Hamilton, WA
Alistair Hamilton, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20100044157 | Convertible point-of-sale checkout terminal - A convertible checkout terminal includes a housing having a window and a data capture device for capturing through the window data associated with products to be checked out at the terminal, a customer interface supported by the housing for enabling a customer to interact with the terminal in a self-service mode of operation, a clerk interface supported by the housing for enabling a clerk to interact with the terminal in a full-service mode of operation, and a mode selector for selecting either the self-service mode in which the customer interface is operational, or the full-service mode in which the clerk interface is operational. | 02-25-2010 |
20100146235 | ISOLATING RECEIVED INFORMATION ON A LOCKED DEVICE - Quarantining data received while a computing device is locked. While the computing device is locked, content items such as images, notifications, voice memos, telephone numbers, and the like are stored in a first memory area. The content items are transferred to a second memory area, separate from the first memory area, based on transfer criteria associated with the content items. For example, images may be automatically uploaded to a web page after the computing device is unlocked, while a mail program executes to display any messages received while the display has been locked. In some embodiments, the user inputs the content items into a locked mobile computing device and further provides the transfer criteria for the content items. | 06-10-2010 |
20100250794 | REMOVABLE ACCESSORY FOR A COMPUTING DEVICE - An accessory computing device or display detachable from another computing device such as a mobile computing device. The accessory computing device displays data from the mobile computing device including notifications relating to electronic mail messages, voice mail messages, stock prices, sports scores, etc. A user interacts with the accessory computing device to control the mobile computing device by, for example, replying to messages, controlling a game executing on the mobile computing device, or silencing a ringer on the mobile computing device. In some embodiments, a plurality of the accessory computing devices interact with the same mobile computing device (e.g., in a multi-player game or device location tracking application executing on the mobile computing device). | 09-30-2010 |
Alistair Robert Hamilton, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20120235930 | ELECTRONIC DEVICE AND METHOD OF DISPLAYING INFORMATION IN RESPONSE TO A GESTURE - A method includes displaying information associated with a first application on a touch-sensitive display of an electronic device. A gesture is detected on the touch-sensitive display, which gesture indicates a request to display information associated with a second application. At least part of the information associated with the second application is displayed without opening the second application. | 09-20-2012 |
20130117718 | ELECTRONIC DEVICE AND METHOD OF DISPLAYING INFORMATION IN RESPONSE TO A GESTURE - A method includes displaying information associated with a first application on a touch-sensitive display of an electronic device. A gesture is detected on the touch-sensitive display, which gesture indicates a request to display information associated with a second application. At least part of the information associated with the second application is displayed without opening the second application. | 05-09-2013 |
20130120266 | IN-LETTER WORD PREDICTION FOR VIRTUAL KEYBOARD - A method including receiving an input of a character from a virtual keyboard rendered on a display, generating a set of characters that includes the character, and displaying the generated set of characters at a location associated with a key of the virtual keyboard of the display which corresponds to a subsequent candidate input character. An electronic device including a display having a virtual keyboard rendered thereupon and a processor, the processor being configured to perform the method. Also disclosed is a keyboard, including a plurality of keys, each key corresponding to one or more different characters of a plurality of characters, wherein in response to receiving an input of a character, the keyboard is configured to perform the method. | 05-16-2013 |
20130125035 | VIRTUAL KEYBOARD CONFIGURATION - A keyboard rendered on a display of an electronic device, the keyboard comprising a plurality of keys, each key corresponding to one or more different characters of a plurality of characters, wherein the plurality of keys are arranged in two or more rows, wherein at least one row includes two edge keys which are located towards the respective edges of the display, wherein the at least one row further includes inner keys located between the edge keys which are larger than the edge keys. | 05-16-2013 |
20130187868 | VIRTUAL KEYBOARD DISPLAY HAVING A TICKER PROXIMATE TO THE VIRTUAL KEYBOARD - A method comprising receiving an input of a character from a virtual keyboard rendered on a display, and displaying the input character left of a cursor located within a ticker rendered on the display proximate to the virtual keyboard, wherein the cursor has a set position located towards a centre of the ticker. | 07-25-2013 |
20130222231 | HANDHELD DEVICE WITH NOTIFICATION MESSAGE VIEWING - Displaying information related to a message on a display screen of a handheld electronic device. In response to a movement of the handheld electronic device from an initial position to a first orientation, displaying on the display screen a first notice related to the message. | 08-29-2013 |
20130222236 | HANDHELD DEVICE WITH NOTIFICATION MESSAGE VIEWING - Displaying information related to a message on a display screen of a handheld electronic device. In response to a movement of the handheld electronic device from an initial position to a first orientation, displaying on the display screen a first notice related to the message. | 08-29-2013 |
20130271375 | METHOD AND DEVICE HAVING TOUCHSCREEN KEYBOARD WITH VISUAL CUES - A method for providing visual cues rendered on a display is provided. The method comprises: detecting a touch input associated with a user interface element rendered on the display; determining an input direction of the touch input; and displaying on the display a visual cue associated with the user interface element, wherein the visual cue is located at a position based on the input direction of the touch input. | 10-17-2013 |
20130271385 | Method of Changing Input States - A method of changing input states on an electronic device is disclosed. The method includes displaying a virtual keyboard on a touch-sensitive display, wherein the virtual keyboard includes a first input character set when the device is in a first input state; and transitioning the device to a second input state when touch input corresponding to a predefined gesture is detected when the device is in the first input state, wherein in the second input state, the virtual keyboard includes a second input character set. | 10-17-2013 |
20130275923 | Method and Device Having Touchscreen Keyboard with Visual Cues - A method for providing visual cues rendered on a display is provided. The method comprises: detecting a touch input associated with a user interface element rendered on the display; determining an input direction of the touch input; and displaying on the display a visual cue associated with the user interface element, wherein the visual cue is located at a position based on the input direction of the touch input. | 10-17-2013 |
20130285926 | Configurable Touchscreen Keyboard - A method for configuring a virtual keyboard on a display, comprising: detecting a touch input associated with a location in the virtual keyboard on the display; adjusting, when the touch input is a designated touch gesture, a position of the virtual keyboard within a user interface screen in which the virtual keyboard is located in accordance with a direction of the touch input. | 10-31-2013 |
20130325438 | Touchscreen Keyboard with Corrective Word Prediction - The present disclosure provides a touchscreen keyboard with corrective word prediction. A method for correcting text input on an electronic device is described. The method comprises: displaying a virtual keyboard on a touchscreen, the virtual keyboard including a plurality of keys; receiving input from the virtual keyboard; generating one or more predicted sets of characters in accordance with the received input; and displaying a predicted set of characters at a designated location when the received input does not match one of the predicted sets of characters. | 12-05-2013 |
20140040756 | SELECTIVE INBOX ACCESS IN HOMESCREEN MODE ON A MOBILE ELECTRONIC DEVICE - An electronic device, such as a mobile communication device, and a method are provided for selective access to certain homescreen panels displayable by the device. The device is provided with a homescreen display, which includes a plurality of panels. The panels include at least one panel that is a fullscreen view of a first application executing on the device. This first application can be a messaging application, and the fullscreen view can be a unified inbox view for a plurality of different message types. The panels also include at least one launch panel having a number of graphical user interface elements, such as icons, representing access points to a corresponding application on the device. When navigating from one of the launch panels to the fullscreen view, an intermediate lock interface for receiving an unlocking input is displayed. The unlocking input is received before the fullscreen view is displayed. | 02-06-2014 |
20140040768 | MULTIPE-STAGE INTERFACE CONTROL OF A MOBILE ELECTRONIC DEVICE - An electronic device, such as a mobile communication device, and a method are provided for multiple-stage interface control of the device. The device is provided with a homescreen display, which includes a plurality of panels. The panels include at least one panel that is a fullscreen view of a first application executing on the device. This first application can be a messaging application, and the fullscreen view can be a unified inbox view for a plurality of different message types. The panels also include at least one launch panel having a number of graphical user interface elements, such as icons, representing access points to a corresponding application on the device. | 02-06-2014 |
20140040769 | MULTIPLE-STAGE INTERFACE CONTROL OF A MOBILE ELECTRONIC DEVICE - An electronic device, such as a mobile communication device, and a method are provided for multiple-stage interface control of the device. The device is provided with a homescreen display, which includes a plurality of panels. The panels include at least one panel that is a fullscreen view of a first application executing on the device. This first application can be a messaging application, and the fullscreen view can be a unified inbox view for a plurality of different message types. The panels also include at least one launch panel having a number of graphical user interface elements, such as icons, representing access points to a corresponding application on the device. | 02-06-2014 |
20140287685 | PORTABLE BRIDGE DEVICE - A portable bridge device and methods for transmitting application data from the portable bridge device to one or more local devices of varying types, platforms and operating systems are described. In one embodiment, the method comprises establishing communication channels between the portable bridge device and first and second local devices, determining a platform or operating system of the local devices, and formatting, based on the determined platform or operating system, application data and transmitting the formatted application data to a portable bridge device interface module of the local devices via the communication channels. The portable bridge device may also establish a long-range communication channel to a remote computing device, and may operate as a gateway to a remote source of applications or resources. Operation of locally connected devices with the portable bridge device is not impacted by a temporary loss of connectivity between the portable bridge device and remote sources. | 09-25-2014 |
