Patent application number | Description | Published |
20110100485 | CENTRAL VACUUM INLET VALVE ASSEMBLY - A subassembly for use in a vacuum inlet valve assembly for a central vacuum system, the subassembly having a valve body with a wiring compartment and at least one press connection detent means and a reversible mounting flange for connecting to the valve body. The mounting flange includes an attachment portion, a mounting flange wall sized and shaped to cover an open side of wiring compartment and press catch connection elements sized and shaped to interact with the detent to secure the mounting flange to the valve body. Also disclosed is a vacuum inlet valve assembly comprising the above subassembly in combination with a cover plate having a rectangular door, a hinge located on a long side of the rectangular door, and a face plate with a vacuum connection opening. In an alternate embodiment the valve body includes a perimeter wall, attachment openings internal but adjacent to said perimeter wall and a snap fit cover to close an open wall of a wiring compartment. | 05-05-2011 |
20130221545 | DIFFUSER BAFFLE FOR GREASE INTERCEPTOR - A diffuser baffle for use in an in-line wastewater grease interceptor. The diffuser baffle lies within a grease collecting chamber between the inflow and outflow of a grease interceptor. The diffuser baffle has an open bottom which is sized and shaped respectively to fit into the grease collecting chamber. The diffuser baffle has an end operatively connected to the inflow opening to permit wastewater to flow into the body through the open bottom. The baffle has a downstream end which includes a deflector portion to deflect a wastewater stream in a direction generally into the grease collecting chamber. The body also includes a number of apertures to permit the deflected wastewater stream to pass through the baffle and into the grease collecting chamber, where FOG will separate before waste water exits the chamber through the outlet baffle. | 08-29-2013 |
20130313180 | SOLIDS CONTAINMENT DEVICE FOR USE WITHIN OR IN ASSOCIATION WITH HYDROMECHANICAL GREASE INTERCEPTOR - A solids containment device for use in n hydromechanical grease interceptor, sized and shaped to be removably carried within the hydromechanical grease interceptor. The solids containment device includes a containment body with side and end walls, an open top, a wastewater inflow opening and an outflow opening. At least one removable solids separating screen is carried within the containment body, and is located between the inflow opening and the outflow opening. The outflow opening is directed away from the outflow aperture of the hydromechanical grease interceptor, in order to encourage a generally diagonal flow path for the wastewater stream within the hydromechanical grease interceptor, thereby encouraging separation of fats, oils and grease. | 11-28-2013 |
20140166595 | REPLACEABLE GREASE TRAP SYSTEM FOR A WASTEWATER SYSTEM AND METHOD OF USING THE SAME - The present invention relates to a grease trap system for wastewater systems, having an inlet pipe with a shut off valve, an outlet pipe with a shut off valve and a grease interceptor comprising a replaceable container body including means to trap fats, oils and grease within the body. The body has inlet and outlet slide couplers in opposed walls, and each coupler has an associated connecting means to sealingly fluidly connect the slide couplers to the inlet and outlet pipes. When the container body is disconnected from the pipes the slide couplers may also be sealed by a removable plug for transport. The slide couplers displace inwardly and outwardly relative to the container to give clearance between the pipes to remove the container. A method of replacing full containers with empty containers is also comprehended. | 06-19-2014 |
20150089736 | BATHTUB DRAIN AND OVERFLOW KIT - A bathtub drain and overflow fitting kit is provided having a drain fitting, an overflow fitting and/or an adapter fitting, for connecting the bathtub drain and overflow openings to the household waste plumbing. The overflow fitting has a ball and socket connection between its inlet and outlet. Preferably, the overflow fitting has an abutment member which limits the range of angles created by the joint socket and joint ball within a range of angles to about 10°. The kit includes a gasket having a first sealing portion, a second sealing portion, and a tapered sealing portion between the first and second sealing portions, and is configured so that the same gasket may be used at the drain opening or the overflow opening. The drain and overflow fittings have at their inlets retaining features that interengage matching retaining features on the gasket to hold during installation. | 04-02-2015 |
20150152629 | INLET BAFFLE ASSEMBLY FOR AN IN-LINE INTERCEPTOR - There is an inlet baffle assembly for use in an in-line interceptor for separating FOG from wastewater and a method of cleaning the inlet baffle assembly without the need for removal from the interceptor. The inlet baffle assembly has an inlet baffle for the grease collecting chamber of an in-line interceptor which defines a flow channel through which influent enters the collecting chambers and has a moveable section moveable between open and closed positions. The inlet baffle assembly also has a flow control element to control the rate of flow of influent entering the flow channel when the moveable section is in the closed position. The flow control element is accessible for cleaning when the moveable section is in the open position. After cleaning, the moveable section is moved into the closed position to facilitate fluid flowing through the inlet baffle assembly into the grease collecting chamber. | 06-04-2015 |
20160101374 | OUTLET WELL COVER FOR AN IN-LINE GREASE INTERCEPTOR - An outlet well cover for use in an in-line grease interceptor is disclosed. The outlet well cover is fitted onto a hollow well extending upwardly from the bottom of the grease interceptor tank, and having an open top. The outlet well cover has at least one, and preferably two arms that extend outwards and define water passageways from the ends of the arms to the middle of the well. Water inflow openings at the ends of the arms allow clarified water to flow into the covered hollow well. The water inflow openings face generally downward to limit the amount of floating FOG material that can be drawn in through the openings. The well cover may also include a central bore adapted to receive a standard sized pipe. The pipe can be connected to an outlet from the tank. | 04-14-2016 |
