Patent application number | Description | Published |
20100244940 | EXTERNAL COMPENSATION FOR INPUT CURRENT SOURCE - An integrated circuit includes: a pre-driver stage, coupled to an external supply voltage, for controlling the final driver stage; a final driver stage, coupled to the pre-driver stage and the external supply voltage, for providing an output voltage; a compensation circuit, coupled to the pre-driver stage, for providing a bias voltage to the pre-driver stage that compensates for variation in the external supply voltage, to control current through the pre-driver stage; and a bias circuit, coupled to the external supply voltage and the compensation circuit, for providing a bias voltage as an input to the compensation circuit. | 09-30-2010 |
20100253391 | APPARATUS AND METHOD FOR CONTROLLING DELAY STAGE OF OFF-CHIP DRIVER - A multiple-finger off-chip driver (OCD) uses delay between branches of the output stage. The delay between branches is controlled using bias circuitry which compensates for process, temperature, and voltage (PVT) variations, resulting in less variation of slew rate at the output of the OCD. The OCD includes a time domain delay stage; a pre-driver stage; a final driver stage; and a bias circuit, for providing bias voltages to the time domain stage that compensate for process, temperature and voltage (PVT) variations on the time domain stage. | 10-07-2010 |
20130179758 | CIRCUITS, INTEGRATED CIRCUITS, AND METHODS FOR INTERLEAVED PARITY COMPUTATION - Circuits, integrated circuits, and methods are disclosed for interleaved parity computation. In one such example circuit, an interleaved parity computation circuit includes a first parity circuit that receives a first set of bits and a second parity circuit that receives a second set of bits. The first set of bits includes a first parity bit, and is received in the first parity circuit during a first clock cycle. The first parity circuit generates a first signal indicative of the parity of the first set of bits. The second set of bits includes a second parity bit, and is received in the second parity circuit during a second clock cycle. The second parity circuit generates a second signal indicative of the parity of the second set of bits. A combining circuit combines the first signal and the second signal into an alert signal. | 07-11-2013 |
20140331110 | CIRCUITS, INTEGRATED CIRCUITS, AND METHODS FOR INTERLEAVED PARITY COMPUTATION - Circuits, integrated circuits, and methods are disclosed for interleaved parity computation. In one such example circuit, an interleaved parity computation circuit includes a first parity circuit that receives a first set of bits and a second parity circuit that receives a second set of bits. The first set of bits includes a first parity bit, and is received in the first parity circuit during a first clock cycle. The first parity circuit generates a first signal indicative of the parity of the first set of bits. The second set of bits includes a second parity bit, and is received in the second parity circuit during a second clock cycle. The second parity circuit generates a second signal indicative of the parity of the second set of bits. A combining circuit combines the first signal and the second signal into an alert signal. | 11-06-2014 |
Patent application number | Description | Published |
20110022947 | SYSTEM AND METHOD FOR DYNAMIC REGENERATION OF PAGE FRAGMENTS - Disclosed herein are embodiments of a system and method for the provisioning of dynamically generated content. One embodiment can interface a content delivery system and a content management system at the fragment level. Depending upon how a page is organized, a fragment may refer to a block within the page, a portion of the page, or a content item presented on the page. When a content item is updated and published onto the content management system, one embodiment of the invention can operate to track dependencies of managed pages and invalidate/validate fragment(s) affected by the change(s) accordingly. The updated fragment(s) may then be dynamically assembled on-the-fly or on-demand. The updated fragment(s) may or may not be cached. In this way, changes made to a piece of content can be reflected in all pages which utilize this content almost simultaneously with the changes to the content itself. | 01-27-2011 |
20120303765 | SYSTEM USING CONTENT GENERATOR FOR DYNAMICALLY REGENERATING ONE OR MORE FRAGMENTS OF WEB PAGE BASED ON NOTIFICATION OF CONTENT CHANGE - Disclosed herein are embodiments of a system and method for the provisioning of dynamically generated content. One embodiment can interface a content delivery system and a content management system at the fragment level. Depending upon how a page is organized, a fragment may refer to a block within the page, a portion of the page, or a content item presented on the page. When a content item is updated and published onto the content management system, one embodiment of the invention can operate to track dependencies of managed pages and invalidate/validate fragment(s) affected by the change(s) accordingly. The updated fragment(s) may then be dynamically assembled on-the-fly or on-demand. The updated fragment(s) may or may not be cached. In this way, changes made to a piece of content can be reflected in all pages which utilize this content almost simultaneously with the changes to the content itself. | 11-29-2012 |
20130232227 | SYSTEM AND METHOD FOR FRAGMENT LEVEL DYNAMIC CONTENT REGENERATION - A system and method for provisioning dynamically generated content. One embodiment can interface a content delivery system and a content management system at the fragment level. Depending upon how a page is organized, a fragment may refer to a block within the page, a portion of the page, or a content item presented on the page. When a content item is updated and published onto the content management system, one embodiment can operate to track dependencies of managed pages and invalidate/validate fragment(s) affected by the change(s) accordingly. The updated fragment(s) may then be dynamically assembled on-the-fly or on-demand. The updated fragment(s) may or may not be cached. In this way, changes made to a piece of content can be reflected in all pages which utilize this content almost simultaneously with the changes to the content itself. | 09-05-2013 |
20140201615 | System and method for the dynamic provisioning of static content - Disclosed herein are embodiments of a system and method for the dynamic provisioning of static content. In one embodiment, information presented on a content delivery system can be refreshed based on information published on a content management system. One embodiment can interface the content delivery system and the content management system at the page level. More specifically, content dependencies across pages employing the same content or portion(s) thereof can be tracked in a timely, accurate manner. Upon receiving a notification of a change to the content or a portion thereof from the content management system, a content generation system may operate to determine, based on the dependencies, what pages are affected by the change and, based on the determination, dynamically regenerate any and all affected pages. The regenerated pages may then be stored and/or pushed to the web tier for delivery to end users. | 07-17-2014 |
Patent application number | Description | Published |
20100035645 | COORDINATED POWER BOOST AND POWER BACK-OFF - A system and method are provided for boosting power for a communications link between a base station and a user device, or user equipment, over a communications link channel in a cellular communications network. In one embodiment, the base station determines whether a communications link for a user device located within a sector of a cell served by the base station needs a power boost. If a power boost is needed, the base station provides a power boost for the communications link for the user device and, for each of one or more neighboring sectors that neighbor the sector in which the user device is located, coordinates the power boost in both frequency and time with a power backoff for a downlink to another user device located in a cell center area of the neighboring sector. | 02-11-2010 |
20100035653 | SUB-CHANNELIZATION WITH POWER BOOST - A method and system are provided for boosting power for a communications link between a base station and a user device, or user equipment, in a cellular communications network. In one embodiment, the communications link is a downlink between the base station and the user device established via a downlink channel having a full channel bandwidth including a number of sub-carrier frequencies. The base station determines whether a power boost is needed for a downlink to the user device. If so, the base station uses a subset of the sub-carrier frequencies from the full channel bandwidth as a reduced bandwidth channel, or sub-channel, for the downlink to the user device such that signal power is concentrated on the sub-carrier frequencies of the reduced channel bandwidth rather than spread across the sub-carrier frequencies of the full channel bandwidth. As a result, a power boost for the downlink is provided. | 02-11-2010 |
20110319126 | COORDINATED POWER BOOST AND POWER BACK-OFF - A system and method are provided for boosting power for a communications link between a base station and a user device, or user equipment, over a communications link channel in a cellular communications network. In one embodiment, the base station determines whether a communications link for a user device located within a sector of a cell served by the base station needs a power boost. If a power boost is needed, the base station provides a power boost for the communications link for the user device and, for each of one or more neighboring sectors that neighbor the sector in which the user device is located, coordinates the power boost in both frequency and time with a power backoff for a downlink to another user device located in a cell center area of the neighboring sector. | 12-29-2011 |
