Patent application number | Description | Published |
20080276042 | DATA STORAGE SYSTEM AND METHOD - Disclosed are a redundant data storage system (e.g., a RAID system) and a method of operating such a redundant data storage system that provides significant power savings with minimal reduction in reliability. The system and method allow up to half of the memory devices in any of the memory arrays in the system to be placed in standby without significantly impacting the read accesses. The system and method further designate reserved areas in the active memory devices as write-journals, which have at least the same level of protection as the main arrays. The write-journals allow data to be written without powering up a standby memory device. Thus, power consumption is minimized without impacting reliability. | 11-06-2008 |
20080276043 | DATA STORAGE SYSTEM AND METHOD - Disclosed are a redundant data storage system (e.g., a RAID system) and a method of operating such a redundant data storage system that provides significant power savings with minimal reduction in reliability. The system and method allow up to half of the memory devices in any of the memory arrays in the system to be placed in standby without significantly impacting the read accesses. The system and method further designate reserved areas in the active memory devices as write-journals, which have at least the same level of protection as the main arrays. The write-journals allow data to be written without powering up a standby memory device. Thus, power consumption is minimized without impacting reliability. | 11-06-2008 |
20080276124 | INCOMPLETE WRITE PROTECTION FOR DISK ARRAY - The embodiments of the invention provide methods of protecting data blocks while writing to a storage array, wherein storage units in the storage array include write logs. The data protection level of the write logs is equal to or greater than the data protection level of the storage units. Moreover, the write logs have metadata describing contents of the write logs, wherein the metadata include a sequence number identifying the age of the metadata. Each of the data blocks is a member of a parity group having addressable data blocks and first parity blocks. The addressable data blocks have at least one host data block and at least one associated data block. | 11-06-2008 |
20080276146 | INCOMPLETE WRITE PROTECTION FOR DISK ARRAY - The embodiments of the invention provide methods of protecting data blocks while writing to a storage array, wherein storage units in the storage array include write logs. The data protection level of the write logs is equal to or greater than the data protection level of the storage units. Moreover, the write logs have metadata describing contents of the write logs, wherein the metadata include a sequence number identifying the age of the metadata. Each of the data blocks is a member of a parity group having addressable data blocks and first parity blocks. The addressable data blocks have at least one host data block and at least one associated data block. | 11-06-2008 |
Patent application number | Description | Published |
20080259492 | Lapping plate texture for increased control over actual lapping force - A slider lapping texture for implementation in a lapping environment. The slider lapping texture includes a lapping texture structure for utilization in a lapping process performed on a slider. The structure also includes a first surface having a base elevation. The structure further includes a second surface at an elevation higher than the base elevation. The second surface is for lapping the slider. The structure additionally includes an opening for expelling residue associated with a lapping process. The slider lapping texture is configured to generate an attractive force when the slider is motioned thereupon in a substantially unidirectional manner. | 10-23-2008 |
20140154951 | COMMON GROUND FOR ELECTRONIC LAPPING GUIDES - Embodiments described herein generally relate to connecting Electronic Lapping Guides (ELG) to a lapping controller such that the number of wire bonds from the controller to a row of read heads is minimized. When lapping the air bearing surface of the read heads, the electrical resistances of the ELGs are monitored to adjust the lapping process and set the stripe height for read sensors in the read heads. Once the resistance corresponds to the desired stripe height, the lapping process is stopped. To measure the resistance, each ELG may be electrically coupled to the same substrate—i.e., share the same common ground. The lapping controller applies a voltage potential across the ELGs using a wire bonded to a pad in the respective read head and one or more connections to the grounded substrate. This configuration avoids having to bond two wires onto each read head. | 06-05-2014 |
20140154952 | WAFER GROUNDING DESIGN FOR SINGLE PAD LAPPING - Embodiments described herein generally relate to connecting Electronic Lapping Guides (ELG) to a lapping controller to reduce resistance from current crowding while reducing connections to the ELG. A device and a system can include a wafer with peripheral grounding vias having a radius of at least 10 μm, a plurality of sliders with a magnetoresistive (MR) elements; a plurality of ELG electrically coupled to the lapping controller through a combination of the wafer and grounding pads and a bonding pad electrically coupled to the ELG. The ELG or the bonding pad can be positioned in the kerf or the device region of a row. If the ELG and the bonding pad are positioned in separate regions, a noble metal should be used to connect. Further, the number of grounding pads can be reduced by using grounding vias at specific intervals and specific sizes. | 06-05-2014 |
