based on the selected hint mode until the controller determines that another hint calibration operation is needed.
A method for providing geospatial information for clustered merchants based on proximate transactional data is disclosed. The method includes retrieving, via an application programming interface, transaction data for a geographical location that corresponds to the clustered merchants based on a predetermined parameter; identifying, from the transaction data, the proximate transactional data that correspond to the clustered merchants; linking transactions in the proximate transactional data to each of the clustered merchants; computing a weighted score for each of the transactions based on a characteristic; calculating a transaction centroid for each of the clustered merchants by using the corresponding weighted score and a result of the linking; and determining the geospatial information for each of the clustered merchants based on a distance to the corresponding transaction centroid.
G06F 16/909 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
A method and a system for using differential privacy techniques to provide axe obfuscation with respect to information included in an inventory axe list of available securities is provided. The method includes: obtaining first information to be included in a first inventory axe list to be published on a particular day; retrieving second information included in a second inventory axe list that was published on the previous day and/or several previous days; obfuscating the obtained first information by applying an algorithm based on the difference between the first information and the second information; and publishing the first inventory axe list by transmitting the obfuscated first information to a plurality of intended recipients. The quality of obfuscation may be measured and controlled as a function of desired privacy level and potential cost.
Storage devices are configured to be utilized in a variety of blockchain related activities that rely on a proof of space consensus model. These storage devices are required to process a lot of read and write cycles on their memory devices to generate the desired proof of space consensus data. The generation and storing of this generated data requires very different types of memory device usage. Storage devices may be configured to optimize these different usage types upon detecting these proof of space blockchain activities. These optimizations can include suspending one or more background or other garbage collection activities. Additional optimizations can further include configuring partitions or namespaces to comprise single-level-cell majority or single-level-cell only memory devices to increase writing speeds. Further optimizations can include interleaving or extending the length of error correction codes. These optimizations, while not suitable for general use, are suitable for proof of space blockchain activities.
H03M 13/00 - Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
97.
METHOD AND SYSTEM FOR PREDICTIVE ANALYTICS OF SPECIFIED POOLS
A method for facilitating automated predictive analytics of specified pools is disclosed. The method includes receiving, via an application programming interface, a bid list from an exchange platform, the bid list relating to a listing of the specified pools; parsing the bid list to identify pool characteristics for each of the specified pools; retrieving real-time market data that corresponds to each of the specified pools; aggregating historical trade data that relates to each of the specified pools; determining, by using a model, a predicted amount for each of the specified pools based on the identified pool characteristic, the retrieved real-time market data, and the aggregated historical trade data; and outputting, via the application programming interface, the predicted amount to the exchange platform.
A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to receive a read command from a host device to read data from the memory device, fetch the read data from the memory device, check metadata associated with the read data, determine if the metadata corresponds to the read command, and provide modified read data to the host device when the metadata does not correspond to the read command. The modified read data may be encrypted read data, corrupted read data, or read data that is replaced with debug information. When the host device receives data that is different than the read data that is requested, the modified read data may be unreadable to the host device so that unprivileged access to the read data may be avoided.
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
A semiconductor device package includes a first substrate having an electrical circuit, semiconductor dies stacked one on top of the other, and bond wires electrically connected one to another. The bond wires electrically couple the semiconductor dies to one another and to the electrical circuit. There is a first bond wire having a first portion connected to a first semiconductor die, a second portion connected to a second semiconductor die, and an intermediate portion between the first portion and second portion. The semiconductor device package further includes a molding compound encapsulating the semiconductor dies, and the first and second portions of the first bond wire. The intermediate portion of the first bond wire is exposed along a top planar surface of the molding compound. The semiconductor device package may be used for coupling one or more other semiconductor device packages thereto via the exposed intermediate portion.
H01L 25/10 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices all the devices being of a type provided for in the same subgroup of groups , or in a single subclass of , , e.g. assemblies of rectifier diodes the devices having separate containers
H01L 25/065 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices all the devices being of a type provided for in the same subgroup of groups , or in a single subclass of , , e.g. assemblies of rectifier diodes the devices not having separate containers the devices being of a type provided for in group
H01L 25/00 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices
In one example, a laser level target post for leveling a server cabinet is disclosed. The laser level target post includes an elongated body section and a reflective surface at a top end of the elongated body section. The top end reflective surface is to reflect a received light beam for leveling a top surface of the server cabinet. The laser level target post also includes a magnetic base at a bottom end of the elongated body section. The magnetic base may attach the laser level target post to a corner of the top surface of the server cabinet.