Patent application number | Description | Published |
20130167446 | CUTTER ASSEMBLY WITH AT LEAST ONE ISLAND AND A METHOD OF MANUFACTURING A CUTTER ASSEMBLY - A cutter assembly includes a substrate and at least one island. The substrate includes a surface circumscribed by a peripheral edge, a flank surface extending from the peripheral edge, and at least one pocket with an opening on the surface and spaced apart from the peripheral edge. The at least one pocket extends from the opening towards an interior of the substrate. The at least one island is in the at least one pocket, and the at least one island includes a cutting surface that is exposed by the opening of the at least one pocket. | 07-04-2013 |
20130167449 | CUTTER ASSEMBLY WITH AT LEAST ONE ISLAND AND A METHOD OF MANUFACTURING A CUTTER ASSEMBLY - A cutter assembly includes a substrate and at least one island. The substrate includes a surface circumscribed by a peripheral edge, a flank surface extending from the peripheral edge, and at least one pocket with an opening on the surface and spaced apart from the peripheral edge. The at least one pocket extends from the opening towards an interior of the substrate. The at least one island is in the at least one pocket, and the at least one island includes a cutting surface that is exposed by the opening of the at least one pocket. | 07-04-2013 |
20130167450 | CUTTER ASSEMBLY WITH AT LEAST ONE ISLAND AND A METHOD OF MANUFACTURING A CUTTER ASSEMBLY - A cutter assembly includes a substrate and at least one island. The substrate includes a surface circumscribed by a peripheral edge, a flank surface extending from the peripheral edge, and at least one pocket with an opening on the surface and spaced apart from the peripheral edge. The at least one pocket extends from the opening towards an interior of the substrate. The at least one island is in the at least one pocket, and the at least one island includes a cutting surface that is exposed by the opening of the at least one pocket. | 07-04-2013 |
20130167451 | CUTTER ASSEMBLY WITH AT LEAST ONE ISLAND AND A METHOD OF MANUFACTURING A CUTTER ASSEMBLY - A cutter assembly includes a substrate and at least one island. The substrate includes a surface circumscribed by a peripheral edge, a flank surface extending from the peripheral edge, and at least one pocket with an opening on the surface and spaced apart from the peripheral edge. The at least one pocket extends from the opening towards an interior of the substrate. The at least one island is in the at least one pocket, and the at least one island includes a cutting surface that is exposed by the opening of the at least one pocket. | 07-04-2013 |
20130255161 | CUTTER ASSEMBLY WITH AT LEAST ONE ISLAND AND A METHOD OF MANUFACTURING A CUTTER ASSEMBLY - A cutter assembly and a method of making the cutter assembly are disclosed. A method of fabricating a cutting element having at least one island structure in at least one pocket of a substrate may comprise steps of building the substrate with at least one pocket; putting the at least one island into the at least one pocket in the substrate to form an assembly, the at least one island is not in a final state, wherein in the final state, chemical composition, shape, phase distribution and content, density and mechanical properties are finalized without changes; and subjecting the assembly to a final fabrication process to form the said cutting element and achieve the final state of the cutting element and at least one island in at least one pocket. | 10-03-2013 |
20130263519 | CUTTER ASSEMBLY WITH AT LEAST ONE ISLAND AND A METHOD OF MANUFACTURING A CUTTER ASSEMBLY - A cutter assembly and a method of making the cutter assembly are disclosed. A method of fabricating a cutting element having at least one island in at least one pocket of a substrate may comprise steps of providing the substrate with at least one pocket, and the at least one substrate is in a final state of the substrate; providing the at least one island, wherein the at least one island is in a final state of the island, wherein in the final state, chemical composition, shape, phase distribution and content, density and mechanical properties are finalized without changes; disposing the at least one island in the at least one pocket of the substrate; and securing the at least one island to at least one substrate. | 10-10-2013 |
20130318884 | CUTTER ASSEMBLY WITH AT LEAST ONE ISLAND AND A METHOD OF MANUFACTURING A CUTTER ASSEMBLY - A cutter assembly and a method of making the cutter assembly are disclosed. A method of fabricating a cutting element having at least one island structure in at least one pocket of a substrate may comprise steps of building a substrate green body with at least one pocket; building at least one island green body; assembling the at least one island green body and the substrate green body with at least one pocket in the substrate green body to form a green body assembly; and subjecting the green body assembly to a final fabrication process to form the said cutting element. | 12-05-2013 |
Patent application number | Description | Published |
20090313322 | Application Streaming Over HTTP - Disclosed are systems and methods for application streaming over HTTP. A virtual application running on a host computing device may detect the need for a page of memory that is not present on the host computing device. Accordingly, the virtual application may send a request to a virtual application server, seeking the absent memory page. The virtual application server may send to a web server an HTTP GET byte range request for the desired memory page. The web server may retrieve the requested block, which may be a portion of the virtual application image file. The requested data is returned to the host computing device via the virtual application server. The virtual application continues running on the host device using the requested data. | 12-17-2009 |