20140154953 | CORRECTING CURRENT CROWDING IN ROW BAR AND VIAS FOR SINGLE PAD BONDING - Embodiments described herein generally relate to connecting electronic lapping guides (ELGs) to a lapping controller to prevent the effects of current crowding while reducing connections to the ELGs in single pad lapping. Devices and systems can include a row of sliders including a magnetoresistive (MR) element, a plurality of high resistance ELGs connected to both the wafer and to at least one bonding pad and at least two peripheral grounding vias connected to the wafer. Methods and systems include a wafer comprising a plurality of sliders wherein each slider is connected to a lapping controller and the delivery of current to the ELGs is sequential to groups of sliders such that only one group of ELGs is being measured at any time. | 06-05-2014 |
Patent application number | Description | Published |
20080288503 | DEFINING A SET OF DATA ACROSS MUTIPLE DATABASES USING VARIABLES AND FUNCTIONS - A method for defining grouping of data, across multiple data sources using variables and functions, may include defining grouping of data corresponding to one or more entities across multiple data sources, using a generic language that relates to multiple entities. The method may include providing access to the data based on Data-Dependent Routing (DDR), using variables and functions defined by the generic language. According to example embodiments, the system may include a user interface to receive one or more statements belonging to the generic language and present data accessed via the one or more statements. The system may also include a processor to execute statements and to provide access to the data. The system may further include a server to host the multiple data sources. | 11-20-2008 |
20090031211 | PROGRAMMING EXTENSION FOR AUTHORING STYLE RULES - A programming extension for authoring style rules is provided. An example programming extension for authoring style rules comprises a style rules editor and a style definition class module. An example style rules editor may be configured to receive a request to generate a collection of style rules and to receive input associated with one or more style rules. The requested collection of style rules is to be suitable for use with a document-based web page. The style definition class module may be configured to generate a Java™ representation of the collection of style rules based on the input associated with the one or more style rules. | 01-29-2009 |
20110161990 | SECURE EXPANDABLE ADVERTISEMENTS USING AN API AND CROSS-DOMAIN COMMUNICATIONS - A system to present secure expandable advertisements using an API and cross-domain communication. A content publishing system that hosts a website can implement an expandable advertisement using IFRAMEs that are expanded upon receiving an API call from a third party rich media vendor that hosts the expandable advertisement when the content publishing system and the third party media vendor are of differing domains. | 06-30-2011 |
20130239196 | SECURE EXPANDABLE ADVERTISEMENTS USING AN API AND CROSS-DOMAIN COMMUNICATIONS - A system to present secure expandable advertisements using an API and cross-domain communication. A content publishing system that hosts a website can implement an expandable advertisement using IFRAMEs that are expanded upon receiving an API call from a third party rich media vendor that hosts the expandable advertisement when the content publishing system and the third party media vendor are of differing domains. | 09-12-2013 |
20140317282 | TECHNIQUES FOR MEASURING ABOVE-THE-FOLD PAGE RENDERING - Techniques for measuring above-the-fold (ATF) page rendering are provided. Visible objects for an ATF portion of a browser page are identified. A start and end time for each visible object is recorded. Furthermore, a total elapsed time to finish loading each of the visible objects to the ATF portion of a browser is determined. | 10-23-2014 |
Patent application number | Description | Published |
20100262496 | Log Processing - Reporting data related to content processing devices, e.g., television devices, are processed to identify channel tunes and corresponding tune times of the content processing devices. Automatically generated channel tunes based on the corresponding tune times are identified. Content items that are aired during a time period defined by the corresponding tune times can be adjusted. | 10-14-2010 |
20110239243 | EXPOSURE BASED CUSTOMIZATION OF SURVEYS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for panel surveys. In one aspect, a method include accessing television history data for viewing devices associated with panelists and that describes, for each viewing device, television advertisements that were presented by use of the viewing device; a proper subset of panelists are selected based on the determinations of television advertisements that were presented and television advertisements that were not presented by use of the viewing device associated with the panelists, and for each of the selected panelists, a survey for the panelist is generated, the survey including one or more questions, each of the questions having been selected based on the television advertisements that were presented and television advertisements that were not presented by use of the viewing device associated with the panelist. | 09-29-2011 |
20120072935 | CHANNEL TUNE DWELL TIME LOG PROCESSING - Reporting data related to content processing devices, e.g., television devices, are processed to identify channel tunes and corresponding tune times of the content processing devices. Automatically generated channel tunes based on the corresponding tune times are identified. Content items that are aired during a time period defined by the corresponding tune times can be adjusted. | 03-22-2012 |
