Patent application number | Description | Published |
20090044568 | Submerged fired vertical furnance - A furnace is heated by submerged heating equipment. An exhaust stack is vented directly to outside the furnace. A portion of hot gases may pass into at least one shaft via which incoming material and a stage of pre-heating occurs. | 02-19-2009 |
20110172077 | HIGH TEMPERATURE GLASS FIBER INSULATION - Disclosed are glass compositions containing Beryllia in addition to various proportions of Silica, Alumina, Calcium, Magnesia, Sodium, Potassium, Iron, Titania, Zirconia, Manganese and/or Phosphorous. Fibers were produced from the disclosed compositions using standard glass processing equipment. These fibers yielded high temperature fibers having low density, high strength, high modulus, excellent glass surfaces requiring very little bonding material to hold the fibers together. Bio solubility is preferably promoted by ensuring that only trace quantities of alumina are present. Fibers having those properties are particularly suitable for producing high temperature glass fiber insulation for use in aircraft and other vehicles. | 07-14-2011 |
20120205571 | Glass fiber binder for aircraft insulation - Glass fiber compositions are provided in the form of mats comprising a binder of thermoplastic polymer or other non-hazardous insulation material which resists high temperatures such as 2,000° F. for long periods. | 08-16-2012 |
20120214660 | GLASS FIBER FOR HIGH TEMPERATURE INSULATION - A glass composition is provided for the production of high temperature glass fibers with oxides comprising 1% to 15% Fe | 08-23-2012 |
Patent application number | Description | Published |
20120035990 | SYSTEM AND METHOD FOR REWARDING APPLICATION INSTALLS - In a system and method for monitoring application installations, a reference to download an application is transmitted to a client device. Communication between the client device and an application server providing the application downloadable by the client device is facilitated. Execution of the application by the client device is detected, and a determination of the installation history of the application on the client device is performed. Reward data is associated with the client device for a first installation of the application on the client device. | 02-09-2012 |
20130211942 | METHOD FOR ENABLING A GIFT TRANSACTION - A method of an embodiment includes: receiving a gift request from a sender, the gift request specifying a recipient and a gift item; requesting approval of the gift item from the recipient; posting a notification of the gift item for publication by an online social network in response to approval of the gift item by the recipient; and initiating payment for the gift item, on behalf of the sender, in response to approval of the gift item by the recipient. | 08-15-2013 |
20130211943 | METHOD FOR ENABLING A GIFT TRANSACTION - A method of an embodiment includes: receiving a gift request from each of a plurality of senders, each gift request specifying a recipient and a selected gift item; requesting approval of each gift item from a respective recipient; posting a notification of each gift item for publication by an online social network in response to approval of each gift item by a respective recipient; initiating payment for each gift item, by a respective sender, in response to approval of each gift item by a respective recipient; tracking approval and modification of each gift item by a respective recipient; and generating a trend report of gift customization based upon a characteristic of recipients who modify and accept gift items specified by respective senders. | 08-15-2013 |
20130211949 | METHOD FOR ENABLING A GIFT TRANSACTION - A method of an embodiment includes: receiving a gift request from a sender, the gift request specifying a recipient and an initial order for a gift item of a predefined price; modifying the initial gift order according to a customization input from the recipient; requesting approval of the modified gift order from the recipient; posting a notification of the modified gift order for publication by an online social network in response to approval of the modified gift order by the recipient; and in response to approval of the modified gift order by the recipient, initiating fulfillment of the modified gift order by requesting payment from the sender up to the predefined price of the gift item specified in the gift request and according to the customization input from the recipient. | 08-15-2013 |
20130211954 | METHOD FOR ENABLING A GIFT TRANSACTION - A method of an embodiment includes: accessing a list of gift items previously selected for a recipient by previous senders, the list comprising a first gift item previously selected by a first sender; receiving a gift request from a second sender, the gift request specifying the recipient and a second gift item; identifying a complementary relationship between the first gift item and the second gift item; requesting approval, from the recipient, of an aggregated gift item that is a combination of the first gift item and the second gift item; posting a notification of the aggregated gift item for publication by an online social network in response to approval of the aggregated gift item by the recipient; and initiating payment of the second gift item by the second sender in response to approval of the aggregated gift item by the recipient. | 08-15-2013 |
20130332307 | METHOD FOR NOTIFYING A SENDER OF A GIFTING EVENT - One variation of the method includes: within a set of communications from a set of users and directed to a recipient within a social networking system, identifying indicators of a gift-appropriate event of the recipient; selecting a gift for the recipient in response to a threshold number of communications with an identified indicator of the gift-appropriate event; selecting a sender, outside the set of users, based on a determined relationship between the sender and the recipient; transmitting an electronic notification to the sender, the electronic notification including an recommendation for the gift for the recipient; and modifying the recommendation in response to an update event following transmission of the electronic notification to the sender and prior to purchase of the gift, by the sender, for the recipient. | 12-12-2013 |
