Patent application number | Description | Published |
20120089972 | Image Based Servicing Of A Virtual Machine - An invention is disclosed for preserving state in a virtual machine when patching the virtual machine (VM). In an embodiment, when a deployment manager that manages VMs in a deployment determines to patch a VM, the manager removes the VM from a load balancer for the deployment, attaches a data disk to the VM, stores application data to the data disk, swaps the prevailing OS disk for a patched OS disk, boots a gust OS stored on the patched OS disk, restores the application state from the data disk to the VM, and adds the VM back to the load balancer. | 04-12-2012 |
20130159987 | PROVIDING UPDATE NOTIFICATIONS ON DISTRIBUTED APPLICATION OBJECTS - The present invention extends to methods, systems, and computer program products for providing update notifications on distributed application objects. When a new version of an object is created that another object depends on, a notification can be added to the dependent object to alert a person that manages the dependent object of the creation of the updated object. Dependent objects can include template objects, such as virtual machine template objects that refer to virtual disk objects and service template objects that refer to one or more virtual machine template objects, as well as service instance objects that represent service instances that are instantiated from template objects. Versions of objects within a family can be identified by sharing a family name and having different releases. A timestamp is used to represent when an object is released to determine which version of an object is the newest version in a family. | 06-20-2013 |
Patent application number | Description | Published |
20090198769 | Virtual Application Server With Version Control - A management system for virtual applications may deploy sets of virtual applications to many client devices, dynamically allocate virtual application servers to individual clients, manage updates to the virtual applications, and provide other high level management to deployments of virtual applications. A client device may include a virtual application management client that may communicate with a management server. The management client may add or remove virtual applications to the client device based on a policy received from the management server, and may query the management server to determine a currently available virtual application distribution server when a virtual application is requested. The management server may distribute and manage versions of applications across one or more virtual application distribution servers. | 08-06-2009 |
20090199175 | Dynamic Allocation of Virtual Application Server - A management system for virtual applications may deploy sets of virtual applications to many client devices, dynamically allocate virtual application servers to individual clients, manage updates to the virtual applications, and provide other high level management to deployments of virtual applications. A client device may include a virtual application management client that may communicate with a management server. The management client may add or remove virtual applications to the client device based on a policy received from the management server, and may query the management server to determine a currently available virtual application distribution server when a virtual application is requested. The management server may distribute and manage versions of applications across one or more virtual application distribution servers. | 08-06-2009 |
20090199178 | Virtual Application Management - A management system for virtual applications may deploy sets of virtual applications to many client devices by defining and distributing policies. The polices may define which client devices and/or users may permitted to access a virtual application from a server and how the virtual application may be used. A client device may include a virtual application management client that may communicate with a management server to retrieve and implement the policies. The management client may add or remove virtual applications to the client device based on a policy received from the management server. In some embodiments, policies may also be distributed and implemented on a virtual application server. | 08-06-2009 |
20110209140 | AUTOMATED DEPLOYMENT AND SERVICING OF DISTRIBUTED APPLICATIONS - Deployment and servicing tasks associated with multi-tier, distributed applications, application environments and data centers are automated so that a person does not have to manually perform these tasks. All of the information describing and defining the distributed service is modeled and stored in a re-useable service template that can be used to drive an automated system to programmatically deploy and manage the service over time. Deployment and servicing of a distributed application can be automated using re-useable models that capture hardware and workload definitions. The re-useable models in the form of service templates enable delta-based servicing of the application. The service can be deployed to one or more physical machines, one or more virtual machines or to a combination thereof. A default deployment plan can be customized with instance-specific customizations of service parameters. | 08-25-2011 |
20140109083 | AUTOMATED DEPLOYMENT AND SERVICING OF DISTRIBUTED APPLICATIONS - Deployment and servicing tasks associated with multi-tier, distributed applications, application environments and data centers are automated so that a person does not have to manually perform these tasks. All of the information describing and defining the distributed service is modeled and stored in a re-useable service template that can be used to drive an automated system to programmatically deploy and manage the service over time. Deployment and servicing of a distributed application can be automated using re-useable models that capture hardware and workload definitions. The re-useable models in the form of service templates enable delta-based servicing of the application. The service can be deployed to one or more physical machines, one or more virtual machines or to a combination thereof. A default deployment plan can be customized with instance-specific customizations of service parameters. | 04-17-2014 |