20120124619 | LOG PROCESSING - Set top box logs are received from a television provider and processed to identify channel tunes and channel tune times. The channel tunes and channel tune times of the log data can be compared to expected air times of television advertisements on channels, and an impression values, e.g., projected viewers, can be generated for each television advertisement. | 05-17-2012 |
20140223458 | CHANNEL TUNE DWELL TIMES - Set top box logs are received from a television provider and processed to identify channel tunes and channel tune times. The channel tunes and channel tune times of the log data can be compared to expected air times of television advertisements on channels, and an impression values, e.g., projected viewers, can be generated for each television advertisement. | 08-07-2014 |
Patent application number | Description | Published |
20120215742 | DATA RETENTION USING LOGICAL OBJECTS - Various embodiments are provided for facilitation of data retention using logical objects. Following an operation creating a redundant copy of the data performed on a scheduled interval, a logical object containing a number of managed file versions, represented by a number of member objects for a recovery point, is created. The logical object is assigned a policy of a data retention policy construct associated with the recovery point. The logical object is adapted for reassignment between policies of the data retention policy construct associated with various recovery points. During the reassignment, the plurality of member objects representing the plurality of managed file versions are logically retained instead of performing a data copy operation to associate the plurality of managed file versions with another recovery point. | 08-23-2012 |
20130101113 | ENCRYPTING DATA OBJECTS TO BACK-UP - Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store. | 04-25-2013 |
20130103945 | ENCRYPTING DATA OBJECTS TO BACK-UP - Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store. | 04-25-2013 |
20140074787 | USING A METADATA IMAGE OF A FILE SYSTEM AND ARCHIVE INSTANCE TO BACKUP DATA OBJECTS IN THE FILE SYSTEM - Provided are a computer program product, system, and method for using a metadata image of a file system and archive instance to backup files in the file system. A point-in-time backup is performed of files in the file system as of a point-in-time. A metadata image includes information on files and directories in the file system as of the point-in-time. Files in the point-in-time backup are backed up to a backup storage. A backup database has records on the files backed-up from the file system. Each record in the backup database has a unique identifier for each backed-up file and a location of the backed-up file in the backup storage. An archive instance is generated including a copy of the database records for the files in the point-in-time backup. The metadata image and the archive instance are associated for the point-in-time backup. | 03-13-2014 |
20140074790 | USING A METADATA IMAGE OF A FILE SYSTEM AND ARCHIVE INSTANCE TO RESTORE DATA OBJECTS IN THE FILE SYSTEM - Provided are a computer program product, system, and method for using a metadata image of a file system and archive instance to restore files in the file system. A metadata image of the file system for a point-in-time backup as of a point-in-time includes information on files and directories in the file system as of the point-in-time and an archive instance including a copy of database records in the backup database for the files in the point-in-time backup. A restore request is received. A file representation is created of each file to restore in the directory structure of the file system from the metadata image, wherein at least one of the created file representations indicates that the file is stored off-line and has an external identifier used to access information on the file in the database records in the archive instance for the point-in-time backup. | 03-13-2014 |
Patent application number | Description | Published |
20080211637 | TIERED RADIO FREQUENCY IDENTIFICATION - Methods and apparatuses for tiered RFID communication are provided, inter alia, for privacy and security in at least certain embodiments. An RFID tag includes first and second memory locations respectively storing first and second identifiers. The tag is configured to respond to an identification query with the first identifier until receipt of a command code. After receipt of the command code, the tag is configured to respond to the identification query with the second identifier. The first identifier can be permanently disabled for privacy. In a one embodiment, the first identifier is an electronic product code, and the second identifier is a recycling identifier, hazardous waste information, or regulatory disposal requirement. In another embodiment, the first and second identifiers can identify the tag's associated item with differing levels of specificity for improved security. | 09-04-2008 |
20100120368 | NOISE CANCELLATION FOR RFID BACKSCATTER - Methods and apparatuses for removing unwanted noise by a radio frequency identification (RFID) interrogator are provided. The interrogator transmits a transmitted signal while receiving a received signal. The received signal can include backscatter modulated signals from one or more RFID tags, as well as unmodulated reflections of the transmitted signal from the environment. The unmodulated reflections are undesirable and may make tag signal extraction difficult. A canceling signal is summed with the received signal to cancel or reduce the unmodulated reflections prior to tag signal extraction. In a specific embodiment, a phase shifted, amplitude adjusted reflection of the transmit signal is used by a directional coupler as the canceling signal. | 05-13-2010 |