20140354680 | Methods and Devices for Generating Display Data - Methods of generating display objects for output on a display of an electronic device are provided. One method for generating display objects pertaining to a set of information data items associated with a first set of display rules comprises: operating a processor to identify a context of an electronic device; update the first set of display rules in accordance with the identified context; and output, on a display of the electronic device, display objects pertaining to the set of information data items in accordance with the updated display rules. A method for outputting actionable display objects on a display of an electronic device comprises operating a processor to: output the actionable display objects; identify a context of the electronic device; and update the actionable display objects in accordance with the identified context. There are also devices configured to perform these methods. | 12-04-2014 |
20150319280 | Handheld Device With Notification Message Viewing - Displaying information related to a message on a display screen of a handheld electronic device. In response to a movement of the handheld electronic device from an initial position to a first orientation, displaying on the display screen a first notice related to the message. | 11-05-2015 |
20160077733 | METHOD AND DEVICE HAVING TOUCHSCREEN KEYBOARD WITH VISUAL CUES - A method for providing visual cues rendered on a display is provided. The method comprises: detecting a touch input associated with a user interface element rendered on the display; determining an input direction of the touch input; and displaying on the display a visual cue associated with the user interface element, wherein the visual cue is located at a position based on the input direction of the touch input. | 03-17-2016 |
Alistair Robert Hamilton, Sammimish, WA US
Patent application number | Description | Published |
---|---|---|
20150254518 | TEXT RECOGNITION THROUGH IMAGES AND VIDEO - The display of text by a first device, that is extracted and used by a second communication device, based upon a determined context of the text, is provided. The image displayed for the first device is captured by an image capture element of a second communication device, which also has a recognition module and an extraction module. The image includes the text and a context element representing a context of the text. | 09-10-2015 |
Alistair Robert Hamilton, Sammanish, WA US
Patent application number | Description | Published |
---|---|---|
20130111581 | COMBINED PASSCODE AND ACTIVITY LAUNCH MODIFIER | 05-02-2013 |
Bryan W. Hamilton, Vancouver, WA US
Patent application number | Description | Published |
---|---|---|
20150360073 | ADJUSTABLE DUMBBELL SYSTEM - An adjustable dumbbell system may include a base, two or more weights, a handle assembly, an additional weight, and selection assembly. The two or more weights may be supported by the base and grouped into a first set of weights associated with one end of the dumbbell system and a second set of weights associated with an opposing end of the dumbbell system. The handle assembly may be selectively fixedly joined to the first and second set of weights. The additional weight may be disposed distally of the handle assembly. The selection assembly may be secured to the additional weight. The selection assembly may include a selection member that may be linearly moveable between a selected position where the additional weight is operatively secured to the handle assembly and an unselected position where the additional weight is disengaged from the handle assembly. | 12-17-2015 |
Bryan West Hamilton, Vancouver, WA US
Patent application number | Description | Published |
---|---|---|
20100242851 | Systems and Methods for Aquatic Electrified Barriers - A flexible aquatic species barrier having a multiplicity of pulsators, each pulsator further comprising an anode lead, a cathode lead, and an potential difference generator, where each pulsator is proximately attached to a section of net, each section net comprising a anode conductive braid, a cathode conductive braid, and a net interposed between the anode conductive braid and the cathode conductive braid, and where the anode lead of the pulsator is connected to the anode conductive braid, and where the cathode lead of the pulsator is connected to the cathode conductive braid; whereby when one or more of the pulsators are activated, a potential difference is created between the anode conductive braid and the cathode conductive braid; such that when current flows between the anode conductive braid and the cathode conductive braid an aquatic species is repelled from the net. | 09-30-2010 |
Carl Hamilton, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20160124669 | PROVIDING SNAPSHOTS OF VIRTUAL STORAGE DEVICES - In general, one aspect of the subject matter described in this specification can be embodied in methods that include receiving, at a computer system, a request to create a snapshot of a virtual storage device, wherein the virtual storage device virtually stores data at virtual addresses, the data being physically stored at a plurality of physical storage locations that are managed by an underlying storage system associated with virtual storage device. The methods can further include identifying, by the computer system, one or more regions of the virtual storage device that have been written to since a previous snapshot of the virtual storage device was created. The methods can additionally include generating a unique identifier for the requested snapshot; and creating the requested snapshot using the identified one more regions and the unique identifier. | 05-05-2016 |
Christopher C. Hamilton, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20140268477 | PERSONAL DEFENSE ACCESSORY FOR A MOBILE COMMUNICATIONS DEVICE - A personal defense accessory for interaction with a mobile communications device includes a main housing. A pair of electrodes are disposed in the main housing. A controller is disposed with the main housing and connected to the pair of electrodes to deliver a stun rated shock. | 09-18-2014 |
Christopher Chad Hamilton, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20140236847 | Synchronized Wearable Electronic Elements - Techniques are provided for synchronizing a plurality of client wearable elements based on an event. Systems may include a social control module that produces synchronization signal(s) based on an event, and a social communication module that transmits the synchronization signal(s) to the one or more social clients. Systems may also include a social receiver module that receives synchronization signal(s) and sensory stimulation modules that actuate based on stimulation signal(s). A stimulation schedule module generates the stimulation signal(s) based at least in part on the at least one synchronization signal. Wearable elements retain at least a portion of the modules described. Various other aspects are directed toward feedback collection and use, sequencing signals, relationship management, client identities, and other related aspects. | 08-21-2014 |
Colleen Hamilton, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20100082505 | SOFTWARE AND HARDWARE RESOURCE CAPACITY MANAGEMENT - A system is disclosed that includes an interface to receive a resource governance rule applicable to one or more hardware resources supporting a monitored software application. The system includes utilization logic to measure usage of a particular hardware resource by the monitored software application. An available utilization of the particular hardware resource is determined based on the resource governance rule, and a total utilization of the particular hardware resource is also determined. One or more utilization metrics are determined based on historical usage of the particular hardware resource as compared to a governed capacity and a non-governed capacity available to the particular hardware resource. The system also includes recommendation logic to determine a recommended action to be taken with respect to the monitored software application. | 04-01-2010 |
20120102423 | VISUALIZATION FOR RESOURCE CAPACITY MANAGEMENT - A method includes displaying a plurality of user modifiable utilization views of a monitored software application, where each of the plurality of user modifiable utilization views is customizable to fit a domain of analysis by identifying one or more resource types of multiple resource components. Each of the plurality of user modifiable utilization views is displayed in one more graphical user interfaces. The method includes determining a desired ordering of the one or more resource types within a hierarchy of types and filtering one or more details of the multiple resource components to create a customized view. A user can navigate between each of the plurality of user modifiable utilization views to dynamically construct related target analysis views including filtered details across one or more other domains of analysis. | 04-26-2012 |
20150199523 | PRIVACY-BASED DEGRADATION OF ACTIVITY SIGNALS AND AUTOMATIC ACTIVATION OF PRIVACY MODES - Methods, systems, and computer program products are provided that address issues related to data privacy by enabling users to elect various levels of data sharing. A user of a user device is enabled to indicate their comfort level with sharing, transmitting, or otherwise exposing individual activity records (data entities) with respect to various activity categories. The exposure of activity records may be controlled with respect to on-device and off-device components. Furthermore, privacy profiles may be automatically generated for the user, and the privacy profiles may be automatically activated in corresponding situations. | 07-16-2015 |
Colleen Elizabeth Hamilton, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20150278348 | EXPLICIT SIGNALS PERSONALIZED SEARCH - Methods, systems, and computer program products are provided that enable users to provide explicit declarations that are used to generate recommendations for the users. An explicit declaration is received from a user of a user device. The explicit declaration is configured to influence a subsequent recommendation. The words of the explicit declaration are processed to generate a record. A recommendation rule is generated based on the generated record. The recommendation rule is executed to generate a recommendation for the user. The generated recommendation is provided to the user. | 10-01-2015 |
20150324753 | SCHEDULING CONFLICT NOTIFICATION - One or more techniques and/or systems are provided for surfacing scheduling conflicts and/or for facilitating appointment scheduling based upon conflict detection. A user may maintain user appointment data comprising user appointments (e.g., calendar entries within a work calendar). Because user activity may not be fully reflected in the appointment data (e.g., no calendar entries for routine grocery shopping, soccer practice, etc.), potential conflicts may exist between user appointments and the true availability of the user. Accordingly, user signals (e.g., email(s), location check-ins, etc. associated with soccer practice) may be evaluated to generate a user inferred behavior pattern that may be used to identify a potential conflict with a user appointment (e.g., where the user consents to the gathering and/or use of such user signals). A warning of the potential conflict may be surfaced to the user (e.g., a Tuesday dinner calendar meeting conflicts with routine soccer practice on Tuesday evenings). | 11-12-2015 |
Colleen Elizabeth Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150199649 | COMPLEMENTARY AND SHADOW CALENDARS - One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar. The complementary calendar and/or the shadow calendar may be displayed to the user and/or may be used to provide dynamic notifications and/or suggestions to the user (e.g. regarding conflicting entries/obligations, etc.). | 07-16-2015 |