20130332308 | METHOD FOR RECOMMENDING A GIFT TO A SENDER - One variation of the method includes: receiving a set of communications from multiple users, the set of communications directed to a recipient through a social networking system; identifying a gift-appropriate event of the recipient based on the set of communications; determining an intent of a sender to respond to the gift-appropriate event of the recipient based on an incomplete electronic note drafted by the sender, within the social networking system, and designating the recipient; selecting a gift for the recipient in response to the determined intent of the sender; and prior to transmission of the note to the recipient, displaying a recommendation to the sender, the recommendation including a suggestion to purchase the gift for the recipient. | 12-12-2013 |
Patent application number | Description | Published |
20120179891 | EXTENSION OF WRITE ANYWHERE FILE SYSTEM LAYOUT - A file system layout apportions an underlying physical volume into one or more virtual volumes (vvols) of a storage system. The underlying physical volume is an aggregate comprising one or more groups of disks, such as RAID groups, of the storage system. The aggregate has its own physical volume block number (pvbn) space and maintains metadata, such as block allocation structures, within that pvbn space. Each vvol has its own virtual volume block number (vvbn) space and maintains metadata, such as block allocation structures, within that vvbn space. Notably, the block allocation structures of a vvol are sized to the vvol, and not to the underlying aggregate, to thereby allow operations that manage data served by the storage system (e.g., snapshot operations) to efficiently work over the vvols. | 07-12-2012 |
20130262805 | Method and Apparatus for Identifying and Eliminating Duplicate Data Blocks and Sharing Data Blocks in a Storage System - A method for sharing data blocks in a hierarchical file system in a storage server includes allocating a plurality of data blocks in the file system, and sharing data blocks in the file system, without using a persistent point-in-time image, to avoid duplication of data blocks. A method for identifying data blocks that can be shared includes computing a fingerprint for each of multiple data blocks to be written to a storage facility and storing the fingerprint with information identifying the data block in an entry in a set of metadata. The set of metadata is used to identify data blocks which are duplicates. | 10-03-2013 |
20140082281 | EXTENSION OF WRITE ANYWHERE FILE SYSTEM LAYOUT - A file system layout apportions an underlying physical volume into one or more virtual volumes (vvols) of a storage system. The underlying physical volume is an aggregate comprising one or more groups of disks, such as RAID groups, of the storage system. The aggregate has its own physical volume block number (pvbn) space and maintains metadata, such as block allocation structures, within that pvbn space. Each vvol has its own virtual volume block number (vvbn) space and maintains metadata, such as block allocation structures, within that vvbn space. Notably, the block allocation structures of a vvol are sized to the vvol, and not to the underlying aggregate, to thereby allow operations that manage data served by the storage system (e.g., snapshot operations) to efficiently work over the vvols. The file system layout extends the file system layout of a conventional write anywhere file layout system implementation, yet maintains performance properties of the conventional implementation. | 03-20-2014 |
20150081966 | DENSE TREE VOLUME METADATA ORGANIZATION - In one embodiment, a node coupled to one or more storage devices executes a storage input/output (I/O) stack having a volume layer. The volume layer manages volume metadata embodied as mappings from offsets of a logical unit (LUN) to extent keys associated with storage locations for extents on the one or more storage devices. Volume metadata is maintained as a dense tree metadata structure representing successive points in time. The dense tree metadata structure has multiple levels, wherein a top level of the dense tree metadata structure represents newer volume metadata changes and descending levels of the dense tree metadata structure represent older volume metadata changes. The node accesses a latest version of changes to the volume metadata by searching from the top level to the descending levels in the dense tree metadata structure. | 03-19-2015 |
Patent application number | Description | Published |
20120011031 | Online Marketplace for Trading of Data Collected from Use of Products and Services - An online marketplace permits the trading of data collected from a plurality of end users, where the data is obtained from the use of a product or service. In one embodiment, a method includes: hosting a marketplace for trading of data provided from the end users; collecting user data from each end user, wherein the data is obtained from use by each end user of a product or a service; storing the respective user data for each respective end user; offering the user data of each end user for a trade with a customer; if the customer accepts the trade, providing the respective user data of each end user to the customer; and providing compensation to each end user based on a share of the revenue received for the trade. | 01-12-2012 |
20120116911 | Data Valuation Estimates in Online Systems - A request for a valuation of a data set is received, over a network, from a requesting user. A plurality of valuation elements associated with the data set are identified, using a data processing system. A data valuation estimate is determined, using the data processing system, for the data set using the plurality of valuation elements. A representation of the data valuation estimate is transmitted, over the network, to the requesting user such that the representation of the data valuation estimate is caused to be displayed on a display device associated with the requesting user. | 05-10-2012 |
20120116923 | Privacy Risk Metrics in Online Systems - A plurality of persona attributes are identified within a data set received from a data seller. A persona privacy risk associated with the persona attributes of the dataset is determined. The persona privacy risk comprises an estimate of the potential sensitivity of the persona attributes. A plurality of identity attributes within a data set received from a data seller are identified. An identity privacy risk associated with the plurality of identity attributes is determined. The persona privacy risk comprises an estimate of the risk that the plurality of identity attributes identify the data seller. A total privacy risk is then determined using the persona privacy risk and the identity privacy risk associated with the dataset, the total privacy risk comprising an estimate of a total risk to the privacy of the data seller that disclosure of the dataset represents. | 05-10-2012 |