20100287313 | APPLICATION VIRTUALIZATION - A virtual application packaged for a specific executing environment may be executed on a processing device having an executing environment different from the specific executing environment. A reference, included in extracted installer metadata, to one or more key paths of a hierarchically-structured data store may be modified according to a set of rules related to the executing environment detected in the processing device. The modified extracted installer metadata may be provided to an installer for installing the virtual application. During execution of the virtual application, a request to read, write, or modify the hierarchically-structured data store may be intercepted and changed, such that a first key path included in the request may be mapped to a second key path, based on the detected executing environment. Similarly, a response to the request, which may include the second key path, may be intercepted and modified, to the first key path. | 11-11-2010 |
20120102505 | DYNAMIC PROCESS VIRTUALIZATION - Access to virtual application resources can be regulated at runtime. More specifically, a process can be provided with access to at least one virtual application resource as a function of context. By way of example, process events can be monitored and analyzed during execution to determine whether access should be provided to the process. | 04-26-2012 |
20120131566 | EFFICIENT VIRTUAL APPLICATION UPDATE - Efficient virtual application updating is enabled. An old version of a virtual application can be compared to a new version of the virtual application and updated as a function thereof. A file unchanged from the old version to the new version can be hard linked from the new version to the old version. For a changed file, matching portions of the file can be copied from the old version to the new version, and remaining un-matching portions can be acquired from another source. | 05-24-2012 |
20130227545 | APPLICATION VIRTUALIZATION - A virtual application packaged for a specific executing environment may be executed on a processing device having an executing environment different from the specific executing environment. A reference, included in extracted installer metadata, to one or more key paths of a hierarchically-structured data store may be modified according to a set of rules related to the executing environment detected in the processing device. The modified extracted installer metadata may be provided to an installer for installing the virtual application. During execution of the virtual application, a request to read, write, or modify the hierarchically-structured data store may be intercepted and changed, such that a first key path included in the request may be mapped to a second key path, based on the detected executing environment. Similarly, a response to the request, which may include the second key path, may be intercepted and modified, to the first key path. | 08-29-2013 |
20130227546 | APPLICATION VIRTUALIZATION - A virtual application packaged for a specific executing environment may be executed on a processing device having an executing environment different from the specific executing environment. A reference, included in extracted installer metadata, to one or more key paths of a hierarchically-structured data store may be modified according to a set of rules related to the executing environment detected in the processing device. The modified extracted installer metadata may be provided to an installer for installing the virtual application. During execution of the virtual application, a request to read, write, or modify the hierarchically-structured data store may be intercepted and changed, such that a first key path included in the request may be mapped to a second key path, based on the detected executing environment. Similarly, a response to the request, which may include the second key path, may be intercepted and modified, to the first key path. | 08-29-2013 |
20140032883 | Lock Free Streaming of Executable Code Data - A disassembler receives instructions and disassembles them into a plurality of separate opcodes. The disassembler creates a table identifying boundaries between each opcode. Each opcode is written to memory in an opcode-by-opcode manner by atomically writing standard blocks of memory. Debug break point opcodes are appended to opcode to create a full block of memory when needed. The block of memory may be thirty-two or sixty-four bits long, for example. Long opcodes may overlap two or more memory blocks. Debug break point opcodes may be appended to a second portion of the long opcode to create a full block of memory. A stream fault interceptor identifies when a requested data page is not available and retrieving the data page. | 01-30-2014 |
Patent application number | Description | Published |
20090293054 | Streaming Virtual Disk for Virtual Applications - A sparsely populated, streaming virtual disk may be used with a virtual application to enable fast launching of a virtual application from a network server. The virtual disk may be configured and populated in blocks, enabling those blocks that are used at a particular time to be downloaded and stored in the virtual disk. As other blocks are requested by the virtual application, those blocks may be fetched from the network server. Each block may be validated using a hash tree or some other function so that the recipient may verify authenticity and completeness. In some embodiments, a virtual application may be configured and deployed as a single file, enabling simple version control among other things. | 11-26-2009 |
