Rogers, WA
Alison Rogers, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090182321 | Coaptive tissue fusion method and apparatus with energy derivative precursive energy termination control - Biological tissue is sealed or fused to occlude an opening by compressing apposite sidewall portions of the tissue and applying sufficient energy to cause the fibers of the compressed apposed sidewall portions to intertwine and fuse with one another to form a permanent seal. The energy application is controlled by detecting a precursor fusion condition while applying the energy and before sufficient energy has been applied to achieve a permanent seal. The application of energy is terminated in a time-delayed relationship to the detection of the precursor fusion condition. The precursor fusion condition is detected from derivative values of the total accumulated amount of high-frequency energy conducted through the tissue. | 07-16-2009 |
Andrew Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20090328180 | Granting Least Privilege Access For Computing Processes - Embodiments provide a security infrastructure that may be configured to run on top of an existing operating system to control what resources can be accessed by an applications and what APIs an application can call. Security decisions are made by taking into account both the current thread's identity and the current thread's call chain context to enable minimal privilege by default. The current thread context is captured and a copy of it is created to be used to perform security checks asynchronously. Every thread in the system has an associated identity. To obtain access to a particular resource, all the callers on the current thread are analyzed to make sure that each caller and thread has access to that resource. Only when each caller and thread has access to that resource is the caller given access to that resource. | 12-31-2009 |
20100049776 | FAT DIRECTORY STRUCTURE FOR USE IN TRANSACTION SAFE FILE - Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second. | 02-25-2010 |
20100217788 | STORAGE SYSTEM FORMAT FOR TRANSACTION SAFE FILE SYSTEM - A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode. | 08-26-2010 |
20110302142 | STORAGE SYSTEM FORMAT FOR TRANSACTION SAFE FILE SYSTEM - A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode. | 12-08-2011 |
20120011179 | FAT DIRECTORY STRUCTURE FOR USE IN TRANSACTION SAFE FILE SYSTEM - Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second. | 01-12-2012 |
20130318136 | FAT DIRECTORY STRUCTURE FOR USE IN TRANSACTION SAFE FILE SYSTEM - Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second. | 11-28-2013 |
Andrew Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090249436 | Centralized Enforcement of Name-Based Computer System Security Rules - This disclosure describes techniques of using a centralized rule database to control the abilities of software processes to perform actions with regard to resources provided by a computer. As described herein, each software process executing in a computer executes within a chamber and each resource provided by the computer is associated with a canonical name that uniquely identifies the resource. Furthermore, the computer stores a set of security rules in a centralized rule database. In addition, this disclosure describes techniques of enforcing the rules stored in the centralized rule database. | 10-01-2009 |
20130013856 | FLASH MANAGEMENT TECHNIQUES - Various flash management techniques may be described. An apparatus may comprise a processor, a flash memory coupled to the processor, and a flash management module. The flash management module may be executed by the processor to receive a write request to write data to the flash memory, write a first control sector with a sequence number to the flash memory, and write the sequence number, an address for a logical sector, and data to at least one physical sector corresponding to the logical sector of the flash memory. Other embodiments are described and claimed. | 01-10-2013 |
Andrew D. Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20110047549 | Manipulating a spin bit within the wait primitive - A method of avoiding unnecessary context switching in a multithreaded environment. A thread of execution of a process waiting on a lock protecting access to a shared resource may wait for the lock to be released by executing in a loop, or “spin”. The waiting thread may continuously check, in a user mode of an operating system, an indicator of whether the lock has been released. After a certain time period, the thread may stop spinning and enter a kernel mode of the operating system. Subsequently, before going to sleep which entails costly context switching, the thread may perform an additional check of the indicator to determine whether the lock has been released. If this is the case, the thread returns to user mode and the unnecessary context switching is avoided. | 02-24-2011 |
20120221843 | MULTI-PHASE RESUME FROM HIBERNATE - Resume of a computing device from hibernation may be performed in multiple phases. Each phase may partially restore a state of the computing device to an operational state and may establish an environment in which another phase of the resume is performed. The hibernation information may be partitioned to store separately data to be used at each resume phase. The information may be stored in a compressed form. In a first phase, a boot-level resume loader may restore a portion of the operating system based on a portion of the hibernation information. The restored portion may be used in a second phase to retrieve hibernation information from another portion through the operating system (OS). Multiple processors supported by the OS may read and decompress the hibernation information that is then moved back to operational memory. The operating system may support asynchronous disk input/output or other functions that accelerate the resume process. | 08-30-2012 |
20120221875 | MULTI-PHASE RESUME FROM HIBERNATE - Resume of a computing device from hibernation may be performed in multiple phases. Each phase may partially restore a state of the computing device to an operational state and may establish an environment in which another phase of the resume is performed. The hibernation information may be partitioned to store separately data to be used at each resume phase. The information may be stored in a compressed form. In a first phase, a boot-level resume loader may restore a portion of the operating system based on a portion of the hibernation information. The restored portion may be used in a second phase to retrieve hibernation information from another portion through the operating system (OS). Multiple processors supported by the OS may read and decompress the hibernation information that is then moved back to operational memory. The operating system may support asynchronous disk input/output or other functions that accelerate the resume process. | 08-30-2012 |
20130318537 | PREVENTING UNNECESSARY CONTEXT SWITCHING BY EMPLOYING AN INDICATOR ASSOCIATED WITH A LOCK ON A RESOURCE - A method of avoiding unnecessary context switching in a multithreaded environment. A thread of execution of a process waiting on a lock protecting access to a shared resource may wait for the lock to be released by executing in a loop, or “spin”. The waiting thread may continuously check, in a user mode of an operating system, an indicator of whether the lock has been released. After a certain time period, the thread may stop spinning and enter a kernel mode of the operating system. Subsequently, before going to sleep which entails costly context switching, the thread may perform an additional check of the indicator to determine whether the lock has been released. If this is the case, the thread returns to user mode and the unnecessary context switching is avoided. | 11-28-2013 |
20140164751 | MULTI-PHASE RESUME FROM HIBERNATE - Resume of a computing device from hibernation may be performed in multiple phases. Each phase may partially restore a state of the computing device to an operational state and may establish an environment in which another phase of the resume is performed. The hibernation information may be partitioned to store separately data to be used at each resume phase. The information may be stored in a compressed form. In a first phase, a boot-level resume loader may restore a portion of the operating system based on a portion of the hibernation information. The restored portion may be used in a second phase to retrieve hibernation information from another portion through the operating system (OS). Multiple processors supported by the OS may read and decompress the hibernation information that is then moved back to operational memory. The operating system may support asynchronous disk input/output or other functions that accelerate the resume process. | 06-12-2014 |