Patent application number | Description | Published |
20090175112 | Table lookup voltage compensation for memory cells - Systems and methods of regulating voltage at a memory cell are disclosed. An address for the memory cell is determined. Table lookups based on the address are performed. The table lookups yield voltage compensation parameters that can be used to set voltages on the terminals (e.g., source and drain) of the memory cell. | 07-09-2009 |
20100149899 | TABLE LOOKUP VOLTAGE COMPENSATION FOR MEMORY CELLS - Systems and methods of regulating voltage at a memory cell are disclosed. An address for the memory cell is determined. Table lookups based on the address are performed. The table lookups yield voltage compensation parameters that can be used to set voltages on the terminals (e.g., source and drain) of the memory cell. | 06-17-2010 |
20110211412 | TABLE LOOKUP VOLTAGE COMPENSATION FOR MEMORY CELLS - Systems and methods of regulating voltage at a memory cell are disclosed. An address for the memory cell is determined. Table lookups based on the address are performed. The table lookups yield voltage compensation parameters that can be used to set voltages on the terminals (e.g., source and drain) of the memory cell. | 09-01-2011 |
20120230142 | TABLE LOOKUP VOLTAGE COMPENSATION FOR MEMORY CELLS - Systems and methods of regulating voltage at a memory cell are disclosed. An address for the memory cell is determined. Table lookups based on the address are performed. The table lookups yield voltage compensation parameters that can be used to set voltages on the terminals (e.g., source and drain) of the memory cell. | 09-13-2012 |
Patent application number | Description | Published |
20120255861 | GROWTH TUBE MICROCHIP ELECTROPHORESIS SYSTEM - This technology is a method and apparatus for the semi-continuous measurement of the concentration of constituents of airborne particles which couples a laminar flow, water condensation particle collector to a microfluidic device for assay of particle chemical composition by electrophoresis. The technology has been used for the assay of sulfates, nitrates, chlorides, and organic acids contained in fine and submicrometer atmospheric particles. For these compounds the apparatus and method described is capable of one-minute time resolution at concentrations at the level of micrograms of analyte species per cubic meter of air. Extension to other analytes is possible. | 10-11-2012 |
20140029154 | CONDENSATION-EVAPORATOR NANOPARTICLE CHARGER - A particle charging method and apparatus are provided. An ion source is applied to a particle laden flow. The flow is introduced into a container in a laminar manner. The container has at least a first section, a second section and a third section. The first section includes wetted walls at a first temperature. A second section adjacent to the first section has wetted walls at a second temperature T | 01-30-2014 |
20140033915 | WICK WETTING FOR WATER CONDENSATION SYSTEMS - A system and method for particle enlargement with continuously wetted wicks includes a container into which a flow of particle-laden air is introduced in a laminar manner through an inlet and to an outlet. The container has a first section, a second section and a third section though which the particle-laden air flows between the inlet and the outlet. The temperature of the second section is warmer than that of the first section at the inlet and the third section at the outlet. In one embodiment, a continuous wick spanning an interior wall of the first second, second section and third section, said wick being capable of internally transporting liquid water along its length is provided. Alternatively, a wick characterized by a bubble point pressure has one side in contact with air and an opposing side mounted adjacent to the interior wall of a housing with a gap formed between the wick and the housing, wherein the wick is used with a water reservoir such that the pressure difference between the air flow and the water filled gap is less than the bubble point pressure of the wick material. | 02-06-2014 |
Patent application number | Description | Published |
20110043797 | Image Collection - An inspection system for creating images of a substrate. A light source directs an incident light onto the substrate, and a light source timing control controls a pulse timing of the incident light. A stage holds the substrate and moves the substrate under the incident light, so that the substrate reflects the incident light as a reflected light. A stage position sensor reports a position of the stage, and a stage position control controls the position of the stage. A time domain integration sensor receives the reflected light, and a time domain integration sensor timing control controls a line shift of the time domain integration sensor. A control system is in communication with the light source timing control, the stage position control, and the time delay integration sensor timing control, and sets the pulse timing of the incident light, the position of the stage, and the line shift of the time delay integration sensor, such that a single line of the time domain integration sensor integrates reflected light from more than one pulse of the incident light from the light source. | 02-24-2011 |
20120086796 | COORDINATE FUSION AND THICKNESS CALIBRATION FOR SEMICONDUCTOR WAFER EDGE INSPECTION - A system may include a support configured to rotatably support a wafer. The system may also include an imager for generating an image of a wafer, where the image includes a first coordinate reference. The system may also include a profiler for generating a profile of the wafer, where the profile includes a second coordinate reference. The system may further include control programming for locating at least one structural feature of an edge of the wafer recognizable by both the imager and the profiler for allowing the first coordinate reference to be mapped to the second coordinate reference. The wafer used in calibration may have discrete edge features detectable in an edge imager and in an edge profiler. | 04-12-2012 |
