Patent application number | Description | Published |
20090260010 | ELECTRONIC DEVICE WORKSPACE RESTRICTION - The drive for multi-tasking and/or availability of numerous applications can interfere with productivity. Constant interruptions from email and real-time online communication can lead to decreased productivity. In addition, attempting to tackle a massive number of different projects with different applications can impede progress on any one of the projects. Functionality can be implemented in a workspace to focus interaction with one or more applications in the workspace. Focused interaction allows a user to limit distractions (e.g., email notifications, instant message notifications, etc) and restrict activities not related to his or her current task. | 10-15-2009 |
20090260062 | REAL-TIME ONLINE COMMUNICATIONS MANAGEMENT - Every day many people use real-time online communication applications in business communications. Although instant message communications can be sent via a secure channel, users can accidentally send instant messages to unintended recipients by typing or pasting text and images. This can lead to unintended information security failures. Implementing functionality to prioritize chat windows within a real-time online communication application reduces the likelihood of sending messages to incorrect recipients. | 10-15-2009 |
20100011414 | MANAGING LOGICAL SOCKETS - Network attacks, such as a denial of service (DoS) attack, attempt to exhaust server resources and can cause a network to be unavailable for significant periods of time. Although a firewall can be utilized to defend a system from network attacks, the number of incoming connections created can be controlled to defend the system against network attacks. An operating system creates connections, known as sockets, on one or more logical ports. Incoming connections are connections whose creation requests originate from a source outside the operating system. Functionality to control socket creation can be implemented within the operating system, thus allowing a system to be placed directly on a network without a firewall. Implementing defense against network attacks within an operating system reduces the additional cost of having firewall products, and can lead to more efficient network configurations. | 01-14-2010 |
20120297072 | MANAGING LOGICAL SOCKETS - A method includes receiving a request from a network source to create a logical socket on a logical port. The method includes accessing a structure that indicates a plurality of logical socket allocation policies to select a first of the plurality of socket allocation policies that corresponds to the logical port. Each of the plurality of logical socket allocation policies governs logical socket allocation for one or more ports, wherein logical allocation policies govern at least one of 1) the number of logical sockets that are allocated to the one or more logical ports, 2) a maximum number of logical sockets shared between a grouping of two or more logical ports, and 3) a maximum number of logical sockets. The method includes determining if the first logical socket allocation policy allows for allocation of the logical socket for the network source to communicate. The method includes allocating a logical socket. | 11-22-2012 |
20120304196 | ELECTRONIC DEVICE WORKSPACE RESTRICTION - Some embodiments include a method that includes receiving an indication of a first of a plurality of tasks. The method includes accessing a policy associated with the first of the plurality of tasks. The method also includes determining that a restricted activity state is to be imposed on an electronic device workspace based on the policy that is associated with the first of the plurality of tasks and an application related activity. The application related activity comprises at least one of accumulation of a first time period of a user working with the first set of one or more applications and expiration of a lack of activity second time period for the second set of one or more applications. The method includes restricting the electronic device workspace to the first set of one or more applications. | 11-29-2012 |
20120331543 | DETECTION OF ROGUE CLIENT-AGNOSTIC NAT DEVICE TUNNELS - Provided are techniques for the prevention of certain types of attacks on computing systems. The current disclosure, which describes one particular type of attack, is directed to the detection and prevention of an attack rather than the mechanics of the particular described attack. The claimed subject matter both detects and prevents an attack without exposing a network to denial-of-service (DoS) attacks by being too restrictive. | 12-27-2012 |