Darlene Hamilton, Lyle, WA US
Patent application number | Description | Published |
---|---|---|
20100103732 | CONTROLLING AC DISTURBANCE WHILE PROGRAMMING - A system and methodology that can minimize disturbance during an AC operation associated with a memory, such as, program, read and/or erase, is provided. The system pre-charges all or a desired subset of the bit lines in a memory array to a specified voltage, during an AC operation to facilitate reducing AC disturbances between neighboring cells. A pre-charge voltage can be applied to all bit lines in a block in the memory array, or to bit lines associated with a selected memory cell and neighbor memory cells adjacent to the selected memory cell in the block. The system ensures that source and drain voltage levels can be set to desired levels at the same or substantially the same time, while selecting a memory cell. This can facilitate minimizing AC disturbances in the selected memory cell during the AC operation. | 04-29-2010 |
20110235412 | CONTROLLING AC DISTURBANCE WHILE PROGRAMMING - A system and methodology that can minimize disturbance during an AC operation associated with a memory, such as, program, read and/or erase, is provided. The system pre-charges all or a desired subset of the bit lines in a memory array to a specified voltage, during an AC operation to facilitate reducing AC disturbances between neighboring cells. A pre-charge voltage can be applied to all bit lines in a block in the memory array, or to bit lines associated with a selected memory cell and neighbor memory cells adjacent to the selected memory cell in the block. The system ensures that source and drain voltage levels can be set to desired levels at the same or substantially the same time, while selecting a memory cell. This can facilitate minimizing AC disturbances in the selected memory cell during the AC operation. | 09-29-2011 |
20120294103 | CONTROLLING AC DISTURBANCE WHILE PROGRAMMING - A system and methodology that can minimize disturbance during an AC operation associated with a memory, such as, program, read and/or erase, is provided. The system pre-charges all or a desired subset of the bit lines in a memory array to a specified voltage, during an AC operation to facilitate reducing AC disturbances between neighboring cells. A pre-charge voltage can be applied to all bit lines in a block in the memory array, or to bit lines associated with a selected memory cell and neighbor memory cells adjacent to the selected memory cell in the block. The system ensures that source and drain voltage levels can be set to desired levels at the same or substantially the same time, while selecting a memory cell. This can facilitate minimizing AC disturbances in the selected memory cell during the AC operation. | 11-22-2012 |
Darlene Hamilton, Husum, WA US
Patent application number | Description | Published |
---|---|---|
20090161462 | CONTROLLING AC DISTURBANCE WHILE PROGRAMMING - A system and methodology that can minimize disturbance during an AC operation associated with a memory, such as, program, read and/or erase, is provided. The system pre-charges all or a desired subset of the bit lines in a memory array to a specified voltage, during an AC operation to facilitate reducing AC disturbances between neighboring cells. A pre-charge voltage can be applied to all bit lines in a block in the memory array, or to bit lines associated with a selected memory cell and neighbor memory cells adjacent to the selected memory cell in the block. The system ensures that source and drain voltage levels can be set to desired levels at the same or substantially the same time, while selecting a memory cell. This can facilitate minimizing AC disturbances in the selected memory cell during the AC operation. | 06-25-2009 |
Darlene Hamilton, White Salmon, WA US
Patent application number | Description | Published |
---|---|---|
20090103357 | FAST SINGLE PHASE PROGRAM ALGORITHM FOR QUADBIT - Methods of rapidly programming a wordline of multi-level flash memory cells comprising memory cell element-pairs having three or more data levels per bit or element corresponding to three or more threshold voltages are provided. An interactive program algorithm rapidly programs the elements of the wordline of memory cells in a learn phase and a single core programming phase. In one embodiment, each wordline comprises learn element-pairs first programmed to provide learn drain voltages for programming core element-pairs along the wordline having the same program pattern of data levels. A set comprising one or more program patterns is chosen to correspond with each program level used on the wordline. The learn element-pairs are programmed to determine a learned program drain voltage for each program level. This learned program drain voltage essentially provides a wordline and program level specific program characterization of the Vd required for the remaining elements of that wordline. | 04-23-2009 |
20090154235 | REDUCED STATE QUADBIT - A reduced state memory device and methods of forming and programming multi-level flash memory cell element-pairs of the device, each element configured to store a blank level or two or more program levels are provided. In one embodiment, the reduced state memory device comprises a component configured to store in the memory cell element-pairs one pattern combination of a plurality of program pattern combinations comprising two blank levels, two program levels, and one blank level and one program level, the levels differing by less than a predetermined value. In one embodiment, a method of forming a memory device comprises forming at least one memory device of a multi-level flash memory array, each memory cell comprising two or more memory elements, each memory element configured to store three or more levels, and excluding one or more program pattern combinations that can be stored in the at least one memory cell. | 06-18-2009 |
Darlene Hamilton, Lacey, WA US
Patent application number | Description | Published |
---|---|---|
20110038195 | METHOD FOR RESETTING A RESISTIVE CHANGE MEMORY ELEMENT - A method of resetting a resistive change memory element is disclosed. The method comprises performing a series of programming operations—for example, a programming pulse of a predetermined voltage level and pulse width—on a resistive change memory element in order to incrementally increase the resistance of the memory element above some predefined threshold. Prior to each programming operation, the resistive state of the memory element is measured and used to determine the parameters used in that programming operation. If this measured resistance value is above a first threshold value, the memory element is determined to already be in a reset state and no further programming operation is performed. If this measured resistance value is below a second threshold value, this second threshold value being less than the first threshold value, a first set of programming parameters are used within the programming operation. If this initial value is above the second threshold value but below the first threshold value, a second set of programming parameters are used within the programming operation. | 02-17-2011 |
20110051499 | METHOD FOR ADJUSTING A RESISTIVE CHANGE ELEMENT USING A REFERENCE - A method of adjusting a resistive change element using a reference is disclosed. The method comprises inspecting a resistive change element to determine a first state; comparing the first state to a reference wherein said reference provides stimulus parameters corresponding to a transition from the first state to a second state; and applying the stimulus parameters to the resistive change element. A resistive change memory cell array is also disclosed. | 03-03-2011 |
20120056149 | METHODS FOR ADJUSTING THE CONDUCTIVITY RANGE OF A NANOTUBE FABRIC LAYER - Methods for adjusting and/or limiting the conductivity range of a nanotube fabric layer are disclosed. In some aspects, the conductivity of a nanotube fabric layer is adjusted by functionalizing the nanotube elements within the fabric layer via wet chemistry techniques. In some aspects, the conductivity of a nanotube fabric layer is adjusted by functionalizing the nanotube elements within the fabric layer via plasma treatment. In some aspects, the conductivity of a nanotube fabric layer is adjusted by functionalizing the nanotube elements within the fabric layer via CVD treatment. In some aspects, the conductivity of a nanotube fabric layer is adjusted by functionalizing the nanotube elements within the fabric layer via an inert ion gas implant. | 03-08-2012 |
Darlene G. Hamilton, White Salmon, WA US
Patent application number | Description | Published |
---|---|---|
20080279014 | MULTI-PHASE WORDLINE ERASING FOR FLASH MEMORY - Erasing wordlines at the same time can cause undesirable results because some wordlines are affected by electromagnetic waves of other wordlines. However, other wordlines are not affected because they are next to contacts. Therefore, it can be beneficial to erase wordlines in a multi-phase sequence that allows for erasing wordlines without an impact from other wordlines. | 11-13-2008 |
Darlene G. Hamilton, Lyle, WA US
Patent application number | Description | Published |
---|---|---|
20090161466 | EXTENDING FLASH MEMORY DATA RETENSION VIA REWRITE REFRESH - Providing for extended data retention of flash memory devices by program state rewrite is disclosed herein. By way of example, a memory cell or group of memory cells can be evaluated to determine a program state of the cell(s). If the cell(s) is in a program state, as opposed to a natural or non-programmed state, a charge level, voltage level and/or the like can be rewritten to a default level associated with the program state, without erasing the cell(s) first. Accordingly, conventional mechanisms for refreshing cell program state that require rewriting and erasing, typically degrading storage capacity of the memory cell, can be avoided. As a result, data stored in flash memory can be refreshed in a manner that mitigates loss of memory integrity, providing substantial benefits over conventional mechanisms that can degrade memory integrity at a relatively high rate. | 06-25-2009 |
Darlene Gay Hamilton, White Salmon, WA US
Patent application number | Description | Published |
---|---|---|
20100128521 | APPLYING NEGATIVE GATE VOLTAGE TO WORDLINES ADJACENT TO WORDLINE ASSOCIATED WITH READ OR VERIFY TO REDUCE ADJACENT WORDLINE DISTURB - Systems, methods, and devices that facilitate applying a predefined negative gate voltage to wordlines adjacent to a selected wordline associated with a memory cell selected during a read or verify operation to facilitate reducing adjacent wordline disturb are presented. A memory component can comprise an optimized operation component that can apply a predefined negative gate voltage to wordlines adjacent to a selected wordline associated with a memory cell selected for a read or verify operation, based at least in part on predefined operation criteria, to facilitate reducing adjacent wordline disturb in the selected memory cell to facilitate reducing a shift in the voltage threshold and maintain a desired operation window. The optimized operation component optionally can include an evaluator component that can facilitate determining whether a negative gate voltage applied to adjacent wordlines is to be adjusted to facilitate reducing adjacent wordline disturb below a predetermined threshold amount. | 05-27-2010 |
20100128524 | MULTI-PHASE PROGRAMMING OF MULTI-LEVEL MEMORY - Systems, methods, and devices that facilitate multi-phase programming of data in a memory component are presented. Received data is programmed to a memory using multiple programming phases based on a predefined program pattern. A program learn is performed by varying drain voltages, as desired, to facilitate determining respective drain voltages related to specified subgroups associated with respective data levels for a first programming phase. A first programming phase is performed using learned drain voltages as initial drain voltages where drain voltage levels are varied during each program pulse to facilitate programming memory cells to respective intrinsic verify voltage levels based on respective data levels. A second programming phase is performed using ending drain voltages from the first programming phase as initial drain voltages where gate voltage levels are varied during each program pulse to facilitate programming memory cells to respective final verify voltage levels based on respective data levels. | 05-27-2010 |