Andrew David Rogers, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140052620 | WIRELESS READER AND PAYMENT TRANSACTION TERMINAL FUNCTIONALITY WITHIN A PORTABLE DEVICE - A user accesses an application on a reader mode device, activating a reader communication mode and disabling conflicting communication modes. The reader mode device activates a radio frequency field and creates a secure communication channel with a payment device. A secure element application on the reader mode device requests and receives payment information from a payment device. The secure element application on the reader mode device decrypts the payment information and requests account verification from the user. The secure element application on the reader mode device receives input from the user and verifies the payment information. In response to verifying the account information, the secure element application on the reader mode device encrypts the payment information and transmits it to a payment processing system. The payment processing system processes the payment transaction and transmits a notice of approved or declined transaction to the reader mode device. | 02-20-2014 |
20140052637 | PORTABLE DEVICE WIRELESS READER AND PAYMENT TRANSACTION TERMINAL SECURE MEMORY FUNCTIONALITY - A user accesses an application on a reader mode device, activating a reader communication mode and disabling conflicting communication modes. The reader mode device activates a radio frequency field and creates a secure communication channel with a payment device. A secure element application on the reader mode device requests and receives payment information from a payment device. The secure element application on the reader mode device decrypts the payment information and requests account verification from the user. The secure element application on the reader mode device receives input from the user and verifies the payment information. In response to verifying the account information, the secure element application on the reader mode device encrypts the payment information and transmits it to a payment processing system. The payment processing system processes the payment transaction and transmits a notice of approved or declined transaction to the reader mode device. | 02-20-2014 |
Andrew M. Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20080320252 | OPTIMIZED AND ROBUST IN-PLACE DATA TRANSFORMATION - In-place data transformations are performed on file data by moving data blocks from a source file into a temporary file and then from the temporary file into a destination file each time in a back to front fashion enabling truncation of the source file while the temporary file is being expanded and written into. Similar read, write, and truncate operations are performed between the temporary and destination files as well resulting in optimized use of available disk and/or memory space. An initial log file with information such as source file name, size, transformation type and direction is generated for recovery from a mid-transaction interruption. Based on a state (truncation, data content) of the temporary and source files, a status of data transfer prior to interruption is determined and remaining data transferred. | 12-25-2008 |
20090089610 | RAPID CRASH RECOVERY FOR FLASH STORAGE - Recovery is expedited for crashes involving flash memory. Rather than requiring an entire flash memory to be read to reconstruct lost information, only a subset of the memory need be read thereby reducing system down, among other thing. In particular, state information such as a logical to physical mapping is captured via a checkpoint operation periodically. Moreover, a deterministic usage pattern is employed to facilitate recovery of actions performed after a checkpoint. | 04-02-2009 |
20090260052 | Inter-Process Message Security - An inter-process messaging security management may be provided. A message comprising an operation to be performed may be sent from a process operating in a process chamber to a second process operating in another chamber. Before the message is allowed to be delivered, the validity of the operation contained in the message may be verified and a security policy may be examined to determine whether the message is permitted to be sent from the first process to the second process. If the security policy permits the second process to execute the operation requested by the first process, the message may be delivered to the second process. If the operation is not permitted, the message may not be delivered and an error message may be returned to the first process. | 10-15-2009 |
20090287874 | Flash Recovery Employing Transaction Log - A transaction log for flash recovery includes a chained sequence of blocks specifying the operations that have been performed, such as a write to a sector or an erase to a block. Checkpoints are performed writing the entire flash state to flash. Once a checkpoint is performed, all of the log entries prior to the checkpoint are deleted and the log processing on recovery begins with the latest checkpoint. If the system is able to safely shutdown, then a checkpoint may be performed before the driver unloads, and on initialization, the entire persisted flash state may be loaded into the flash memory with a minimal amount of flash scanning. If a power failure occurs during system operation, then on the next boot-up, only the sectors or blocks specified in the log entries after the latest checkpoint have to be scanned, rather than all the sectors on the part. | 11-19-2009 |
20090320089 | POLICY-BASED USER BROKERED AUTHORIZATION - A User Brokered Authorization (UBA) mechanism for policy decisions in a computing device is provided. The authorization mechanism interacts with an authorization layer of the computing device's operating system and enables a determination of whether an authorization decision can be made programmatically or by end user decision based on generalized device policy. | 12-24-2009 |
20120144092 | EFFICIENT CACHE MANAGEMENT - A method of managing memory of a computing device includes providing a first memory that can be allocated as cache memory or that can be used by a computing device component. A first memory segment can be allocated as cache memory in response to a cache miss. Cache size can be dynamically increased by allocating additional first memory segments as cache memory in response to subsequent cache misses. Cache memory size can be dynamically decreased by reallocating first memory cache segments for use by computing device components. The cache memory can be a cache for a second memory accessible to the computing device. The computing device can be a mobile device. The first memory can be an embedded memory and the second memory can comprise embedded, removable or external memory, or any combination thereof. The maximum size of the cache memory scales with the size of the first memory. | 06-07-2012 |
Andrew Michael Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20100070544 | VIRTUAL BLOCK-LEVEL STORAGE OVER A FILE SYSTEM - Embodiments of the invention create a virtualized storage device on a file system. Block-level storage units or clusters corresponding to the file system are defined for a storage volume associated with a computing device. Responsive to receipt of a block-level command (e.g., received via a universal serial bus), the computing device identifies a file system operation corresponding to the block-level command. The computing device performs the file system operation for the storage volume. Embodiments of the invention enable a mobile computing device to present the storage volume as a virtualized storage device to a host computing device for access while retaining control over the file system. | 03-18-2010 |
20100146231 | AUTHENTICATING A BACKUP IMAGE WITH BIFURCATED STORAGE - Authenticating a backup image stored on a storage device prior to restoring the backup image. A value such as a hash value is generated based on the image to be preserved. The value is stored on the storage device in a first area accessible for writing only when the computing device is in an update mode. The first area becomes read-only when the computing device is in an operating system mode. The image is stored on the storage device in a second area accessible for writing when the computing device is in the update mode or the operating system mode. When attempting to restore the image from the second area, the value from the first area is compared to another value generated at the time of the restoration for validation. | 06-10-2010 |