20100023738 | State Separation for Application Changes - Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define configurations or uses of the application, including connections to and interactions with other applications. Applications that are virtualized may have state that is defined within a usage context and multiple states or configurations may be stored and recalled based on the usage context. Policies may define the context and what parameters are to be saved, and may be applied when applications are operated in a virtualized manner. | 01-28-2010 |
20100023934 | Computer Application Packages with Customizations - Applications operated within a virtual environment may be organized into a package containing various software components. Each software component or resource may have a specific name and other metadata, including a designator for overwriting or modifying the component. A policy may define how any changes to specific software components may be stored and retrieved based on the designator. One or more sets of changed components may be generated, persisted, and re-applied to create a customized version of the application based on the original package. The application may be operated within a virtual application environment or within a dedicated virtual machine environment. | 01-28-2010 |
20110246617 | Virtual Application Extension Points - A virtual application may be configured with several extension points within a host operating system. The virtual application may be configured with a private namespace in which various components, such as registry settings, dynamic linked libraries, and other components may reside. During configuration, links may be placed in the host operating system that may point to objects in the virtual application's private namespace so that the operating system and other applications may launch, control, or otherwise interact with the virtual application. The links may be located in a file system, registry, or other locations and may be available to other applications, including other virtual applications. A configuration routine may place the links into the host operating system at the time the application may be configured. | 10-06-2011 |
20110302581 | State Separation for Virtual Applications - Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define configurations or uses of the application, including connections to and interactions with other applications. Applications that are virtualized may have state that is defined within a usage context and multiple states or configurations may be stored and recalled based on the usage context. Policies may define the context and what parameters are to be saved, and may be applied when applications are operated in a virtualized manner. | 12-08-2011 |
20120102103 | RUNNING LEGACY APPLICATIONS ON CLOUD COMPUTING SYSTEMS WITHOUT REWRITING - Embodiments of the invention enable an application configured to store certain information (e.g., state information) locally to be deployed to a cloud computing environment in which local storage of such information is not permitted. For example, some embodiments create a “package” of resources that the application expects to be available to it during execution, and makes the package available to the application during execution in the cloud computing environment. The package may provide the application with resources it expects to have available during execution, such as the ability to store state information locally. As a result, the application need not be substantially modified to execute in the cloud computing environment. | 04-26-2012 |
20120110570 | STATEFUL APPLICATIONS OPERATING IN A STATELESS CLOUD COMPUTING ENVIRONMENT - A cloud computing environment may use a virtualization layer within a stateless cloud computing process to capture, store, and retrieve state information generated by a stateful application executing within the process. The virtualization layer may monitor various state storage systems to identify changes to stateful items and store the stateful items in a state storage mechanism. The virtualization layer may intercept and redirect calls to the stateful items stored in the state storage mechanism. A cloud computing manager may start and stop the stateless cloud computing process, and may recover the state and resume executing the application. | 05-03-2012 |
20130263134 | State Separation For Virtual Applications - Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define configurations or uses of the application, including connections to and interactions with other applications. Applications that are virtualized may have state that is defined within a usage context and multiple states or configurations may be stored and recalled based on the usage context. Policies may define the context and what parameters are to be saved, and may be applied when applications are operated in a virtualized manner. | 10-03-2013 |
20130305264 | Virtual Application Extension Points - A virtual application may be configured with several extension points within a host operating system. The virtual application may be configured with a private namespace in which various components, such as registry settings, dynamic linked libraries, and other components may reside. During configuration, links may be placed in the host operating system that may point to objects in the virtual application's private namespace so that the operating system and other applications may launch, control, or otherwise interact with the virtual application. The links may be located in a file system, registry, or other locations and may be available to other applications, including other virtual applications. A configuration routine may place the links into the host operating system at the time the application may be configured. | 11-14-2013 |