20120249303 | SUBSET SELECTION OF RFID TAGS USING LIGHT - Methods and apparatuses for selecting a subset of RFID tags are provided in some embodiments. These methods and apparatuses utilize the susceptibility to light by persistent nodes found in passive tags. Light can be used to intentionally reduce persistence times in a particular subset tags or even an individual tag. Then, persistent nodes can be used as a selection criterion to distinguish previously illuminated tags from non-illuminated tags. In other embodiments, a power circuit receives a RF input source and generates a direct current (DC) output voltage. The circuit includes a bias circuit to supply a gate to source bias, which is independent of the DC output voltage. The circuit further includes a voltage multiplier circuit that is coupled to the bias circuit. The voltage multiplier circuit has MOS transistors with one transistor to receive the gate to source bias. | 10-04-2012 |
20130186959 | PERSISTENT NODES FOR RFID - An RFID transponder in one embodiment comprises a radio frequency (RF) transceiver, processing logic coupled to the RF transceiver, a switch coupled to the processing logic, a tunneling device coupled to the switch and a differential sensing circuit having a first input coupled to the tunneling device and a second input coupled to a predetermined reference voltage. In one embodiment, the tunneling device can discharge to a voltage below the predetermined reference voltage. | 07-25-2013 |
20130187762 | RFID PROTOCOLS WITH NON-INTERACTING VARIANTS - In an RFID system having at least one tag and at least one reader, a tag and a reader can, in one embodiment, use a pair of keys, known to both the tag and the reader, to restrict the interaction of the tag and the reader so that tags having the pair of keys interact only with readers that use the pair of keys. | 07-25-2013 |
20130187764 | DYNAMIC ANALOG AUTHENTICATION - Methods and apparatuses that receive an analog signal to provide a challenge to a device are described. The challenge may include a digital selection and an analog attribute of the analog signal. The analog attribute may be associated with an attribute value in an analog domain. Physical characteristics of the device may be evaluated according the analog challenge. A digital response may be generated as a result of the evaluation responding to the analog challenge. The combination of the digital challenge, the analog challenge, and the digital response may authenticate the device. | 07-25-2013 |
20130187765 | SIMULTANEOUS PROGRAMMING OF SELECTED TAGS - An apparatus and method for simultaneous programming of data to individually addressed Tags. Tags contain a being addressed indicator that allows for processing of simultaneous programming commands. Specified Tags are individually pre-addressed to receive simultaneous programming. Tag data is programmed simultaneously for all Tags in a specified group of Tags. Data is individually verified for each specified Tag in the group of Tags. | 07-25-2013 |
20130187778 | ELECTRONIC ARTICLE SURVEILLANCE - Methods and apparatuses for activating an electronic tag with an identifier via an access to a storage area of the electronic tag without database or authentication operations are described. The storage area may be accessed as a scratch pad memory. The identifier can identify an inventory including a plurality of articles. One of the articles is attached with the electronic tag. The electronic tag is active if the identifier is stored in the storage area. When the electronic tag is located within a proximity of the electronic gate device, the electronic tag may be inspected wirelessly from the electronic gate device. An alarm may be activated or caused via the electronic gate device if the inspection indicates the electronic tag is active. | 07-25-2013 |
20130300540 | Subset Selection of RFID Tags Using Light - Methods and apparatuses for selecting a subset of RFID tags are provided in some embodiments. These methods and apparatuses utilize the susceptibility to light by persistent nodes found in passive tags. Light can be used to intentionally reduce persistence times in a particular subset tags or even an individual tag. Then, persistent nodes can be used as a selection criterion to distinguish previously illuminated tags from non-illuminated tags. In other embodiments, a power circuit receives a RF input source and generates a direct current (DC) output voltage. The circuit includes a bias circuit to supply a gate to source bias, which is independent of the DC output voltage. The circuit further includes a voltage multiplier circuit that is coupled to the bias circuit. The voltage multiplier circuit has MOS transistors with one transistor to receive the gate to source bias. | 11-14-2013 |
20140333420 | SIMULTANEOUS PROGRAMMING OF SELECTED TAGS - An apparatus and method for simultaneous programming of data to individually addressed Tags. Tags contain a being addressed indicator that allows for processing of simultaneous programming commands. Specified Tags are individually pre-addressed to receive simultaneous programming Tag data is programmed simultaneously for all Tags in a specified group of Tags. Data is individually verified for each specified Tag in the group of Tags and verification includes tracking a command counter for each specified Tag. | 11-13-2014 |
20140354416 | METHODS AND APPARATUSES TO IDENTIFY DEVICES - Embodiments of the present invention include systems with Readers and Tags in which a Reader queries the Tags with a parameter that includes a level of probability of reply according to which the Tags individually and randomly decide whether or not to reply. In one embodiment, the Tags can switch between two states: A and B. The query command also specifies a state (A or B) so that only the Tags in the specified state can reply. After successfully sending the Tag identification data from a Tag to the Reader, the Tag switches to the other state from the specified state. In one embodiment, the operations about the two states are symmetric. In one embodiment, the Tags can remember the parameters used in a query so that a short form of query command can be used to repeat the query with the same query parameters. | 12-04-2014 |