Andrew Michael Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100115006 | COMPUTING DEVICE WITH RELATIVELY LIMITED STORAGE SPACE AND OPERATING/FILE SYSTEM THEREOF - A computing device includes a storage device and a file system for storing and retrieving files on the storage device. The storage device includes storage space divided into sectors and the file system externally addresses the storage device on a per-sector basis, but internally divides each sector of the storage device into chunks and manages data within each sector on a per-chunk basis. Thus, the file system reads a chunk from or writes a chunk to the storage device by reading or writing the sector having the chunk. | 05-06-2010 |
Brian Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130219380 | Time Shift Configuration Management for Software Product Installation - Systems, methods and computer program products for providing software product configuration management through a time shift responsive to software product installation content, user inputs, and software product applicability rules are disclosed. A configuration engines may be loaded on a computing device, which access installation product content related to the software product via one or more data stores. The configuration engine detects the initial configuration state of the software product and accepts a user input identifying a desired final configuration state of the software product. The configuration engine applies at least one applicability rule to determine whether the installation product content needs to be acquired from the data store to achieve the desired final configuration state. The configuration engine modifies the software product from the initial configuration state to the desired final configuration state in a succinct and efficient manner without causing inoperability of the software product. | 08-22-2013 |
Chad Rogers, Tacoma, WA US
Patent application number | Description | Published |
---|---|---|
20120178599 | PROPRIOCEPTION BALANCE AND COORDINATION ENHANCEMENT SYSTEM - A system for enhancing proprioception, balance, and coordination includes a frame, at least one foot pad having an integrated central rail for mating with the frame, where the integrated track allows for the connection of a plurality of different interchangeable attachments which connect with the frame on a mating track. The plurality of different interchangeable attachments includes a plurality of fulcrums having different shapes acting to alter the level of difficulty to increase a patient's mobility and balance. | 07-12-2012 |
Corey E. Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20150290540 | POSITIONING A CAMERA VIDEO OVERLAY ON GAMEPLAY VIDEO - A gaming console composites a camera video overlay on gameplay video for broadcasting such that the gameplay area that is rendered by the gaming console is not obscured, even when the camera video overlay is composited on the gameplay video for broadcasting. The gaming console or a companion device of the gaming console can also allow a user to specify placement of the camera video overlay on the gameplay video for broadcasting, permitting the user to choose the portion of the gameplay video for broadcasting that is obscured by the camera video overlay. | 10-15-2015 |
Ekaterina Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20150095145 | ADVERTISEMENT EFFECTIVENESS MEASUREMENT - A dashboard to integrate gadgets and present data output from the gadgets in an integrated user interface. The gadgets dynamically collect information about an advertisement or an ad campaign associated with the advertisement as the information is collected from various sources during the ad campaign, each of some of the gadgets processing collected information and outputting the processed information in real time. | 04-02-2015 |
20150235261 | ADVERTISEMENT EFFECTIVENESS MEASUREMENT - A dashboard to integrate gadgets and present data output from the gadgets in an integrated user interface. The gadgets dynamically collect information about an advertisement or an ad campaign associated with the advertisement as the information is collected from various sources during the ad campaign, each of some of the gadgets processing collected information and outputting the processed information in real time. | 08-20-2015 |
Eldon Rogers, Auburn, WA US
Patent application number | Description | Published |
---|---|---|
20100051794 | INFRARED SENSOR CALIBRATION SYSTEM AND METHOD - A calibration system for an infrared imaging system includes an infrared sensor having a sensor model for imaging a target having a target spectral signature. The infrared imaging system includes an atmospheric model having atmospheric spectral values. The calibration system comprises a blackbody calibration source having a calibration source spectral signature and a computer for receiving the sensor model, the target spectral signature, the calibration source spectral signature and the atmospheric spectral values. The computer predicts a target spectral signature propagation at the infrared sensor and matches the target spectral signature propagation with the calibration source spectral signature propagation to determine a blackbody calibration source temperature for radiometric calibration of the infrared sensor. | 03-04-2010 |
Eldon C. Rogers, Auburn, WA US
Patent application number | Description | Published |
---|---|---|
20120038206 | NON-PNEUMATIC SURVIVABLE TIRE, COVER AND FABRICATION PROCESSES - A non-pneumatic tire and wheel assembly incorporates a tire tread and a conventional vehicle wheel with an elastomer tire body element molded for engagement intermediate the tread and wheel. The tire body element includes multiple concentric layers with alternating spokes. A bonded multilayer cover may be employed which is received within a recess in an outer surface of the tire body element from the tire tread. A mounting plate is engaged to the cover and attached to the wheel. | 02-16-2012 |
20120038207 | NON-PNEUMATIC SURVIVABLE TIRE MOUNTING SYSTEM FOR CONVENTIONAL WHEELS - A non-pneumatic tire and wheel assembly incorporates a tire tread and a conventional vehicle wheel with an elastomer tire body element and integral wall elements extending radially inward from the tire body element for sealing engagement with the wheel. The tire body element includes multiple concentric layers with alternating spokes. A bonded multilayer cover may be employed which is received within a recess in an outer surface of the tire body element from the tire tread. An attachment plate is engaged to the cover and attached to the wheel. | 02-16-2012 |
20120192707 | Expanding Countermeasure and Launcher System - Systems and methods described herein provide for the protection of personnel within vehicles and structures from handheld grenades and other threats. According to one aspect of the disclosure provided herein, a countermeasure system includes an expandable countermeasure having a flexible body with a number of weighted projectiles attached around a perimeter of the body. A threat detection and launch control system detects incoming threats and, in response, triggers a launch of the expandable countermeasure from the launcher to intercept and neutralize the threat. | 08-02-2012 |
20140020817 | NON-PNEUMATIC SURVIVABLE TIRE MOUNTING SYSTEM FOR CONVENTIONAL WHEELS - A method for fabrication of a non-pneumatic tire and wheel assembly incorporates a tire tread and a conventional vehicle wheel with an elastomer tire body element formed by introducing elastomer into mold elements with a center plug and releasably carried chamber forms to provide integral wall elements extending radially inward from the tire body element for sealing engagement with the wheel. The tire body element includes multiple concentric layers with alternating spokes formed with strut and aperture dimensions in the mold elements and mating rubber cast blocks adapted for the desired spoke design. After curing, the tire assembly is mounted on the conventional wheel with conventional mounting tools to deform the integral side walls and a pneumatic chamber formed by the side walls is inflated. | 01-23-2014 |
20140034219 | NON-PNEUMATIC SURVIVABLE TIRE, COVER AND FABRICATION PROCESSES - A non-pneumatic tire and wheel assembly incorporates a tire tread and a conventional vehicle wheel with an elastomer tire body element molded for engagement intermediate the tread and wheel. The tire body element includes multiple concentric layers with alternating spokes. A bonded multilayer cover may be employed which is received within a recess in an outer surface of the tire body element from the tire tread. A mounting plate is engaged to the cover and attached to the wheel. | 02-06-2014 |