20100142284 | DETERMINISTIC-BASED PROGRAMMING IN MEMORY - Systems, methods, and devices that employ deterministic programming techniques to facilitate efficient programming of memory elements in a memory are presented. A memory component comprises an optimized program component that can divide a group of memory elements selected for programming into a desired number of subgroups based in part on respective current threshold voltage levels (Vt) of the memory elements; apply respective program pulses to each memory element in respective subgroups; measure respective Vt levels of memory elements after the pulse; and verify as passed memory elements that meet a target Vt. The optimized program component can divide a subset of memory elements that do not meet the target Vt into a desired number of subgroups based in part on respective current Vt levels of the memory elements and can continue to perform this deterministic programming process until all memory elements are verified as passing for the target Vt. | 06-10-2010 |
Darlene Gay Hamilton, Husum, WA US
Patent application number | Description | Published |
---|---|---|
20100135082 | MOVING PROGRAM VERIFY LEVEL FOR PROGRAMMING OF MEMORY - Systems, methods, and devices that employ moving program verify levels to facilitate programming data to memory elements in a memory component are presented. A program component can employs a specified number of program verify (PV) levels where a first program pulse is applied to a selected group of memory elements to facilitate verifying the cells to pass the first PV level. The PV level can be moved to a next PV level that is a higher charge level than or equal to the first PV level, and a subset of the group of cells that are below the next PV level are selected and a next program pulse is applied to the subset of cells to facilitate verifying the cells to pass the next PV level. The moving PV level process can continue until the group of memory elements is verified to pass the target PV level. | 06-03-2010 |
Eric Hamilton, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20140074909 | MANAGING CONVERSATIONS IN SINGLE VIEW PANE ENVIRONMENT - A communication application displays a conversation navigation bar to manage conversations. The application inserts an interactive tile into the navigation bar for each conversation. Each tile presents status information about the conversation and the modality of the conversation. Tiles are ordered according to activity and updates. The navigation bar is adjustable to accommodate hardware and software limitations of a platform. | 03-13-2014 |
20140082522 | MANAGING MODALITY VIEWS ON CONVERSATION CANVAS - A communication application displays a modality view that may be one of a collaboration, a gallery, or a messaging view on a conversation canvas. The application may display an initial view according a modality selection by the user. A user is enabled to select a next view from the set by providing a user action such as a tap, swipe action, etc. The application dynamically generates the next modality view according to the initial view. Common participants and common contexts are used to configure the next view. Subsequent to configuration, the application displays the next modality view on the conversation canvas by transitioning from the initial view. The application retains session information from the initial view to restore the initial view session if the user selects to return to the initial view. | 03-20-2014 |
20150188727 | TUNNELING VOIP CALL CONTROL ON CELLULAR NETWORKS - Signaling from a mobile device is transparently tunneled through a cellular voice network to a Voice over Internet Protocol (“VoIP”) core network so that multi-party calls, including conference calls and call waiting, can be managed entirely within the VoIP core network. The tunneled signals enable call control to be implemented in the VoIP core network and also establish a way to communicate requests, instructions, and call state. The signaling is transparent to the cellular network because that network does not receive and interpret the signaling. Instead, the cellular network's existing and unmodified control plane is repurposed by the mobile device by placing new, brief outgoing calls through the cellular network to the VoIP core network where the called party number (i.e., the caller-ID) encodes specific information. The VoIP core network immediately releases the new cellular call once the caller-ID is received and the encoded information is interpreted. | 07-02-2015 |
20150319113 | MANAGING MODALITY VIEWS ON CONVERSATION CANVAS - A communication application displays a modality view that may be one of a collaboration, a gallery, or a messaging view on a conversation canvas. The application may display an initial view according a modality selection by the user. A user is enabled to select a next view from the set by providing a user action such as a tap, swipe action, etc. The application dynamically generates the next modality view according to the initial view. Common participants and common contexts are used to configure the next view. Subsequent to configuration, the application displays the next modality view on the conversation canvas by transitioning from the initial view. The application retains session information from the initial view to restore the initial view session if the user selects to return to the initial view. | 11-05-2015 |
James Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120330954 | System And Method For Implementing A Scalable Data Storage Service - A system that implements a scalable data storage service may maintain tables in a non-relational data store on behalf of clients. The system may provide a Web services interface through which service requests are received, and an API usable to request that a table be created, deleted, or described; that an item be stored, retrieved, deleted, or its attributes modified; or that a table be queried (or scanned) with filtered items and/or their attributes returned. An asynchronous workflow may be invoked to create or delete a table. Items stored in tables may be partitioned and indexed using a simple or composite primary key. The system may not impose pre-defined limits on table size, and may employ a flexible schema. The service may provide a best-effort or committed throughput model. The system may automatically scale and/or re-partition tables in response to detecting workload changes, node failures, or other conditions or anomalies. | 12-27-2012 |
James R. Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110149963 | DISTRIBUTED ROUTING ARCHITECTURE - A hierarchical distributed routing architecture including at least two levels, or layers, for receiving, processing and forwarding data packets between network components is provided. The core level router components receive an incoming packet from a network component and identify a distribution level router component based on processing a subset of the destination address associated with the received packet. The distribution level router components receive a forwarded packet and forward the packet to a respective network. The mapping, or other assignment, of portions of the FIB associated with the distributed routing environment is managed by a router management component. | 06-23-2011 |
20110149964 | DISTRIBUTED ROUTING ARCHITECTURE - A hierarchical distributed routing architecture including at least three levels, or layers, for receiving, processing and forwarding data packets between network components is provided. The core level router components receive an incoming packet from a network component and identify a distribution level router component based on processing a subset of the destination address associated with the received packet. The distribution level router components that receiving a forwarded packet and identify a transit level router component based a second processing of at least a subset of the destination address associated with the received packet. The transit level router components receive the forwarded packet and forward the packet to a respective network. The mapping, or other assignment, of portions of the FIB associated with the distributed routing environment is managed by a router management component. | 06-23-2011 |
20110149965 | DISTRIBUTED ROUTING ARCHITECTURE - A hierarchical distributed routing architecture including at least three levels, or layers, for receiving, processing and forwarding data packets between network components is provided. The core level router components receive an incoming packet from a network component and identify a distribution level router component based on processing a subset of the destination address associated with the received packet. The distribution level router components that receiving a forwarded packet and identify a transit level router component based a second processing of at least a subset of the destination address associated with the received packet. The distribution level router components maintain address routing information a first and second memory. The transit level router components receive the forwarded packet and forward the packet to a respective network. The mapping, or other assignment, of portions of the FIB associated with the distributed routing environment is managed by a router management component. | 06-23-2011 |
20110238546 | MANAGING COMMITTED PROCESSING RATES FOR SHARED RESOURCES - Commitments against various resources can be dynamically adjusted for customers in a shared-resource environment. A customer can provision a data volume with a committed rate of Input/Output Operations Per Second (IOPS) and pay only for that commitment (plus any overage), for example, as well as the amount of storage requested. The customer can subsequently adjust the committed rate of IOPS by submitting an appropriate request, or the rate can be adjusted automatically based on any of a number of criteria. Data volumes for the customer can be migrated, split, or combined in order to provide the adjusted rate. The interaction of the customer with the data volume does not need to change, independent of adjustments in rate or changes in the data volume, other than the rate at which requests are processed. | 09-29-2011 |
20110238857 | COMMITTED PROCESSING RATES FOR SHARED RESOURCES - Customers of a shared-resource environment can provision resources in a fine-grained manner that meets specific performance requirements. A customer can provision a data volume with a committed rate of Input/Output Operations Per Second (IOPS) and pay only for that commitment (plus any overage), and the amount of storage requested. The customer will then at any time be able to complete at least the committed rate of IOPS. If the customer generates submissions at a rate that exceeds the committed rate, the resource can still process at the higher rate when the system is not under pressure. Even under pressure, the system will deliver at least the committed rate. Multiple customers can be provisioned on the same resource, and more than one customer can have a committed rate on that resource. Customers without committed or guaranteed rates can utilize the uncommitted portion, or committed portions that are not being used. | 09-29-2011 |
20130010788 | DISTRIBUTED ROUTING ARCHITECTURE - A hierarchical distributed routing architecture including at least two levels, or layers, for receiving, processing and forwarding data packets between network components is provided. The core level router components receive an incoming packet from a network component and identify a distribution level router component based on processing a subset of the destination address associated with the received packet. The distribution level router components receive a forwarded packet and forward the packet to a respective network. The mapping, or other assignment, of portions of the FIB associated with the distributed routing environment is managed by a router management component. | 01-10-2013 |