20120331544 | DETECTION OF ROGUE CLIENT-AGNOSTIC NAT DEVICE TUNNELS - Provided are techniques for the prevention of certain types of attacks on computing systems. The current disclosure, which describes one particular type of attack, is directed to the detection and prevention of an attack rather than the mechanics of the particular described attack. The claimed subject matter both detects and prevents an attack without exposing a network to denial-of-service (DoS) attacks by being too restrictive. | 12-27-2012 |
Patent application number | Description | Published |
20140048261 | Treatment Fluids Comprising a Stabilizing Compound Having Quaternized Amine Groups and Methods for Use Thereof - Methods for mitigating precipitation during matrix acidizing of a subterranean formation. The methods generally comprise introducing a treatment fluid into a subterranean formation. The treatment fluid comprises a chelating agent; a hydrofluoric acid source; and a stabilizing compound. The stabilizing compound has two or more quaternized amine groups. In some cases the treatment fluid further comprises alkali metal ions. | 02-20-2014 |
20140116696 | Compositions And Methods Related To Mitigating Aluminum And Ferric Precipitates In Subterranean Formations After Acidizing Operations - Trivalent-ion chelating agents may be useful in mitigating the formation aluminum and ferric precipitates in subterranean formations during acidizing operations. An acidizing operation may include introducing an acidizing fluid into a wellbore penetrating a subterranean formation, the acidizing fluid comprising an aqueous fluid, an acid source, and a trivalent-ion chelating agent, e.g., hydroxamates, 6,7-dihydroxyquinoline, 3-hydroxy-4-pyridinones, and any combination thereof. In some instances, trivalent-ion chelating agents with a pKa of less than about 7 may be particularly useful in acidizing operations. | 05-01-2014 |
20140262289 | Methods for Acidizing a Subterranean Formation Using a Stabilized Microemulsion Carrier Fluid - Acidizing fluids may be formulated to minimize the detrimental effects of precipitation during an acidizing operation by promoting production of precipitates from a subterranean formation. Methods for acidizing a subterranean formation can comprise: providing an acidizing fluid comprising a stabilized microemulsion carrier fluid, a chelating agent, and an acid source; introducing the acidizing fluid into a subterranean formation; at least partially dissolving a surface in the subterranean formation with the acidizing fluid, thereby forming a spent fluid; and producing the spent fluid from the subterranean formation. | 09-18-2014 |
Patent application number | Description | Published |
20130269941 | Treatment Fluids Comprising a Hydroxypyridinecarboxylic Acid and Methods for Use Thereof - Treatment fluids can mitigate the occurrence or effects of precipitation in a subterranean formation through complexation of a metal ion therein. Methods for treating a subterranean formation can comprise: providing a treatment fluid comprising a hydroxypyridinecarboxylic acid, a salt thereof, or a tautomer thereof; introducing the treatment fluid into a subterranean formation; and complexing a metal ion in the subterranean formation with the hydroxypyridinecarboxylic acid. | 10-17-2013 |
20140342953 | Complexation of Calcium Ions in the Presence of Quaternized Amine Compounds While Acidizing a Subterranean Formation - Acidizing operations in subterranean formations that contain both a siliceous material and a source of calcium ions can often be problematic due to the generation of calcium-containing precipitates, particularly calcium fluoride. Methods for treating a subterranean formation can comprise: providing a treatment fluid having a pH ranging between about 1 and about 4.5 and comprising a chelating agent, hydrofluoric acid or a hydrofluoric acid-generating compound, and a compound having two or more quaternized amine groups; introducing the treatment fluid into a subterranean formation containing a siliceous material and a source of calcium ions; dissolving at least a portion of the siliceous material in the subterranean formation with the hydrofluoric acid or the hydrofluoric acid-generating compound; and complexing at least a portion of the calcium ions in the subterranean formation with the chelating agent. | 11-20-2014 |
20140374107 | Methods and Systems for Acidizing Subterranean Formations with Treatment Fluids Containing Dual-Functioning Chelating Agents - When used outside the pH range at which metal ion complexation normally occurs, aminopolycarboxylic acids can moderate the reaction rate of acids with carbonate minerals. Methods for treating a subterranean formation can comprise: providing a treatment fluid comprising an aqueous carrier fluid, an acid, and a chelating agent comprising an aminopolycarboxylic acid, the treatment fluid having a pH below that at which the carboxylic acid groups of the chelating agent are substantially protonated and the chelating agent is ineffective for complexing a metal ion; introducing the treatment fluid into a subterranean formation comprising a carbonate mineral; reacting the acid with the carbonate mineral, such that the acid at least partially spends and the pH of the treatment fluid rises; and once the pH of the treatment fluid rises above a pK | 12-25-2014 |