Eugene T. Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20100041269 | QUICK-MOUNT RELAY APPARATUS AND METHOD OF INSTALLATION - A relay socket may include an opening for insertion of a relay into the opening, and a plurality of integral locking members for attaching and locking the relay socket to at least one of a structure surface and a relay without the use of attachment hardware. | 02-18-2010 |
Gary Rogers, Camano Island, WA US
Patent application number | Description | Published |
---|---|---|
20080276498 | PORTABLE OR TOW-BEHIND SNOW MELTER - A snow melter that may be used to melt snow. The snow melter includes a dump tank for receiving a quantity of snow to be melted. The melter also includes a melt tank and a heat exchanger. The melt tank separate from the dump tank. The heat exchanger heats the water in the melt tank. Water heated by the melt tank is allowed to flow from the melt tank into the dump tank to melt the snow in the dump tank. Doors may also be added to the dump tank to facilitate the removal of debris from the dump tank after use. Further, the dump tank may also have an inclinable floor to further facilitate the removal of debris from the dump tank after use. | 11-13-2008 |
Gerry Rogers, Black Diamond, WA US
Patent application number | Description | Published |
---|---|---|
20150250570 | ORAL IRRIGATOR WITH ANTISEPTIC DISPENSER - An oral irrigator that is configured to be connected to a tap, such as a shower tap, is described. In one embodiment, an oral irrigator has a tap manifold for coupling the irrigator between the shower tap and a showerhead. The oral irrigator has an antiseptic port for the introduction of antiseptic into the flow of water from the irrigator tip. In an exemplary embodiment, an irrigator regulator is configured at the irrigator end of a conduit, whereby a user can manipulate an irrigator control feature to control the amount of flow to the irrigator tip. In still another embodiment, an irrigator regulator comprises an antiseptic port and manipulation of an irrigator valve may direct a flow of water to the antiseptic port, thereby introducing a flow of antiseptic out of the irrigator tip. | 09-10-2015 |
Harry Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20130120931 | ENCLOSING ARRANGEMENT OF RACKS IN A DATACENTER - Enclosing arrangements of racks of computing devices fully encloses a space, either solely by the racks themselves, or in conjunction with structural features, such as walls and doors. The enclosed space can be either a hot aisle, whose hot air is vented out by fans positioned in at least one vertical extremity of the enclosed space, such as the floor, or ceiling, or it can be a cold aisle, whose cold air is pumped in by those fans. To maintain proper pressurization across a vertical cross-section of the enclosed space, specific ones of the computing devices have their fans adjusted based on their vertical position within the racks or have passive airflow adjustments, such as impedance screens. Computing devices can draw or vent air from their sides, taking advantage of the interstitial space between the racks provided by the enclosing arrangement. | 05-16-2013 |
20130282885 | WIRELESS-BASED NETWORK MANAGEMENT - Embodiments of network systems, computing systems, devices, components, modules, routines, and processes are described herein. In one embodiment, a network system includes a computing unit and a management controller configured to control a device operation of the computing unit. The device operation includes at least one of an operation to power up, an operation to power down, an operation to reset, an operation to power cycle, or an operation to refresh the computing unit. The network system also includes a wireless element configured to allow wireless communication between the computing unit and the management controller. | 10-24-2013 |
Harry R. Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20110296155 | AUTOMATICALLY STARTING SERVERS AT LOW TEMPERATURES - This document describes various techniques for automatically starting servers at low temperatures. A server may be powered on into a heating mode responsive to determining that a temperature of the server is below an operational temperature range. The server may then be restarted when the temperature of the server has increased to a temperature that is within the operational temperature range. | 12-01-2011 |
20120331317 | POWER-CAPPING BASED ON UPS CAPACITY - The power draw of equipment in a data center may be capped in order to keep the power draw under the capacity of the Uninterruptable Power Supply (UPS) that serves the data center. The current capacity of the UPS may be estimated, and the equipment may be controlled so as to keep the equipment's power draw under that current capacity. Factors that may affect the estimate of the UPS's current capacity include the history of temperature and humidity to which the UPS has been subject, and charge/discharge history of the UPS. Factors that may affect the decision of which equipment to throttle to a lower power level include: the current power load at the data center, the type of software that each server is running, and the demand for that software. | 12-27-2012 |
Harry R. Rogers, Santa Clara, WA US
Patent application number | Description | Published |
---|---|---|
20130138935 | AUTOMATICALLY STARTING SERVERS AT LOW TEMPERATURES - This document describes various techniques for automatically starting servers at low temperatures. A server may be powered on into a heating mode responsive to determining that a temperature of the server is below an operational temperature range. The server may then be restarted when the temperature of the server has increased to a temperature that is within the operational temperature range. | 05-30-2013 |
Harry Raymond Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20100185843 | HARDWARE ENCRYPTING STORAGE DEVICE WITH PHYSICALLY SEPARABLE KEY STORAGE DEVICE - Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data inaccessible. Destruction of the separable key device can result in virtual destruction of the encrypted data. The cryptographic information on the separable key device can be provided by a storage device manufacturer, or by a provisioning computing device. The separable key device can be directly communicationally coupled to a provisioning computing device or it can establish a secure communication tunnel with the provisioning device through a computing device to which the separable key device is communicationally coupled. Cryptographic information can be provided by, and deleted from, the provisioning computing device prior to completion of the booting of that device. | 07-22-2010 |
20130335907 | TRAY AND CHASSIS BLADE SERVER ARCHITECTURE - In computing scenarios involving an aggregation of multiple computational units into a server or computer set, many architectures may be devised to provide physical storage and logical aggregation of the computational units. Presented herein are variations of one such architecture, comprising a chassis having a set of slots, into which may be inserted a tray storing the computational units of one or more blades. Respective trays and chassis slots comprise a power connector and a network connector that are positioned to connect directly (i.e., without a cable or manual interaction) when a tray is inserted into a slot. The chassis stores a set of power supplies, and may connect each blade with a power supply, optionally providing power routing and failover capabilities. The chassis may also provide a management component that connects to and provides management capabilities of the blades of the trays, power supplies, and climate regulating components. | 12-19-2013 |
20130344794 | CLIMATE REGULATOR CONTROL FOR DEVICE ENCLOSURES - Climate regulation within an enclosure (e.g., a case of a workstation or a rack or cabinet of servers) may be achieved through a climate regulator featuring several selectable climate regulator settings (e.g., a variable-speed fan array). Controllers of such climate regulators often select climate regulator settings based on current conditions inside the enclosure, such as the temperature of one or more processors operating within the enclosure. However, such control fails to account for the climate of air outside the enclosure that is drawn in to provide climate regulation, even though the climate properties of inlet air may significantly affect the effectiveness of climate regulation. Accordingly, a controller of a climate regulator may be configured to detect inlet climate properties of air directed into the enclosure, and to map the inlet climate properties (alone or in combination with other factors) to a selected climate regulator setting for the climate regulator. | 12-26-2013 |
James Rogers, Spokane, WA US
Patent application number | Description | Published |