20160026457 | AUTOMATED DEPLOYMENT AND SERVICING OF DISTRIBUTED APPLICATIONS - Deployment and servicing tasks associated with multi-tier, distributed applications, application environments and data centers are automated so that a person does not have to manually perform these tasks. All of the information describing and defining the distributed service is modeled and stored in a re-useable service template that can be used to drive an automated system to programmatically deploy and manage the service over time. Deployment and servicing of a distributed application can be automated using re-useable models that capture hardware and workload definitions. The re-useable models in the form of service templates enable delta-based servicing of the application. The service can be deployed to one or more physical machines, one or more virtual machines or to a combination thereof. A default deployment plan can be customized with instance-specific customizations of service parameters. | 01-28-2016 |
Patent application number | Description | Published |
20080268790 | ANTENNA SYSTEM INCLUDING A POWER MANAGEMENT AND CONTROL SYSTEM - An antenna system may include a reconfigurable array antenna system including a plurality of elements each capable of radiating and receiving electromagnetic energy. The antenna system may also include an electronically reconfigurable power management and control system to selectively power each of the plurality of elements to generate a desired beam pattern. | 10-30-2008 |
20080315075 | METHOD FOR OPTICALLY DETECTING AND IDENTIFYING A THREAT - An optical detection apparatus includes a housing having a circumferential opening therein. A primary mirror reflects light rays to form a first set of light rays to a secondary mirror that has a generally concave shape coupled to the housing. A tertiary mirror having a generally concave shape coupled to the housing spaced apart from the secondary mirror directs light to detection optics that form an image using the third set of light rays. The detection optics include a micro-mirror array that redirect the image to a detector. A controller controls the micro-mirror array and determines an event characteristic based upon the image thereon. | 12-25-2008 |
20130239407 | Bonding Components to Each Other Using Exothermic Reactions by Simultaneous Current Pulses - A method and apparatus for joining a first workpiece and a second workpiece. A layer of exothermic material is placed between the first workpiece and the second workpiece. A plurality of currents is applied to the layer of exothermic material in a plurality of locations and substantially at the same time such that an exothermic reaction occurs in the layer of exothermic material. | 09-19-2013 |
20150222350 | Wirelessly Connecting An Aircraft At An Airport - Disclosed are ways for wirelessly connecting an aircraft at an airport. For example, a method for wirelessly communicating with an aircraft may include determining a proximity of an aircraft of a directional antenna system for wireless communication, determining availability of the directional antenna system for wireless communication with the aircraft, selecting the directional antenna system based on the determined proximity and availability, and providing instructions for the directional antenna system to communicate with the aircraft. | 08-06-2015 |
Patent application number | Description | Published |
20090259618 | SLICING OF RELATIONAL DATABASES - A method and a processing device may be provided for creating a shadow database, having a size being approximately a desired percentage of a size of a relational database. Referential integrity of tables of the relational database may be preserved in the created shadow database. A representation of a connected graph may be created, based on a schema description of the relational database, and may be used to find driving tables and related tables of the relational database. Portions of driving tables of the relational database may be copied to corresponding tables of the shadow database and rows of tables of the relational database, related to the copied portions of the driving tables, may be copied to corresponding tables of the shadow database in a number of iterations until the size of the shadow database is approximately the desired percentage of the size of the relational database. | 10-15-2009 |
20090271170 | FAILURE SIMULATION AND AVAILABILITY REPORT ON SAME - A simulation may be performed to assess availability of a service in the event of various types of failures. A specification may describe a behavior to be induced on a machine, and a formula under which availability is to be measured. A controller processes the specification and dispatches a request to induce the behavior to a machine on which the behavior is to be induced. An agent on that machine may look up a routine in a simulation library and may use the routine to induce the behavior. Data, such as performance counter values, are collected before, during, and/or after occurrence of the behavior, and are transmitted back to the controller. A report generator applies the formula contained in the specification to the data received to calculate the availability metric, and produces a report containing that metric. | 10-29-2009 |
20100318489 | PII IDENTIFICATION LEARNING AND INFERENCE ALGORITHM - Techniques are described herein for determining whether data sets of real information in databases indicate PII information. The data sets are stored in a first table and parsed for keywords related to the names of data items in the sets. The keywords are stored in the second table in a many-to-many relationship with related data items in the first table. The number of times the keywords are parsed from the data items is counted, as well as the number of times each keyword is associated with a PII-designated data item. The counted numbers are then used in analyzing new data sets to identify the likelihood that the new data sets contain any PII data items. | 12-16-2010 |
Patent application number | Description | Published |
20100248688 | Notifications - Notification techniques are described. In an implementation, an unlock screen is displayed by a mobile communications device that indicates that one or more keys of the mobile communications device are locked. If an input is detected at the mobile communications device to remove the lock, an animation is displayed that gives an appearance that the unlock screen is a page that is being turned and removing the lock of the one or more keys. | 09-30-2010 |