20130010749 | SUB-CHANNELIZATION WITH POWER BOOST - A method and system are provided for boosting power for a communications link between a base station and a user device, or user equipment, in a cellular communications network. In one embodiment, the communications link is a downlink between the base station and the user device established via a downlink channel having a full channel bandwidth including a number of sub-carrier frequencies. The base station determines whether a power boost is needed for a downlink to the user device. If so, the base station uses a subset of the sub-carrier frequencies from the full channel bandwidth as a reduced bandwidth channel, or sub-channel, for the downlink to the user device such that signal power is concentrated on the sub-carrier frequencies of the reduced channel bandwidth rather than spread across the sub-carrier frequencies of the full channel bandwidth. As a result, a power boost for the downlink is provided. | 01-10-2013 |
20130017857 | COORDINATED POWER BOOST AND POWER BACK-OFF - A system and method are provided for boosting power for a communications link between a base station and a user device, or user equipment, over a communications link channel in a cellular communications network. In one embodiment, the base station determines whether a communications link for a user device located within a sector of a cell served by the base station needs a power boost. If a power boost is needed, the base station provides a power boost for the communications link for the user device and, for each of one or more neighboring sectors that neighbor the sector in which the user device is located, coordinates the power boost in both frequency and time with a power backoff for a downlink to another user device located in a cell center area of the neighboring sector. | 01-17-2013 |
Patent application number | Description | Published |
20100003439 | POLYETHYLENE COMPOSITIONS, METHODS OF MAKING THE SAME, AND ARTICLES PREPARED THEREFROM - The invention is related to compositions suitable for the fabrication of pipes, and other articles, with excellent performance properties. The invention provides a composition, comprising a blend, wherein said blend comprises a high molecular weight ethylene-based interpolymer and a low molecular weight ethylene-based interpolymer, and the high molecular weight ethylene-based interpolymer is a heterogeneously branched linear or a homogeneously branched linear ethylene-based interpolymer, and has a density from 0.922 g/cc to 0.929 g/cc, and a high load melt index (I21) from 0.2 g/10 min to 1.0 g/10 min, and the low molecular weight ethylene-based interpolymer is heterogeneously branched linear or a homogeneously branched linear ethylene-based interpolymer, and has a density from 0.940 g/cc to 0.955 g/cc, and a melt index (I2) from 6 g/10 min to 50 g/10 min. The blend has a single peak in an ATREF profile eluting above 30° C., and has a coefficient of viscosity average molecular weight (CM?) less than −0.0032 in the log(calculated Mv) versus elution temperature, said CMv calculated in the range of elution temperatures from 70° C. to 90° C. The Mv is the viscosity average molecular weight. | 01-07-2010 |
20120258270 | METHOD FOR EXTRUDING POLYMER - The invention provides a process for extruding a composition, comprising at least one polymer, through a die, comprising applying at least one processing additive (PA) onto at least one surface of the die, and extruding the composition through the die, and wherein the processing additive is applied to the die as a solution. The invention also provides a composition comprising at least one processing additive (PA), and a solvent or a solvent mixture. | 10-11-2012 |
20130137828 | POLYETHYLENE COMPOSITIONS, METHODS OF MAKING THE SAME, AND ARTICLES PREPARED THEREFROM - The invention is related to compositions suitable for the fabrication of pipes, and other articles, with excellent performance properties. The invention provides a composition, comprising a blend, wherein said blend comprises a high molecular weight ethylene-based interpolymer and a low molecular weight ethylene-based interpolymer, and the high molecular weight ethylene-based interpolymer is a heterogeneously branched linear or a homogeneously branched linear ethylene-based interpolymer, and has a density from 0.922 g/cc to 0.929 g/cc, and a high load melt index (I21) from 0.2 g/10 min to 1.0 g/10 min, and the low molecular weight ethylene-based interpolymer is heterogeneously branched linear or a homogeneously branched linear ethylene-based interpolymer, and has a density from 0.940 g/cc to 0.955 g/cc, and a melt index (I2) from 6 g/10 min to 50 g/10 min. The blend has a single peak in an ATREF profile eluting above 30° C., and has a coefficient of viscosity average molecular weight (CMv) less than −0.0032 in the log (calculated Mv) versus elution temperature, said CMv calculated in the range of elution temperatures from 70° C. to 90° C. The Mv is the viscosity average molecular weight. | 05-30-2013 |
Patent application number | Description | Published |
20080222719 | Fine-Grained Authorization by Traversing Generational Relationships - Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource, and locating, based on the request, the resource in both a containment relationship graph and in a structure having groupings of resources, wherein the groupings comprise a grouping having the resource. Further, the embodiment includes traversing a vertex of the containment relationship graph, wherein the vertex comprises a generational resource of the resource, and reading an authorization table associated with a grouping having the generational resource in the groupings. Further still, the embodiment includes determining whether to grant the access rights for performing the action on the resource. | 09-11-2008 |
20090037196 | DETERMINING WHETHER A POSTAL MAIL ITEM CONTAINING A RADIO FREQUENCY IDENTIFIER (RFID) IS JUNK MAIL - A method, computer program product, and apparatus for receiving a postal mail item. The postal mail item is received. The postal mail item contains a radio frequency identifier identifying the sender of the postal mail item. Responsive to receiving the postal mail item in the mailbox, the radio frequency identifier of the postal mail item is scanned with a scanner to identify the sender of the postal mail item. A determination is made whether the sender of the postal mail item is in a junk mail list. The junk mail list includes a list of senders accessible to a processor in the scanner. | 02-05-2009 |
20120047258 | Managing and Securing Manageable Resources in Stateless Web Server Architecture Using Servlet Filters - Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein the application program component receives and processes the user request. | 02-23-2012 |
20130007845 | Authentication and authorization methods for cloud computing security platform - An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud. | 01-03-2013 |
Patent application number | Description | Published |
20080291894 | METHODS AND APPARATUS TO COMMUNICATE USING A MULTI-FIDELITY AUDIO GATEWAY - Methods and apparatus to communicate using a multi-fidelity audio gateway are described. One example method receives information associated with at least one communication service via a multi-fidelity audio gateway and selects at least one communication path for use by the gateway device based on the communication service. | 11-27-2008 |
20090094662 | SYSTEM FOR MANAGING MEDIA SERVICES - A system that incorporates teachings of the present disclosure may include, for example, a Media Content Processor (MCP) having a controller to detect a communication device roaming into a personal area network, receive a communication identifier from the communication device, authenticate the communication device responsive to validating the communication identifier, and enable the communication device to manage operations of the MCP according to a profile of a subscriber of said communication device responsive to a successful authentication of said communication device. Other embodiments are disclosed. | 04-09-2009 |
20090220064 | METHODS AND APPARATUS TO MANAGE CONFERENCE CALLS - Methods and apparatus to manage conference calls are described. An example method of managing a conference call includes maintaining a record of participants of the conference call; enabling a first one of the participants to request an adjustment of a volume of a current speaker; and in response to a request from the first participant, adjusting an amplification setting associated with the current speaker in a preference file associated with the first participant. | 09-03-2009 |
20110078720 | APPLIED AUTOMATIC DEMOGRAPHIC ANALYSIS - A method for managing a data stream that is transmitted from a stream transmitter to a stream receiver disposed in an environment that includes at least one individual is provided. The method includes detecting an action of the individual in the environment and determining a demographic descriptor of the individual based on the detected action. The method further includes correlating the determined demographic descriptor and a content of the data stream to determine whether a predetermined condition is satisfied, and, in response to the correlating the demographic descriptor of the individual and the content of the data stream satisfying the predetermined condition, automatically modifying the data stream. | 03-31-2011 |
20110123004 | System and Method to Search a Media Content Database Based on Voice Input Data - A computer implemented method includes initiating a call from an interactive voice response (IVR) system to a first device associated with a user in response to a user request. The computer implemented method includes receiving voice input data at the IVR system via the call. The computer implemented method also includes performing a search of a media content database based at least partially on the voice input data. The computer implemented method further includes sending search results identifying media content items based on the search of the media content database to a second device associated with the user. | 05-26-2011 |
20110313774 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. A spoken phrase is received and time-stamped. The user is identified from the spoken phrase. A window of time is determined from a semantic content of the spoken phrase. A sensor measurement is received and time-stamped. A difference in time between the time-stamped spoken phrase and the time-stamped sensor measurement is determined and compared to the window of time. When the difference in time is within the window of time, then the sensor measurement is associated with the user. | 12-22-2011 |
