Patent application number | Description | Published |
20120219585 | INFLUENZA TREATMENT AND/OR CHARACTERIZATION, HUMAN-ADAPTED HA POLYPEPTIDES; VACCINES - The present invention provides, among other things, methods, reagents, and systems for the treatment, detection, analysis, and/or characterization of influenza infections. | 08-30-2012 |
20120258487 | MICROFLUIDIC PLATFORM FOR SYNTHETIC BIOLOGY APPLICATIONS - This invention provides methods and compositions for assembling biological constructs (e.g., plasmids, transformed cells, etc.). In certain embodiments the methods involve encapsulating separate components of said biological construct each in a fluid droplet confined in a fluid channel; optionally mixing droplets from different fluid channels to for a sequenced order of droplets carrying different components of said biological construct in a channel or chamber; and optionally combining two or more droplets each containing different components of said biological construct to permit said components to react with each other in one or more reactions contributing to the assembly of said biological construct. | 10-11-2012 |
20150147329 | INFLUENZA TREATMENT AND/OR CHARACTERIZATION, HUMAN-ADAPTED HA POLYPEPTIDES; VACCINES - The present invention provides, among other things, methods, reagents, and systems for the treatment, detection, analysis, and/or characterization of influenza infections. | 05-28-2015 |
Patent application number | Description | Published |
20080243683 | Mechanism for secure rehosting of licenses - In one embodiment, a licensing authority receives a rehost ticket indicating proof of removal of a license from a first device. The licensing authority receives a request for a license for a second device. The licensing authority validates the rehost ticket to ensure that the license on the first device has been removed from the first device. The licensing authority provides a license for the second device if the rehost ticket is successfully validated, wherein the license that has been removed from the first device and the license for the second device provide the same license capabilities. The first device and the second device are associated with the same customer. Payment has been received for the license associated with the first device but payment has not been received for a separate license capable of being applied to the second device. | 10-02-2008 |
20130282884 | ENABLING APPLICATIONS IN A MULTI-TRANSPORT STACK ENVIRONMENT - In one embodiment, an apparatus includes a first transport stack, a virtual network interface controller (VNIC), and a second transport stack. The first transport stack is associated with an Internetwork Operating System (IOS), as well as with a plurality of interface-based Internet Protocol (IP) addresses and a plurality of IP addresses. The VNIC is configured to dynamically provision the plurality of interface-based IP addresses and the plurality of IP addresses. The second transport stack is associated with a kernel, and configured to communicate with a first application. The MS is configured to enable the first application to share the plurality of IP addresses and the plurality if IP addresses with a plurality of applications. | 10-24-2013 |
20140140211 | CLASSIFICATION OF TRAFFIC FOR APPLICATION AWARE POLICIES IN A WIRELESS NETWORK - In one embodiment, a method includes performing stateful application classification on packets received at a controller and transmitting classification information to an access point. The classification information includes flow information and stateless rules for applying policies. The access point is configured to use the classification information to perform stateless application classification and apply policies to packets received from a mobile device. An apparatus and logic are also disclosed herein. | 05-22-2014 |
20140269535 | WIRELESS SYSTEM WITH SPLIT CONTROL PLANE AND DATA PLANE - In one embodiment, a method includes identifying an access point joining a wireless controller in communication with a switch, establishing a control tunnel between the access point and the wireless controller, transmitting an address of the switch from the wireless controller to the access point, and requesting the switch to setup a data tunnel with the access point. An apparatus and logic are also disclosed herein. | 09-18-2014 |
20150063158 | Wireless Network Flow Monitoring - Techniques are presented herein for enabling performance monitoring of flows within a management and provisioning tunnel used for communicating packets between a wireless controller and wireless access point devices. A wireless controller that is configured to communicate with at least one wireless access point obtains a packet to be sent to the wireless access point for wireless transmission in a wireless network by the wireless access point. The wireless controller identifies, based on the packet, traffic session flow information associated with the packet. The wireless controller encapsulates the packet with a tunneling header that comprises the traffic session flow information and sends the encapsulated packet to the wireless access point. The tunneling header may also comprise an application identifier (ID) associated with the packet. | 03-05-2015 |