20130271596 | Systems and Methods for Sample Inspection and Review - The disclosure is directed to systems and methods for sample inspection and review. In some embodiments, images are collected and/or defects are located utilizing separately addressable red, green, and blue (RGB) illumination sources to improve image quality. In some embodiments, illumination sources are pulse width modulated for substantially consistent light intensity in presence of variable sample motion. In some embodiments, a stage assembly is configured to support the sample without blocking access to the supported surface of the sample, and further configured to reduce oscillations or vibrations of the sample. In some embodiments, an illumination system includes an imaging path and a focusing path to allow full field of view focusing. | 10-17-2013 |
20140253910 | System and Method for Reviewing a Curved Sample Edge - The disclosure is directed to a system and method for reviewing a curved edge of a sample. A line scan detector is actuated along an actuation path defined by the edge of the sample to scan a plurality of locations along the sample edge. The scan data is assembled to generate at least one review image of at least a portion of the edge of the sample. In some embodiments a substantially normal angle of incidence is maintained between the sample edge and the scanning illumination. In some embodiments, brightfield and darkfield images may be collected utilizing a common objective with separately operable illumination sources directing illumination along a first and second illumination path to the sample edge for review. | 09-11-2014 |
Patent application number | Description | Published |
20100137074 | IRON-TYPE GOLF CLUBS - An iron-type golf club includes a conventional-weight section, a lightweight section and a heavyweight section. The conventional-weight section includes the hitting face and at least a portion of the hosel. The heavyweight section, made of a denser material than the conventional-weight section, includes the sole and an optional back flange. The lightweight section, made of a material less dense than either of the other sections, includes a core to which the other two sections are secured, such as by co-molding the core to the other two sections. In the co-molding context, the components need not be constrained by their respective weight and density, but could be classified more generically as having a pre-formed component and a molding component irrespective of the densities of the components. | 06-03-2010 |
20120264537 | GOLF CLUB HEADS WITH ENLARGED GROOVES - Golf club heads with enlarged grooves, wherein a portion of the finish adjacent or within the groove is removed to create the visual appearance of enlarged grooves. The surface finish of the groove enhancement area surrounding the groove is matched to be the same as the surface finish of the groove, preferably a bright, smooth or shiny metallic finish. This surface finish of the remainder of the striking face of the golf club is a second surface finish, preferably a dark or black matte, or rough finish. The contrast between the two finishes gives the perception that the grooves are larger than they are physically. | 10-18-2012 |
20130045816 | GOLF CLUB GRIP - The invention generally relates to a grip for a golf club. In certain embodiments, the invention provides a golf club grip having a pattern such that a view of the grip is identical to a user for every position of a multi-positional club head of a golf club. | 02-21-2013 |
20130172102 | Iron-Type Golf Clubs - An iron-type golf club includes a conventional-weight section, a lightweight section and a heavyweight section. The conventional-weight section includes the hitting face and at least a portion of the hosel. The heavyweight section, made of a denser material than the conventional-weight section, includes the sole and an optional back flange. The lightweight section, made of a material less dense than either of the other sections, includes a core to which the other two sections are secured, such as by co-molding the core to the other two sections. In the co-molding context, the components need not be constrained by their respective weight and density, but could be classified more generically as having a pre-formed component and a molding component irrespective of the densities of the components. | 07-04-2013 |
20130203517 | GOLF CLUB GRIP WITH HOUSING - The invention generally relates to a grip for a golf club for housing an accessory to enhance the enjoyment of the game of golf. A grip of the invention prevents relative motion between the accessory and the club when the accessory is coupled to the club. | 08-08-2013 |
20140342846 | GOLF CLUB HEADS WITH ENLARGED GROOVES - Golf club heads with enlarged grooves, wherein a portion of the finish adjacent or within the groove is removed to create the visual appearance of enlarged grooves. The surface finish of the groove enhancement area surrounding the groove is matched to be the same as the surface finish of the groove, preferably a bright, smooth or shiny metallic finish. This surface finish of the remainder of the striking face of the golf club is a second surface finish, preferably a dark or black matte, or rough finish. The contrast between the two finishes gives the perception that the grooves are larger than they are physically. | 11-20-2014 |
Patent application number | Description | Published |
20090090199 | DIVE COMPUTER WITH GLOBAL POSITIONING SYSTEM RECEIVER - Dive computers and methods of logging information including position, audio and video information are disclosed. In one embodiment, the invention includes a processor, a global positioning system receiver connected to the processor and a pressure transducer connected to the processor. | 04-09-2009 |
20090135022 | DIVE COMPUTER WITH GLOBAL POSITIONING SYSTEM RECEIVER - Dive computers in accordance with embodiments of the invention are disclosed. One embodiment includes a microprocessor, a pressure transducer connected to the microprocessor, a microphone connected to the microprocessor, a speaker connected to the microprocessor, a telephone transceiver connected to the microprocessor, a GPS receiver connected to the microprocessor and a display. In addition, the microprocessor, pressure transducer and display are configured to display information concerning the dive computer's depth of submersion, the microprocessor, microphone, speaker and telephone transceiver are configured to enable the dive computer to be used as a telephone handset, and the microprocessor is configured to obtain GPS coordinates from the GPS receiver. In a further embodiment, the microprocessor, the microphone, the speaker, the telephone transceiver, the display, and the GPS receiver are components of a mobile phone handset including an external connector for communicating with external devices, the pressure transducer is packaged separately from the mobile phone handset and the pressure transducer packaging includes a connector configured to mate with the external connector of the mobile phone handset creating a connection between the pressure transducer and the microprocessor, and the mobile phone handset and the pressure transducer are contained within a waterproof housing. In addition, a software application installed on the mobile phone handset configures the microprocessor to record information concerning the dive computer's depth and time of submersion in a dive log. | 05-28-2009 |