20150015316 | PERSISTENT NODES FOR RFID - An RFID transponder in one embodiment comprises a radio frequency (RF) transceiver, processing logic coupled to the RF transceiver, a switch coupled to the processing logic, a tunneling device coupled to the switch and a differential sensing circuit having a first input coupled to the tunneling device and a second input coupled to a predetermined reference voltage. In one embodiment, the tunneling device can discharge to a voltage below the predetermined reference voltage. | 01-15-2015 |
20150015375 | METHODS AND APPARATUSES TO IDENTIFY DEVICES - An apparatus and method to identify devices including a first set of commands to identify devices in a first state and a second set of commands to identify devices in a second state, wherein devices identified in the first state are placed in the second state and devices identified in the second state are placed in the first state. | 01-15-2015 |
20150028108 | DOUBLE LOOP INDUCTOR RFID - An apparatus and method for coupling a radio frequency identification (RFID) integrated circuit (IC) with a dual loop coil formed on a lead frame. In one embodiment, the lead frame is encapsulated in an IC package. | 01-29-2015 |
20150161837 | METHODS AND SYSTEMS FOR PROVIDING CONTROL OF A DEVICE USING A FINGERPRINT SENSOR - Methods and apparatuses for operating a portable device based on a fingerprint sensor are described. According to one embodiment of the invention, a fingerprint sensor attached to a portable device detects fingerprint from a particular finger at a particular orientation. In response, a machine executable code is executed within the portable device to perform one or more predetermined user configurable operations. Other methods and apparatuses are also described. | 06-11-2015 |
20150332138 | SUBSET SELECTION OF RFID TAGS USING LIGHT - Methods and apparatuses for selecting a subset of RFID tags are provided in some embodiments. These methods and apparatuses utilize the susceptibility to light by persistent nodes found in passive tags. Light can be used to intentionally reduce persistence times in a particular subset tags or even an individual tag. Then, persistent nodes can be used as a selection criterion to distinguish previously illuminated tags from non-illuminated tags. In other embodiments, a power circuit receives a RF input source and generates a direct current (DC) output voltage. The circuit includes a bias circuit to supply a gate to source bias, which is independent of the DC output voltage. The circuit further includes a voltage multiplier circuit that is coupled to the bias circuit. The voltage multiplier circuit has MOS transistors with one transistor to receive the gate to source bias. | 11-19-2015 |
Patent application number | Description | Published |
20110246538 | VISUAL MANIPULATION OF DATABASE SCHEMA - Methods, program products, and systems for visual manipulation of database schema are disclosed. In general, in one aspect, a system can display a schema view and a data view in graphic representation in an integrated GUI on a display device. The system can display a schema in the schema view, and one or more data records in the data view. The system can receive a touch input from the display device in the schema view, or the data view, or both. In response to the touch input, the system can modify the schema, or the data records, or both. The system can update the schema view and data view substantially simultaneously to reflect the modification in the schema or data records. | 10-06-2011 |
20130198684 | VISUAL MANIPULATION OF DATABASE SCHEMA - Methods, program products, and systems for visual manipulation of database schema are disclosed. In general, in one aspect, a system can display a schema view and a data view in graphic representation in an integrated GUI on a display device. The system can display a schema in the schema view, and one or more data records in the data view. The system can receive a touch input from the display device in the schema view, or the data view, or both. In response to the touch input, the system can modify the schema, or the data records, or both. The system can update the schema view and data view substantially simultaneously to reflect the modification in the schema or data records. | 08-01-2013 |
20130339833 | LAYOUT SYNCHRONIZATION - Methods, program products, and systems for layout synchronization are described. A first device can share with a second device a layout designed according to display properties of the first device, even if display properties of the second device differ from those of the first device. The layout can be synchronized between the devices, where each device can adapt the layout in a manner specific to the display properties of the device. Two-dimensional views of same data can have a consistent appearance on multiple devices each having distinct display properties. | 12-19-2013 |
Patent application number | Description | Published |