---|---|---|
20090301276 | Cutting Assemblies and Methods - Cutting assemblies are disclosed that include an entrance portion and a receiving portion, with the receiving portion defining a receiving opening configured to be axially aligned with an entrance opening of the entrance portion when mounted to the surface of a cutting apparatus. Cutting assemblies are also provided that include a material carriage configured to be borne by a cutting apparatus. Cutting assemblies that include a material receiving portion configured to be slidably mounted to a surface of a cutting apparatus are also disclosed. Cutting methods are also disclosed that can include rotating a piece of material around the materials longitudinal axis and delivering the material to a cutting tool while the longitudinal axis of the material is aligned substantially opposite the direction of rotation of the cutting tool. | 12-10-2009 |
Jon T. Rogers, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150074391 | VERIFICATION OF USER COMMUNICATION ADDRESSES - Disclosed are various embodiments for performing stateless verification of communication addresses. Encrypted verification data is generated for a user, including a communication address, an identifier of the user, a verification code, and a timestamp. The encrypted verification data is sent to the user, and the verification code is transmitted to the communication address. The encrypted verification data and the verification code are received from the user. The communication address is verified based at least in part on the verification code received from the user and the encrypted verification data received from the user. | 03-12-2015 |
Justin Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20080209563 | Runtime Security and Exception Handler Protection - In various embodiments, redirection techniques can be utilized to protect against insecure functionality, to mitigate scripting vulnerabilities, and to protect vulnerable exception handlers. In at least some embodiments, a program can be protected from a security vulnerability by using a runtime shield which changes the behavior of the program while it is running. The shield effectively provides a redirection solution that addresses the vulnerability while, at the same time, does not alter the particular program's executable code. | 08-28-2008 |
20090113280 | Enabling Pseudo-Class Styles without Revealing Personal Information - Various embodiments enable particular CSS pseudo-classes to be employed, but limit particular functionality aspects of those pseudo-classes that can lead to divulging personally identifiable information. Thus, various embodiments can change how a CSS pseudo-class is allowed to function. For example, in at least some embodiments, CSS pseudo-classes are permitted to be used to make the visual formatting changes to a web page, but not structural formatting changes. That is, changes that do not affect the structure of content within a web document are allowed, while changes that affect the structure of the content are not allowed. | 04-30-2009 |
20110179349 | ENABLING PSEUDO-CLASS STYLES WITHOUT REVEALING PERSONAL INFORMATION - Various embodiments enable particular CSS pseudo-classes to be employed, but limit particular functionality aspects of those pseudo-classes that can lead to divulging personally identifiable information. Thus, various embodiments can change how a CSS pseudo-class is allowed to function. For example, in at least some embodiments, CSS pseudo-classes are permitted to be used to make the visual formatting changes to a web page, but not structural formatting changes. That is, changes that do not affect the structure of content within a web document are allowed, while changes that affect the structure of the content are not allowed. | 07-21-2011 |
20120304044 | INTERFACE DEFINITION LANGUAGE EXTENSIONS - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 11-29-2012 |
20120304150 | BINDING BETWEEN A LAYOUT ENGINE AND A SCRIPTING ENGINE - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 11-29-2012 |
20120304203 | MEMORY MODEL FOR A LAYOUT ENGINE AND SCRIPTING ENGINE - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 11-29-2012 |
20120304303 | SECURITY MODEL FOR A LAYOUT ENGINE AND SCRIPTING ENGINE - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 11-29-2012 |
20150026661 | BINDING BETWEEN A LAYOUT ENGINE AND A SCRIPTING ENGINE - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 01-22-2015 |
20150058714 | Memory Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 02-26-2015 |
Justin E. Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20080301560 | Retaining Style Information when Copying Content - An illustrative implementation is described for copying an identified portion of source content along with style information associated with the portion. The implementation allows the identified portion to be pasted into target content. By virtue of the extraction and retention of style information, the identified portion that is pasted into the target content visually resembles the identified portion as it appears in the source content. The implementation can identify relevant style information to be preserved based on a contextual analysis of style information applied to the source content. In one illustrative case, some of the style information may be revealed by parts of the content that are not directly demarcated by the identified portion. | 12-04-2008 |
20110107200 | Retaining Style Information when Copying Content - An illustrative implementation is described for copying an identified portion of source content along with style information associated with the portion. The implementation allows the identified portion to be pasted into target content. By virtue of the extraction and retention of style information, the identified portion that is pasted into the target content visually resembles the identified portion as it appears in the source content. The implementation can identify relevant style information to be preserved based on a contextual analysis of style information applied to the source content. In one illustrative case, some of the style information may be revealed by parts of the content that are not directly demarcated by the identified portion. | 05-05-2011 |
20130042255 | Memory Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 02-14-2013 |
20130047064 | Interface Definition Language Extensions - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 02-21-2013 |
20130047258 | Security Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 02-21-2013 |
20130067314 | Batch Document Formatting and Layout on Display Refresh - In one or more embodiments, processing efficiencies are gained within the web browser by utilizing the display refresh notifications to drive layout processing within a web browser's layout pipeline. By doing so, the browser can ensure that layout computation is performed when the computed layout is actually to be displayed by the computing device. This can enable the web browser to defer and batch numerous changes into a single layout update, thereby reducing overall CPU utilization while maintaining user responsiveness. | 03-14-2013 |
20130067320 | Batch Document Formatting and Layout on Display Refresh - In one or more embodiments, processing efficiencies are gained within the web browser by utilizing the display refresh notifications to drive layout processing within a web browser's layout pipeline. By doing so, the browser can ensure that layout computation is performed when the computed layout is actually to be displayed by the computing device. This can enable the web browser to defer and batch numerous changes into a single layout update, thereby reducing overall CPU utilization while maintaining user responsiveness. | 03-14-2013 |
20130176344 | Input Pointer Delay and Zoom Logic - Various embodiments enable repetitive gestures, such as multiple serial gestures, to be implemented efficiently so as to enhance the user experience. Other embodiments provide various approaches to zoom operations that consider a particular element's contextual surroundings in making a zoom decision that is designed to enhance the user experience and provide efficiently-zoomed content given a device's or rendering container's form factor. | 07-11-2013 |
20130179598 | Supporting Different Event Models using a Single Input Source - In at least some embodiments, input provided by a single source generates events representing multiple source types through a mapping process, e.g. a touch input generates both touch and mouse events. By configuring the system to not recognize certain gestures, messages associated with the events of the different source types are then interleaved and provided to an associated application for processing. Efficiencies are gained by configuring the system to interleave the messages associated with the source types because messages of one source type can be processed sooner than if the messages of the one source type were queued up and sent in a non-interleaved fashion. | 07-11-2013 |