20120220317 | Dive Computer with Global Positioning System Receiver - Dive computers in accordance with embodiments of the invention are disclosed. One embodiment includes a mobile phone handset, including a microprocessor, a microphone connected to the microprocessor, a speaker connected to the microprocessor, a telephone transceiver connected to the microprocessor, memory, a display, and an external connector for communicating with external devices wherein the memory contains a software application, and a waterproof housing including a pressure transducer, where the mobile phone handset is located within the waterproof housing and connected to the pressure transducer via the external connector, and wherein the software application configures the mobile phone handset to create a dive log stored in memory, wherein the dive log comprises recorded information including depth of submersion information recorded from the pressure transducer and display the recorded information during the dive. | 08-30-2012 |
20130027541 | DIVE COMPUTER WITH GLOBAL POSITIONING SYSTEM RECEIVER - Dive computers in accordance with embodiments of the invention are disclosed. One embodiment includes a mobile phone handset, including a microprocessor, a microphone connected to the microprocessor, a speaker connected to the microprocessor, a telephone transceiver connected to the microprocessor, memory, a display, and an external connector for communicating with external devices wherein the memory contains a software application, and a waterproof housing including a pressure transducer, where the mobile phone handset is located within the waterproof housing and connected to the pressure transducer via the external connector, and wherein the software application configures the mobile phone handset to create a dive log stored in memory, wherein the dive log comprises recorded information including depth of submersion information recorded from the pressure transducer and display the recorded information during the dive. | 01-31-2013 |
20130144558 | Systems and Methods for Dive Computers with Remote Upload Capabilities - Dive computers incorporating a variety of features are disclosed. One embodiment of the invention includes a dive computer including a microprocessor, memory configured to store a software application, a pressure transducer configured to determine depth information, and a communications device configured to communicate with external devices, wherein the software application configures the microprocessor to create a dive log stored in memory, wherein the dive log includes recorded information including depth of submersion information recorded from the pressure transducer, and transmit the dive log using the communications device. | 06-06-2013 |
Patent application number | Description | Published |
20090084413 | VAPOR DRYER HAVING HYDROPHILIC END EFFECTOR - Embodiments of the present invention generally relate to an apparatus and methods for rinsing and drying substrates. One embodiment provides an end effector comprising a body having a contact tip for contacting an edge area of a substrate, wherein the end effector is configured to support the substrate while the substrate is in a rinsing bath and while the substrate is being dried from the rinsing bath, and the contact tip comprises a hydrophilic material. | 04-02-2009 |
20090196724 | EDGE CONTACT GRIPPER - The present invention generally provides a method and apparatus for supporting and transferring a substrate. One embodiment of the present invention provides an apparatus configured for handling a substrate comprising a base member, a first finger movably connected with the base member, wherein the first finger is pivotable about a pivoting axis, a second finger movably connected with the base member, wherein the second finger is pivotable about the pivoting axis, the first and second fingers form an opening, and pivoting of the first and second fingers allow the opening to vary for receiving a substrate and for carrying the substrate by contacting an edge of the substrate, and an actuator connected with the first finger and second finger, wherein the actuator is configured to pivot the first and second fingers simultaneously along opposite directions. | 08-06-2009 |
20110266736 | VAPOR DRYER HAVING HYDROPHILIC END EFFECTOR - Embodiments of the present invention generally relate to an apparatus and methods for rinsing and drying substrates. One embodiment provides an end effector comprising a body having a contact tip for contacting an edge area of a substrate, wherein the end effector is configured to support the substrate while the substrate is in a rinsing bath and while the substrate is being dried from the rinsing bath, and the contact tip comprises a hydrophilic material. | 11-03-2011 |
Patent application number | Description | Published |
20110302164 | Order-Independent Stream Query Processing - In a system and method for order-independent stream query processing, one or more input streams of data are received, and the one or more input streams are analyzed to determine data which is older than an already emitted progress indicator. The data which is older than the already emitted progress indicator is partitioned into one or more partitions, and each of the one or more partitions are independently processed using out-of-order processing techniques. A query is received, rewritten and decomposed into one or more sub-queries that produce partial results for each of the one or more partitions, where each of the one or more sub-queries correspond to a partition. A view is also produced that consolidates the partial results for each partition. The partial results are consolidated at a consolidation time specified by the query to produce final results, and the final results are provided. | 12-08-2011 |