Patent application number | Description | Published |
20120005970 | GUY ANCHOR REINFORCEMENT - A reinforcing system for a guy anchor used in a guyed or additionally guyed tower includes a concrete structure formed around the guy anchor. The concrete structure has a top surface slightly above grade level. The reinforcing system further includes a supplemental anchor shaft. The supplemental anchor shaft is attached to the existing anchor head and extends down into the concrete structure, where it is retained and encased therein. The concrete structure preferably has a base and at least one wall that extends down from the base and has a surface that faces the tower to resist horizontal forces. The reinforcing system is sufficiently strong to keep the guy anchor in place even if the original anchor shaft completely corrodes. The supplemental anchor shaft does not generally come into contact with soil. It therefore resists corrosion and is expected to provide a long service life. | 01-12-2012 |
20120011780 | MODULAR GUY ANCHOR - A modular guy anchor includes an anchor head and an anchor shaft. The anchor head includes a tubular region for receiving the anchor shaft. The anchor shaft has one end that extends into or through the tubular region and is retained therein. The anchor shaft is preferably galvanized steel coated over at least a portion of its length with a corrosion-resistant material. The corrosion-resistant material is preferably applied over any portion of the anchor shaft that is exposed to soil during normal use. The modularity of the guy anchor facilitates stocking, shipping, and installation, while the corrosion resistance of the anchor shaft promotes longevity. | 01-19-2012 |
20130000244 | GUY ANCHOR REINFORCEMENT - A reinforcing system for a guy anchor used in a guyed or additionally guyed tower includes a concrete structure formed around the guy anchor. The concrete structure has a top surface slightly above grade level. The reinforcing system further includes a supplemental anchor shaft. The supplemental anchor shaft is attached to the existing anchor head and extends down into the concrete structure, where it is retained and encased therein. The concrete structure preferably has a base and at least one wall that extends down from the base and has a surface that faces the tower to resist horizontal forces. The reinforcing system is sufficiently strong to keep the guy anchor in place even if the original anchor shaft completely corrodes. The supplemental anchor shaft does not generally come into contact with soil. It therefore resists corrosion and is expected to provide a long service life. | 01-03-2013 |
20130145701 | MODULAR GUY ANCHOR - A modular guy anchor includes an anchor head and an anchor shaft. The anchor head includes a tubular region for receiving the anchor shaft. The anchor shaft has one end that extends into or through the tubular region and is retained therein. The anchor shaft is preferably galvanized steel coated over at least a portion of its length with a corrosion-resistant material. The corrosion-resistant material is preferably applied over any portion of the anchor shaft that is exposed to soil during normal use. The modularity of the guy anchor facilitates stocking, shipping, and installation, while the corrosion resistance of the anchor shaft promotes longevity. | 06-13-2013 |
20130276387 | GUY ANCHOR REINFORCEMENT - A reinforcing system for a guy anchor used in a guyed or additionally guyed tower includes a concrete structure formed around the guy anchor. The concrete structure has a top surface slightly above grade level. The reinforcing system further includes a supplemental anchor shaft. The supplemental anchor shaft is attached to the existing anchor head and extends down into the concrete structure, where it is retained and encased therein. The concrete structure preferably has a base and at least one wall that extends down from the base and has a surface that faces the tower to resist horizontal forces. The reinforcing system is sufficiently strong to keep the guy anchor in place even if the original anchor shaft completely corrodes. The supplemental anchor shaft does not generally come into contact with soil. It therefore resists corrosion and is expected to provide a long service life. | 10-24-2013 |
Patent application number | Description | Published |