20120029917 | APPARATUS AND METHOD FOR PROVIDING MESSAGES IN A SOCIAL NETWORK - A system that incorporates teachings of the present disclosure may include, for example, a server including a controller to receive audio signals and content identification information from a media processor, generate text representing a voice message based on the audio signals, determine an identity of media content based on the content identification information, generate an enhanced message having text and additional content where the additional content is obtained by the controller based on the identity of the media content, and transmit the enhanced message to the media processor for presentation on the display device, where the enhanced message is accessible by one or more communication devices that are associated with a social network and remote from the media processor. Other embodiments are disclosed. | 02-02-2012 |
20120030712 | NETWORK-INTEGRATED REMOTE CONTROL WITH VOICE ACTIVATION - A method and system for network-integrated remote control includes voice activation of a user interface context on a remote control device. A user may utter a voice command, which the remote control device may use to obtain a user interface context from a network server. The user interface context may be used by the remote control device to display a user interface. The voice command may be associated with desired multimedia content, which may be selectable using control elements in the user interface. The remote control device can then be used to select and control desired multimedia programs. | 02-02-2012 |
20120291070 | METHOD AND APPARATUS FOR ASSOCIATING MICRO-BLOGS WITH MEDIA PROGRAMS - A system that incorporates teachings of the present disclosure may operate, for example, according to a method for identifying subsets of blogs from a collection of blogs according to a relevance of each subset of blogs to one of a plurality of media programs deliverable to a plurality of subscriber devices, determining for each subset of blogs one or more trends, detecting a subscriber device from the plurality of subscriber devices, selecting a media program from the plurality of media programs, selecting one of the subsets of blogs that is relevant to the media program, and supplying the subscriber device the selected subset of blogs with the one or more trends determined for the select subset of blogs. Other embodiments are disclosed. | 11-15-2012 |
20130024187 | METHOD AND APPARATUS FOR SOCIAL NETWORK COMMUNICATION OVER A MEDIA NETWORK - A system that incorporates teachings of the present disclosure may include, for example, transmitting a request to initiate a communication session with a member device of a social network, activating a speech capture element, maintaining activation of the speech capture element in accordance with a pattern of prior speech messages, detecting a speech message at the activated speech capture element, and transmitting the detected speech message, or a derivative thereof, to the member device of the social network. Other embodiments are disclosed. | 01-24-2013 |
20130054245 | System and Method to Search a Media Content Database Based on Voice Input Data - A method includes initiating a call from an interactive voice response (IVR) system to a first device associated with a user in response to a request. The method includes receiving voice input data at the IVR system via the call. The method also includes performing a search of a media content database based at least partially on the voice input data. The method further includes sending search results identifying media content items based on the search of the media content database to a second device associated with the user. | 02-28-2013 |
20130145400 | Systems and Methods to Facilitate a Voice Search of Available Media Content - A particular method includes determining estimated popularity scores for programs identified in an electronic program guide for a time interval. The programs identified in the electronic program guide for the time interval include programs being aired. One or more estimated popularity scores are based on viewing trends of the programs being aired. The method also includes determining a voice search vocabulary based on the estimated popularity scores. The voice search vocabulary includes one or more keywords usable for a keyword search of the electronic program guide during the time interval based on a received voice search request. | 06-06-2013 |
20130176910 | METHODS AND APPARATUS TO MANAGE CONFERENCE CALLS - Methods and apparatus to manage conference calls are described. An example method includes classifying participants of the conference call in a hierarchy according to respective priority values; detecting an attempt of a participants to speak at a same time; detecting which one of the participants has a lower priority ranking; blocking an audio signal of the one of the participants having the lower priority ranking; placing an identifier associated with the blocked one of the participants in a queue; organizing the queue according to a behavior-based policy by comparing an utterance of a current speaker to a keyword associated with the conference call to determine a relevancy of the utterance; and increasing a point total associated with the current speaker in response to determining that the utterance is substantially relevant, and decreasing the point total associated with the current speaker in response to determining that the utterance is substantially irrelevant. | 07-11-2013 |
20130226585 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. A spoken phrase is received and time-stamped. The user is identified from the spoken phrase. A window of time is determined from a semantic content of the spoken phrase. A sensor measurement is received and time-stamped. A difference in time between the time-stamped spoken phrase and the time-stamped sensor measurement is determined and compared to the window of time. When the difference in time is within the window of time, then the sensor measurement is associated with the user. | 08-29-2013 |
20140013363 | System for Managing Media Services - A system that incorporates teachings of the present disclosure may include, for example, a media content processor (MCP) having a controller to detect a communication device roaming into a personal area network, receive a communication identifier from the communication device, authenticate the communication device responsive to validating the communication identifier, and enable the communication device to manage operations of the MCP according to a profile of a subscriber of the communication device responsive to a successful authentication of the communication device. Other embodiments are disclosed. | 01-09-2014 |
20140058745 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. Often times a weight scale, blood pressure monitor, or other medical measurement device is shared among a group of users. A time-stamped physiological measurement is compared to a time-stamped message from a mobile device. If the timestamps are contemporaneous, then the physiological measurement is bound to the mobile device. | 02-27-2014 |
20140337015 | METHOD AND APPARATUS FOR SOCIAL NETWORK COMMUNICATION OVER A MEDIA NETWORK - A system that incorporates teachings of the present disclosure may initiate a communication session with a member device of a social network and may activate a speech capture element based on a pattern of prior speech messages. A speech message may be detected at the speech capture element and, in turn, transmitted to the member device. | 11-13-2014 |
20150020089 | SYSTEM FOR MANAGING MEDIA SERVICES - Aspects of the subject disclosure may include, for example, a device that includes a processor and a memory that stores executable instructions. The instructions, when executed by the processor, cause the processor to perform operations including receiving an identifier of a communication device that has established communications with a media processor by way a personal area network. An association between the communication device and the media processor is determined and the communication device is authenticates according to the identifier. Information is provided to the media processor to facilitate management of media services by the communication device. Other embodiments are disclosed. | 01-15-2015 |
20150058009 | APPARATUS AND METHOD FOR PROVIDING MESSAGES IN A SOCIAL NETWORK - A system that incorporates teachings of the present disclosure may include, for example, a server including a controller to receive audio signals and content identification information from a media processor, generate text representing a voice message based on the audio signals, determine an identity of media content based on the content identification information, generate an enhanced message having text and additional content where the additional content is obtained by the controller based on the identity of the media content, and transmit the enhanced message to the media processor for presentation on the display device, where the enhanced message is accessible by one or more communication devices that are associated with a social network and remote from the media processor. Other embodiments are disclosed. | 02-26-2015 |
Patent application number | Description | Published |
20080301638 | Method and Apparatus for a System Management Tool to Adapt Command Interface and Behavior Based on Installed Features - A system management tool framework for a system management tool for extending system management commands related to software installation units such as software component, feature or product. The tool is constructed in accordance with an interface and framework that allows polymorphism and dynamic binding at run-time. When the system management software tool is constructed in accordance to the framework of the present invention, the software tool can be made scalable, flexible and adaptable to a heterogeneous distributed system. | 12-04-2008 |
20090037196 | DETERMINING WHETHER A POSTAL MAIL ITEM CONTAINING A RADIO FREQUENCY IDENTIFIER (RFID) IS JUNK MAIL - A method, computer program product, and apparatus for receiving a postal mail item. The postal mail item is received. The postal mail item contains a radio frequency identifier identifying the sender of the postal mail item. Responsive to receiving the postal mail item in the mailbox, the radio frequency identifier of the postal mail item is scanned with a scanner to identify the sender of the postal mail item. A determination is made whether the sender of the postal mail item is in a junk mail list. The junk mail list includes a list of senders accessible to a processor in the scanner. | 02-05-2009 |
20120047258 | Managing and Securing Manageable Resources in Stateless Web Server Architecture Using Servlet Filters - Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein the application program component receives and processes the user request. | 02-23-2012 |