20130010796 | DISTRIBUTED ROUTING ARCHITECTURE - A hierarchical distributed routing architecture including at least three levels, or layers, for receiving, processing and forwarding data packets between network components is provided. The core level router components receive an incoming packet from a network component and identify a distribution level router component based on processing a subset of the destination address associated with the received packet. The distribution level router components that receiving a forwarded packet and identify a transit level router component based a second processing of at least a subset of the destination address associated with the received packet. The transit level router components receive the forwarded packet and forward the packet to a respective network. The mapping, or other assignment, of portions of the FIB associated with the distributed routing environment is managed by a router management component. | 01-10-2013 |
20130080420 | HISTORICAL BROWSING SESSION MANAGEMENT - A remote browsing process is directed to the generation and management of a remote browse session at a network computing provider. A client computing device requests a remote browse session instance at a network computing provider. The network computing and storage provider processes the requested content for display, and provides a processed representation of the requested content to the client computing device for display. The network computing provider further provides a historical content representation corresponding to the requested content to a historical browse storage component for storage. The network computing provider may further provide historical content representations to the historical browse storage component for content directly or indirectly referenced by the requested content. The client computing device may subsequently search for content not previously displayed by the client computing device. | 03-28-2013 |
20130080421 | HISTORICAL BROWSING SESSION MANAGEMENT - A remote browsing process is directed to the generation and management of a remote browse session at a network computing and storage provider. A client computing device provides a search request to a network computing and storage provider. Responsive to the search request, the network computing and storage provider provides search results corresponding to historical content representations associated with content previously requested by the client computing device or a user associated with the client computing device. The network computing and storage provider may determine the search results based on a navigation path associated with a previous request for content, or based on any number of other factors. | 03-28-2013 |
20130080576 | HISTORICAL BROWSING SESSION MANAGEMENT - A remote browsing process is directed to the generation and management of a remote browse session at a network computing provider. A client computing device requests a remote browse session instance at a network computing provider. The network computing provider instantiates the browse session instance and retrieves the requested content. The network computing provider processes the requested content for display, and provides a processed representation of the requested content to the client computing device. The network computing provider further provides a historical content representation corresponding to the requested content to a historical browse storage component for storage. The network computing provider retrieves additional content referenced directly or indirectly by the requested content. The network computing provider provides historical content representations corresponding to some of the additional content to the historical browse storage component. | 03-28-2013 |
20130080577 | HISTORICAL BROWSING SESSION MANAGEMENT - A remote browsing process is directed to the generation and management of a remote browse session at a network computing provider. A client computing device requests a remote browse session instance at a network computing provider. The browse session instance may correspond to one or more requested network resources. The network computing provider instantiates the browse session instance and retrieves the requested content. The network computing provider processes the requested content and provides a processed representation of the requested content to the client computing device. The network computing provider further provides a historical content representation to a historical browse storage component for storage. The client computing device may display the representation of the requested content and may send user interaction data based on user interactions. | 03-28-2013 |
20130346480 | TECHNIQUES FOR CAPTURING DATA SETS - Techniques, including systems and methods, for capturing data sets include performing a client-side two-phase commit to ensure one or more data consistency conditions. A logical volume may represent a data set that is distributed among a plurality of physical storage devices. One or more client devices are instructed to block at least acknowledgment of write operations. When the one or more client devices have blocked at least acknowledgment of write operations, one or more servers in communication with the physical storage devices are instructed to capture corresponding portions of the data set. When the servers have been instructed to capture corresponding portions of the data set, the client devices are instructed to resume at least acknowledgment of write operations. | 12-26-2013 |
20140046908 | ARCHIVAL DATA STORAGE SYSTEM - A cost-effective, durable and scalable archival data storage system is provided herein that allow customers to store, retrieve and delete archival data objects, among other operations. For data storage, in an embodiment, the system stores data in a transient data store and provides a data object identifier may be used by subsequent requests. For data retrieval, in an embodiment, the system creates a job corresponding to the data retrieval and provides a job identifier associated with the created job. Once the job is executed, data retrieved is provided in a transient data store to enable customer download. In various embodiments, jobs associated with storage, retrieval and deletion are scheduled and executed using various optimization techniques such as load balancing, batch processed and partitioning. Data is redundantly encoded and stored in self-describing storage entities increasing reliability while reducing storage costs. Data integrity is ensured by integrity checks along data paths. | 02-13-2014 |
20140082019 | HISTORICAL BROWSING SESSION MANAGEMENT - A remote browsing process is directed to the generation and management of a remote browse session at a network computing provider. A client computing device requests a remote browse session instance at a network computing provider. The network computing and storage provider processes the requested content for display, and provides a processed representation of the requested content to the client computing device for display. The network computing provider further provides a historical content representation corresponding to the requested content to a historical browse storage component for storage. The network computing provider may further provide historical content representations to the historical browse storage component for content directly or indirectly referenced by the requested content. The client computing device may subsequently search for content not previously displayed by the client computing device. | 03-20-2014 |
20140082028 | SYSTEM AND METHOD FOR IMPLEMENTING A SCALABLE DATA STORAGE SERVICE - A system that implements a scalable data storage service may maintain tables in a non-relational data store on behalf of clients. The system may provide a Web services interface through which service requests are received, and an API usable to request that a table be created, deleted, or described; that an item be stored, retrieved, deleted, or its attributes modified; or that a table be queried (or scanned) with filtered items and/or their attributes returned. An asynchronous workflow may be invoked to create or delete a table. Items stored in tables may be partitioned and indexed using a simple or composite primary key. The system may not impose pre-defined limits on table size, and may employ a flexible schema. The service may provide a best-effort or committed throughput model. The system may automatically scale and/or re-partition tables in response to detecting workload changes, node failures, or other conditions or anomalies. | 03-20-2014 |
20140088979 | PROVIDING SYSTEM RESOURCES WITH SECURE CONTAINMENT UNITS - A system for providing resources to customers includes racks, sub-rack level secure containment units in the racks, and a provisioning control system. The sub-rack level secure containment units each enclose system resources. The racks hold two or more of the sub-rack level secure containment units. For each customer, the provisioning control system may provision a set of sub-rack level secure containment units to the customer. The provisioning control system may monitor, and create a record of, events of physical access to the system resources in each customer's set of sub-rack level secure containment units. | 03-27-2014 |
20140208129 | RESERVE POWER SYSTEM FOR DATA CENTER - A system for performing computing operations in a data center includes one or more sets of computer systems, one or more primary power systems, and a reserve power system. The primary power systems include at least one power distribution unit that supplies power to at least one of the sets of computer systems. The reserve power system automatically supplies power to at least one of the sets of computer systems if a condition is met (such as a failure of the primary power system). | 07-24-2014 |
20140208130 | RESERVE POWER SYSTEM FOR DATA CENTER - A system for performing computing operations in a data center includes one or more sets of computer systems, one or more primary power systems, and a reserve power system. The primary power systems include at least one power distribution unit that supplies power to at least one of the sets of computer systems. The reserve power system automatically supplies power to at least one of the sets of computer systems if a condition is met (such as a failure of the primary power system). | 07-24-2014 |
20140279905 | TOKEN-BASED ADMISSION CONTROL FOR REPLICATED WRITES - Methods and apparatus for token-based admission control for replicated writes are disclosed. Data objects are divided into partitions, and corresponding to each partition, at least a master replica and a slave replica are stored. A determination as to whether to accept a write request directed to the partition is made based at least in part on one or more of (a) available throughput capacity at the master replica, and (b) an indication, obtained using a token-based protocol, of available throughput capacity at the slave replica. If the write request is accepted, one or more data modification operations are initiated. | 09-18-2014 |
20140324920 | OBJECT STORAGE USING MULTIPLE DIMENSIONS OF OBJECT INFORMATION - A method for grouping and storing objects across different storage solutions in storage systems according to analysis of multiple dimensions of information may be implemented as or in a storage management module. The module collects information about objects (e.g., data objects) in a storage system (e.g., a data storage system). The objects may be objects already stored in the storage system or may be new objects to be stored in the storage system. The module analyzes the collected information across multiple dimensions to determine groupings of the objects, and determines a storage solution for each determined grouping. The module may then direct storage of the objects in the groupings according to the determined storage solutions. Upon obtaining new information about object(s) in the storage system, the module may direct movement of the object(s) from one storage solution to another storage solution according to an analysis including the new information. | 10-30-2014 |