20130179776 | Enabling Performant Cascading Operations - Various embodiments enable performant cascading operations to be performed by selectively applying a subset of cascading operations to designated elements in a hierarchical tree, responsive to receiving an input associated with one of the elements. A full set of cascading operations can be performed, subsequent to performing the subset of cascading operations, in accordance with various parameters. Such parameters can include, by way of example and not limitation, user interaction timing, the complexities of the cascading operations for a given element, and/or the number of elements to which the cascading operations can be applied, to name just a few. | 07-11-2013 |
20130179844 | Input Pointer Delay - Various embodiments enable repetitive gestures, such as multiple serial gestures, to be implemented efficiently so as to enhance the user experience. In at least some embodiments, a first gesture associated with an object is detected. The first gesture is associated with a first action. Responsive to detecting the first gesture, pre-processing associated with the first action is performed in the background. Responsive to detecting a second gesture associated with the object within a pre-defined time period, an action associated with the second gesture is performed. Responsive to the second gesture not being performed within the pre-defined time period, processing associated with the first action is completed. | 07-11-2013 |
20130201107 | Simulating Input Types - A timer is utilized in an input simulation process that simulates an input of one type when an input of a different type is received. In at least some embodiments, when a first type of input is received, a corresponding timer is started. If, before passage of an associated time period, a first input scenario is present, then one or more actions associated with the first input type are performed. If, on the other hand, after passage of the associated time period, a second input scenario is present, then one or more actions associated with a second input type are performed by using the first input type to simulate the second input type. | 08-08-2013 |
20130263029 | Instantiable Gesture Objects - Instantiable gesture object techniques are described in which native gesture functionality is abstracted to applications using a script-based recognition interface. Gesture objects may be instantiated for different interaction contexts at the direction of applications programmed using dynamic scripting languages. Gesture objects can be configured to designate particular touch contacts and/or other inputs to consider for gesture recognition and a target element of content to which corresponding recognized gestures are applicable. After creation, gesture objects manage gesture processing operations on behalf of the applications including creating recognizers with the native gesture system, feeding input data for processing, and transforming raw gesture data into formats appropriate for the application and/or a target element. Accordingly, script-based applications may use the gesture objects to offload processing tasks associated with gesture recognition and take advantage of native gesture functionality. | 10-03-2013 |
20130298010 | Retaining Style Information when Copying Content - An illustrative implementation is described for copying an identified portion of source content along with style information associated with the portion. The implementation allows the identified portion to be pasted into target content. By virtue of the extraction and retention of style information, the identified portion that is pasted into the target content visually resembles the identified portion as it appears in the source content. The implementation can identify relevant style information to be preserved based on a contextual analysis of style information applied to the source content. In one illustrative case, some of the style information may be revealed by parts of the content that are not directly demarcated by the identified portion. | 11-07-2013 |
20140019844 | Declarative Style Rules for Default Touch Behaviors - In at least some embodiments, a mechanism is provided for web developers to request specific default behaviors, such as touch behaviors, on their webpages. In at least some implementations, a Cascading Style Sheets (CSS) rule is utilized to enable or disable manipulations such as panning, pinch zoom, and double-tap-zoom manipulations. The mechanism can be extensible to accommodate additional default behaviors that are added in the future. In various embodiments, the behaviors are declared upfront and thus differ from solutions which employ an imperative model. The declarative nature of this approach allows achievement of full independence from the main thread and deciding the correct response using independent hit testing. | 01-16-2014 |
20140365862 | Memory Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 12-11-2014 |
20140375657 | Synchronization Points for State Information - Techniques for synchronization points for state information are described. In at least some embodiments, synchronization points are employed to propagate state information among different processing threads. A synchronization point, for example, can be employed to propagate state information among different independently-executing threads. Accordingly, in at least some embodiments, synchronization points serve as inter-thread communications among different independently-executing threads. | 12-25-2014 |
20150058924 | Security Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 02-26-2015 |
20150261730 | Declarative Style Rules for Default Touch Behaviors - In at least some embodiments, a mechanism is provided for web developers to request specific default behaviors, such as touch behaviors, on their webpages. In at least some implementations, a Cascading Style Sheets (CSS) rule is utilized to enable or disable manipulations such as panning, pinch zoom, and double-tap-zoom manipulations. The mechanism can be extensible to accommodate additional default behaviors that are added in the future. In various embodiments, the behaviors are declared upfront and thus differ from solutions which employ an imperative model. The declarative nature of this approach allows achievement of full independence from the main thread and deciding the correct response using independent hit testing. | 09-17-2015 |
Kim Rogers, Stanwood, WA US
Patent application number | Description | Published |
---|---|---|
20090013614 | Retractable rigid roof system - A retractable roof assembly that includes at least two main hinges each connected to a telescope arm assembly used to support the opposite ends of a plurality of overlapping elongated shingles. The telescopic arm is made of a plurality of longitudinally aligned couplers designed to slide and lock together. Attached to the opposite ends of each elongated shingle is a coupler. During operation, couplers allow the shingles to be retracted and slide together into a stack configuration or extended with their adjacent edges overlapping. In one embodiment, the roof assembly extends outward from a fixed vertical support surface and supported at its opposite ends by two support arms. In a second embodiment, the roof assembly is supported by an RV slide out and automatically extends and retracts therewith. A drive rod is used that connects to a scissors frame that supports the shingles when extended. As the telescopic arms retract, the scissors frame retracts as the shingles slide together into a stacked configuration. | 01-15-2009 |
20130324383 | Portable Calisthenics Exercise Device - A device for supporting an exerciser performing callisthenic exercises that includes a right and left, rigid, upright frame supports and an intermediate fork assembly. The fork assembly is adjustable in length and linked to the front sections of the two frame supports. Each frame support is angled inward to provide greater stability. The rear sections of the frame supports are detached and may be rotated laterally to reposition the gripping surfaces on the two frame supports and to adjust the size of the exercise area formed in between the two frame supports to accommodate different individuals and exercises. Each frame support includes a front leg and rear leg that allows height adjustment of each frame support. The device may include a pair of first handles, a pair of second handles attached to the two frame supports, and a suspension seat and one or two horizontal bars. | 12-05-2013 |