20150186164 | State Separation For Virtual Applications - The present invention relates to dispositioning state changes for applications. An application can be executed with different behaviors depending on the resources available to the application. The application can be executed with one behavior based on the availability of a specified resource and can be executed with another different behavior when a change in availability of the specified resource is detected. A configuration can be applied to an application based on a fist defined state for the application. Applying the configuration causes the application to execute with a first behavior. A change in available resources defines a second state for the application. The change in available resources is dispositioned (e.g., stored or discarded) in accordance with a policy based on a determine context for the second state. | 07-02-2015 |
20160034320 | Virtual Application Extension Points - A virtual application may be configured with several extension points within a host operating system. The virtual application may be configured with a private namespace in which various components, such as registry settings, dynamic linked libraries, and other components may reside. During configuration, links may be placed in the host operating system that may point to objects in the virtual application's private namespace so that the operating system and other applications may launch, control, or otherwise interact with the virtual application. The links may be located in a file system, registry, or other locations and may be available to other applications, including other virtual applications. A configuration routine may place the links into the host operating system at the time the application may be configured. | 02-04-2016 |
Patent application number | Description | Published |
20120158819 | POLICY-BASED APPLICATION DELIVERY - Technologies are described herein for automatically selecting a best application delivery method based on a centrally maintained policy. An agent executing on a user computing device receives a request to initiate an application. The agent requests a centrally maintained application placement policy document regarding the application program from a policy server. The application placement policy document may describe a policy for determining a method for delivery of the application to the user computing device based on a number of conditions. The agent selects the method for delivery of the application based on the application placement policy document and the current conditions, and then initiates the application program utilizing the selected application delivery method. | 06-21-2012 |
20120159471 | MULTI-MACHINE DEPLOYMENT AND CONFIGURATION OF MULTI-TIERED APPLICATIONS - Technologies are described herein for deploying and configuring a multi-tiered application to multiple computers. A selection of one or more application packages from multiple available application packages is received. Each of the selected application packages may correspond to one of multiple deployment configurations. The selected application packages may form the multi-tiered application. A union operation is performed on the multiple deployment configurations to generate a merged deployment configuration. A deployment workflow for deploying and configuring the selected application packages to the multiple computers is generated. The selected application packages are deployed to the multiple computers over a network according to the deployment workflow and the merged deployment configuration. | 06-21-2012 |
20120159479 | PROVIDING A PERSONA-BASED APPLICATION EXPERIENCE - Technologies are described herein for providing; a persona-based application experience. A query for a location of a persona package is received from a virtualization client. When the query is received, a current persona of a user requesting execution of a virtualized application is determined. The location of the persona package corresponding to the current persona of the user is determined The location of the persona package is sent to the virtualization client in response to the query. The virtualization client is configured to execute the virtualized application adapted to the persona package. | 06-21-2012 |
20120159570 | PROVIDING A SECURITY BOUNDARY - In order to enable potentially conflicting applications to execute on the same computer, application programming interface (API) calls are intercepted when an application attempts to access a computer system's resources. During a learning mode of operation, a security monitor stores data in a security monitor database identifying which applications are allowed to access the computer system resources. At runtime of an application, the security monitor operates in an enforcement mode and utilizes the contents of the security monitor database to determine if an application is permitted to access system resources. If data associated with the application is located in the security monitor database, the application is allowed to access computer system resources, if data associated with the application is not located in the security monitor database, the application is not allowed to access computer system resources. | 06-21-2012 |
20120166597 | SATISFYING APPLICATION DEPENDENCIES - The dependencies of an application are identified by intercepting application programming interface calls made by an application. A determination is then made at the runtime of the application as to whether the dependencies of the application are present. If the dependencies are not present, a client device upon which the application is executing is configured such that the dependencies are present and are made available only to the authorized application. If the dependencies are present and the application is authorized to interact with the dependencies, the application is permitted to execute. | 06-28-2012 |