20150078402 | Enabling Mobile Applications to Acquire a MAC Address for Obtaining Location Information - Techniques are presented to enable a network element in a network to receive a request from an application on a device, the request being encapsulated in a packet that includes a header that contains a physical layer identifier of the device to which the application does not have access. The physical layer identifier at the network element may be obtained. A response may be sent to the application on the device, the response containing at least one of the physical layer identifier of the device and location information of the device. | 03-19-2015 |
20150358410 | TRANSFER OF SESSION FROM INTERACTIVE DIGITAL SIGN TO MOBILE DEVICE - In one embodiment, a method includes creating at a network device, a user session with an interactive digital sign, generating a session tag for the user session, wherein the session tag is configured for input at a mobile device, transmitting the session tag to the interactive digital sign, and continuing at the network device, the user session with the mobile device. An apparatus and logic are also disclosed herein. | 12-10-2015 |
20160028837 | Enabling Mobile Applications to Acquire a MAC Address for Obtaining Location Information - Techniques are presented to enable a network element in a network to receive a request from an application on a device, the request being encapsulated in a packet that includes a header that contains a physical layer identifier of the device to which the application does not have access. The physical layer identifier at the network element may be obtained. A response may be sent to the application on the device, the response containing at least one of the physical layer identifier of the device and location information of the device. | 01-28-2016 |
Patent application number | Description | Published |
20080311754 | LOW TEMPERATURE SACVD PROCESSES FOR PATTERN LOADING APPLICATIONS - A method of improving pattern loading in a deposition of a silicon oxide film is described. The method may include providing a deposition substrate to a deposition chamber, and adjusting a temperature of the deposition substrate to about 250° C. to about 325° C. An ozone containing gas may be introduced to the deposition chamber at a first flow rate of about 1.5 slm to about 3 slm, where the ozone concentration in the gas is about 6% to about 12%, by wt. TEOS may also be introduced to the deposition chamber at a second flow rate of about 2500 mgm to about 4500 mgm. The deposition rate of the silicon oxide film is controlled by a reaction rate of a reaction of the ozone and TEOS at a deposition surface of the substrate. | 12-18-2008 |
20090031955 | VACUUM CHUCKING HEATER OF AXISYMMETRICAL AND UNIFORM THERMAL PROFILE - Embodiments of a vacuum chuck having an axisymmetrical and/or more uniform thermal profile are provided herein. In some embodiments, a vacuum chuck includes a body having a support surface for supporting a substrate thereupon; a plurality of axisymmetrically arranged grooves formed in the support surface, at least some of the grooves intersecting; and a plurality of chucking holes formed through the body and within the grooves, the chucking holes for fluidly coupling the grooves to a vacuum source during operation, wherein the chucking holes are disposed in non-intersecting portions of the grooves. | 02-05-2009 |
20090084413 | VAPOR DRYER HAVING HYDROPHILIC END EFFECTOR - Embodiments of the present invention generally relate to an apparatus and methods for rinsing and drying substrates. One embodiment provides an end effector comprising a body having a contact tip for contacting an edge area of a substrate, wherein the end effector is configured to support the substrate while the substrate is in a rinsing bath and while the substrate is being dried from the rinsing bath, and the contact tip comprises a hydrophilic material. | 04-02-2009 |
20110266736 | VAPOR DRYER HAVING HYDROPHILIC END EFFECTOR - Embodiments of the present invention generally relate to an apparatus and methods for rinsing and drying substrates. One embodiment provides an end effector comprising a body having a contact tip for contacting an edge area of a substrate, wherein the end effector is configured to support the substrate while the substrate is in a rinsing bath and while the substrate is being dried from the rinsing bath, and the contact tip comprises a hydrophilic material. | 11-03-2011 |
Patent application number | Description | Published |
20140075457 | Providing Support for Position-Related Applications - A method of providing position support to a main processor of a computing device is disclosed. The method may include receiving primary position data from a sensor at a sensor controller. The method may also include analyzing, via the sensor controller, the primary position data to determine secondary position data. The method may also include formatting, via the sensor controller, the secondary position data. The method may also include aggregating, via the sensor controller, the formatted position data. The method may also include providing, via a single channel interface between the sensor controller and the main processor, the aggregated position data to an operating system installed on the main processor. The method may also include communicating, via a driver installed on the operating system, the position data to an application installed on the operating system. | 03-13-2014 |