20100056405 | SELF-DIVERTING ACID TREATMENT WITH FORMIC-ACID-FREE CORROSION INHIBITOR - A method of treating a subterranean formation penetrated by a wellbore of a well having iron-containing components is carried out by introducing a treatment fluid into the wellbore of the well. The treatment fluid is formed from an aqueous solution, a mineral acid, a viscoelastic surfactant gelling agent and corrosion inhibitor system containing at least one of an alkyl, alkenyl, alicyclic or aromatic substituted aliphatic ketone and aliphatic or aromatic aldehyde. The treatment fluid is substantially free of any formic acid or precursor formic acid. In certain embodiments, the corrosion inhibitor system comprises a mixture of at least one of an alkenyl phenone or α,β-unsaturated aldehyde, an unsaturated ketone or unsaturated aldehyde other than the alkenyl phenone and α,β-unsaturated aldehyde, a dispersing agent, an extender and an alcohol solvent. A corrosion inhibitor intensifier may also be used in certain embodiments, which may include a mixture of cuprous iodide and cuprous chloride. | 03-04-2010 |
20100093891 | Self-Viscosifying and Self-Breaking Gels - The invention provides a method. The method injects into a wellbore, a fluid comprising at least one of an acrylamide polymer and an acrylamide copolymer, and at least one of an oxidizing agent and a radical initiator; and allows viscosity of the fluid to increase for a first period of time; and subsequently, allows viscosity of the fluid to decrease for a second period of time. In a further aspect the invention provides a fluid for use in a well within a subterranean formation penetrated by a wellbore. The fluid is in a first embodiment, made of an acrylamide polymer and/or copolymer and an oxidizing agent or radical initiator, wherein concentration of the oxidizing agent or radical initiator is such that the fluid increases its viscosity for a period of time and after said period of time decreases its viscosity. The fluid is in a second embodiment, made of an acrylamide polymer and/or copolymer and an oxidizing agent or radical initiator, wherein the oxidizing agent or radical initiator is such that the fluid increases its viscosity for a period of time and after said period of time decreases its viscosity. | 04-15-2010 |
20120220503 | COMPOSITION AND METHOD FOR TREATING WELL BORE IN A SUBTERRANEAN FORMATION WITH CROSSLINKERS POLYMER FLUIDS - The concentrate solution for the crosslinking of polymers comprises water, polyol, a viscosifying agent, a first borate ion in solution, and a crosslinking agent able to release a second borate ion, wherein the second borate ion is not in solution. | 08-30-2012 |
20120245060 | CROSS-LINKERS FOR HYDRAULIC FRACTURING FLUID - A method of forming a wellbore fluid, the method including introducing a hydratable polymer and introducing a crosslinker comprised of at least a silica material, the crosslinker having a dimension of from about 5 nm to about 100 nm. | 09-27-2012 |
20140158356 | ENCAPSULATED EXPLOSIVE PELLET - An apparatus usable with a well includes an explosive pellet that is adapted to be communicated into the well via a fluid and includes an explosive material that is adapted to be detonated downhole in the well. The apparatus further includes an encapsulant to encapsulate the explosive pellet to inhibit unintended detonation of the explosive material. The encapsulant is adapted to be at least partially removed from the explosive pellet in response to the explosive pellet being communicated into the well. | 06-12-2014 |
Patent application number | Description | Published |
20080283064 | Surgical drape with position assisting fenestration - A surgical drape has a fenestration configured to aid in identifying an anatomical point of interest and positioning the fenestration at the surgical site. In one preferred form, the surgical drape has a chevron-shaped fenestration for positioning the fenestration relative to the xiphoid process region of a patient, which is useful for establishing the sterile field in certain bariatric procedures. An anesthesia screen at a head of the drape extends laterally to the sides of the base sheet forming the fenestration and defines integral arm board covers. The lateral ends of the anesthesia sheet are sealed in part to close the ends of the arm board covers. A secondary base sheet defining a smaller, secondary fenestration is releasably attached to the base sheet so that the fenestrations can be aligned with one another. Various instrument and chord management features are also included. A method of making the drape is also disclosed. | 11-20-2008 |
20090301632 | FENESTRATED EXTREMITY SURGICAL DRAPE - A method of forming a fenestrated extremity surgical drape includes providing improved seal integrity to reduce the occurrence of pathogenic contamination at the surgical site via migration through the seal. The seal has a non-linear configuration to eliminate uneven stress concentrations commonly located at the corners of rectilinear seals. An elastomeric apertured panel can be disposed between a film panel and a fiber/film laminate panel. These layers can be joined by a heat sealing operation along two spaced apart concentric seal locations ringing the aperture and a fenestration in the laminate panel. The assembly can then be affixed by adhering the underside(s) of one or more panels to a base drape, which has an opening aligned with the aperture and fenestration. | 12-10-2009 |