20140012877 | ORDER-INDEPENDENT STREAM QUERY PROCESSING - In a system and method for order-independent stream query processing, one or more input streams of data are received, and the one or more input streams are analyzed to determine data which is older than an already emitted progress indicator. The data which is older than the already emitted progress indicator is partitioned into one or more partitions, and each of the one or more partitions are independently processed using out-of-order processing techniques. A query is received, rewritten and decomposed into one or more sub-queries that produce partial results for each of the one or more partitions, where each of the one or more sub-queries correspond to a partition. A view is also produced that consolidates the partial results for each partition. The partial results are consolidated at a consolidation time specified by the query to produce final results, and the final results are provided. | 01-09-2014 |
Patent application number | Description | Published |
20110191191 | PLACEHOLDER BIDS IN ONLINE ADVERTISING - Some embodiments of the invention provide techniques for placing “placeholder” bids in an auction associated with online advertising marketplace. Placeholder bids can include bids that are not actually entered or placed in the auction or marketplace. Rather, placeholder bids can include hypothetical bids. Impacts of placeholder bids, should the placeholder bids have been entered or placed as actual bids, can be assessed. An assessment can include assessing an impact on auction and marketplace parameters, an impact on bid or campaign performance, and an impact on downstream parameters such as user behavior, such as associated conversions or purchasing. | 08-04-2011 |
20110231245 | OFFLINE METRICS IN ADVERTISEMENT CAMPAIGN TUNING - Techniques are provided relating to optimization of an online advertising campaign. Information is obtained relating to online advertising, associated with a brand associated with an online advertising campaign, directed to each of a set of individuals. Information is also obtained relating to offline behavior of the individuals in association with the brand. One or more metrics are determined that are associated with a relationship between the online advertising and the offline behavior. Optimization of at least one parameter of the online advertising campaign is performed based at least in part on at least one of the one or more metrics. | 09-22-2011 |
20110231246 | ONLINE AND OFFLINE ADVERTISING CAMPAIGN OPTIMIZATION - Techniques are provided relating to advertising campaign optimization. Information is obtained relating to online and offline behavior of a set of individuals in association with a brand associated an advertising campaign. Based at least in part on the information, one or more metrics are determined reflecting an association between online advertising and offline behavior relating to the brand, or vice versa. Optimization is performed for at least one parameter of an online advertising campaign or an offline advertising campaign based at least in part on at least one of the one or more metrics. The campaign could also be a combined offline/online campaign. | 09-22-2011 |
20130211904 | GUI That Displays Characteristics of an Advertising Audience Selected By Specifying Targeting Constraints - An audience browser GUI that displays characteristics of an advertising audience selected by specifying targeting constraints is disclosed. The audience browser GUI allows a user to express constraints to define audiences. The audience browser displays characteristics of audiences defined by the constraints. A user can adjust constraints, observe characteristics of the resulting audience, and repeat to develop a desirable audience. In addition, the audience browser may recommend initial constraints and adjustments to constraints, based on advertiser goals and data. | 08-15-2013 |
Patent application number | Description | Published |
20120282111 | SYSTEM AND METHOD OF DIFFERENTIAL PRESSURE CONTROL OF A RECIPROCATING ELECTROKINETIC PUMP - A method of controlling the output of an electrokinetic pump to deliver a target stroke volume includes applying a pump drive signal to the electrokinetic pump for a pump stroke time duration and then determining a volume of a delivery fluid pumped. Then, comparing the volume of the delivery fluid pumped to the target stroke volume; generate a new time interval for applying the pump drive signal. Then apply the pump drive signal to the electrokinetic pump for the new time interval. A system for delivery of fluid includes an electrokinetic pump under the control of an electronic controller. The electronic controller contains computer readable instructions to determine an output of the electrokinetic pump and then generate a stroke time delivery adjustment for precise pumping schemes. | 11-08-2012 |
20120282112 | GANGING ELECTROKINETIC PUMPS - An electrokinetic system includes a first electrokinetic pump, a second electrokinetic pump, a reservoir having delivery fluid therein, and a controller. The first electrokinetic pump is configured to provide a first range of flow rates. The second electrokinetic pump is configured to provide a second range of flow rates. The second range includes flow rates that are greater than the flow rates of the first range. The reservoir is fluidically attached to the first electrokinetic pump and the second electrokinetic pump. The controller is configured to apply voltage to one of the first or second electrokinetic pumps and then apply voltage to the other of the first or second electrokinetic pumps so as to vary the flow rate range of delivery fluid pump from the reservoir. | 11-08-2012 |
20130085462 | ELECTROKINETIC PUMP BASED WOUND TREATMENT SYSTEM AND METHODS - A wound treatment system includes a patch, first and second fluid reservoirs, an electrokinetic pump assembly, and a controller. The patch is configured to enclose a wound area and includes an inlet and an outlet. The first fluid reservoir is fluidically connected to the inlet and the second fluid reservoir is fluidically connected to the outlet. The electrokinetic pump assembly is configured to pump a first treatment fluid from the first fluid reservoir into the patch through the inlet and to pump fluid from the patch through the outlet and into the second fluid reservoir. The controller is configured to operate the electrokinetic pump assembly and to include an electronic memory containing computer readable instructions for operating the electrokinetic pump assembly to perform a wound therapy protocol in the wound area. | 04-04-2013 |
Patent application number | Description | Published |