20120166869 | PREDICTING, DIAGNOSING, AND RECOVERING FROM APPLICATION FAILURES BASED ON RESOURCE ACCESS PATTERNS - Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from application failures. Access to resources by the application program is monitored, and resource access events are logged. Resource access patterns are established from the logged resource access events utilizing computer pattern recognition techniques. If subsequent access to resources by the application program deviates from the established patterns, then a user and/or administrator of the application program is notified of a potential error condition based on the detected deviation. In addition, sequences of resource access events that deviate from the established resources access patterns are correlated with an error condition based on a temporal proximity to the time of occurrence of the error to provide diagnostic information regarding the error. | 06-28-2012 |
20120166963 | CONVERTING DESKTOP APPLICATIONS TO WEB APPLICATIONS - Technologies are described herein for converting a desktop application to a web application. An interface file is generated based on a user interface of the desktop application. A logic file is generated based on application executables of the desktop application. A data model is generated based on application data and states of the desktop application. The web application is generated based on the interface file, the logic file, and the data model. | 06-28-2012 |
20120167117 | STORING AND RESUMING APPLICATION RUNTIME STATE - Execution of an application is suspended and the runtime state of the application is collected and persisted. Maintenance operations may then be performed on the computer that the application was executing upon. The runtime state might also be moved to another computer. In order to resume execution of the application, the runtime state of the application is restored. Once the runtime state of the application has been restored, execution of the application may be restarted from the point at which execution was suspended. A proxy layer might also be utilized to translate requests received from the application for resources that are modified after the runtime state of the application is persisted. | 06-28-2012 |
20120167121 | APPLICATION EXECUTION IN A RESTRICTED APPLICATION EXECUTION ENVIRONMENT - Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call is allowed or blocked by a restricted application execution environment. Each API call that is blocked by the restricted application execution environment is modified so that the API call is allowable such as, for instance, modifying the API call to execute against a shadow resource. Remediation code might also be executed at runtime to reformat the API call so that it is allowed to execute in the restricted application execution environment. | 06-28-2012 |
20140250494 | APPLICATION EXECUTION IN A RESTRICTED APPLICATION EXECUTION ENVIRONMENT - Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call is allowed or blocked by a restricted application execution environment. Each API call that is blocked by the restricted application execution environment is modified so that the API call is allowable such as, for instance, modifying the API call to execute against a shadow resource. Remediation code might also be executed at runtime to reformat the API call so that it is allowed to execute in the restricted application execution environment. | 09-04-2014 |
20140304771 | APPLICATION EXECUTION IN A RESTRICTED APPLICATION EXECUTION ENVIRONMENT - Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call is allowed or blocked by a restricted application execution environment. Each API call that is blocked by the restricted application execution environment is modified so that the API call is allowable such as, for instance, modifying the API call to execute against a shadow resource. Remediation code might also be executed at runtime to reformat the API call so that it is allowed to execute in the restricted application execution environment. | 10-09-2014 |
20140310703 | MULTI-MACHINE DEPLOYMENT AND CONFIGURATION OF MULTI-TIERED APPLICATIONS - Technologies are described herein for deploying and configuring a multi-tiered application to multiple computers. A selection of one or more application packages from multiple available application packages is received. Each of the selected application packages may correspond to one of multiple deployment configurations. The selected application packages may form the multi-tiered application. A union operation is performed on the multiple deployment configurations to generate a merged deployment configuration. A deployment workflow for deploying and configuring the selected application packages to the multiple computers is generated. The selected application packages are deployed to the multiple computers over a network according to the deployment workflow and the merged deployment configuration. | 10-16-2014 |
20140373008 | THREAD OPERATION ACROSS VIRTUALIZATION CONTEXTS - Application virtualization at the thread level, rather than at the process level, the operation of a thread across virtualization contexts. For instance, one virtualization context might be a native environment, whereas another virtualization context might be a virtualization environment in which code running inside a virtualization package has access to virtualized computing resources. A thread operating in a first virtualization context then enters an entry point to code associated with a second virtualization context. For instance, a native thread might enter a plug-in operating as part of a virtualized package in a virtualization environment. While the thread is operating on the code, the thread might request access to the second computing resources associated with the second virtualization environment. In response, the thread is associated with the second virtualization context such that the thread has access to the second computing resources associated with the second virtualization context. | 12-18-2014 |