20140149062 | SENSOR CALIBRATION - A method and system for generating calibrated data are described herein. The method includes detecting a computing device is in a first position and detecting axis data that corresponds to a sensor of the computing device in the first position. The method also includes using the axis data to modify sensor data to produce calibrated data. Furthermore, the method includes sending the calibrated data to an operating system. | 05-29-2014 |
20140156895 | USB DEVICE INTERRUPT SIGNAL - A method and system for sending an interrupt signal is described herein. The method may include detecting sensor data in a sensor controller and detecting a powered down port between the sensor controller and an operating system. The method may also include sending the interrupt signal from the sensor controller to the operating system. In addition, the method may include detecting the operating system has provided power to the powered down port. Furthermore, the method may include sending the sensor data from the sensor controller to the operating system. | 06-05-2014 |
Patent application number | Description | Published |
20080307266 | TECHNIQUES FOR AUTOMATICALLY TRACKING SOFTWARE ERRORS - Techniques are provided for automatically tracking errors encountered by a software system. An occurrence of an error that affects performance of an operation being performed by a database server is detected. In response to detecting the occurrence, error information about the error is automatically recorded in a storage space within a database that is managed by the database server. The error information is automatically recorded by executing one or more computer instructions in a first code path of the database server, where the first code path is a separate code path than a second code path of the database server that performs the operation whose performance is affected by the error. | 12-11-2008 |
20080307267 | TECHNIQUES FOR AUTOMATIC SOFTWARE ERROR DIAGNOSTICS - Techniques are provided for automatically diagnosing errors in a software system. The software system automatically determines whether conditions associated with the software system warrant use of any diagnostic features that are not currently enabled. When the software system determines that the conditions associated with the software system warrant use of any diagnostic features that are not currently enabled, the software system determines which of a plurality of available diagnostic features should be enabled. The software system then enables the determined one or more diagnostics features. | 12-11-2008 |
20090196423 | METHODS TO DEFEND AGAINST TAMPERING OF AUDIT RECORDS - Embodiments of the invention provide systems and methods for detection of tampering with an audit record for a database. According to one embodiment, a method for detection of tampering with an audit record for a database can comprise reading one or more audit records for a time period from an audit table. The one or more audit records can each include a time stamp and reading the one or more audit records can comprise reading audit records having a timestamp within the time period. An encrypted record, such as a message digest record, for the time period can be generated based on the one or more audit records and including the time stamps. The message digest record can be stored in a message digest table. In some cases, the message digest table can be maintained in a trusted data store. | 08-06-2009 |
20090199301 | METHODS TO DEFEND AGAINST TAMPERING OF AUDIT RECORDS - Embodiments of the invention provide systems and methods for maintaining audit records for a database or other resource. According to one embodiment, a method for maintaining audit records for a database can comprise detecting an operation involving at least one record of the database. An audit record can be generated for the operation and the audit record can be stored in an audit table in the database. Insert operations and select operations for the audit table can be supported but other operations for the audit table can be prohibited. Additionally or alternatively, creation of more than one audit table having a same name and schema can be prevented. | 08-06-2009 |
20120109985 | EVALUATING EVENT-GENERATED DATA USING APPEND-ONLY TABLES - Techniques are provided for evaluating base events, compound events, and logical update events in an event processing system. In one embodiment, the base events, compound events, and logical update events are definitions in a particular syntax language that specify conditions for evaluating input event data. In this embodiment, base event definitions are evaluated over the input event data; logical update event definitions are evaluated by determining whether the effect of any earlier event is changed by the arrival of a new event; and compound event definitions are evaluated over records representing events that have been selected by evaluating the base event definitions over the input event data. | 05-03-2012 |
Patent application number | Description | Published |