Patent application number | Description | Published |
20090049800 | Heat sealing jaw, apparatus and method - A heat sealing jaw for use in cooperation with an opposing backing jaw for sealing layers of film together is described. The heat sealing jaw may be suitable for forming an easy-open feature on a packaging pouch used to contain flowable material. In certain embodiments the heat sealing jaw comprises a jaw body, a heat sealing element secured to the jaw body, a support surface for clamping the layers of film together against the opposing backing jaw, and, a heat sink coupled to the heat sealing element for inducing a temperature gradient along a sealing face of the heat sealing element. The sealing face may have a protrusion for forming a notch within the layers of film. Related apparatuses and methods are also described. | 02-26-2009 |
20120216960 | Heat Sealing Jaw, Apparatus and Method - This invention relates to a heat sealing element for use in a heat sealing jaw in cooperation with an opposing backing jaw for sealing layers of film together to form a sealed portion and a notch within the sealed portion, the heat sealing element comprising: a sealing face for pressing the layers of film together against the opposing backing jaw and forming the sealed portion, the sealing face having a protrusion for forming the notch within the sealed portion; and a clamping portion adjacent to the sealing face, the clamping portion being disposed at an orientation diverging from a plane along which the layers of film are sealed together. | 08-30-2012 |
20120220439 | Heat Sealing Jaw, Apparatus and Method - This invention relates to a method for sealing film layers to form a sealed portion and a notch within the sealed portion, comprising: providing film layers between sealing jaws comprising a heat sealing element, with a sealing face having a length and a protrusion extending partly along the length of its sealing face; inducing a temperature gradient along the of sealing face length, wherein the temperature proximate to the protrusion is higher than at a distance from the protrusion; closing the jaws and simultaneously clamping the film at a location adjacent to the sealing face; holding the jaws closed for a period of time; and opening the jaws to release the layers of film. | 08-30-2012 |
Patent application number | Description | Published |
20080270609 | COMPUTER-READABLE MEDIUM TO MULTIPLEX MULTIPLE APPLICATION SERVER REQUESTS OVER A SINGLE DATABASE CONNECTION - In a system for avoiding section collision for application server requests over a single database connection, the database server assigns query identifiers to each instance of the same cursor opened for the same processing level within an application, allowing multiple instances of the same cursor to be processed in parallel without section collision. The application server assigns a command source identifier to each statement sent over a single database connection to uniquely identify the application source of the statement. This applies for multiples of the same statement sent by different application sources within the same application, for a single statement containing multiple application sources, and for multiple statements from different applications multiplexed over a single database connection. These statements can be processed separately from and in parallel with the each other without section collision. | 10-30-2008 |
20080271114 | SYSTEM FOR PROVIDING AND UTILIZING A NETWORK TRUSTED CONTEXT - A system for establishing a connection between a data server and a middleware server is disclosed. The system includes defining a plurality of trust attributes corresponding to a trusted context between the middleware server and the data server and validating the plurality of trust attributes against a plurality of attributes corresponding to the middleware server. The plurality of attributes provided in a connection request. The system also includes establishing the trusted context based on the validating the plurality of trust attributes. | 10-30-2008 |
20110161742 | Efficient Monitoring in a Software System - A monitoring of a server system during an execution of a server system processing logic, includes: during collection and storage of operational metrics by a given thread in a thread-local memory, determining that a checkpoint within the server system processing logic is reached; determining whether a threshold number of checkpoints have been encountered by the given thread; in response to the threshold number of checkpoints having been encountered, determining whether a threshold time interval since a last rollup of the collected operational metrics has been exceeded; and in response to the threshold time interval being exceeded, performing a rollup of the collected operational metrics from the thread-local memory to an accumulation point in a shared memory, where the accumulation point stores aggregated operational metrics from a plurality of threads. | 06-30-2011 |
20130166741 | EFFICIENT MONITORING IN A SOFTWARE SYSTEM - A monitoring of a server system during an execution of a server system processing logic, includes: during collection and storage of operational metrics by a given thread in a thread-local memory, determining that a checkpoint within the server system processing logic is reached; determining whether a threshold number of checkpoints have been encountered by the given thread; in response to the threshold number of checkpoints having been encountered, determining whether a threshold time interval since a last rollup of the collected operational metrics has been exceeded; and in response to the threshold time interval being exceeded, performing a rollup of the collected operational metrics from the thread-local memory to an accumulation point in a shared memory, where the accumulation point stores aggregated operational metrics from a plurality of threads. | 06-27-2013 |