20160026478 | Converting Desktop Applications to Web Applications - Technologies are described herein for converting a desktop application to a web application. An interface file is generated based on a user interface of the desktop application. A logic file is generated based on application executables of the desktop application. A data model is generated based on application data and states of the desktop application. The web application is generated based on the interface file, the logic file, and the data model. | 01-28-2016 |
20160062817 | Predicting, Diagnosing, And Recovering From Application Failures Based On Resource Access Patterns - Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from application failures. Access to resources by the application program is monitored, and resource access events are logged. Resource access patterns are established from the logged resource access events utilizing computer pattern recognition techniques. If subsequent access to resources by the application program deviates from the established patterns, then a user and/or administrator of the application program is notified of a potential error condition based on the detected deviation. In addition, sequences of resource access events that deviate from the established resources access patterns are correlated with an error condition based on a temporal proximity to the time of occurrence of the error to provide diagnostic information regarding the error. | 03-03-2016 |
20160087993 | Selectively Managing Datasets - Selectively wiping data. A method includes identifying a plurality of datasets on a device. The method further includes identifying one or more datasets, on a dataset basis, from among the plurality of datasets that are managed datasets associated with a particular user account by being associated with an account identifier for the particular user account at a data structure external to the device. The managed datasets are associated with a particular user account by being associated with an account identifier for the particular user account. The method further includes receiving an indication that managed data associated with the particular user account should be wiped from the device. The method further includes wiping the one or more datasets that are identified as being managed datasets associated with a particular user account while not wiping datasets from the plurality of datasets that are not associated with the particular user account. | 03-24-2016 |
20160103701 | Storing and Resuming Application Runtime State - Execution of an application is suspended and the runtime state of the application is collected and persisted. Maintenance operations may then be performed on the computer that the application was executing upon. The runtime state might also be moved to another computer. In order to resume execution of the application, the runtime state of the application is restored. Once the runtime state of the application has been restored, execution of the application may be restarted from the point at which execution was suspended. A proxy layer might also be utilized to translate requests received from the application for resources that are modified after the runtime state of the application is persisted. | 04-14-2016 |
Patent application number | Description | Published |
20090123407 | MONO-, DI- AND POLYOL PHOSPHATE ESTERS IN PERSONAL CARE FORMULATIONS - A hydrophilized personal care formulation, which can be in the form of a hand or body soap (liquid or bar), lipstick, body wash, makeup remover, skin cleaner, hair conditioner, skin or hair moisturizer. The formulation employs an organophosphorus material or a mixture of an organophosphorus material, for example, mono-, di-, and polyol phosphate esters. | 05-14-2009 |
20110064687 | MONO-, DI- AND POLYOL PHOSPHATE ESTERS IN PERSONAL CARE FORMULATIONS - A hydrophilized personal care formulation, which can be in the form of a hand or body soap (liquid or bar), lipstick, body wash, makeup remover, skin cleaner, hair conditioner, skin or hair moisturizer. The formulation employs an organophosphorus material or a mixture of an organophosphorus material, for example, mono-, di-, and polyol phosphate esters. | 03-17-2011 |
20110172136 | DETERGENT COMPOSITION WITH HYDROPHILIZING SOIL-RELEASE AGENT AND METHODS FOR USING SAME - Laundry detergent compositions that provide soil release benefits to all fabric comprising an organophosphorus soil release agents and optional non-cotton secondary soil release agents. The present invention further relates to a method for providing soil release benefits to cotton fabric by contacting cotton articles with a water soluble and/or dispersible organophosphorus material. The contacting can be during washing or by pretreating by applying the composition directly to stains or by presoaking the clothing in the composition prior to washing. The present invention further relates to providing soil release benefits to all fabric in the laundry wash load in the presence of a bleaching agent. | 07-14-2011 |
20110177012 | MONO-, DI- AND POLYOL ALKOXYLATE PHOSPHATE ESTERS IN ORAL CARE FORMULATIONS AND METHODS FOR USING SAME - This invention relates to a composition useful as an oral care composition comprising an organophosphate material, additional oral care composition ingredients, for example, a surfactant agent, and optionally an abrasive agent. | 07-21-2011 |