20120266259 | APPROACHES FOR FIRMWARE TO TRUST AN APPLICATION - Techniques for determining whether firmware should trust an application sufficiently so as to provide a service to the application. Firmware, executing on a device, receives an indication that an application, also executing on the device, is requesting a service provided by the firmware. The firmware obtains (a) an operating system signature associated with the application and (b) a firmware signature associated with the application. The operating system signature is a signature that is used by the operating system, executing on the device, to authenticate the application, while the firmware signature is a signature that is used by the firmware to authenticate the application. If the firmware determines that the operating system signature matches the firmware signature, then the firmware storing trust data that permits the application to access the service provided by the firmware. The firmware need not calculate a signature based on the in-memory image of the application. | 10-18-2012 |
20130061242 | SECURE APPLICATION FIRMWARE ENVIRONMENT FOR X86 AND NON-X86 PROCESSORS - Techniques for firmware providing a simulated system management mode (SMM) while being executed by a non-x86 platform, such as an ARM platform. In response to receiving a service call from an OS interface driver, the firmware may determine a requested service identified by the service call. Thereafter, the firmware may identify an appropriate service handler to perform the requested service. After the appropriate service handler performs the requested service, the appropriate service handler notifies the OS interface driver. Since the SMM is emulated by the firmware, the firmware may execute on an x86 platform or a non-x86 platform, such as an ARM platform. | 03-07-2013 |
20140075549 | SYSTEM AND METHOD FOR PROVIDING GESTURE-BASED USER IDENTIFICATION - A mechanism for allowing a user to prove their identity on touch-based devices employing the use of a touch surface in firmware-controlled environments is discussed. The user may prove his or her identity by entering a series of strokes on the touch-based device to form a word or image. Characteristics of the entered strokes such as stroke order and stroke direction are compared to stored stroke characteristics that were gathered from a drawing of the same word or image during a user enrollment process. If the stroke characteristics comparison is acceptable, the user identity is verified. | 03-13-2014 |
20140115364 | METHOD AND DEVICE FOR ADVANCED CONFIGURATION AND POWER INTERFACE (ACPI) SLEEP-STATE SUPPORT USING CPU-ONLY RESET - A mechanism for firmware to gain control from the operating system of an Advanced Configuration and Power Interface (ACPI)-compliant computing device during sleep-state transitions even if the computing device lacks a dedicated means for such a change to occur is discussed. Embodiments of the present invention report a CPU-only reset register in place of a sleep control register for an ACPI-compliant computing device in which an operating system is attempting a sleep-state transition. A CPU reset value is substituted for a sleep type value in a sleep-state object and written to the CPU-only reset register that was reported instead of the sleep control register thereby triggering a CPU-only reset. Firmware code operating at a known CPU reset vector may perform specified processing and then authorize a transition to the originally requested sleep-state. | 04-24-2014 |
20140325197 | SPECIALIZED BOOT PATH FOR SPEEDING UP RESUME FROM SLEEP STATE - A specialized boot path for speeding up resume from a sleep state is discussed. In a UEFI-compliant system, a specially constructed alternate firmware volume is created which contains only the code modules used during resumption from an S3 sleep state. This alternate firmware volume is copied into Random Access Memory (RAM) during a normal boot. When the system subsequently enters the S3 sleep state and then begins the resume boot process, code in the boot sequence detects it is a resume from an S3 sleep state, restores a RAM configuration and jumps execution to a Pre-EFI Initialization (PEI) core entry point in the alternate firmware volume in RAM instead of to a firmware volume in ROM. This alternate firmware volume performs specified S3 resume tasks and then returns control to the operating system. | 10-30-2014 |
20150046871 | SYSTEM AND METHOD FOR RE-SIZING AND RE-POSITIONING APPLICATION WINDOWS IN A TOUCH-BASED COMPUTING DEVICE - A technique for improving application window displays in a multi-window graphical user interface in a touch-based computing device is discussed. By selecting an application window or corresponding thumbnail icon in a multi-window graphical user interface using a finger touch and dragging the application window or icon to an edge of the screen indicated by another finger, the edge of the selected application window may be automatically aligned with respect to that screen edge. Additionally, already open application windows may be automatically re-sized and re-positioned to accommodate the newly re-sized application window. | 02-12-2015 |
Patent application number | Description | Published |
20090094421 | Manufacturing mode for secure firmware using lock byte - Upon initialization or startup of an electronic device, the device checks a predetermined section of non-volatile memory, referred to as the signature byte or lock byte, and allows either the manufacturing mode which allows for installation of the final or production version of firmware to be loaded into non-volatile memory, or the production mode which write-protects certain portions of non-volatile memory before giving operating control of the electronic device to another program, for example, an operating system. By only allowing execution of operating system or other executable code after write-protecting certain portions of non-volatile memory, system security, integrity, and robustness are substantially increased. | 04-09-2009 |
20120159520 | EMULATING LEGACY VIDEO USING UEFI - Techniques for supporting legacy VGA video using UEFI standard and extended UEFI graphics drivers. When an operating system that does not natively support the UEFI display protocols requires video services provided by firmware, the operating system communicates a request for video services to a generic video option ROM. The generic video option ROM notifies a generic video SMM driver of the request for video services. Such notification may be performed using a software system management interrupt (SMI). Upon notification, the generic video SMM driver notifies a third party UEFI video driver of the request for video services. The third party video driver provides the requested video services to the operating system. In this way, a third party UEFI graphics driver may support a wide variety of operating systems, even those that do not natively support the UEFI display protocols. | 06-21-2012 |