20140012740 | COLLECTING AND ANALYZING TRANSACTION DATACOLLECTING AND ANALYZING TRANSACTION AND DEMOGRAPHIC DATA TO FULFILL QUERIES AND TARGET SURVEYS - A system and method to gather and analyze transaction records and demographics associated with a plurality of consultants is presented herein. A consultant is a user that creates a profile and provides access to one or more accounts at one or more financial institutions and/or demographic data. Transaction records collected from the one or more accounts are stripped of personally identifying data, analyzed, associated with a consultant's profile, and persistently stored. Demographic data may be collected from a consultant and/or derived from the consultant's transaction records, associated with the consultant's profile, and persistently stored. Surveys are targeted at consultants based, at least in part, on the transaction records and/or demographic data associated with each consultant's profile. Furthermore, database queries are fulfilled based on the transaction records and demographic data associated with one or more consultant profiles stored in the database. | 01-09-2014 |
20150254684 | COLLECTING AND ANALYZING TRANSACTION DATACOLLECTING AND ANALYZING TRANSACTION AND DEMOGRAPHIC DATA TO FULFILL QUERIES AND TARGET SURVEYS - A system and method to gather and analyze transaction records and demographics associated with a plurality of consultants is presented herein. A consultant is a user that creates a profile and provides access to one or more accounts at one or more financial institutions and/or demographic data. Transaction records collected from the one or more accounts are stripped of personally identifying data, analyzed, associated with a consultant's profile, and persistently stored. Demographic data may be collected from a consultant and/or derived from the consultant's transaction records, associated with the consultant's profile, and persistently stored. Surveys are targeted at consultants based, at least in part, on the transaction records and/or demographic data associated with each consultant's profile. Furthermore, database queries are fulfilled based on the transaction records and demographic data associated with one or more consultant profiles stored in the database. | 09-10-2015 |
Patent application number | Description | Published |
20090093449 | Concentrated aqueous azalide formulations - The present invention relates to formulations of concentrated azalide antibiotics and methods for making and using them. Specifically, the invention relates to a method of treating an infection comprising administering to a patient in need thereof, an effective amount of a concentrated aqueous azalide antibiotic formulation made according to the method comprising dissolving an azalide antibiotic in an aqueous solution comprising a strong acid. The invention also relates to methods for making concentrated aqueous azalide antibiotic formulations for use in pulmonary infection, a nasopharyngeal infection, an otic infection, an ocular infection, a dermal or a vaginal infection. The invention also relates to concentrated aqueous azalide antibiotic formulations made by dissolving an azalide antibiotic in an aqueous solution comprising a strong acid. | 04-09-2009 |
20100305054 | CONCENTRATED AQUEOUS AZALIDE FORMULATIONS - The present invention relates to formulations of concentrated azalide antibiotics and methods for making and using them. Specifically, the invention relates to a method of treating an infection comprising administering to a patient in need thereof, an effective amount of a concentrated aqueous azalide antibiotic formulation made according to the method comprising dissolving an azalide antibiotic in an aqueous solution comprising a strong acid. The invention also relates to methods for making concentrated aqueous azalide antibiotic formulations for use in pulmonary infection, a nasopharyngeal infection, an otic infection, an ocular infection, a dermal or a vaginal infection. The invention also relates to concentrated aqueous azalide antibiotic formulations made by dissolving an azalide antibiotic in an aqueous solution comprising a strong acid. | 12-02-2010 |
Patent application number | Description | Published |
20140122161 | WORKFLOW-BASED PROJECT MANAGEMENT - Systems and techniques are described for performing workflow-based project management. An embodiment can receive a scope tree and a sequence of steps, stages, and/or phases that one or more items in the scope tree go through. The embodiment can then generate a set of subprojects, streams, and/or tasks based on the received scope tree and the sequence of steps, stages, and/or phases. Note that each subproject, stream, or task is associated with an item in the scope tree and an item in the sequence of steps, stages, and/or phases. Next, the embodiment can generate a set of interdependencies between the set of subprojects, streams, and/or tasks based on the scope tree and the sequence of steps, stages, and/or phases. The embodiment can then create the project plan that includes the set of subprojects, streams, and/or tasks and the set of interdependencies between the set of subprojects, streams, and/or tasks. | 05-01-2014 |
Patent application number | Description | Published |
20140059080 | SYSTEM FOR LIGHTWEIGHT OBJECTS - Creating an object is disclosed. An instance of a sharable type is created. An instance of a lightweight type is created. The sharable type is designated as a parent of the lightweight type. The instance of the sharable type is designated as a parent of the instance of the lightweight type. The instance of the sharable type may be shared by one or more other instances of the lightweight type. | 02-27-2014 |