20130007845 | Authentication and authorization methods for cloud computing security platform - An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud. | 01-03-2013 |
20140317716 | Extending infrastructure security to services in a cloud computing environment - A cloud deployment appliance (or other platform-as-a-service (IPAS) infrastructure software) includes a mechanism to deploy a product as a “shared service” to the cloud, as well as to enable the product to establish a trust relationship between itself and the appliance or IPAS. The mechanism further enables multiple products deployed to the cloud to form trust relationships with each other (despite the fact that each deployment and each product typically, by the nature of the cloud deployment, are intended to be isolated from one another). In addition, once deployed and provisioned into the cloud, a shared service can become part of a single sign-on (SSO) domain automatically. SSO is facilitated using a token-based exchange. Once a product registers with a token service, it can participate in SSO. This approach enables enforcement of consistent access control policy across product boundaries, and without requiring a user to perform any configuration. | 10-23-2014 |
Patent application number | Description | Published |
20080288546 | METHOD AND SYSTEM FOR HANDLING REALLOCATED BLOCKS IN A FILE SYSTEM - A system for managing a file system. In response to a user selecting an image of the file system to perform a rollback operation, each data block in the file system that is owned by the image is searched for. Then, it is determined whether a data block owned by the image is marked in a first map and a second map. In response to determining that the data block owned by the image is marked in the first map and the second map, the data block is marked in a third map. In response to determining that the data block owned by the image is marked in the third map, a new data block is allocated in the file system. Subsequently, data from the data block owned by the image is copied to the new data block in the file system prior to performing the rollback operation to avoid a collision that causes data corruption. | 11-20-2008 |
20080301203 | MANAGING A SNAPSHOT STORED WITHIN A FILE SYSTEM SPACE FOR EFFICIENT DETECTING OF IN-USE BLOCKS - In one embodiment, at least one snapshot thread manages a point in time snapshot of a file system stored within the space allocated to the file system. The snapshot thread tracks, for at least one block of the plurality of blocks of the file system, a separate entry in a snapshot map specifying if each at least one block is newly allocated following the creation of the point in time snapshot and specifying an addressed location of a snapshot copy of the at least one block if copied. Separately, a file system handling thread tracks a mapping of an allocation state of each of said plurality of blocks of the file system. Responsive to detecting the file system triggered to write or delete a particular block from among the at least one block of the file system, the snapshot thread allows the file system to write to or delete the particular block without making a snapshot copy of the particular block if a particular entry for the particular block in the snapshot map specifies the particular block is newly allocated, wherein a block marked newly allocated was not in-use at the point in time of the file system snapshot. | 12-04-2008 |
20090070535 | HANDLING TEMPORARY FILES IN A FILE SYSTEM WITH SNAPSHOTS - A temporary file is identified. The temporary file includes a data block containing a first file image. A determination is made whether the temporary block has been included in a previous snapshot. Responsive to receiving a modification of the temporary block that has been included in the previous snapshot, a modified first image is created. The modified image is stored in the original file block, and the original image is copied to a newly allocated block. The original first block is updated to include a reference to the second block. | 03-12-2009 |
20090182792 | METHOD AND APPARATUS TO PERFORM INCREMENTAL TRUNCATES IN A FILE SYSTEM - The present invention provides a computer implemented method for truncating a file in a file system. The file system receives a request to truncate a file to a target size, the file having a first inode. The file system creates a second inode to a transient directory, wherein the second inode holds a plurality of in-progress entries. The file system sets a target size in the first inode. The file system writes a truncate entry to a journal, the truncate entry comprising a predetermined size. The file system truncates the file by up to the predetermined size. The file system determines that the file is above the target size. Responsive to a determination that the file is above the target size, the file system repeats the truncating step and the determining step. Responsive to a determination that the file is not above the target size, the file system applies the in-progress entries from the transient directory. | 07-16-2009 |
20100011035 | Method and System for Handling Reallocated Blocks in a File System - A system for managing a file system. In response to a user selecting an image of the file system to perform a rollback operation, each data block in the file system that is owned by the image is searched for. Then, it is determined whether a data block owned by the image is marked in a first map and a second map. In response to determining that the data block owned by the image is marked in the first map and the second map, the data block is marked in a third map. In response to determining that the data block owned by the image is marked in the third map, a new data block is allocated in the file system. Subsequently, data from the data block owned by the image is copied to the new data block in the file system prior to performing the rollback operation to avoid a collision that causes data corruption. | 01-14-2010 |
20100250493 | USING A SPARSE FILE AS A CLONE OF A FILE - One embodiment is for using a sparse file as a clone. The method includes creating, by an application associated with a computer system, a snapshot of a file, such as an individual file, a collection of files, file system, directories, and so forth. Further, the method includes requesting, by the application, a clone of that created snapshot. Further still, the method includes generating, by the application, an empty sparse having at least one inode identifying the empty sparse file as the clone and pointing to the snapshot associated with the clone. Thereby, the requested clone is created using the created sparse file, which begins as an empty sparse file. | 09-30-2010 |
20120005162 | Managing Copies of Data Structures in File Systems - A method, data processing system, and computer program product for managing data. A processor unit copies a data structure within a hierarchy of data structures to form a copy of the data structure. The data structure belongs to a level within a plurality of levels in the hierarchy of data structures. The processor unit associates an identifier with the data structure within the hierarchy of data structures. The processor unit increments a portion of the identifier for the data structure in response to copying the data structure to form the copy of the data structure and associating the identifier with the data structure within the hierarchy of data structures. The portion of the identifier that is incremented is based on the level within the plurality of levels in which the data structure is located. | 01-05-2012 |
20120066182 | INODE MANAGEMENT IN REDIRECT-ON-WRITE FILE SYSTEM - Some embodiments of the inventive subject matter allow a redirect-on-write file system to continue processing file transactions while writing a snapshot to persistent storage. Thus, embodiments do not block file transactions while flushing snapshots to persistent storage. To avoid blocking, some embodiments the file system can maintain two snapshot generations. The first snapshot generation is the snapshot being written to persistent storage. The second snapshot generation may reside in main memory, and store data for file transactions occurring after the file system began writing the first snapshot generation. | 03-15-2012 |
20120066183 | FILE CLONING ACROSS DIFFERENT FILESETS - After a clone file is created from a file, a write request targeting the clone file can be handled. It is determined that the write request indicates the clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. It is then determined that the data block at a current location cannot be modified. The write request is implemented with respect to the data block at a different location. It is indicated that the data block at the different location can be modified for subsequent write requests that indicate the clone file | 03-15-2012 |
20120066191 | OPTIMIZED CONCURRENT FILE INPUT/OUTPUT IN A CLUSTERED FILE SYSTEM - Embodiments include a method comprising transmitting from a node of a plurality of nodes within a clustered file system provides concurrent file I/O access for files, to write access a region of a file. The method includes receiving an authorization to write access the region without a lock to preclude access of the region by other nodes, if at least one physical section in a machine-readable medium has been allocated for storage of the region by the server. The method includes receiving the authorization to write access the region with the lock to preclude access of the region by the other nodes, if the at least one physical section in the machine-readable medium has not been allocated for storage of the region by the server. Responsive to receiving the authorization to write access, metadata is transmitted for storage into the at least one physical section in the machine-readable medium. | 03-15-2012 |
20120066278 | DISTRIBUTED FILE HIERARCHY MANAGEMENT IN A CLUSTERED REDIRECT-ON-WRITE FILE SYSTEM - Management of a file hierarchy for a clustered file system can be distributed across nodes of the cluster. A cluster file hierarchy is accessed to determine location of a file in response to a request to write to a file. A first node maintains the cluster file hierarchy. It is determined that management of a fileset object, which represents a fileset that includes the file, has been delegated to a second node based, at least in part, on said accessing the cluster file hierarchy. A node file hierarchy maintained by the second node is accessed responsive to determining the delegation. The cluster file hierarchy represents filesets of the clustered file system and the node hierarchy represents a subset of one or more of the filesets. Location of the file is determined based, at least in part, on said accessing the node file hierarchy. | 03-15-2012 |