20140181828 | PROCESSOR PROVISIONING BY A MIDDLEWARE PROCESSING SYSTEM - A middleware processor provisioning process provisions a plurality of processors in a multi-processor environment. The processors themselves may be subdivided in to one or more partitions or processing instances for which a single processing queue is created and a single kernel thread is started. User processing requests are portioned and dispatched across the plurality of processing queues and are serviced by the corresponding kernel process, thereby efficiently using available processing resources while servicing the user processing requests in a desired manner. | 06-26-2014 |
20140201751 | PROCESSOR PROVISIONING BY A MIDDLEWARE PROCESSING SYSTEM - A middleware processor provisioning process provisions a plurality of processors in a multi-processor environment. The processors themselves may be subdivided in to one or more partitions or processing instances for which a single processing queue is created and a single kernel thread is started. User processing requests are portioned and dispatched across the plurality of processing queues and are serviced by the corresponding kernel process, thereby efficiently using available processing resources while servicing the user processing requests in a desired manner. | 07-17-2014 |
20140201757 | PROCESSOR PROVISIONING BY A MIDDLEWARE PROCESSING SYSTEM FOR A PLURALITY OF LOGICAL PROCESSOR PARTITIONS - A middleware processor provisioning process provisions a plurality of processors in a multi-processor environment. The processing capability of the multiprocessor environment is subdivided and multiple instances of service applications start protected processes to service a plurality of user processing requests, where the number of protected processes may exceed the number of processors. A single processing queue is created for each processor. User processing requests are portioned and dispatched across the plurality of processing queues and are serviced by protected processes from corresponding service applications, thereby efficiently using available processing resources while servicing the user processing requests in a desired manner. | 07-17-2014 |
Patent application number | Description | Published |
20080275880 | ACCESS CONTROL FOR ELEMENTS IN A DATABASE OBJECT - A system for controlling access to elements in a database object are provided. The system provides for receiving a request from a user to access the database object, determining whether an access restriction is imposed on the database object, and controlling access to the elements in the database object by the user based on the access restriction. The access restriction specifies one or more users to which the access restriction is applicable, defines a dynamic condition the one or more users must satisfy in order to access the database object, and identifies one or more of the elements in the database object accessible to the one or more users when the dynamic condition is satisfied. | 11-06-2008 |
20090182747 | METHOD AND SYSTEM FOR USING FINE-GRAINED ACCESS CONTROL (FGAC) TO CONTROL ACCESS TO DATA IN A DATABASE - A method and system for controlling access to data stored in a table of a database are provided. The method includes marking the table of the database as being protected with fine-grained access control (FGAC), creating a system authorization class for the table of the database, the system authorization class having a default row authorization that prevents access to all rows in the table, the system authorization class being unmodifiable, creating a user authorization class for the table of the database, the user authorization class having a default row authorization that prevents access to all rows in the table, the user authorization class being modifiable, and associating the system authorization class and the user authorization class with the table of the database. | 07-16-2009 |
20100211555 | EFFICIENT INTEGRATION BETWEEN AN EXTERNAL WORKLOAD MANAGER AND AN RDBMS - According to one embodiment of the present invention, a system, method and computer program product is provided for integrating an external workload manager with a database system. The method according to one embodiment includes a method comprises: receiving a request in a database component, the request including a cross component token; starting a new unit of work in workload management software in the database component, in response to the request; determining, from a cross component workload management unit, a transaction class and a synchronization code using the database component; finding an internal workload in the workload management software that matches the transaction class and the synchronization code of the cross component workload management unit; and using the matching internal workload for the new unit of work. | 08-19-2010 |
20110072031 | Method for modifying a query by use of an external system for managing assignment of user and data classifications - Disclosed is a data processing-implemented method, a data processing system, and an article of manufacture for modifying a query during compilation of the query. The query includes a request for an element of data from a table in a database and parameters identifying the requested element. The data processing-implemented method includes determining available information from parameters for locating a classification of the requested element and a classification associated with the query, the requested data classification controlling access to the requested element according to the query associated classification, requesting a suggested action from an external system for obtaining a comparison of the requested data classification and the query associated classification based on the available information, receiving the suggested action from the external system responsive to the sent request, and incorporating the suggested action into the query, the suggested action effecting comparison of the requested data classification with the query associated classification. | 03-24-2011 |
Patent application number | Description | Published |
20150200941 | Providing context-based visibility of cloud resources in a multi-tenant environment - A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context. | 07-16-2015 |
20150200958 | Providing context-based visibility of cloud resources in a multi-tenant environment - A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context. | 07-16-2015 |