Bartley
Bruce Howard Bartley, Taupo NZ
Patent application number | Description | Published |
---|---|---|
20120166016 | Tracking System Device and Method - An aircraft monitoring system comprising a computer system and a receiver for receiving tracking data from a tracking device associated with an aircraft, the monitoring system having a passive tracking mode in which the computer system is configured to receive tracking data and an active tracking mode in which the computer system is configured to determine a condition indicative of an aircraft incident based on the absence of received tracking data. The monitoring system is automatically triggered into the active tracking mode when a signal is received from the aircraft indicating the aircraft has taken-off. | 06-28-2012 |
Gillian Elspeth Bartley, Queensland AU
Patent application number | Description | Published |
---|---|---|
20090042697 | THERAPEUTIC OR EXERCISE APPARATUS - An apparatus for use as an exercise or therapeutic apparatus, the apparatus comprising a first and at least one second slidable element, each of the slidable elements having at least one reduced friction sliding surface, wherein the reduced friction sliding surface of the first element slides over the reduced friction sliding surface of the at least one second element during exercise or therapy. | 02-12-2009 |
Jonathan Keith Bartley, Cardiff GB
Patent application number | Description | Published |
---|---|---|
20100226845 | Mixed-Metal Oxides Precipitated With Supercritical CO2 - Hopcalite-type catalysts for oxidation of CO are formed by preparing a mixed-metal oxide precursor by firstly preparing a solution of a mixture of metal precursor compounds in a solvent, followed by contacting the solution with a supercritical antisolvent to precipitate the mixed-metal oxide precursor. A mixed-metal oxide may then be prepared from the precursor by oxidation, for example by calcination. The mixed-metal oxide is then collected and optionally activated for use as a catalyst. The activated or calcined catalyst contains a nano-structured mixed-phase composition comprising phase-separated intimately mixed nanoparticles of copper and manganese oxide. | 09-09-2010 |
Jonathan Keith Bartley, Bonvilston Cardiff GB
Patent application number | Description | Published |
---|---|---|
20140024525 | Catalyst, Method of Manufacture and Use Thereof - A catalyst is provided, the catalyst comprising rods having mean length of 100 microns or less, the rods comprising a metal molybdate or tungstate, the metal being selected from the group consisting of iron, manganese, nickel, chromium, vanadium, aluminium, silver, titanium, copper, bismuth, and cobalt. A method of making such a catalyst is also provided. | 01-23-2014 |
Michael Lyndon Bartley, Winnipeg CA
Patent application number | Description | Published |
---|---|---|
20090282718 | Adapter Device for Coupling an Auxiliary Stock to a Handgun - An adapter device comprises a mounting frame arranged to be mounted onto a handgun and a stock mount arranged to support an auxiliary stock on the mounting frame. The stock mount allows interchangeable use of existing commercially available stocks to be used with a handgun. | 11-19-2009 |
Stuart James Bartley, Bridgend GB
Patent application number | Description | Published |
---|---|---|
20140202026 | BEAD COLLECTION DEVICE AND METHOD - A device is provided for separating beads from a carrier fluid, the device comprising: a bead-receiving means for receiving beads dispersed in a carrier fluid, a fluid removal means operable to remove fluid from the bead-receiving means in a first fluid removal zone by the application of reduced pressure, and a bead collection means operable to remove beads from the bead-receiving means in a bead collection zone by the application of reduced pressure, the bead-receiving means being movable so that beads are movable from the first fluid removal zone to the bead collection zone. | 07-24-2014 |
Timothy S. Bartley, Worongary AU
Patent application number | Description | Published |
---|---|---|
20140245264 | Identifying Test Cases Based on Changed Test Code - An approach is provided to identify test cases based on changed test code. In the approach, test cases are compared to a current test environment that includes an instrumented software program that results in matching test cases. Matching test cases are selected based on a detection of one or more substantive changes to the current test environment. The current test environment is tested using the selected test cases. In an alternate approach, the current environment is tested with multiple test cases and code coverage metrics are retained. After the initial testing, modification of the software program results in comparing of the modification to the retained code coverage metrics whereupon a set of the test cases are selected and used to re-test the software program. | 08-28-2014 |