20120150800 | INDEPENDENT FILESET GENERATIONS IN A CLUSTERED REDIRECT-ON-WRITE FILESYSTEM - Maintaining a generation value for each fileset that is distinct from a corresponding fileset manager preserves the independence of nodes while also allowing distributed fileset management. A fileset manager can maintain a value that reflects consistency snapshots for that node (“node generation”) separately from a value that reflects consistency snapshots for a particular fileset (“fileset generation”). | 06-14-2012 |
20120150804 | MULTIPLE CONTEXTS IN A REDIRECT ON WRITE FILE SYSTEM - A method includes initiating committing to persistent storage of a current consistency snapshot of a plurality of data objects in a redirect-on-write file system. Each of the plurality of data objects has a first copy of at least two copies of the data having a first context of at least two contexts. The method includes receiving, during committing to storage of the current consistency snapshot, an update to a data object of the plurality of data objects. The method also includes responsive to receipt of the update to the data object, creating a second copy of data of the data object from the first copy. The second copy of the data has a second context of the at least two contexts. The method includes responsive to receipt of the update to the data object, updating, based on the update, the second copy of the data of the data object. | 06-14-2012 |
20120150926 | DISTRIBUTED FREE BLOCK MAP FOR A CLUSTERED REDIRECT-ON-WRITE FILE SYSTEM - In a cluster that distributes fileset management, fileset managers will maintain a free block map and an in-flight block map to allocate blocks to clients writing to a relevant fileset. A fileset manager managing free block allocation for cluster clients that write to a fileset managed by the fileset manager. Since a clustered file system manager manages an initial free block map for the cluster (“cluster free block map”), the clustered file system manager provisions free blocks to fileset managers from the cluster free block map. The fileset manager then allocates free blocks from the provisioned free blocks to cluster clients that write to the fileset managed by the fileset manager. | 06-14-2012 |
20120151245 | IN-FLIGHT BLOCK MAP FOR A CLUSTERED REDIRECT-ON-WRITE FILESYSTEM - A cluster server manages allocation of free blocks to cluster clients performing writes in a clustered file system. The cluster server manages free block allocation with a free block map and an in-flight block map. The free block map is a data structure or hardware structure with data that indicates blocks or extents of the clustered file system that can be allocated to a client for the client to write data. The in-flight block map is a data structure or hardware structure with data that indicates blocks that have been allocated to clients, but remain in-flight. A block remains in-flight until the clustered file system metadata has been updated to reflect a write performed to that block by a client. After a consistency snapshot of the metadata is published to the storage resources, the data at the block will be visible to other nodes of the cluster. | 06-14-2012 |
20120209810 | Using a Sparse File as a Clone of a File - One embodiment is for using a sparse file as a clone. The method includes creating, by an application associated with a computer system, a snapshot of a file, such as an individual file, a collection of files, file system, directories, and so forth. Further, the method includes requesting, by the application, a clone of that created snapshot. Further still, the method includes generating, by the application, an empty sparse having at least one inode identifying the empty sparse file as the clone and pointing to the snapshot associated with the clone. Thereby, the requested clone is created using the created sparse file, which begins as an empty sparse file. | 08-16-2012 |
20120209813 | FILE CLONING ACROSS DIFFERENT FILESETS - After a clone file is created from a file, a write request targeting the clone file can be handled. It is determined that the write request indicates the clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. It is then determined that the data block at a current location cannot be modified. The write request is implemented with respect to the data block at a different location. It is indicated that the data block at the different location can be modified for subsequent write requests that indicate the clone file | 08-16-2012 |
20120216074 | IN-FLIGHT BLOCK MAP FOR A CLUSTERED REDIRECT-ON-WRITE FILESYSTEM - A cluster server manages allocation of free blocks to cluster clients performing writes in a clustered file system. The cluster server manages free block allocation with a free block map and an in-flight block map. The free block map is a data structure or hardware structure with data that indicates blocks or extents of the clustered file system that can be allocated to a client for the client to write data. The in-flight block map is a data structure or hardware structure with data that indicates blocks that have been allocated to clients, but remain in-flight. A block remains in-flight until the clustered file system metadata has been updated to reflect a write performed to that block by a client. After a consistency snapshot of the metadata is published to the storage resources, the data at the block will be visible to other nodes of the cluster. | 08-23-2012 |
20130031058 | MANAGING DATA ACCESS REQUESTS AFTER PERSISTENT SNAPSHOTS - A client node on which a file system is mounted can be configured to efficiently handle content access requests after a snapshot is created. The client node can maintain generation numbers at a data block, a file, and a fileset level to determine whether a data block is part of a snapshot generation and consequently whether the data block is writable in a current generation. Data block mappings and write access permissions associated with the data blocks need not be revoked at the client node prior to creating the snapshot. Cached data block mappings can be accessed to identify data blocks for servicing a read request. The data block can be updated in place if the data block is not part of the snapshot generation. The write request can be serviced at a new data block if the data block is part of the snapshot generation. | 01-31-2013 |
20130318086 | DISTRIBUTED FILE HIERARCHY MANAGEMENT IN A CLUSTERED REDIRECT-ON-WRITE FILE SYSTEM - Management of a file hierarchy for a clustered file system can be distributed across nodes of the cluster. A cluster file hierarchy is accessed to determine location of a file in response to a request to write to a file. A first node maintains the cluster file hierarchy. It is determined that management of a fileset object, which represents a fileset that includes the file, has been delegated to a second node based, at least in part, on said accessing the cluster file hierarchy. A node file hierarchy maintained by the second node is accessed responsive to determining the delegation. The cluster file hierarchy represents filesets of the clustered file system and the node hierarchy represents a subset of one or more of the filesets. Location of the file is determined based, at least in part, on said accessing the node file hierarchy. | 11-28-2013 |
20140156602 | FILE CLONING ACROSS DIFFERENT FILESETS - A method includes determining, by a processor, that a write request indicates a clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. The method includes determining that the data block at a current location cannot be modified. In response to a determination that the data block at the current location cannot be modified, the method includes implementing the write request with respect to the data block at a different location and indicating that the data block at the different location can be modified for subsequent write requests that indicate the clone file. | 06-05-2014 |
Patent application number | Description | Published |
20090260819 | COMPOSITIONS AND METHODS FOR DIVERTING INJECTED FLUIDS TO ACHIEVE IMPROVED HYDROCARBON FLUID RECOVERY - The present disclosure is directed to compositions and methods that may be used for enhanced oil recovery, for modifying the permeability of subterranean formations and for increasing the mobilization and/or recovery rate of hydrocarbon fluids present in the formations. The compositions may include, for example, expandable cross linked polymeric microparticles having an unexpanded volume average particle size diameter of from about 0.05 to about 5,000 microns and a cross linking agent content of from about 100 to about 200,000 ppm of hydrolytically labile silyl ester or silyl ether crosslinkers and from 0 to about 300 ppm of non-labile crosslinkers. | 10-22-2009 |
20090260820 | BLOCK COPOLYMERS FOR RECOVERING HYDROCARBON FLUIDS FROM A SUBTERRANEAN RESERVOIR - The present disclosure is directed to compositions and methods that may be used for enhanced oil recovery, for modifying the permeability of subterranean formations and for increasing the mobilization and/or recovery rate of hydrocarbon fluids present in the formations. The compositions may include, for example, expandable cross-linked polymeric microparticles having unexpanded volume average particle size diameters of from about 0.05 to about 5,000 microns and cross linking agent contents of from about 100 to about 200,000 ppm of labile cross linkers and from 0 to about 300 ppm of non-labile cross linkers, wherein the expandable polymeric monomers have a block copolymer structure comprising at least two different monomers having different chemical structures. | 10-22-2009 |
20090264321 | COMPOSITION AND METHOD FOR RECOVERING HYDROCARBON FLUIDS FROM A SUBTERRANEAN RESERVOIR - This invention is directed to a composition comprising encapsulated expandable polymeric microparticles including expandable base microparticles encapsulated in a shell of at least one layer of a labile or degradable encapsulation material. The encapsulated microparticles have an unexpanded volume average particle size diameter of from about 0.05 to about 5,000 microns. The invention is further directed to the use of the composition for modifying the permeability of subterranean formations and increasing the mobilization and/or recovery rate of hydrocarbon fluids present in the formations. | 10-22-2009 |