Kim David Rogers, Stanwood, WA US
Patent application number | Description | Published |
---|---|---|
20120193890 | Fifth Wheel Trailer Hitch Cover - A cover for a fifth wheel trailer hitch that includes a rigid body with a front planar section and a rear planar section. Formed on the front planar section is a downward extending lip that engages the front edge of the head assembly on the hitch. The cover includes a holding mechanism for preventing the cover from moving forward and laterally over the head assembly. In two embodiments, the holding mechanism is a pivoting torsion plate attached to the bottom surface of the cover that presses against the rear portion of the head assembly. In another embodiment, the torsion plate is replaced by a center post with lateral beveled ears that slide into the head assembly's pin slot. In a fourth embodiment, the holding mechanism is at least one downward biasing clip attached to the cover's rear section that presses against the rear portion of the head assembly. | 08-02-2012 |
Lawrence W. Rogers, Kenmore, WA US
Patent application number | Description | Published |
---|---|---|
20090171490 | IDENTIFICATION OF ENGINEERING INTENT REQUIREMENTS IN AN ELECTRONIC ENVIRONMENT - Engineering requirements are defined in an electronic environment. In one embodiment, a method includes providing at least one of a set of master requirements and a set of version requirements to be applied to the electronic product definition, and referencing an electronic reference document from at least one of the set of master requirements and the set of version requirements, the electronic reference document including one or more particular engineering requirements to be applied to the electronic product definition. Alternately, a method includes defining a callout linked to the at least one of the set of master requirements and the set of version requirements, the callout being adapted to supersede a conflicting engineering requirement set forth in at least one of the set of master requirements and the set of version requirements. | 07-02-2009 |
20110172795 | CONSIDERATION OF MANUFACTURING CAPABILITY DURING AIRCRAFT DESIGN - A system comprises a configurator for providing a configuration definition that specifies existing engineering designs and manufacturing capability of aircraft structures that have already been designed and manufactured; and a processor for accessing the configuration definition from the configurator and filtering the configuration definition according to customer specifications for a new aircraft. The filtering selects existing designs and identifies existing manufacturing capability to fabricate structures for the new aircraft. | 07-14-2011 |
March Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20130111404 | USER INTERFACE FOR SAVING DOCUMENTS USING EXTERNAL STORAGE SERVICES | 05-02-2013 |
20130303190 | REQUESTING A LOCATION OF A USER - A user sends a location request to a user of a group that requests the user's current location. For example, one family member may send a location request to another family member that is part of their family group for their current location. The user receiving the request may accept the location request or reject the location request. When the location request is reject, the requesting user is not provided with the current location information of the user. When the location request is accepted, the requesting user is provided with the current location information of the user. In addition to providing the location information to the requesting user, the location may also be shared with other members of the group. For example, a message may be sent to each of the family members that are part of the group that informs them that a member has updated their location. | 11-14-2013 |
20140214937 | Activity Graphs - The description relates to activity graphs. One example can obtain details from multiple activity cards. The example can identify relationships between at least some of the details of the multiple activity cards. The example can also generate an activity graph that reflects at least some of the relationships between individual activity cards. | 07-31-2014 |
20140372525 | SMART NOTIFICATIONS USING A CALENDAR - Notifications are delivered to a user based in part on a user's current context. The notifications may be based on personal information (e.g. calendar events, tasks, alerts, and the like) as well as a context of a user. The notifications may be delivered using different types of notifications. The type of notification selected may be based on the current context of the user. Notifications may also be sent to other users (e.g. that are part of a trusted group) in response to a change in state of the event (e.g. the task completed). Instead of a user receiving notifications at preset times, notifications are delivered to the user using their current context. A group member may also create a message to another member requesting an action. When a response is made, the requesting group member receives a notification and the other group members may also receive notifications. | 12-18-2014 |
Mike Rogers, Clarkston, WA US
Patent application number | Description | Published |
---|---|---|
20120256372 | Bifacial Targets, Methods of Making and Methods of Use - Targets including bifacial target areas adjoining four planar extension arms that meet at a center and are set at angles of 109.5 degrees between adjacent arms. A method including providing a pair of symmetrical target portions each having two bifacial target areas adjoining extension arms that meet along a centerline. Slits are provided at centerline apexes, and the slits the two portions are merged. The two target portions are welded together along the merged slits. A method including positioning a target on a surface, with one extension arm projecting upward. A firearm is aimed at a face of the bifacial target area adjoined to the upwardly projecting arm. The firearm is fired to impact the face, the impact causing the target to flip into a new position The firearm is then aimed at a face of the bifacial target area adjoined to the new upwardly projecting extension arm. | 10-11-2012 |
Neil Christian Rogers, Tulalip, WA US
Patent application number | Description | Published |
---|---|---|
20140252053 | PISTOL MAGAZINE HOLSTER WITH SNAG - A pistol magazine holster may comprise a body capable of retaining a pistol magazine, a support structure coupled to the body and adapted to secure the body to a compartment, and a snag member coupled to the body. The snag member may be adapted to retain the body within the compartment as the magazine is withdrawn. | 09-11-2014 |
Philip Michael Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130232087 | ELECTRONIC REGISTRATION SYSTEM FOR PRODUCT TRANSACTIONS - An electronic registration system which facilitates authorized product returns and reduces the incidence of improper returns. A retailer sales associate is prompted to enter individual product identification information such as an individual serial number. This individual product identification information is then stored in a data base along with the date on which the product was sold and an appropriate UPC code, SKU number or manufacturer code. A check digit algorithm may be used to verify the serial number prior to storage. A sales receipt may be imprinted with at least the date of the transaction and the serial number. When a product is returned, the retailer may cross-reference the serial number on the product with that on the receipt to verify the sales receipt. Otherwise, the database may be searched for pertinent sales information. | 09-05-2013 |
Philip Michael Rogers, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20120265693 | ELECTRONIC REGISTRATION SYSTEM FOR PRODUCT TRANSACTIONS - An electronic registration system which facilitates authorized product returns and reduces the incidence of improper returns. A retailer sales associate is prompted to enter individual product identification information such as an individual serial number. This individual product identification information is then stored in a data base along with the date on which the product was sold and an appropriate UPC code, SKU number or manufacturer code. A check digit algorithm may be used to verify the serial number prior to storage. A sales receipt may be imprinted with at least the date of the transaction and the serial number. When a product is returned, the retailer may cross-reference the serial number on the product with that on the receipt to verify the sales receipt. Otherwise, the database may be searched for pertinent sales information. | 10-18-2012 |