20140136828 | BIOS USER INTERFACE CONTROL USING MOBILE DEVICE - A technique for managing a Unified Extensible Firmware Interface (UEFI) Basic Input/Output System (BIOS)-controlled computing device from a separate mobile computing device is discussed. | 05-15-2014 |
20140289436 | NETWORK CONTROLLER SHARING BETWEEN SMM FIRMWARE AND OS DRIVERS - A mechanism for reducing the cost of providing network-based remote platform management by allowing system firmware to communicate with a remote platform administrator or process by sharing a NIC that is also used for normal network traffic is discussed. The dual use of the NIC reduces the cost of remote platform management by removing the need for a secondary controller or CPU core on the computing device that is dedicated to remote management tasks. Additionally, performance in the computing device improves as a byproduct of a CPU core or thread not being dedicated to the management task and instead being available for handling of other tasks. | 09-25-2014 |
20140289570 | VIRTUAL BASEBOARD MANAGEMENT CONTROLLER - A system firmware agent providing the capabilities of a Baseboard Management Controller (BMC) from within System Management Mode (SMM) is discussed. A virtual BMC provides dedicated communication channels for system firmware, other BMCs in the platform and remote management agents. The virtual BMC may monitor the status of the system, record system events, and control the system state. | 09-25-2014 |
20140331037 | SECURE BOOT OVERRIDE IN A COMPUTING DEVICE EQUIPPED WITH UNIFIED-EXTENSIBLE FIRMWARE INTERFACE (UEFI)-COMPLIANT FIRMWARE - A firmware-based system and method for detecting an indicator of an override condition during a Unified Extensible Firmware Interface (UEFI) Secure Boot sequence. The indicator of the override condition may be detected based upon the pressing of a specialized button, designated key or keys or other received input that indicates both physical presence of the user and the desire, on the current boot, to bypass UEFI Secure Boot. An embodiment may work for only a single boot, not require access into a setup application, and may be accessed by externally accessible features of the computer system. | 11-06-2014 |
20150074387 | SYSTEM AND METHOD FOR AUTO-ENROLLING OPTION ROMS IN A UEFI SECURE BOOT DATABASE - A mechanism for automatically enrolling option ROMs into the system security database used for a UEFI Secure Boot is discussed. A request is received by a computing device to auto-enroll one or more option ROMs for one or more respective devices on the next boot of the system. Upon receiving the request, a flag or other type of indicator indicative of an auto-enroll status is changed to an active mode. The indicator is stored in non-volatile memory and may be stored as a UEFI Authenticated Variable. Following the changing of the indicator, the system is either reset or shut down. During the next boot only, after identifying the indicator indicative of an active mode auto-enroll status, the signatures for the option ROMs of all discovered devices whose signatures do not exist in the system security database are calculated(hashed) and added to the UEFI Secure Boot database without user interaction. | 03-12-2015 |
20150074427 | SYSTEM AND METHOD TO SECURE ON-BOARD BUS TRANSACTIONS - A technique for securing on-board bus transactions in a computing device is discussed. A shared key is generated and then programmed into the read-only non-volatile write-once storage of two on-board components. The shared key may be generated during the manufacturing process. Once complete, all transactions between the two on-board components are encrypted by the components using the shared key without exposing the key on any external bus. | 03-12-2015 |
20150081684 | SYSTEM AND METHOD TO SHARE AN APPLICATION WITH ANOTHER DEVICE - A technique for sharing an application between devices is discussed. Embodiments of the present invention transmit information about an application from a source computing device to a target computing device. An application sharing service on the target computing device then automatically searches the target computing device for a resident corresponding application or its equivalent and if a corresponding application is not found, searches an application store or repository for the corresponding application. If the application or its equivalent is found in the application store or repository, a user may be prompted to download the application or the application may be downloaded automatically. If the corresponding application was found on the target computing device originally, a check may be performed to determine if the most recent update is installed and, if the most recent version is not installed, it may be downloaded from the application store. | 03-19-2015 |
20150089238 | SYSTEM AND METHOD FOR VERIFYING CHANGES TO UEFI AUTHENTICATED VARIABLES - A mechanism for certifying that an operating system-based application has authorization to change a UEFI authenticated variable held in the system firmware is discussed. Embodiments of the present invention receive with the system firmware a request from an operating system-based application to change a UEFI authenticated variable. The request includes an authentication descriptor header with a timestamp and pre-determined GUID. The request also includes a hash calculated using a password known to the firmware. The system firmware certifies that the caller has authorization to change an authenticated variable by first verifying the information in the header and then creating a new hash using the password. The new hash is compared to the received hash and must match in order for the system firmware to allow the alteration of the UEFI authenticated variable. In one embodiment, the password is the system firmware password. | 03-26-2015 |
Patent application number | Description | Published |
20080301056 | ONLINE PAYER AUTHENTICATION SERVICE - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. | 12-04-2008 |
20100057619 | ACCOUNT AUTHENTICATION SERVICE WITH CHIP CARD - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. | 03-04-2010 |
20100332393 | ONLINE PAYER AUTHENTICATION SERVICE - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. | 12-30-2010 |