20140351893 | MANAGING HARDWARE REBOOT AND RESET IN SHARED ENVIRONMENTS - In an environment such as a cloud computing environment where various guests can be provisioned on a host machine or other hardware device, it can be desirable to prevent those users from rebooting or otherwise restarting the machine or other resources using unauthorized information or images that can be obtained from across the network. A cloud manager can cause one or more network switches or other routing or communication processing components to deny communication access between user-accessible ports on a machine or device and the provisioning systems, or other specific network resources, such that the user cannot cause the host machine to pull information from those resources upon a restart or reboot of the machine. Further, various actions can be taken upon a reboot or attempted reboot, such as to isolate the host machine or even power off the specific machine. | 11-27-2014 |
20140376368 | COMPOUND TOKEN BUCKETS FOR BURST-MODE ADMISSION CONTROL - Methods and apparatus for compound token buckets usable for burst-mode admission control are disclosed. A peak burst rate and a sustained burst rate of work requests that are to be supported at a work target are determined. The maximum token populations of a peak-burst token bucket and a sustained-burst token bucket are configured, based on the peak burst rate and the sustained burst rate respectively. In response to receiving a work request directed at the work target, a determination to accept the work request for execution is made based at least in part on the token population of the peak-burst token bucket and/or the sustained-burst token bucket. | 12-25-2014 |
20140379506 | TOKEN-BASED PRICING POLICIES FOR BURST-MODE OPERATIONS - Methods and apparatus for token-based pricing policies for burst-mode operations are disclosed. A pricing policy to be applied to token population changes at a token bucket used for admission control during burst-mode operations at a work target is determined. Over a time period, changes to the token population of that bucket are recorded. A billing amount to be charged to a client is determined, based on the recorded changes in token population and an associated pricing amount indicated in the pricing policy. | 12-25-2014 |
20140379922 | EQUITABLE DISTRIBUTION OF EXCESS SHARED-RESOURCE THROUGHPUT CAPACITY - Methods and apparatus for equitable distribution of excess shared-resource throughput capacity are disclosed. A first and a second work target are configured to access a shared resource to implement accepted work requests. Admission control is managed at the work targets using respective token buckets. A first metric indicative of the work request arrival rates at the work targets during a time interval, and a second metric associated with the provisioned capacities of the work targets are determined. A number of tokens determined based on a throughput limit of the shared resource is distributed among the work targets to be used for admission control during a subsequent time interval. The number of tokens distributed to each work target is based on the first metric and/or the second metric. | 12-25-2014 |
20140380324 | BURST-MODE ADMISSION CONTROL USING TOKEN BUCKETS - Methods and apparatus for burst-mode admission control using token buckets are disclosed. A work request (such as a read or a write) directed to a work target is received. Based on a first criterion, a determination is made that the work target is in a burst mode of operation. A token population of a burst-mode token bucket is determined, and if the population meets a second criterion, the work request is accepted for execution. | 12-25-2014 |
20140380330 | TOKEN SHARING MECHANISMS FOR BURST-MODE OPERATIONS - Methods and apparatus for token-sharing mechanisms for burst-mode operations are disclosed. A first and a second token bucket are respectively configured for admission control at a first and a second work target. A number of tokens to be transferred between the first bucket and the second bucket, as well as the direction of the transfer, are determined, for example based on messages exchanged between the work targets. The token transfer is initiated, and admission control decisions at the work targets are made based on the token population resulting from the transfer. | 12-25-2014 |
20150036284 | COMPUTE NODE COOLING WITH AIR FED THROUGH BACKPLANE - A computing system includes a chassis, one or more backplanes coupled to the chassis. Computing devices are coupled to the one or more backplanes. The one or more backplanes include backplane openings that allow air to pass from one side of the backplane to the other side of the backplane. Air channels are formed by adjacent circuit board assemblies of the computing devices and the one or more backplanes. Channel capping elements at least partially close the air channels. | 02-05-2015 |
20150036287 | SYSTEM FOR COMPUTE NODE MAINTENANCE WITH CONTINUOUS COOLING - A computing system includes a chassis, one or more backplanes coupled to the chassis. Computing devices are coupled to the one or more backplanes. The one or more backplanes include backplane openings that allow air to pass from one side of the backplane to the other side of the backplane. Air channels are formed by adjacent circuit board assemblies of the computing devices and the one or more backplanes. Channel capping elements at least partially close the air channels. | 02-05-2015 |
20150081374 | CLIENT-SELECTABLE POWER SOURCE OPTIONS FOR NETWORK-ACCESSIBLE SERVICE UNITS - Methods and apparatus for client-selectable power source options for network-accessible service units are described. A programmatic interface is implemented to enable clients of a service to select, from among a plurality of power source categories including a renewable category and a non-renewable category, a power source category to be used for a service unit. Based on inputs received via the interface, the respective amounts of power to be obtained from renewable and non-renewable categories during a time period may be estimated. A verification operation comparing the estimated amounts to the amount of power that is actually obtained from the different sources may be performed. | 03-19-2015 |
20150112999 | SYSTEM AND METHOD FOR IMPLEMENTING A SCALABLE DATA STORAGE SERVICE - A system that implements a scalable data storage service may maintain tables in a non-relational data store on behalf of clients. The system may provide a Web services interface through which service requests are received, and an API usable to request that a table be created, deleted, or described; that an item be stored, retrieved, deleted, or its attributes modified; or that a table be queried (or scanned) with filtered items and/or their attributes returned. An asynchronous workflow may be invoked to create or delete a table. Items stored in tables may be partitioned and indexed using a simple or composite primary key. The system may not impose pre-defined limits on table size, and may employ a flexible schema. The service may provide a best-effort or committed throughput model. The system may automatically scale and/or re-partition tables in response to detecting workload changes, node failures, or other conditions or anomalies. | 04-23-2015 |
20150160948 | FIRMWARE UPDATES DURING LIMITED TIME PERIOD - When providing a user with native access to at least a portion of device hardware, the user can be prevented from modifying firmware and other configuration information by controlling the mechanisms used to update that information. In some embodiments, an asymmetric keying approach can be used to encrypt or sign the firmware. In other cases access can be controlled by enabling firmware updates only through a channel or port that is not exposed to the customer, or by mapping only those portions of the hardware that are to be accessible to the user. In other embodiments, the user can be prevented from modifying firmware by only provisioning the user on a machine after an initial mutability period wherein firmware can be modified, such that the user never has access to a device when firmware can be updated. Combinations and variations of the above also can be used. | 06-11-2015 |
20150179211 | VIBRATION CANCELLATION FOR DATA STORAGE - Methods and apparatus for vibration cancellation are disclosed. Vibration data from one or more vibration detectors associated with a storage device is collected. The vibration data represents vibrations experienced by the storage device. In response to the vibration data from the one or more vibration detectors, one or more movements for respective ones of one or more counter-vibration actuators to at least partially cancel of the vibrations experienced by the storage device is calculated. The one or more counter-vibration actuators perform the one or more movements. | 06-25-2015 |
20150199519 | MANAGING FIRMWARE UPDATE ATTEMPTS - Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure counter for each update or update attempt. The value of the counter can be determined every time the validity of the firmware is confirmed, and this value can be stored to a secure location. At subsequent times, such as during a boot process, the actual value of the counter can be determined and compared with the expected value. If the values do not match, such that the firmware may be in an unexpected state, an action can be taken, such as to prevent access to, or isolate, the hardware until such time as the firmware can be validated or updated to an expected state. | 07-16-2015 |
20150248341 | MONITORING AND ANALYSIS OF OPERATING STATES IN A COMPUTING ENVIRONMENT - A set of techniques is described for monitoring and analyzing crashes and other malfunctions in a multi-tenant computing environment (e.g. cloud computing environment). The computing environment may host many applications that are executed on different computing resource combinations. The combinations may include varying types and versions of hardware or software resources. A monitoring service is deployed to gather statistical data about the failures occurring in the computing environment. The statistical data is then analyzed to identify abnormally high failure patterns. The failure patterns may be associated with particular computing resource combinations being used to execute particular types of applications. Based on these failure patterns, suggestions can be issued to a user to execute the application using a different computing resource combination. Alternatively, the failure patterns may be used to modify or update the various resources in order to correct the potential malfunctions caused by the resource. | 09-03-2015 |
James Robert Hamilton, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20100185843 | HARDWARE ENCRYPTING STORAGE DEVICE WITH PHYSICALLY SEPARABLE KEY STORAGE DEVICE - Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data inaccessible. Destruction of the separable key device can result in virtual destruction of the encrypted data. The cryptographic information on the separable key device can be provided by a storage device manufacturer, or by a provisioning computing device. The separable key device can be directly communicationally coupled to a provisioning computing device or it can establish a secure communication tunnel with the provisioning device through a computing device to which the separable key device is communicationally coupled. Cryptographic information can be provided by, and deleted from, the provisioning computing device prior to completion of the booting of that device. | 07-22-2010 |
20100325736 | REMOTE ACCESS CONTROL OF STORAGE DEVICES - An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storage device. Alternatively, the access control device can comprise information to establish a secure connection to an authorization computing device and the access control device can implement the decisions of the authorization computing device. The access control device can control access by instructing a storage device to execute specific firmware instructions to prevent meaningful responses to data storage related requests. The access control device can also comprise storage-related cryptographic information utilized by the storage device to encrypt and decrypt data. In such a case, the access control device can control access by not releasing the storage-related cryptographic information to the storage device. | 12-23-2010 |