20090264322 | COMPOSITION AND METHOD FOR RECOVERING HYDROCARBON FLUIDS FROM A SUBTERRANEAN RESERVOIR - This invention is directed to a composition comprising expandable polymeric microparticles comprising hydrophobic polymers having a backbone with labile pendant groups, the microparticles having an unexpanded volume average particle size diameter of from about 0.05 to about 5,000 microns. Labile pendant groups on the backbone are subject to hydrolysis under a change in environmental conditions that results in expansion of the microparticle. The invention is further directed to the use of the composition for modifying the permeability of subterranean formations and increasing the mobilization and/or recovery rate of hydrocarbon fluids present in the formations. | 10-22-2009 |
20090264324 | COMPOSITION AND METHOD FOR RECOVERING HYDROCARBON FLUIDS FROM A SUBTERRANEAN RESERVOIR - This invention is directed to a composition comprising crosslinked expandable polymeric microparticles comprising structured polymers having labile crosslinks or having a labile core and non-labile crosslinks. The starting configuration of the structured polymers constrains the microparticle to an unexpanded volume average particle size diameter of from about 0.05 to about 5,000 microns. Labile crosslinks or the labile core of the structured polymers are subject to degradation which results expansion of the microparticle. The invention is further directed to the use of the composition for modifying the permeability of subterranean formations and increasing the mobilization and/or recovery rate of hydrocarbon fluids present in the formations. | 10-22-2009 |
20090264325 | COMPOSITIONS AND METHODS FOR RECOVERING HYDROCARBON FLUIDS FROM A SUBTERRANEAN RESERVOIR - The present disclosure is directed to compositions and methods for enhanced oil recovery, for modifying the permeability of subterranean formations and for increasing the mobilization and/or recovery rate of hydrocarbon fluids present in the formations. The compositions may include, for example, expandable cross-linked polymeric microparticles having unexpanded volume average particle size diameters of from about 0.05 to about 5,000 microns and cross linking agent contents of from about 100 to about 200,000 ppm of labile cross linkers and from 0 to about 300 ppm of non-labile cross linkers that may be used in combination with other components such as, for example, a second and different polymeric microparticle, a viscosified aqueous solution, a subterranean reservoir treatment, or combinations thereof. | 10-22-2009 |
20100022419 | COMPOSITION AND METHOD FOR RECOVERING HYDROCARBON FLUIDS FROM A SUBTERRANEAN RESERVOIR - This invention is directed to a composition comprising expandable polymeric microparticles comprising an interpenetrating polymer network (IPN). The IPN constrains the microparticle to an unexpanded volume average particle size diameter of from about 0.05 to about 5,000 microns. Labile cross-links in the polymers of the IPN are subject to degradation, which results in release of the expandable microparticle so that the microparticle expands. The invention is further directed to the use of the composition for modifying the permeability of subterranean formations and increasing the mobilization and/or recovery rate of hydrocarbon fluids present in the formations. | 01-28-2010 |
20120316090 | ENVIRONMENTALLY FRIENDLY DISPERSION SYSTEM USED IN THE PREPARATION OF INVERSE EMULSION POLYMERS - A water-in-oil emulsion composition and method of production is disclosed. The composition may comprise a monomer phase, an organic phase, at least one initiator, and an inverting phase. The monomer phase may further comprise at least one monomer, water, ammonium chloride, sodium 2-acrylamido-2-methyl-1-propanesulfonate, tetrasodium ethylenediaminetetraacetate, and at least one water soluble ethylenically unsaturated monomer. The organic phase may further comprise at least one hydrophobic solvent, lecithin, and a polyoxyethylene derivative of a sorbitan ester. The at least one monomer may be selected from the group consisting of an acrylic monomer, an acrylamide monomer, and combinations thereof. | 12-13-2012 |
20130192826 | COMPOSITION AND METHOD FOR RECOVERING HYDROCARBON FLUIDS FROM A SUBTERRANEAN RESERVOIR - A composition comprising crosslinked expandable polymeric microparticles capable of hydrolysis at or below neutral pH and a method of modifying the permeability to water of a subterranean formation by introducing such compositions into the subterranean formation is disclosed and claimed. This invention further relates to compositions and methods for the recovery of hydrocarbon fluids from a subterranean reservoir or formation subjected to CO | 08-01-2013 |
20140116691 | CHEMICAL TREATMENT METHOD AND ADDITIVE USED TO TREAT FINES MIGRATION AND FLOW THROUGH POROUS MEDIA - Methods for reducing fines migration in a porous subterranean reservoir are disclosed. In certain aspects, the methods include introducing a composition comprising a water-soluble or dispersible branched polyhydroxyetheramine into the porous subterranean reservoir, maintaining a sufficient temperature in the porous subterranean reservoir for a period of time, adsorbing the composition onto a surface of the porous subterranean reservoir, and stabilizing at least a portion of the fines present in the porous subterranean reservoir. Methods for enhancing an effective permeability of a porous subterranean reservoir are also disclosed. In connection with the disclosed methods, a treatment composition can be used and in certain aspects, the treatment composition can be a reaction product of bisphenol A, an ethanol amine, diethanol amine, and a monofunctionalized polyoxyalkyleneamine. | 05-01-2014 |
20150068748 | COMPOSITIONS AND METHODS FOR DIVERTING INJECTED FLUIDS TO ACHIEVE IMPROVED HYDROCARBON FLUID RECOVERY - The present disclosure is directed to compositions and methods that may be used for enhanced oil recovery, for modifying the permeability of subterranean formations and for increasing the mobilization and/or recovery rate of hydrocarbon fluids present in the formations. The compositions may include, for example, expandable cross linked polymeric microparticles having an unexpanded volume average particle size diameter of from about 0.05 to about 5,000 microns and a cross linking agent content of from about 100 to about 200,000 ppm of hydrolytically labile silyl ester or silyl ether crosslinkers and from 0 to about 300 ppm of non-labile crosslinkers. | 03-12-2015 |
Patent application number | Description | Published |
20100099246 | METHOD OF MAKING A SPLIT GATE MEMORY CELL - A method includes forming a first layer of gate material over a semiconductor substrate; forming a hard mask layer over the first layer; forming an opening; forming a charge storage layer over the hard mask layer and within the opening; forming a second layer of gate material over the charge storage layer; removing a portion of the second layer and a portion of the charge storage layer which overlie the hard mask layer, wherein a second portion of the second layer remains within the opening; forming a patterned masking layer over the hard mask layer and over the second portion, wherein the patterned masking layer defines both a first and second bitcell; and forming the first and second bitcell using the patterned masking layer, wherein each of the first and second bitcell comprises a select gate made from the first layer and a control gate made from the second layer. | 04-22-2010 |
20100240156 | METHOD FOR PROVIDING A NON-VOLATILE MEMORY - Testing a non volatile memory by exposing the non volatile memory to particle radiation (e.g. xenon ions) to emulate memory cell damage due to data state changing events of a non volatile memory cell. After the exposing, the memory cells are subjected to tests and the results of the tests are used to develop reliability indications of the non volatile memory. Integrated circuits with non volatile memories of the same design are provided. Reliability representations of the integrated circuits can be made with respect to a number of data state charging events based on the exposure and subsequent tests. | 09-23-2010 |
20120261635 | RESISTIVE RANDOM ACCESS MEMORY (RAM) CELL AND METHOD FOR FORMING - A resistive random access memory cell over a substrate includes a memory stack structure and a sidewall spacer. The memory stack structure is over the substrate and includes a first electrode layer, a second electrode layer, and a metal oxide layer between the first electrode layer and the second electrode layer. The metal oxide layer has a sidewall. The sidewall spacer is adjacent to the sidewall and has a composition including silicon, carbon, and nitrogen. | 10-18-2012 |
20120261636 | RESISTIVE RANDOM ACCESS MEMORY (RAM) CELL AND METHOD FOR FORMING - A resistive random access memory cell uses a substrate and includes a gate stack over the substrate. The gate stack includes a first copper layer over the substrate, a copper oxide layer over the first copper layer, and a second copper layer over the copper oxide layer. | 10-18-2012 |
20130084697 | SPLIT GATE MEMORY DEVICE WITH GAP SPACER - A method for forming a split gate device includes forming a first sidewall of a first conductive gate layer, wherein the semiconductor layer includes a tunnel region laterally adjacent the first sidewall, forming a dielectric layer along the first sidewall to provide for increased thickness of a gap spacer, forming a charge storage layer over a portion of a top surface of the first conductive layer and over the tunnel region, and forming a second conductive gate layer over the charge storage layer. | 04-04-2013 |
20130264533 | RERAM DEVICE STRUCTURE - A resistive random access memory (ReRAM) includes a first metal layer having a first metal and a metal-oxide layer on the first metal layer. The metal-oxide layer inlcudes the first metal. The ReRAM further includes a second metal layer over the metal-oxide layer and a first continuous conductive barrier layer in physical contact with sidewalls of the first metal layer and of the metal-oxide layer. | 10-10-2013 |