20100248689 | Unlock Screen - Unlock screen and notification techniques are described. In an implementation, an unlock screen is displayed by a mobile communications device that indicates that one or more keys of the mobile communications device are locked. If an input is detected at the mobile communications device to remove the lock, an animation is displayed that gives an appearance that the unlock screen is a page that is being turned and removing the lock of the one or more keys. | 09-30-2010 |
20120244841 | Notifications - Notification techniques are described. In an implementation, an unlock screen is displayed by a mobile communications device that indicates that one or more keys of the mobile communications device are locked. If an input is detected at the mobile communications device to remove the lock, an animation is displayed that gives an appearance that the unlock screen is a page that is being turned and removing the lock of the one or more keys. | 09-27-2012 |
20130102366 | Unlock Screen - Unlock screen and notification techniques are described. In an implementation, an unlock screen is displayed by a mobile communications device that indicates that the mobile communications device is locked. If an input is detected to remove the lock by dragging across a Y-axis of the display device, an animation is displayed that gives an appearance that the unlock screen is being removed and the lock on the mobile communications device is removed. | 04-25-2013 |
Patent application number | Description | Published |
20120284111 | MULTI-METRIC TRENDING STORYBOARD - A graphical user interface for displaying internet advertising metrics and comparisons of internet advertising metrics is provided. The graphical user interface comprises a trending display area that displays a plurality of trending graphs in the same viewable area. Each trending graph displays a different internet advertising metric and is configured to display a plurality of internet advertising trending comparisons. As well, a detail display area displays a detail view of at least one of the trending graphs. The detail view is in the same viewable area as the plurality of trending graphs. | 11-08-2012 |
20140040009 | PROVIDING AND FILTERING KEYWORD STACKS - Computer-readable media, computer systems, and computing devices for providing and filtering keyword stacks are provided. In embodiments, the method includes receiving an indication to display a set of keyword stacks. Each of the keyword stacks is associated with a different internet advertising metric. Keyword data associated with each of the internet advertising metrics is referenced. Thereafter, the keyword data associated with each of the internet advertising metrics is utilized to generate each of the keyword stacks. In some cases, each of the keyword stacks includes a set of horizontal bars vertically stacked with each horizontal bar representing a number of keywords falling within a particular metric measurement, or range thereof, corresponding with a vertical axis. | 02-06-2014 |
20150310092 | ATTRIBUTE HISTOGRAMS FOR PROVIDING DATA ACCESS - Systems, methods, and computer-readable storage media are provided for providing a view into a mass of data when the number of items that make up the mass is very large. A request for display of information about a subset of data items contained within the corpus that have a specified characteristic is received. A quantity of data items comprising the subset is determined. It also is determined whether the quantity exceeds a threshold. If the quantity does not exceed the threshold, the requested information is presented. If, however, the quantity of data items comprising the subset exceeds the threshold, a view of the data items comprising the subset is provided that includes at least one distribution graph (e.g., histogram) generated in view of a certain measure, each distribution graph showing a visual representation of the data items comprising the subset organized by a particular attribute. | 10-29-2015 |
Patent application number | Description | Published |
20090299021 | DIELS-ALDER CROSSLINKABLE DENDRITIC NONLINEAR OPTIC CHROMOPHORES AND POLYMER COMPOSITES - Diels-Alder crosslinkable dendritic nonlinear optical chromophore compounds, films and crosslinked polymer composites formed from the chromophore compounds, methods for making and using the chromophore compounds, films, and crosslinked polymer composites, and electro-optic devices that include films and crosslinked polymer composites formed from the chromophore compounds. | 12-03-2009 |
20100029953 | PHENYLTETRAENE-BASED NONLINEAR OPTICAL CHROMOPHORES - Alkoxy-substituted phenyltetraene nonlinear optically active compounds, films and devices that include the compounds, and methods for making and using the compounds, films, and devices. | 02-04-2010 |
20120252995 | DIELS-ALDER CROSSLINKABLE DENDRITIC NONLINEAR OPTIC CHROMOPHORES AND POLYMER COMPOSITES - Diels-Alder crosslinkable dendritic nonlinear optical chromophore compounds, films and crosslinked polymer composites formed from the chromophore compounds, methods for making and using the chromophore compounds, films, and crosslinked polymer composites, and electro-optic devices that include films and crosslinked polymer composites formed from the chromophore compounds. | 10-04-2012 |
20140328369 | DETECTION OF THERMAL DAMAGE OF COMPOSITES USING MOLECULAR PROBES - Improved methods of detecting thermal exposure are provided herein. The provided methods utilize initially dormant luminescent probes incorporated into a matrix to form a composite. When exposed to heat over a period of time, the luminescent probes are “activated” through a molecular transformation initiated by thermal energy. The activated probes exhibit a luminescent profile based on the extent of thermal exposure, thereby providing an indicator of the thermal exposure experienced by the matrix. When the composite is used to produce a structural component of a vehicle (e.g., an aircraft), the methods provide a convenient, large-area indicator of thermal damage experienced by the structural component. | 11-06-2014 |