20110174318 | SURGICAL DEVICE HAVING MULTIPLE RECEPTACLES - A surgical device comprising a first receptacle having a first mouth and a second receptacle having a second mouth, wherein the first mouth is in open communication with the second mouth via a joint joining the first receptacle with the second receptacle, and wherein the first mouth and second mouth open in a common direction. The surgical device can be used to effectively collect fluid during surgery in a first receptacle while simultaneously and independently retaining equipment and other medical supplies, such as tubes, wires, and/or tools, in a second receptacle. A drape sheet for covering at least a portion of a patient, the drape sheet optionally having a fenestration therein, with the surgical device being attached to the drape sheet. | 07-21-2011 |
20110240039 | SURGICAL DRAPE HAVING TEARABLE SHEET - A surgical drape having a tearable first sheet, the first sheet including at least one notch disposed at a periphery of the first sheet and an imperforate portion extending from the at least one notch to at least one fenestration, wherein tearing the first sheet via the at least one notch creates a linear tear line extending along the imperforate portion from the at least one notch to the at least one fenestration. The fenestration may be included in the first sheet. The drape may also include a second sheet, wherein the second sheet comprises the fenestration, wherein a cut extends from a periphery of the second sheet to the fenestration in the second sheet, wherein the first sheet is affixed a surface of the second sheet and extends along a length of and overlapping the cut, and wherein the notch is aligned with the cut. | 10-06-2011 |
Patent application number | Description | Published |
20110276742 | Characterizing Multiple Resource Utilization Using a Relationship Model to Optimize Memory Utilization in a Virtual Machine Environment - An approach is provided that uses a hypervisor to allocate a shared memory pool amongst a set of partitions (e.g., guest operating systems) being managed by the hypervisor. The hypervisor retrieves memory related metrics from shared data structures stored in a memory, with each of the shared data structures corresponding to a different one of the partitions. The memory related metrics correspond to a usage of the shared memory pool allocated to the corresponding partition. The hypervisor identifies a memory stress associated with each of the partitions with this identification based in part on the memory related metrics retrieved from the shared data structures. The hypervisor then reallocates the shared memory pool amongst the plurality of partitions based on the identified memory stress of the plurality of partitions. | 11-10-2011 |
20120005401 | PAGE BUFFERING IN A VIRTUALIZED, MEMORY SHARING CONFIGURATION - An apparatus includes a processor and a volatile memory that is configured to be accessible in an active memory sharing configuration. The apparatus includes a machine-readable encoded with instructions executable by the processor. The instructions including first virtual machine instructions configured to access the volatile memory with a first virtual machine. The instructions including second virtual machine instructions configured to access the volatile memory with a second virtual machine. The instructions including virtual machine monitor instructions configured to page data out from a shared memory to a reserved memory section in the volatile memory responsive to the first virtual machine or the second virtual machine paging the data out from the shared memory or paging the data in to the shared memory. The shared memory is shared across the first virtual machine and the second virtual machine. The volatile memory includes the shared memory. | 01-05-2012 |
20130159614 | PAGE BUFFERING IN A VIRTUALIZED, MEMORY SHARING CONFIGURATION - An apparatus includes a processor and a volatile memory that is configured to be accessible in an active memory sharing configuration. The apparatus includes a machine-readable encoded with instructions executable by the processor. The instructions including first virtual machine instructions configured to access the volatile memory with a first virtual machine. The instructions including second virtual machine instructions configured to access the volatile memory with a second virtual machine. The instructions including virtual machine monitor instructions configured to page data out from a shared memory to a reserved memory section in the volatile memory responsive to the first virtual machine or the second virtual machine paging the data out from the shared memory or paging the data in to the shared memory. The shared memory is shared across the first virtual machine and the second virtual machine. The volatile memory includes the shared memory. | 06-20-2013 |