20090268749 | ENHANCED CMTS FOR RELIABILITY, AVAILABILITY, AND SERVICEABILITY - A Cable Modem Termination System (CMTS) is partitioned into Line Cards, I/O Cards, and a midplane to provide enhanced Reliability, Availability, and Serviceability. Each I/O Card provides a cabling interface for coupling an assigned Line Card to other portions of a Hybrid-Fiber-Coax Network. A plurality of RF signals is coupled via connectors between each Line Card and a corresponding I/O Card, via the midplane. This permits a Line Card to be removed for servicing without requiring recabling of the corresponding I/O Card. Preferably, a rectangular-multi-pin collinear connector-cascade (Line Card jack, midplane double-plug, and I/O Card jack) is used to couple the plurality of RF signals. The connector-cascade is configured with protective RF ground pins adjacent and surrounding each of a plurality of RF signal pins. This approach permits each Line Card to be removed or inserted in a single action, without attention to individual RF interconnects, yet meets all system RF requirements while using relatively inexpensive connectors. The I/O Cards preferably include a distributed backup bus that permits one of the Line Cards in the CMTS to serve as a designated backup. The backup bus enables assignment of the designated backup Line Card to the I/O Card associated with a failing Line Card, without requiring recabling of any I/O Card. In conjunction with a signal processing architecture that permits dynamically programmable channel assignments, the backup bus facilitates rapid and fully automated failover. The Line Cards are preferably further partitioned into easily replaceable sections, including IF-to-RF and signal processing modules. | 10-29-2009 |
20100031305 | ENHANCED FIBER NODES WITH CMTS CAPABILITY - Enhanced Cable Modem Termination System (CMTS) functionality, including programmable digital domain modulators and demodulators for dynamic channel assignment, is incorporated into Fiber Nodes (FNs) or mini Fiber Nodes (mFNs), yielding enhanced Fiber Nodes (eFNs). These eFns distribute CMTS functionality deep into Hybrid-Fiber-Coax Networks (HFCN) rather than centralizing the CMTS functions within a single location. Moving the cable modem terminations closer to the subscribers shortens the analog RF paths required to support cable modems. Communication of both subscriber data and CMTS control data is performed over Ethernet-compatible packet networks between the field-based CMTSs and an upstream facility (e.g., the Head End), which includes an Internet gateway. Packet data for multiple subscriber cable modems is easily compressed and merged over common network paths, reducing cabling plant complexity and increasing bandwidth utilization. This approach dramatically reduces the infrastructure cost per cable modem. Distributing CMTS functionality among multiple eFNs also reduces demands on already stretched resources at the Head End for space, power, and HVAC. For HFCN channels containing signals with modulation or encoding schemes that are unknown or best processed upstream, the invention also provides for tunneling their spectrum over the same packet network as used for the cable modem data. The channels to be tunneled are isolated using digital receivers, translated to baseband, their data framed, merged with cable modem subscriber data, and transmitted over the packet network. Upstream, the framed channel data is parsed and the original channel spectrum reconstructed to permit information recovery. | 02-04-2010 |
20110157992 | APPARATUS, SYSTEM, AND METHOD FOR BIASING DATA IN A SOLID-STATE STORAGE DEVICE - An apparatus, system, and method are disclosed for improving performance in a non-volatile solid-state storage device. Non-volatile solid-state storage media includes a plurality of storage cells. The plurality of storage cells is configured such that storage cells in an empty state store initial binary values that satisfy a bias. An input module receives source data for storage in the plurality of storage cells of the non-volatile solid-state storage media. Bits of the source data have a source bias that is different from the bias of the plurality of storage cells. A bit biasing module biases the bits of the source data toward the bias of the plurality of storage cells. A write module writes the biased source data to the plurality of storage cells of the non-volatile solid-state storage media. | 06-30-2011 |
20110200055 | ENHANCED CMTS FOR RELIABILITY, AVAILABILITY, AND SERVICEABILITY - A Cable Modem Termination System (CMTS) is partitioned into Line Cards, I/O Cards, and a midplane to provide enhanced Reliability, Availability, and Serviceability. Each I/O Card provides a cabling interface for coupling an assigned Line Card to other portions of a Hybrid-Fiber-Coax Network. A plurality of RF signals is coupled via connectors between each Line Card and a corresponding I/O Card, via the midplane. This permits a Line Card to be removed for servicing without requiring recabling of the corresponding I/O Card. Preferably, a rectangular-multi-pin collinear connector-cascade (Line Card jack, midplane double-plug, and I/O Card jack) is used to couple the plurality of RF signals. The connector-cascade is configured with protective RF ground pins adjacent and surrounding each of a plurality of RF signal pins. This approach permits each Line Card to be removed or inserted in a single action, without attention to individual RF interconnects, yet meets all system RF requirements while using relatively inexpensive connectors. The I/O Cards preferably include a distributed backup bus that permits one of the Line Cards in the CMTS to serve as a designated backup. The backup bus enables assignment of the designated backup Line Card to the I/O Card associated with a failing Line Card, without requiring recabling of any I/O Card. In conjunction with a signal processing architecture that permits dynamically programmable channel assignments, the backup bus facilitates rapid and fully automated failover. The Line Cards are preferably further partitioned into easily replaceable sections, including IF-to-RF and signal processing modules. | 08-18-2011 |
