Genty
Bernard Genty, Jouques FR
Patent application number | Description | Published |
---|---|---|
20120074324 | GAS EXCHANGE SYSTEM FLOW CONFIGURATION - System flow path designs that minimize the impact of gas diffusion sources and sinks. By reducing the magnitude of parasitic sources and sinks, lower rates of photosynthesis and transpiration can be more accurately measured, e.g., without the need for extensive empirical compensation. According to one aspect, a sensor head for use in a gas exchange analysis system includes a sample chamber defining a measurement volume for analysis of a sample, the sample chamber having an inlet and an outlet, and a flow splitting mechanism located proximal to the sample chamber, the mechanism configured to split a gas flow received at an input port from a remote source to a first output port and to a second output port, wherein the first output port is coupled with the inlet of the sample chamber. The sensor head also typically includes a first gas analyzer coupled with the outlet of the sample chamber and configured to measure a concentration of one or more gases, and a second gas analyzer coupled with the second output port of the flow splitting mechanism and configured to measure a concentration of the one or more gases. Advantageously, gas diffusion sources and sinks are reduced due to the proximity of the flow splitting mechanism with the sample chamber and gas analyzers. This advantageously reduces measurement error associated with or attributable to gas diffusion sources and sinks. The proximity advantage derives from minimizing the joints, gaskets, fittings, tubing lengths, and materials all prone or susceptible to gas diffusion. | 03-29-2012 |
Denise Marie Genty, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20080229417 | METHOD FOR CONTROLLING RISK IN A COMPUTER SECURITY ARTIFICIAL NEURAL NETWORK EXPERT SYSTEM - A computer implemented method, data processing system, and computer program product for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat. | 09-18-2008 |
20090007277 | System and Method for Automatically Hiding Sensitive Information Obtainable from a Process Table - The present invention provides a system and method for automatically hiding sensitive information, obtainable from a process table, from other processes that should not access the sensitive information. The system and method include a sensitive command attribute table that is used by a system administrator to designate the commands and command attributes that will typically be associated with sensitive information. The sensitive command attribute table is used when a command is entered that requests information from the process table to be displayed or output. In response, a search of the process table entries is made to determine if a command and/or its attribute in the process table matches an entry in the sensitive command attribute table. If so, the command, its attributes, and/or its attribute values are blanked from the output of the process table information. | 01-01-2009 |
20090063801 | Write Protection Of Subroutine Return Addresses - Exemplary methods, systems, and products are described that operate generally by moving subroutine return address protection to the processor itself, in effect proving atomic locks for subroutine return addresses stored in a stack, subject to application control. More particularly, exemplary methods, systems, and products are described that write protect subroutine return addresses by calling a subroutine, including storing in a stack memory address a subroutine return address and locking, by a computer processor, the stack memory address against write access. Calling a subroutine may include receiving in the computer processor an instruction to lock the stack memory address. Locking the stack memory address may be carried out by storing the stack memory address in a protected memory lockword. A protected memory lockword may be implemented as a portion of a protected content addressable memory. | 03-05-2009 |
20090113533 | Method and System for a Single-Sign-On Operation Providing Grid Access and Network Access - A user device initiates a network access authentication operation via a network access device with a network access authentication server, e.g., a Remote Authentication Dial-In User Service (RADIUS) server, which also generates an X.509 proxy certificate and includes the proxy certificate with the information, such as a set of network access parameters, that is returned to the user device in response to a successful completion of the network access authentication operation. The user device extracts and stores the proxy certificate. The network access parameters are used by the user device to communicate via the network access device on a network, which supports a grid. When the user device accesses a resource in the grid, the proxy certificate is already available, thereby obviating the need to generate a new proxy certificate and allowing a user of the user device to experience an integrated single-sign-on for network access and grid access. | 04-30-2009 |
Nicolas Genty, Paris FR
Patent application number | Description | Published |
---|---|---|
20150248394 | AUTOMATICALLY UPLOADING USER PROFILE INFORMATION - Techniques for automatically transmitting user profile data over a network are provided. In one technique, a browser displays a form and a QR code (or other form of encoded data) on a webpage. A mobile application scans the QR code, which causes the mobile application to identify user profile data (that may be stored locally with respect to the mobile application) and send the user profile data to a Campaign server. The Campaign server causes the form that is displayed by the browser to be filled in with the user profile data. The browser than transmits the filled-in form to a partner server that provides the webpage. In another technique, a mobile application scans a QR code, which may be displayed on a flyer, a poster, a computer screen, or a television screen. The mobile application identifies and transmits user profile data to a Campaign server. | 09-03-2015 |
Patrick Genty, Orleans FR
Patent application number | Description | Published |
---|---|---|
20090238870 | Dividable galenical form allowing modified release of the active ingredient - Dividable galenical form for the modified release of active ingredient, wherein the non-subdivided galenical form and a portion of said form obtained by subdivision have identical dissolution profiles. Medicaments. | 09-24-2009 |
20130202710 | PHARMACEUTICAL COMPOSITION FOR THE PROLONGED RELEASE OF TRIMETAZIDINE - Composition for the prolonged release of trimetazidine wherein the inner phase comprises trimetazidine and the outer layer comprises a retardant and an anti-agglomerant. | 08-08-2013 |
20130295176 | DIVIDABLE GALENICAL FORM ALLOWING MODIFIED RELEASE OF THE ACTIVE INGREDIENT - Dividable galenical form for the modified release of active ingredient, wherein the non-subdivided galenical form and a portion of said form obtained by subdivision have identical dissolution profiles. | 11-07-2013 |
20140221449 | DIVIDABLE GALENICAL FORM ALLOWING MODIFIED RELEASE OF THE ACTIVE INGREDIENT - Dividable galenical form for the modified release of active ingredient, wherein the non-subdivided galenical form and a portion of said form obtained by subdivision have identical dissolution profiles. | 08-07-2014 |
Todd Genty, Seaside Heights, NJ US
Patent application number | Description | Published |
---|---|---|
20120246827 | Sun Towel and Blanket - The invention provides a circular sun towel and blanket which enables consumers to rotate their body as opposed to their towel in facing the direction of the sun. Centrally positioned is a small zippered hole to accommodate an umbrella. | 10-04-2012 |