20140189715 | CONVERSION OF LIGHTWEIGHT OBJECT TO A HEAVYWEIGHT OBJECT - Processing an object that shares a parent with another object is disclosed. An indication is received with respect to an object that shares a parent object instance with one or more other objects that a change associated with the object is to be made to a data comprising the shared parent object instance. The parent object instance is cloned to create a new parent object instance. The new parent object instance is designated as the parent of the object instance. | 07-03-2014 |
20150121545 | SECURITY DESCRIPTORS FOR RECORD ACCESS QUERIES - Embodiments regard security descriptors for record access queries. An embodiment of a method includes: receiving a record access query, the query regarding records for a certain one or more users, groups, or both at a certain access level; searching one or more sharing tables of entities in a computing environment for security descriptors, each security descriptor being associated with a set of one or more users, groups, or both having access to one or more records of a set of records at an access level; identifying any security descriptors in the one or more sharing tables that relate to the certain one or more users, groups, or both with at least the certain access level; and searching the one or more records associated with each of the identified security descriptors according to the record access query. | 04-30-2015 |
Patent application number | Description | Published |
20110246542 | SYSTEM FOR LIGHTWEIGHT OBJECTS - Creating an object is disclosed. An instance of a sharable type is created. An instance of a lightweight type is created. The sharable type is designated as a parent of the lightweight type. The instance of the sharable type is designated as a parent of the instance of the lightweight type. The instance of the sharable type may be shared by one or more other instances of the lightweight type. | 10-06-2011 |
20120110024 | IDENTIFIERS FOR NON-SEARCHABLE ATTRIBUTES - An attribute is received for storage. Whether the attribute is searchable or non-searchable in storage is determined. Storing the attribute as a searchable attribute comprises storing the attribute in a database table corresponding to a hierarchical class-based object. Storing the attribute as a non-searchable attribute comprises storing the attribute together with one or more other non-searchable attributes as a set of attributes. The set of attributes is stored in a database location outside the database table corresponding to the hierarchical class-based object, and the database location is accessed before the database table. A unique attribute identifier is associated with the attribute to distinguish between a name of the attribute and a name of one of the one or more other non-searchable attributes in the event that the name of the attribute and the name of the one of the one or more other non-searchable attributes are assigned the same name. | 05-03-2012 |
20120185504 | RETRIEVAL OF SEARCHABLE AND NON-SEARCHABLE ATTRIBUTES - Retrieving stored data is disclosed. A retrieval request is received for an object. A retrieval response is generated that includes: 1) a first set of searchable attributes associated with the object, wherein an attribute of the first set of attributes is stored in a database in a manner that enables a database query to be performed against the attribute of the first set of attributes; and 2) a second set of non-searchable attributes associated with the object, wherein an attribute of the second set of attributes is stored in the database in a manner that does not enable a database query to be performed against the attribute of the second set of attributes. | 07-19-2012 |
20120185514 | OPTIMIZED FETCHING FOR CUSTOMIZATION OBJECT ATTRIBUTES - An attribute of a hierarchical class-based object is received. The attribute in a database is stored both in a first location in a first table at a first level of a hierarchy of database tables which table hierarchy is based at least in part on a class hierarchy associated with the hierarchical class-based object and in a second location in a second table at a second level of the table hierarchy which second level is higher than the first level. | 07-19-2012 |
20120290623 | EFFICIENT STORAGE OF NON-SEARCHABLE ATTRIBUTES - Storing data is disclosed. An attribute is included in a combined set of attributes. The combined set of attributes is stored in one or more database locations not specific to any one attribute in the combined set. | 11-15-2012 |
20130179463 | RETRIEVAL OF SEARCHABLE AND NON-SEARCHABLE ATTRIBUTES - Retrieving stored data is disclosed. A retrieval request is received for an object. A retrieval response is generated that includes: 1) a first set of searchable attributes associated with the object, wherein an attribute of the first set of attributes is stored in a database in a manner that enables a database query to be performed against the attribute of the first set of attributes; and 2) a second set of non-searchable attributes associated with the object, wherein an attribute of the second set of attributes is stored in the database in a manner that does not enable a database query to be performed against the attribute of the second set of attributes. | 07-11-2013 |