20120215961 | APPARATUS, SYSTEM, AND METHOD FOR BIASING DATA IN A SOLID-STATE STORAGE DEVICE - An apparatus, system, and method are disclosed for improving performance in a non-volatile solid-state storage device. Non-volatile solid-state storage media includes a plurality of storage cells. The plurality of storage cells is configured such that storage cells in an empty state store initial binary values that satisfy a bias. An input module receives source data for storage in the plurality of storage cells of the non-volatile solid-state storage media. Bits of the source data have a source bias that is different from the bias of the plurality of storage cells. A bit biasing module biases the bits of the source data toward the bias of the plurality of storage cells. A write module writes the biased source data to the plurality of storage cells of the non-volatile solid-state storage media. | 08-23-2012 |
Patent application number | Description | Published |
20140037091 | SYSTEM AND METHOD FOR HYBRID MULTIPLE SOURCE DECRYPTION - Systems and methods are disclosed to improve performance of a communications device receiving encrypted communications from multiple sources. The communications device is configured to increase the amount of decryption performed using a hardware-based process as compared to a software-based process by reprogramming the hardware to store a shared security key corresponding to a frame received from a source, allowing the hardware-based process to decrypt subsequent frames from that source. | 02-06-2014 |
20150282005 | LINK AGGREGATION IN WIRELESS LOCAL AREA NETWORKS - Methods, systems, and devices are described for establishing a virtual communication link including at least a first and second physical link between two devices. A single virtual packet queue of a device may receive one or more data packets to be transmitted via the virtual communication link. The single virtual packet queue may attach a virtual sequence number to each of the one or more data packets and send the one or more data packets to one or more of the first or the second physical link according to the assigned virtual sequence numbers. The one or more packets may then be communicated via the first and/or second physical links according to link specific sequence numbers, such as medium access control (MAC) sequence numbers, assigned to the one or more data packets by the first and/or second physical links. | 10-01-2015 |
20150341758 | MULTICAST PACKET RECEPTION RELIABILITY OVER WI-FI - To ensure that multicasts from access points sent in response to periodic beacons reach a variety of listening clients that may have longer sleep intervals than an interval between beacons, this disclosure describes systems, methods, and apparatus for multicasting bursts of frames where a burst number is selected so as to be equal to or greater than a range of common sleep intervals. Further, where multicast frames are re-multicast according to known protocols, the repeated bursts can be offset from the re-multicast start time suggested by the protocol, in order to increase a likelihood that clients with especially long sleep intervals receive the multicast frame. | 11-26-2015 |
Patent application number | Description | Published |
20120065617 | SYSTEMS AND METHODS FOR INTRAVENOUS DRUG MANAGEMENT USING IMMITTANCE SPECTROSCOPY - Described herein are devices, systems, and methods for determining the composition of liquids, including the identity of one or more drugs in the liquid, the concentration of the drug, and the type of diluent using immittance spectroscopy. These devices, systems and methods are particularly useful for describing the identity and, in some variations, concentration of one or more components of a medical liquid such as intravenous fluid. In particular, described herein are devices, systems and methods that may operate in low ionic strength diluents. Also described are methods of recognizing complex immittance spectrograph patterns to determine the composition of a liquid by pattern recognition. | 03-15-2012 |
20140375324 | SYSTEMS AND METHODS FOR INTRAVENOUS DRUG MANAGEMENT USING IMMITTANCE SPECTROSCOPY - Described herein are devices, systems, and methods for determining the composition of liquids, including the identity of one or more drugs in the liquid, the concentration of the drug, and the type of diluent using immittance spectroscopy. These devices, systems and methods are particularly useful for describing the identity and, in some variations, concentration of one or more components of a medical liquid such as intravenous fluid. In particular, described herein are devices, systems and methods that may operate in low ionic strength diluents. Also described are methods of recognizing complex immittance spectrograph patterns to determine the composition of a liquid by pattern recognition. | 12-25-2014 |
Patent application number | Description | Published |
20120188400 | PIXEL ARRANGEMENT FOR EXTENDED DYNAMIC RANGE IMAGING - The present invention relates to an imager for improving image quality. The imager includes a pixel array of a plurality of pixels arranged in rows and columns. The imager also includes a color filter array (CFA) including a color pattern of a first color filter allowing a first pixel to detect a first color of light, and a second color filter allowing a second pixel to detect a second color of light and a third color of light. Each of the color filters in the color pattern are included in each row of the pixel array. | 07-26-2012 |
20140027613 | BAYER SYMMETRIC INTERLEAVED HIGH DYNAMIC RANGE IMAGE SENSOR - To generate data for color pixels in an image, Bayer symmetric interleaved exposures can more evenly spread the long exposure pixels in the vertical direction and produce a higher dynamic range by having pixels with different exposure times interleaved within different rows. Long and short exposure pixels can be interleaved across two adjacent rows to form 4 pixel wide by 2 pixel tall blocks that are repeated across a Bayer pattern color array. In each block, the first row can be three long and one short exposure pixel; and the second row can be three short and one long exposure pixel. The long exposure pixels can form an “L” shaped pattern rotated 90 degrees clockwise; and the short exposure pixels can form an “L” shaped pattern rotated 90 degrees counter-clockwise. Subsequent rows of the blocks may be offset horizontally to form diagonal bands of long and short exposure pixels. | 01-30-2014 |