20130320284 | FIELD FOCUSING FEATURES IN A RERAM CELL - A resistive random access memory (ReRAM) cell, comprising a first conductive electrode and a dielectric storage material layer over the first conductive electrode. The dielectric storage material layer is conducive to the formation of conductive filaments during the application of a filament forming voltage to the cell. The cell includes a second conductive electrode over the dielectric storage material layer and an interface region comprising a plurality of interspersed field focusing features that are not photo-lithographically defined. The interface region is located between the first conductive electrode and the dielectric storage material layer or between the dielectric storage material layer and the second conductive electrode. | 12-05-2013 |
20130320285 | FIELD FOCUSING FEATURES IN A RERAM CELL - A resistive random access memory (ReRAM) cell comprising a first conductive electrode and a dielectric storage material layer over the first conductive electrode. The dielectric storage material layer is conducive to the formation of conductive filaments during the application of a filament forming voltage to the cell. The cell includes a second conductive electrode over the dielectric storage material layer and a layer of conductive nanoclusters ( | 12-05-2013 |
20130323922 | SPLIT GATE MEMORY DEVICE WITH GAP SPACER - A method for forming a split gate device includes forming a first sidewall of a first conductive gate layer, wherein the semiconductor layer includes a tunnel region laterally adjacent the first sidewall, forming a dielectric layer along the first sidewall to provide for increased thickness of a gap spacer, forming a charge storage layer over a portion of a top surface of the first conductive layer and over the tunnel region, and forming a second conductive gate layer over the charge storage layer. | 12-05-2013 |
20140295639 | FIELD FOCUSING FEATURES IN A RERAM CELL - A resistive random access memory (ReRAM) cell comprising a first conductive electrode and a dielectric storage material layer over the first conductive electrode. The dielectric storage material layer is conducive to the formation of conductive filaments during the application of a filament forming voltage to the cell. The cell includes a second conductive electrode over the dielectric storage material layer and a layer of conductive nanoclusters ( | 10-02-2014 |
Patent application number | Description | Published |
20090286672 | INTERNAL DONOR FOR OLEFIN POLYMERIZATION CATALYSTS - Disclosed are solid titanium catalyst components, catalyst systems containing solid titanium catalyst components, and methods of making solid titanium catalyst components. The solid titanium catalyst components contain an internal electron donor compound containing at least one ether group and at least one ketone group. The catalyst system can contain a solid titanium catalyst component, an organoaluminum compound, and an organosilicon compound. Also disclosed are methods of polymerizing or copolymerizing an alpha-olefin. The methods involve contacting an olefin with a catalyst system containing the solid titanium catalyst component. | 11-19-2009 |
20100029870 | INTERNAL DONOR FOR OLEFIN POLYMERIZATION CATALYSTS - Disclosed are 1,8-naphthyl diaryloates, methods of making 1,8-naphthyl diaryloates, methods of using 1,8-naphthyl diaryloates, solid titanium catalyst components, catalyst systems containing solid titanium catalyst components, methods of making solid titanium catalyst components, and polymerization methods. The solid titanium catalyst components contain a 1,8-naphthyl diaryloate internal electron donor compound. The catalyst system can contain a solid titanium catalyst component, an organoaluminum compound, and an organosilicon compound. | 02-04-2010 |
20110152481 | Internal and external donor compounds for olefin polymerization catalysts - The present invention relates to catalyst systems containing solid catalyst components comprising titanium, magnesium, halogen and a 1,8-naphthyl diaryloate internal electron donor compound; organoaluminum compounds and alkyl benzoate derivatives as external electron donors. The present invention also relates to methods of making the catalyst systems, and methods of polymerizing or copolymerizing alpha-olefins using the catalyst systems. | 06-23-2011 |
20110207901 | INTERNAL AND EXTERNAL DONOR COMPOUNDS FOR OLEFIN POLYMERIZATION CATALYSTS II - The present invention relates to catalyst systems containing solid catalyst components comprising titanium, magnesium, halogen and an internal electron donor compound having at least one ether group and at least one ketone group; organoaluminum compounds and alkyl benzoate derivatives as external electron donors. The present invention also relates to methods of making the catalyst systems, and methods of polymerizing or copolymerizing alpha-olefins using the catalyst systems. | 08-25-2011 |
20110213106 | Internal and External Donor Compounds for Olefin Polymerization Catalysts III - The present invention relates to solid catalyst components comprising titanium, magnesium, halogen and an internal electron donor compound containing at least one 1,8-naphthyl diester compound. The 1,8-naphthyl diester compounds include naphthalene-1,8-diyl dicycloalkanecarboxylate derivatives, dicycloalkenecarboxylate derivatives, 8-(cycloalkanecarbonyloxy)naphthalene-1-yl benzoate derivatives, and 8-(cycloalkenecarbonyloxy)naphthalene-1-yl benzoate derivatives. The present invention further relates to catalyst systems containing the catalyst solid components, organoaluminum compounds, and organosilicon compounds. The present invention also relates to methods of making the solid catalyst components and the catalyst systems, and methods of polymerizing or copolymerizing alpha-olefins using the catalyst systems. | 09-01-2011 |
20110294970 | ETHYLENE POLYMERIZATION CATALYSTS - The present invention relates to solid catalyst components comprising a reaction product of a titanium compound, a magnesium compound, an alcohol, an aluminum alkoxide, a siloxane mixture, and a maleate derivative; and catalyst systems comprising the solid catalyst components and organoaluminum compounds. The present invention also relates to methods of making the solid catalyst components and the catalyst systems, and methods of polymerizing or copolymerizing ethylene using the catalyst systems. | 12-01-2011 |
20120116031 | High Activity Catalyst Component for Olefin Polymerization and Method of Using the Same - A catalyst system containing (a) a solid catalyst component containing a titanium halide, a magnesium halide, a first internal electron donor compound, and a second internal electron donor compound, (b) an organoaluminum compound, and (c) an external electron donor compound is disclosed. The first internal electron donor compound contains at least one ether group and at least one ketone group. The second internal electron donor compound is a 1,8-naphthyl diester compound. Methods of polymerizing or copolymerizing alpha-olefins using the catalyst system also are disclosed. | 05-10-2012 |
20130137568 | Internal Donor Structure for Olefin Polymerization Catalysts and Methods of Making and Using Same - The presently disclosed and claimed inventive concept(s) relates to solid catalyst components comprising titanium, magnesium, halogen and an internal electron donor compound having at least one ester group and at least one alkoxy group, and catalyst systems containing the catalyst solid components, organoaluminum compounds, and organosilicon compounds. The presently disclosed and claimed inventive concept(s) further relates to methods of making the catalyst components and the catalyst systems, and methods of polymerizing or copolymerizing alpha-olefins using the catalyst systems. | 05-30-2013 |
20130231447 | NEW INTERNAL DONORS FOR ETHYLENE POLYMERIZATION CATALYSTS AND METHODS OF MAKING AND USING SAME II - Solid catalyst components are disclosed including titanium, magnesium, halogen and an internal electron donor compound having at least one ester group and at least one alkoxy group, and catalyst systems containing the catalyst solid components, organoaluminum compounds, and organosilicon compounds. Further, methods of making the catalyst components and the catalyst systems are disclosed as well as methods of polymerizing or copolymerizing alpha-olefins using the catalyst systems. | 09-05-2013 |
20140235805 | INTERNAL DONOR STRUCTURE FOR OLEFIN POLYMERIZATION CATALYSTS AND METHODS OF MAKING AND USING SAME - The presently disclosed and claimed inventive concept(s) relates to solid catalyst components comprising titanium, magnesium, halogen and an internal electron donor compound having at least one ester group and at least one alkoxy group, and catalyst systems containing the catalyst solid components, organoaluminum compounds, and organosilicon compounds. The presently disclosed and claimed inventive concept(s) further relates to methods of making the catalyst components and the catalyst systems, and methods of polymerizing or copolymerizing alpha-olefins using the catalyst systems. | 08-21-2014 |
20140275451 | INTERNAL AND EXTERNAL DONOR COMPOUNDS FOR OLEFIN POLYMERIZATION CATALYSTS IV - The present disclosure relates to solid catalyst components comprising titanium, magnesium, halogen and an internal electron donor compound containing at least one 9-(alkoxymethyl)-9H-fluorene compound. The 9-(alkoxymethyl)-9H-fluorene compound include octyl-9-(methoxymethyl)-9H-fluorene-9-carboxylate; 7-methyloctyl-9-(methoxymethyl)-9H-fluorene-9-carboxylate; 2-ethylhexyl-9-(methoxymethyl)-9H-fluorene-9-carboxylate; and 9-(methoxymethyl)-9H-fluorene-9-yl benzoate. The present disclosure further relates to catalyst systems containing the catalyst solid components, organoaluminum compounds, and organosilicon compounds. The present disclosure also relates to methods of making the solid catalyst components and the catalyst systems, and methods of polymerizing or copolymerizing alpha-olefins using the catalyst systems. | 09-18-2014 |
20140275452 | MIXED INTERNAL DONOR STRUCTURES FOR 1-OLEFIN POLYMERIZATION CATALYSTS - Solid catalyst components are disclosed, which include titanium, magnesium, halogen and a combination of internal electron donor compounds containing at least one 1,8 naphthyl diester compound of Formula (II-1) and at least one 3,3-bis(methoxymethyl) alkane of Formula (II-2): | 09-18-2014 |
Patent application number | Description | Published |
20090283295 | TORQUE-BALANCED ELECTRICAL CABLE - An embodiment of a wellbore cable comprises a cable core, at least a first armor wire layer comprising a plurality of strength members and surrounding the cable core, and at least a second armor wire layer comprising a plurality of strength members surrounding the first armor wire layer, the second armor wire layer covering a predetermined percentage of the circumference of the first armor wire layer to prevent torque imbalance in the cable. | 11-19-2009 |