20130125249 | Remote Access Control Of Storage Devices - An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storage device. Alternatively, the access control device can comprise information to establish a secure connection to an authorization computing device and the access control device can implement the decisions of the authorization computing device. The access control device can control access by instructing a storage device to execute specific firmware instructions to prevent meaningful responses to data storage related requests. The access control device can also comprise storage-related cryptographic information utilized by the storage device to encrypt and decrypt data. In such a case, the access control device can control access by not releasing the storage-related cryptographic information to the storage device. | 05-16-2013 |
James Robert Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130216234 | DATA CENTER WITH FREE-SPACE OPTICAL COMMUNICATIONS - A data center for executing a data processing application includes processing units, sub-units or servers. Each of the processing units, sub-units or servers can execute a part or all of the data processing application. The processing units, sub-units or servers are electrical disjoint with respect to data communications, but can communicate with each other over free space optical links. | 08-22-2013 |
20140348510 | DATA CENTER WITH FREE-SPACE OPTICAL COMMUNICATIONS - A data center for executing a data processing application includes processing units, sub-units or servers. Each of the processing units, sub-units or servers can execute a part or all of the data processing application. The processing units, sub-units or servers are electrical disjoint with respect to data communications, but can communicate with each other over free space optical links. | 11-27-2014 |
Jason S. Hamilton, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20080317240 | ALPHA CHARACTER SUPPORT AND TRANSLATION IN DIALER - The innovation supports the ability to map alpha characters entered directly into the dialer application of a smartphone. These alpha characters can be entered via a smartphone keyboard (e.g., QWERTY keyboard) and converted to the appropriate digits as mapped to a conventional telephone keypad. The resultant numerical digits can be used to prompt a network call. Additionally, the innovation can be used during an active call to respond to prompts that traditionally require 12-key mappings. This innovation allows a user to both dial a number directly via a smartphone keyboard, and filter contacts by name, in a non-modal manner. | 12-25-2008 |
Jeffrey Wayne Hamilton, Renton, WA US
Patent application number | Description | Published |
---|---|---|
20150101176 | Method and Apparatus for Fitting a Sleeve - Illustrative Embodiments may provide for an apparatus and method for fitting a first tube to a second tube. The apparatus may have a first section and a second section. The first section and the second section may engage each other to form a spreine. Each section may engage a sleeve. The spreine may encircle the sleeve encircling the first tube. The spreine may include a slider that may receive a force that may move the spreine and the sleeve, engaged within the spreine, and fit the first tube to the second tube. Fitting the first tube to the second tube may include engaging the sleeve with a first O-ring that may encircle a first ferrule in the first tube, and the sleeve simultaneously engaging a second O-ring encircling a second ferrule in a second tube. | 04-16-2015 |
Jennifer Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130246417 | MEMORY USAGE DATA COLLECTION AND ANALYSIS FOR DYNAMIC OBJECTS - A script engine for a dynamic language can collect memory allocation information for dynamic objects created by the scripting engine and for dynamic objects created by the script engine host. A native interface can be exposed to a client comprising a software development tool. The software development tool can be a third-party tool. In response to a query, the script engine can take a snapshot of a garbage collector heap and return an object record for each dynamic object in the heap. The object information can include memory allocation information, object type and other information. Multiple snapshots can be taken and the delta between snapshots can be determined and sent to a requestor. | 09-19-2013 |
Jennifer A. Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130132930 | CAPTURING TELEMETRY DATA BY DYNAMIC LANGUAGE ENGINE - At least one embodiment described herein relates to the selective capturing of script code stacks associated with exceptions thrown by script code. For unhandled exceptions, the script engine 1) captures the script code stack in a host-accessible manner in which a host that hosts the script engine may access the captured script code stack, 2) completes unwinding of the script stack, and 3) reports the captured script code stack to a host that hosts the script engine. For at least one of the handled exceptions thrown by the script code for which the script code itself handles the exception, the script code stack is not captured in the host-accessible manner. Also, the call stack property of an error object is populated at throw time, rather than creation time. | 05-23-2013 |
Judd Douglas Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080206128 | Process for recycling industrial waste magnesium oxide/magnesium hydroxide for use in magnesium oxide based cement/concrete and method of preparation - The inventor's discovery of recyclable Industrial Waste Magnesium Oxide/Magnesium Hydroxide materials, which are currently available from numerous magnesium based industrial processes/sources, as well as the identification of various state-of-the-art, contemporary and/or advanced materials dehydration and separation technologies, is intended to advance the cost-effective, eco-friendly, superior quality usefulness of Magnesium Oxide based cement concrete. | 08-28-2008 |
Judd Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080296541 | CHEMICALLY BONDED CERAMIC RADIATION SHIELDING MATERIAL AND METHOD OF PREPARATION - A composition of matter and method of forming a radiation shielding member at ambient temperatures in which the composition of matter includes a ‘cold-fired’ chemically bonded oxide-phosphate ceramic cement matrix; with one or more suitably prepared and distributed radiation shielding materials dispersed in the ‘cold-fired’ chemically bonded oxide-phosphate ceramic cement matrix. | 12-04-2008 |
20130277616 | CHEMICALLY BONDED CERAMIC RADIATION SHIELDING MATERIAL AND METHOD OF PREPARATION - A composition of matter and method of forming a radiation shielding member at ambient temperatures in which the composition of matter includes a ‘cold-fired’ chemically bonded oxide-phosphate ceramic cement matrix; with one or more suitably prepared and distributed radiation shielding materials dispersed in the ‘cold-fired’ chemically bonded oxide-phosphate ceramic cement matrix. | 10-24-2013 |
Justin Hamilton, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20120155717 | IMAGE SEARCH INCLUDING FACIAL IMAGE - A method and apparatus is provided for performing image matching. The method includes comparing a face in a first image to a face in each of a set of stored images to identify one or more face-matching images that include similar facial features to the face in the first image. Next, the first image is compared to each of the face-matching images to identify one or more resulting images that are spatially similar to the first image. Accordingly, the resulting image or images have similar facial features and similar overall or background features to those in the first image. For example, if the query image is of a playground with a child swinging on a swing, the image matching technique can find other images of the same child in a setting that appears similar. | 06-21-2012 |
20130054572 | ACCURATE SEARCH RESULTS WHILE HONORING CONTENT LIMITATIONS - Accurate search results are provided while still honoring content limitations. Content responsive to search, whose presentation is prevented by content limitations is presented in an obscured manner, notifying the user of the existence of the content, while not enabling discerning of details, thereby honoring the content limitations. Attempted user interaction with obscured content acts as an entry point to changing the content limitations, including presenting user notifications of the content limitations and presenting an option to change the content limitations to allow for the unobscured presentation of the obscured content. Graphical content can be obscured by applying graphical modifications to generate new, obscured content that provides only a vague resemblance to the original, including jittering pixels, or other subcomponents, the applying of Gaussian blurs, and pixelization. | 02-28-2013 |
20130173603 | DYNAMIC DEFINITIVE IMAGE SERVICE - A representative image system is described herein that provides a representative image for any given search query. Upon receiving a search for a term (or terms), the system accesses an inverted index to identify images associated with that term. The system then receives a ranked list of images. The ranked list includes image identifiers, and once an item in the list is selected the system can use the associated image identifier to retrieve the image from a thumbnail or other server. If an editor has overridden the default image for the present search query, then the system returns the image identifier for the overridden image, which can be used to access the image from the thumbnail or other server. Thus, the representative image system provides a reliable and universal mechanism for retrieving representative images for any given topic dynamically in real time. | 07-04-2013 |
Justin Hamilton, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090327236 | VISUAL QUERY SUGGESTIONS - Systems, computer-implemented methods, and computer-readable media for presenting video search results for query suggestions are provided. A search query is received from a user. One or more query suggestions related to the search query are determined. One or more video items or images relevant to the one or more query suggestions are accessed. One or more image representations for the one or video items or images relevant to the one or more query suggestions are displayed to the user who input the original search query. | 12-31-2009 |
Justin D. Hamilton, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20120106853 | IMAGE SEARCH - Image search techniques are described. In one or more implementations, images in a search result are ordered based at least in part on similarity of the images, one to another. The search result having the ordered images is provided in response to a search request. | 05-03-2012 |
20120110453 | Display of Image Search Results - Techniques involving display of image search results are described. In one or more implementations, an image search result is displayed having a plurality of images. Responsive to selection of a particular one of the images, a filmstrip is displayed having a contiguous series of representations of at least a portion of the plurality of images, at least one of which is of the particular image, the particular image is displayed as disposed proximal to metadata associated with the image, and at least a portion of a webpage from which the particular image was obtained is displayed. | 05-03-2012 |