20130346967 | Determining Placement Fitness For Partitions Under A Hypervisor - A technique for determining placement fitness for partitions under a hypervisor in a host computing system having non-uniform memory access (NUMA) nodes. In an embodiment, a partition resource specification is received from a partition score requester. The partition resource specification identifies a set of computing resources needed for a virtual machine partition to be created by a hypervisor in the host computing system. Resource availability within the NUMA nodes of the host computing system is assessed to determine possible partition placement options. A partition fitness score of a most suitable one of the partition placement options is calculated. The partition fitness score is reported to the partition score requester. | 12-26-2013 |
20130346972 | Determining Placement Fitness For Partitions Under A Hypervisor - A technique for determining placement fitness for partitions under a hypervisor in a host computing system having non-uniform memory access (NUMA) nodes. In an embodiment, a partition resource specification is received from a partition score requester. The partition resource specification identifies a set of computing resources needed for a virtual machine partition to be created by a hypervisor in the host computing system. Resource availability within the NUMA nodes of the host computing system is assessed to determine possible partition placement options. A partition fitness score of a most suitable one of the partition placement options is calculated. The partition fitness score is reported to the partition score requester. | 12-26-2013 |
Patent application number | Description | Published |
20100191720 | Risk-premium-based database-query optimization - Embodiments of the present invention are directed to query-optimization methods and systems that employ risk premiums assigned to database operations in order to increase the robustness and reliability of the evaluation and selection of query-execution plans for executing high-level database queries. Using risk-premium estimates, selection of query-execution plans that include potentially inefficient database operations and inefficient database-operation-execution sequences, often selected by currently available query-optimization methods and systems, are avoided. | 07-29-2010 |
20110029508 | SELECTIVITY-BASED OPTIMIZED-QUERY-PLAN CACHING - Embodiments of the present invention partition optimized query plans into equivalence groups, each comprising one or more equivalence classes. Each equivalence group corresponds to a particular compiled, normalized, and parameterized query plan prior to optimization. Each equivalence class within an equivalence group corresponds to a different query plan corresponding to the particular compiled, normalized, and parameterized query plan represented by the equivalence group that has been optimized with respect to the selectivity of one or more predicate clauses of the query that is compiled to produce the particular compiled, normalized, and parameterized query plan. Optimized query plans are cached according to their respective equivalence groups and equivalence classes. When a query, similar to a query already compiled, optimized, and cached, is subsequently received and compiled, a selectivity for a predicate of the compiled query is computed, allowing the database management system to retrieve a cached query plan optimized for a similar query with similar selectivity. | 02-03-2011 |
20110060731 | SYSTEM AND METHOD FOR OPTIMIZING QUERIES - There is provided a computer-implemented method of optimizing a query. An exemplary method comprises determining a maximum cardinality for an operator. The query may comprise the operator. The exemplary method also comprises determining a plurality of potential implementations for the operator. The exemplary method additionally comprises generating a query plan for the query based on the maximum cardinality and the potential implementations. | 03-10-2011 |
20120179669 | SYSTEMS AND METHODS FOR SEARCHING A SEARCH SPACE OF A QUERY - One example discloses a database management system that can comprise a memory for storing computer executable instructions and a processing unit for accessing the memory and executing the computer executable instructions. The computer executable instructions can comprise a compiler to amortize the execution resource cost of searching a search space corresponding to a received query over a plurality of searches. | 07-12-2012 |