20100263904 | Torque-Balanced, Gas-Sealed Wireline Cables - A torque-balanced, gas-blocking wireline cable and a method of making the cable includes an electrically conductive cable core for transmitting electrical power and surrounding inner and outer layers of a plurality of armor wires. Gas blocking is achieved by placing a soft polymer layer over the core before the inner wires are cabled thereon. The inner wires imbed partially into the soft polymer layer such that no gaps are left between the inner wires and the core. A second soft polymer layer is optionally extruded over the inner wires before the outer wires are applied. The second soft polymer layer fills any spaces between the inner and outer wire layers and prevents pressurized gas from infiltrating between the wires. The inner wires have larger diameters than the outer wires such that the inner wires carry approximately 60% of the load and torque imbalance is prevented. | 10-21-2010 |
20120097419 | Wireline Cables Not Requiring Seasoning - A cable includes an electrically conductive cable core for transmitting electrical power and data, an insulative/protective layer circumferentially disposed around the core, an inner armor wire layer including a plurality of armor wires disposed around the cable core and the insulative layer, wherein at least one of the armor wires of the inner armor wire layer is bonded to the insulative layer, and an outer armor wire layer including a plurality of armor wires disposed around the inner armor wire layer. At least one of the armor wires of the outer armor wire layer can be bonded to the at least one of the armor wires of the inner armor wire layer. | 04-26-2012 |
20140158380 | Pump Deployment Via Cable - A method can include providing a pump connected to a power cable with a smooth surface; providing a stuffing box with a valve configured to form a seal with the smooth surface of the power cable in a closed state and to form a passage for the pump as connected to the power cable in an open state; providing a lubricator; providing a blow-out protector with a valve configured to form a seal with the smooth surface of the power cable in a closed state and to form a passage for the pump as connected to the power cable in an open state; and controlling the states of the valves while lowering the pump via the power cable through the stuffing box, the lubricator, and the blow-out protector to position the pump into a bore of a well. Various other apparatuses, systems, methods, etc., are also disclosed. | 06-12-2014 |
20140190706 | ENCAPSULATING AN ELECTRIC SUBMERSIBLE PUMP CABLE IN COILED TUBING - An electric submersible pump (ESP) cable encapsulated in coiled tubing is provided. In an example process, ESP cable is drawn through coiled tubing. Liquid filler that cures into a supportive solid matrix is pumped into the coiled tubing. The solid matrix may be a rubberized filler or a closed-cell foam. Additives in the liquid filler can compensate for thermal expansion during operation of the ESP, or decrease overall weight of the solid matrix, or swell in the presence of oil, water, salt, or gas to seal a hole in the coiled tubing. The coiled tubing may be formed and seam-welded around the ESP cable from flat steel strip. A long coiled tubing resistant to stretch for deep wells may be produced by providing extra ESP cable for slack before the liquid filler cures into solid matrix. The coiled tubing may be clad with corrosion-resistant alloy for corrosive wells. | 07-10-2014 |
20140311758 | Continuously Bonded Small-Diameter Cable With Electrical Return On Outer Wires - A small-diameter, continuously bonded cable and a method for manufacturing the same includes at least one longitudinally extending inner metallic component with a tie layer of an amended polymer material surrounding and bonded thereto in steps of heating and extruding. A longitudinally extending outer metallic component is radially spaced from the at least one inner metallic component and incased in a polymer material jacket layer in heating and extruding steps. The polymer materials insulate the metallic component for conducting electrical power and/or data signals. | 10-23-2014 |
20140367121 | Dual Use Cable With Fiber Optic Packaging For Use In Wellbore Operations - A dual use cable includes at least one fiber optic cable encased in a metallic component that is encased in a layer of polymer material. The polymer material is surrounded by a tube or armor wire strength members embedded in one or two additional polymer material layers. A final assembly can include an outer metallic component or an outer layer of polymer material. The at least one fiber optic cable transmits data and the armor wire strength members and/or metallic components transmit at least one of electrical power and data. | 12-18-2014 |
20150037581 | CABLE HAVING STRENGTH MEMBER WITH BONDED POLYMER COATINGS TO CREATE CONTINUOUSLY BONDED JACKETED STRENGTH MEMBER SYSTEM - The present disclosure comprises providing a cable core encased in a polymeric layer, cabling a first armor wire layer about the cable core, cabling a second armor wire layer about the first armor wire layer to form the cable, each of the armor wire layers comprising a plurality of strength members, at least one of the armor wire layers comprising a plurality of strength members having a polymeric layer bonded thereto. | 02-05-2015 |
20150075696 | Wireline Cables Not Requiring Seasoning - A cable includes an electrically conductive cable core for transmitting electrical power and data, an insulative/protective layer circumferentially disposed around the core, an inner armor wire layer including a plurality of armor wires disposed around the cable core and the insulative layer, wherein at least one of the armor wires of the inner armor wire layer is bonded to the insulative layer, and an outer armor wire layer including a plurality of armor wires disposed around the inner armor wire layer. At least one of the armor wires of the outer armor wire layer can be bonded to the at least one of the armor wires of the inner armor wire layer. | 03-19-2015 |
Patent application number | Description | Published |
20080254781 | SYSTEM AND APPARATUS FOR SILENCING COMMUNICATION DEVICES - A system and method for silencing communication devices is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a silencing system having a controller element to transmit an RF signal to an RF receiver of a mobile communication device. An audible alerting function of the mobile communication device can be adjusted in response to the RF signal. Additional embodiments are disclosed. | 10-16-2008 |
20100039238 | METHODS AND APPARATUS TO VISUALIZE LOCATIONS OF RADIO FREQUENCY IDENTIFICATION (RFID) TAGGED ITEMS - Methods and apparatus to visualize locations of radio frequency identification (RFID) tagged items are described. One example method includes receiving a request from a portable electronic device to access product information associated with an individual radio frequency identification (RFID) tagged item, determining a location of the product information in a database, transmitting the located product information to the portable electronic device for display thereon, receiving modified product information associated with the individual RFID tagged item from the portable electronic device, and storing the modified product information to the location of the product information in the database. | 02-18-2010 |
20100041343 | SYSTEM AND APPARATUS FOR SILENCING COMMUNICATION DEVICES - A system and method for silencing communication devices is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a silencing system having a controller element to transmit an RF signal to an RF receiver of a mobile communication device. An audible alerting function of the mobile communication device can be adjusted in response to the RF signal. Additional embodiments are disclosed. | 02-18-2010 |
20110279246 | METHODS AND APPARATUS TO VISUALIZE LOCATIONS OF RADIO FREQUENCY IDENTIFICATION (RFID) TAGGED ITEMS - Methods and apparatus to visualize locations of radio frequency identification (RFID) tagged items are described. One example method includes receiving a request from a portable electronic device to access product information associated with an individual radio frequency identification (RFID) tagged item, determining a location of the product information in a database, transmitting the located product information to the portable electronic device for display thereon, receiving modified product information associated with the individual RFID tagged item from the portable electronic device, and storing the modified product information to the location of the product information in the database. | 11-17-2011 |
20120317000 | METHODS AND APPARATUS TO VISUALIZE LOCATIONS OF RADIO FREQUENCY IDENTIFICATION (RFID) TAGGED ITEMS - Methods and apparatus to visualize locations of radio frequency identification (RFID) tagged items are described. One example method includes receiving a request from a portable electronic device to access product information associated with an individual radio frequency identification (RFID) tagged item, determining a location of the product information in a database, transmitting the located product information to the portable electronic device for display thereon, receiving modified product information associated with the individual RFID tagged item from the portable electronic device, and storing the modified product information to the location of the product information in the database. | 12-13-2012 |
20140046803 | METHOD AND APPARATUS TO VISUALIZE LOCATIONS OF RADIO FREQUENCY IDENTIFICATION (RFID) TAGGED ITEMS - Methods and apparatus to visualize locations of radio frequency identification (RFID) tagged items are described. One example method includes receiving a request from a portable electronic device to access product information associated with an individual radio frequency identification (RFID) tagged item, determining a location of the product information in a database, transmitting the located product information to the portable electronic device for display thereon, receiving modified product information associated with the individual RFID tagged item from the portable electronic device, and storing the modified product information to the location of the product information in the database. | 02-13-2014 |