Justin David Hamilton, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20120113148 | DYNAMIC IMAGE RESULT STITCHING - Methods and systems for compiling image results into compilation images so that multiple image results may be downloaded via a single browser-download connection are provided. An image search request is received and a plurality of image results that satisfy the image search request are determined. At least a portion of the image results determined to satisfy the search request are dynamically stitched together to create a compilation image. Upon receiving an image download request for a satisfying image result, the compilation image is returned to the user's browser rather than a single thumbnail image. In this way, a plurality of image results is returned via a single browser-download connection and the latency in returning a large number of request-satisfying image results is decreased. | 05-10-2012 |
20120162244 | IMAGE SEARCH COLOR SKETCH FILTERING - Visual features of images are translated into visual words defined by a dictionary. The visual words are indexed and the images are stored in an image store. A sketched imaged, translated into visual words, is utilized to search for similar images in the image store. The visual words are compared to visual words in the index to identify matches associated with stored images. The stored images are displayed and ranked according to the highest number of matches. Textual searches are used to supplement or refine the search results. | 06-28-2012 |
Keith S. Hamilton, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20080307436 | Distributed publish-subscribe event system with routing of published events according to routing tables updated during a subscription process - A publish-subscribe event system for a set of communicating machines, where when a machine receives an event, whether a published event or a subscription event, it publishes locally the received event by an inter-process communication in the machine. In this way, the event is made available to other processes on the machine. For some embodiments, an event is published locally in a machine by placing it in shared memory. During a subscription process, each machine updates its routing table as subscription events are received. When a published event is received by a machine, it is published locally by the inter-process communication in the machine, where the one or more subscribing applications on the machine may have access to it. The received published event is also routed to other connected machines according to the machine's routing table. Other embodiments are described and claimed. | 12-11-2008 |
Kim Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120179752 | SYSTEMS AND METHODS FOR CONSUMER-GENERATED MEDIA REPUTATION MANAGEMENT - A computing system configured to gather social media content includes a memory; a content collection and ingestion system, stored in the memory and configured, when executed on a computer processor, to communicate with one or more computing systems to direct a search of a content source using a received collection request and to ingest the results of the directed search into a data store; and a content management system, stored in the memory and configured, when executed on a computer processor, to display the ingested results on a display. | 07-12-2012 |
Kris P. Hamilton, Bellingham, WA US
Patent application number | Description | Published |
---|---|---|
20080229704 | ARCHITECTURAL MEMBRANE STRUCTURES AND METHODS FOR PRODUCING THEM - An architectural membrane structure preferably includes an aerogel material disposed, for example, between two outer layers. The aerogel can be in monolithic or granular form or can be present in an aerogel composite. A method for manufacturing an architectural membrane structure includes securing an insert, e.g., an aerogel blanket, composite or granular aerogel, between a first and second layer. The architectural membrane structure can be used as a tensioned panel in envelopes such as roofing, overhangs, canopies or in other architectural or structural fabric applications. | 09-25-2008 |
Michael C. Hamilton, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20120251107 | WDM Router - The present invention provides a mixed analog and digital chip-scale reconfigurable WDM network. The network suitably includes a router that enables rapidly configurable wavelength selective routers of fiber optic data. The router suitably incorporates photonic wavelength selective optical add/drop filters and multiplexers. | 10-04-2012 |
Nicole A. Hamilton, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090150409 | SYSTEM AND METHOD FOR AUTOMATICALLY CREATING A MEDIA ARCHIVE FROM CONTENT ON A RECORDING MEDIUM - A media player for creating a media archive may include a media reader to read media content from a recording medium inserted into the media reader. The media player may also include an archival component to store the media content in a storage medium. In one embodiment, the media player includes a playback component to play back the media content from the storage medium concurrently with the storage of the media content by the archival component. | 06-11-2009 |
20120166948 | SYSTEM AND METHOD FOR AUTOMATICALLY CREATING A MEDIA ARCHIVE FROM CONTENT ON A RECORDING MEDIUM - A media player for creating a media archive may include a media reader to read media content from a recording medium inserted into the media reader. The media player may also include an archival component to store the media content in a storage medium. In one embodiment, the media player includes a playback component to play back the media content from the storage medium concurrently with the storage of the media content by the archival component. | 06-28-2012 |
20140105578 | SYSTEM AND METHOD FOR AUTOMATICALLY CREATING A MEDIA ARCHIVE FROM CONTENT ON A RECORDING MEDIUM - A media player may include a media reader to read media content from a recording medium inserted into the media reader. The media player may also include a media analysis component to identify one or more valid portions of the recording medium containing media content and one or more invalid portions of the recording medium without media content. In one embodiment, the media player includes an archival component to store the media content from the one or more valid portions in a storage medium and a playback component to play back the one or more valid portions of the media content from the storage medium concurrently with the identification of the one or more valid portions by the media analysis component and the storage of the media content by the archival component. | 04-17-2014 |
Robert T. Hamilton, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100300329 | FIBER CEMENT BOARD WITH MODIFIED FIBER - A building material product comprising a cementitious binder, an aggregate and cellulose reinforcing fibers wherein the cellulose reinforcing fibers have been treated with cationic or nonionic oil. The resulting fiber when included in a fiber cement composite results in improved deflection of the composite at peak loading as well as improved impact strength while maintaining overall board strength. | 12-02-2010 |
20100300330 | FIBER CEMENT BOARD WITH MODIFIED FIBER - A building material product comprising a cementitious binder, an aggregate and cellulose reinforcing fibers wherein the cellulose reinforcing fibers have been treated with oil which is bound to the fiber by a retention aid. The resulting fiber when included in a fiber cement composite results in improved deflection of the composite at peak loading as well as improved impact strength while maintaining overall board strength. | 12-02-2010 |
20100307702 | Meterable Fiberous Material - A particle or particles of cellulosic wood pulp fibers having a top and bottom face and a hexagonal perimeter, and methods of using it. | 12-09-2010 |
20120199047 | Meterable Fiberous Material - A particle or particles of cellulosic wood pulp fibers having a top and bottom face and a hexagonal perimeter, and methods of using it. | 08-09-2012 |
20120208933 | POLYMERIC COMPOSITES - A composition comprising 65 to 90 weight percent kraft chemical wood pulp fibers and a thermoplastic polymer and a method of making the composition. | 08-16-2012 |
20130206035 | Composite Polymer - A composition comprising 10 to 50 weight % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the composition has a brightness of at least 20 as measured by the Brightness Test. The wood pulp fiber can be bleached chemical wood pulp fiber. The brightness may be at least 30 as measured by the Brightness Test. | 08-15-2013 |
20130206036 | Composite Polymer - A composition comprising 10 to 50 wt % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the average dispersion of the fibers within the thermoplastic polymer composition is equal to or greater than 90% as determined by the Dispersion Test. The pulp can be bleached chemical wood pulp fiber. | 08-15-2013 |
20130206037 | Composite Polymer Molded Product - A molded part comprising 10 to 50 weight % wood pulp fiber, 45 to 85 weight % thermoplastic polymer and having an edge extending between two faces wherein the edge has two tactile defects or less per foot or less of edge length. | 08-15-2013 |
20130210965 | Composite Polymer - A composition comprising 10 to 50 wt % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the dilution level for detection in a bag at 40° C. is equal to or less than 450 as determined by ASTM E679. | 08-15-2013 |
Scott Hamilton, Spokane, WA US
Patent application number | Description | Published |
---|---|---|
20130119769 | Energy Systems And Energy Storage System Charging Methods - Energy systems and energy storage system charging methods are described. In one aspect, an energy storage system charging method includes applying an excitation signal to a stator of an induction machine, outputting electrical energy from the stator of the induction machine during the applying, and charging an energy storage system using the electrical energy outputted from the stator. | 05-16-2013 |
Scott Robert Hamilton, Spokane, WA US
Patent application number | Description | Published |
---|---|---|
20090322084 | Energy Systems, Energy Devices, Energy Utilization Methods, and Energy Transfer Methods - Energy systems, energy devices, energy utilization methods, and energy transfer methods are described. In one arrangement, energy utilization methods include providing first energy from a power grid to an induction generator at a first moment in time; using the induction generator and the first energy from the power grid, charging an energy storage device; using second energy from the energy storage device, powering a motor causing the induction generator to generate third energy during a second moment in time; and providing the third energy to the power grid. Other arrangements are described. | 12-31-2009 |
20100006356 | Electric Vehicle Charging Methods, Battery Charging Methods, Electric Vehicle Charging Systems, Energy Device Control Apparatuses, and Electric Vehicles - Electric vehicle charging methods, battery charging methods, electric vehicle charging systems, energy device control apparatuses, and electric vehicles are described. In one arrangement, an electric vehicle charging method includes receiving information regarding charging of an electric vehicle with energy from an electric power grid, determining an amount of energy stored by an energy storage device coupled to the electric power grid, and controlling a transfer of the energy stored by the energy storage device to the electric power grid using the information regarding the charging of the electric vehicle. Other arrangements are described. | 01-14-2010 |
20120153618 | Energy Systems, Energy Devices, Energy Utilization Methods, and Energy Transfer Methods - Energy systems, energy devices, energy utilization methods, and energy transfer methods are described. In one arrangement, energy utilization methods include providing first energy from a power grid to an induction generator at a first moment in time; using the induction generator and the first energy from the power grid, charging an energy storage device; using second energy from the energy storage device, powering a motor causing the induction generator to generate third energy during a second moment in time; and providing the third energy to the power grid. Other arrangements are described. | 06-21-2012 |