20140351793 | PRIORITIZING TEST CASES USING MULTIPLE VARIABLES - A computer identifies lines of code of a product program that have been modified after an initial test of the product program. The computer determines the overlap between lines of code that have been modified and a mapped test case. The computer determines a weighted value for the mapped test case based on two or more of, an environment of the test case, the degree of the overlap, a time the test case was last executed, a time the test case takes to execute, and a priority of a defect. The environment of the test case is configured to replicate a working environment where the product program is to be deployed and includes an operating system, a hardware configuration, and the configuration of the operating system. | 11-27-2014 |
20140359495 | GENERATING A CONTEXT FOR TRANSLATING STRINGS BASED ON ASSOCIATED APPLICATION SOURCE CODE AND MARKUP - A method for generating a context for translating strings for a graphical user interface. The method includes receiving a string to be translated and associated source code, the string identified by a unique key within the associated source code. The method includes identifying a first logical section of the associated source code corresponding to a unique key of the string. The method includes identifying one or more graphical user interface components within the identified logical section of the associated source code. The method then includes creating a mockup image presenting the one or more graphical user interface components and the string. | 12-04-2014 |
20140380279 | PRIORITIZING TEST CASES USING MULTIPLE VARIABLES - A computer identifies lines of code of a product program that have been modified after an initial test of the product program. The computer determines the overlap between lines of code that have been modified and a mapped test case. The computer determines a weighted value for the mapped test case based on two or more of, an environment of the test case, the degree of the overlap, a time the test case was last executed, a time the test case takes to execute, and a priority of a defect. The environment of the test case is configured to replicate a working environment where the product program is to be deployed and includes an operating system, a hardware configuration, and the configuration of the operating system. | 12-25-2014 |
20150026664 | METHOD AND SYSTEM FOR AUTOMATED TEST CASE SELECTION - A computer-implemented method, computer program product, and computer system for intellectually and automatically selecting test cases for testing software that has been changed. In this invention, the automated selection of the subset of the test cases is based on determination of what software under test has been changed, what test cases have exercised these changes, what test data has been used to exercise these changes, what test environment including hardware and software configuration has been used to test these changes, and what pre-requisite test cases have been run prior to having the software under test in the correct state. | 01-22-2015 |
Timothy Simon Bartley, Worongary AU
Patent application number | Description | Published |
---|---|---|
20090158389 | COMPUTER METHOD AND APPARATUS FOR AUTHENTICATING UNATTENDED MACHINES - An unattended computer-based machine is authenticated by the present invention method, system or apparatus. The subject machine may be an auto-restarted machine or similar machine configured to be unattended. Upon receipt of initializing input from a user at a subject computer-based machine, a working process authenticates the user and generates resulting credentials. The working process stores the generated credentials in a memory area of the subject machine. Separate from and independent of the working process is a security monitor of the present invention. A monitoring module of the present invention monitors user activity on the subject machine and upon detecting suspect activity destroys the stored credentials of the working process. Suspect activity includes any activity raising a suspicion of compromise. | 06-18-2009 |
20100011438 | Role-Based Privilege Management - In one embodiment, a computer implemented method for role-based privilege management is provided. The computer implemented method receives a transformation request from a requester to form a received request, and identifies a target environment of the received request. The computer implemented method determines whether the target environment matches a predefined environment in a set of role-based privileges and, responsive to a determination that the target environment matches a predefined environment in the set of role-based privileges, maps the parameterized privileges from the set of role-based privileges to the target environment and performs the request. | 01-14-2010 |
20120124217 | Adjusting The Connection Idle Timeout In Connection Pools - An approach is provided that responds to a connection request to connect to an external network entity using a connection from a managed connection pool. The connection pool is managed by selecting connections from the connection pool that includes one or more currently unused connections with the external network entity. One of the selected connections is validated by comparing an idle time associated with each of the selected connections to a maximum idle time value corresponding to the external network entity. The maximum idle time value being previously identified at the information handling system. The validated connection is then used to connect to the external network entity to satisfy the connection request. | 05-17-2012 |