20140063283 | CORRECTION FACTOR FOR COLOR RESPONSE CALIBRATION - The color response of camera devices may be calibrated, using a correction factor that can account for differences in the spectra of light emitted by different light sources used during calibration. The correction factor may be calculated based on the expected spectral sensitivities of the camera devices, the power spectrum of an actual light source, and the power spectrum of a canonical light source. The correction factor is then applied to adjust a measured color response of a given camera device, so that the adjusted color response is effectively the response of the given camera device if it had been illuminated by the canonical light source. In this manner, any measured color response differences, which may be due to differences between the actual light source used and the canonical light source, can be effectively reduced (if not essentially eliminated.) Other embodiments are also described and claimed. | 03-06-2014 |
20150355326 | OPTICALLY GATED DETECTOR ARRANGEMENT - A camera includes a pulse transmitter for transmitting at a transmit time through an aperture and along an optical path to a target a coherent electromagnetic ranging pulse at a first wavelength range outside the visible spectrum. In some embodiments, the camera includes a reflected pulse detector for receiving a reflected electromagnetic pulse reflected by the target back along the optical path and through the aperture at a detect time subsequent to the transmit time. In some embodiments, the camera includes a shutter positioned for shielding the pulse detector from at least transmit time to an intermediate time between the transmit time and the detect time. In some embodiments, the shutter includes a layer of semiconductor material placed in the optical path at a point between the target and the detector. | 12-10-2015 |
Patent application number | Description | Published |
20150319405 | Method for Synchronizing A/V Streams - A device may communicate a delay request value to downstream devices in order to synchronize A/V streams. For example, rather than adding the delay required to synchronize audio and video streams, an A/V splitter may instead communicate to downstream devices, asking them to add the amount of delay desired. | 11-05-2015 |
20150326439 | STREAM CREATION WITH LIMITED TOPOLOGY INFORMATION - The discovery of a topology of a network with an unknown topology can enable the selection of a data path within the network, and the establishment of a data stream over the selected data path. Routing tables mapping originating nodes to input ports can be created based on the receipt of discovery messages generated by the originating nodes. A source node can select a data path between the source node and a sink node in order to establish a data stream using the routing tables. Data paths can be selected based on, for instance, routing table bandwidth information, latency information, and/or distance information. Data streams can be established over the selected data path, and each node can release any reserved output bandwidth determined to be unnecessary for the data stream. | 11-12-2015 |
20150326440 | STREAM CREATION WITH LIMITED TOPOLOGY INFORMATION - The discovery of a topology of a network with an unknown topology can enable the selection of a data path within the network, and the establishment of a data stream over the selected data path. Routing tables mapping originating nodes to input ports can be created based on the receipt of discovery messages generated by the originating nodes. A source node can select a data path between the source node and a sink node in order to establish a data stream using the routing tables. Data paths can be selected based on, for instance, routing table bandwidth information, latency information, and/or distance information. Data streams can be established over the selected data path, and each node can release any reserved output bandwidth determined to be unnecessary for the data stream. | 11-12-2015 |
20150326441 | STREAM CREATION WITH LIMITED TOPOLOGY INFORMATION - The discovery of a topology of a network with an unknown topology can enable the selection of a data path within the network, and the establishment of a data stream over the selected data path. Routing tables mapping originating nodes to input ports can be created based on the receipt of discovery messages generated by the originating nodes. A source node can select a data path between the source node and a sink node in order to establish a data stream using the routing tables. Data paths can be selected based on, for instance, routing table bandwidth information, latency information, and/or distance information. Data streams can be established over the selected data path, and each node can release any reserved output bandwidth determined to be unnecessary for the data stream. | 11-12-2015 |
20150326444 | NETWORK TOPOLOGY DISCOVERY - Embodiments relate to identifying a topology of a network based on information identifying adjacent devices from each of the devices in the network. In one embodiment, each device identifies one or more adjacent devices within one hop and stores information identifying the one or more adjacent devices. A requesting device aggregates information identifying one or more adjacent devices of each device and identifies the topology of the network based on the aggregated information. By each device storing and transmitting information identifying adjacent devices connected within one hop, amount of information stored in each device and bandwidth of information exchanged can be reduced. | 11-12-2015 |