Randall A. Rogers, Auburn, WA US
Patent application number | Description | Published |
---|---|---|
20090110901 | COMPOSITE FASTENERS CONTAINING MULTIPLE REINFORCING FIBER TYPES - A method for making composite fasteners includes the provision of a mold containing an elongated cavity having a long axis and the shape of the fastener body, an elongated insert comprising a plurality of long, interwoven or intermingled first reinforcing fibers, and a hardenable liquid matrix that may include a plurality of short, second reinforcing fibers suspended therein. The insert is placed in the cavity such that the long reinforcing fibers are disposed generally parallel to the long axis of the cavity. The mold cavity is then filled with the liquid matrix such that the short reinforcing fibers are distributed generally uniformly throughout the mold cavity, and the liquid matrix of the suspension is then hardened so as to form a hardened fastener body encapsulating the first and second reinforcing fibers. The molded fastener is then removed from the mold, either for immediate use or for subsequent processing. | 04-30-2009 |
20130259604 | FASTENER SYSTEMS THAT PROVIDE EME PROTECTION - Fasteners are inserted into a stack of members and terminated with parts having at least one of a dry dielectric coating and a dry dielectric seal at select locations to protect against electromagnetic effects (EME). | 10-03-2013 |
20140055906 | FASTENER SYSTEMS THAT PROVIDE EME PROTECTION - Fasteners are inserted into a stack of members and terminated with parts having at least one of a dry dielectric coating and an inner dry dielectric seal at select locations to protect against electromagnetic effects (EME). | 02-27-2014 |
20140230228 | SELF-ALIGNING SLEEVED PROTRUDING HEAD FASTENERS WITH ELECTROMAGNETIC EFFECT PROTECTION FEATURES - A fastener system for composite structure provides electromagnetic energy protection by incorporating a self-aligning head (SAH) fastener having a head with a spherical engaging surface and a shank extending from the head for insertion through a hole in a composite structure and a self-aligning self sealing (SASS) washer having a throat receiving the shank and a spherical mating surface interfacing with the spherical engaging surface of the head. | 08-21-2014 |
20140338179 | NUT, WASHER & FASTENER HEAD FOR ELECTROMAGNETIC EFFECT PROTECTION - A fastener system for composite structure providing electromagnetic energy (EME) protection incorporates a fastener having a head with an engagement surface and a shank having a threaded end. A nut is received on the threaded end of the fastener, with the nut also having an engagement surface. At least one of the head engagement surface and the nut engagement surface incorporates a reduced area portion for engagement of a first mating surface or second mating surface, respectively. | 11-20-2014 |
Richard Rogers, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20140324860 | CONTENT SELECTION FOR STORAGE TIERING - A method, of managing storage of content of a system ( | 10-30-2014 |
Susan L. Rogers, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20080249568 | Crossbar Spinal Prosthesis Having a Modular Design and Systems for Treating Spinal Pathologies - An adaptable spinal facet joint prosthesis, including a pedicle fixation element; a laminar fixation element; and a facet joint bearing surface having a location adaptable with respect at least one of the pedicle fixation element and the laminar fixation element. The invention also includes a method of implanting an adaptable spinal facet joint prosthesis including the steps of determining a desired position for a facet joint bearing surface; and attaching a prosthesis comprising a facet joint bearing surface to a pedicle portion of a vertebra and a lamina portion of a vertebra to place the facet joint bearing surface in the desired position. The invention also provides a facet joint prosthesis implant tool including a tool guide adapted to guide a vertebra cutting tool; and first and second fixation hole alignment elements extending from the saw guide. The invention also provides systems for treating spinal pathologies that include intervertebral discs in combination with spinal and facet joint prostheses. | 10-09-2008 |
20130030466 | Crossbar Spinal Prosthesis Having a Modular Design and Systems For Treating Spinal Pathologies - An adaptable spinal facet joint prosthesis, including a pedicle fixation element; a laminar fixation element; and a facet joint bearing surface having a location adaptable with respect at least one of the pedicle fixation element and the laminar fixation element. The invention also includes a method of implanting an adaptable spinal facet joint prosthesis including the steps of determining a desired position for a facet joint bearing surface; and attaching a prosthesis comprising a facet joint bearing surface to a pedicle portion of a vertebra and a lamina portion of a vertebra to place the facet joint bearing surface in the desired position. The invention also provides a facet joint prosthesis implant tool including a tool guide adapted to guide a vertebra cutting tool; and first and second fixation hole alignment elements extending from the saw guide. | 01-31-2013 |
20140052248 | Crossbar Spinal Prosthesis Having a Modular Design and Related Implantation Methods - Modular spinal prosthesis having one of both of adaptable and configurable components are provided. The modular spinal prosthesis described herein provide an artificial articular configuration to replace damaged, worn or otherwise removed spinal facet elements. | 02-20-2014 |
20140081330 | Crossbar Spinal Prosthesis Having A Modular Design and Related ImplantationMethods - Modular spinal prosthesis having one of both of adaptable and configurable components are provided. The modular spinal prosthesis described herein provide an artificial articular configuration to replace damaged, worn or otherwise removed spinal facet elements. The prosthesis can include a crossbar having first and second ends. A first caudal prosthesis can be attached to the first end of the crossbar, while a second caudal prosthesis can be attached to the second end of the crossbar. A first crossbar mount can be positioned on the crossbar near the first caudal prosthesis, while a second crossbar mount can be positioned on the crossbar near the second caudal prosthesis. A first cephalad prosthesis can extend from the first crossbar mount, while a second cephalad prosthesis can extend from the second crossbar mount. | 03-20-2014 |
Timothy G. Rogers, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20140149710 | CREATING SIMD EFFICIENT CODE BY TRANSFERRING REGISTER STATE THROUGH COMMON MEMORY - Methods, media, and computing systems are provided. The method includes, the media are configured for, and the computing system includes a processor with control logic for allocating memory for storing a plurality of local register states for work items to be executed in single instruction multiple data hardware and for repacking wavefronts that include work items associated with a program instruction responsive to a conditional statement. The repacking is configured to create repacked wavefronts that include at least one of a wavefront containing work items that all pass the conditional statement and a wavefront containing work items that all fail the conditional statement. | 05-29-2014 |
20140181467 | HIGH LEVEL SOFTWARE EXECUTION MASK OVERRIDE - Methods, and media, and computer systems are provided. The method includes, the media includes control logic for, and the computer system includes a processor with control logic for overriding an execution mask of SIMD hardware to enable at least one of a plurality of lanes of the SIMD hardware. Overriding the execution mask is responsive to a data parallel computation and a diverged control flow of a workgroup. | 06-26-2014 |
20150100758 | DATA PROCESSOR AND METHOD OF LANE REALIGNMENT - A data processor includes a register file divided into at least a first portion and a second portion for storing data. A single instruction, multiple data (SIMD) unit is also divided into at least a first lane and a second lane. The first and second lanes of the SIMD unit correspond respectively to the first and second portions of the register file. Furthermore, each lane of the SIMD unit is capable of data processing. The data processor also includes a realignment element in communication with the register file and the SIMD unit. The realignment element is configured to selectively realign conveyance of data between the first portion of the register file and the first lane of the SIMD unit to the second lane of the SIMD unit. | 04-09-2015 |