Patent application number | Description | Published |
20140109580 | PART LOAD PERFORMANCE IMPROVEMENT USING DEFORMABLE BORE PLUGS - A cooling arrangement for a gas turbine engine. The cooling arrangement comprises a discharge channel for air flow from a compressor, a first cooling channel and at least one aperture providing communication between the flow of air through the discharge channel and the first cooling channel. A restrictor device in the aperture regulates the flow of air between the discharge channel and the first cooling channel. The restrictor device deforms to vary air flowing through the aperture in response to a physical condition of the engine. This physical condition of the engine may be that of the temperature of air flowing through the discharge channel, the restrictor device responding to regulate the flow of air based on that temperature. The restrictor device may be a two-way shape memory alloy. | 04-24-2014 |
20140140807 | TURBINE SHROUD ARRANGEMENT FOR A TURBINE SYSTEM AND METHOD OF CONTROLLING A TURBINE SHROUD ARRANGEMENT - A turbine shroud arrangement for a turbine system includes a first region of a tip shroud, the first region disposed in close proximity to an adjacent tip shroud. Also included is a second region of the tip shroud, the second region disposed in close proximity to the adjacent tip shroud, the second region comprising a temperature sensitive material configured to engage the second region and the adjacent tip shroud in contact over a first operating condition of the turbine system and configured to provide a second region gap over a second operating condition of the turbine system. | 05-22-2014 |
20140140841 | TURBINE BUCKET SHROUD ARRANGEMENT AND METHOD OF CONTROLLING TURBINE BUCKET INTERACTION WITH AN ADJACENT TURBINE BUCKET - A turbine bucket shroud arrangement for a turbine system includes a contact region of a tip shroud, wherein the contact region is in close proximity to an adjacent tip shroud. Also included is a negative thermal expansion material disposed proximate the contact region, the contact region comprising a first volume during a startup condition and a shutdown condition of the turbine system and a second volume during a steady state condition of the turbine system, wherein the second volume is less than the first volume. | 05-22-2014 |
Patent application number | Description | Published |
20090070881 | METHOD AND APPARATUS FOR CONTROLLING THE PRESENTATION OF CONFIDENTIAL CONTENT - A computer implemented method and apparatus for controlling the presentation of information. In response to receiving a request to present the information, a process confirms that conditions for presentation of the information are satisfied using a set of presentation policies, wherein the conditions are specified in the set of presentation policies, and wherein the conditions comprise a status of a user and a setting of the user. The process then determines whether confidential content is present in the information. Responsive to the confidential content being present, the process redacts the confidential content before presenting the information to a user, and then updates a presentation history with metadata describing the presentation of the information comprising the confidential content. | 03-12-2009 |
20090089133 | INTEGRATED CALENDAR AND TASK SCHEDULER - A computer implemented method for integrating a calendar and task scheduler to enable automatic scheduling of meetings and assignment of tasks based on priority. With the illustrative embodiments, a task in a user's calendaring system may be split into multiple time blocks, and each time block for the task may then be scheduled around meetings in a user's calendar. Tasks that are scheduled in the user's calendar may also be automatically rescheduled when meetings within the user's calendar change. Tasks may be scheduled over lower priority meetings in the user's calendar as needed in order to meet the due dates assigned to the tasks. The illustrative embodiments also allow for automatically adjusting meeting or task priorities based on policies, and identifying classes of activities that may be performed concurrently. | 04-02-2009 |
20120099728 | Protocol Based Key Management - A method, system, and computer usable program product for protocol based key management are provided in the illustrative embodiments. A key management protocol associated with a key request is identified, the key request being a request for data usable in cryptographic security. A first subset is selected from a set of policies using the key management protocol. A set of permissions is computed based on the first subset of policies, the set of permissions indicating whether the key request is permitted under the key management protocol. The set of permissions is cached in a cache in a data storage device. | 04-26-2012 |
20150055780 | Event-driven, asset-centric key management in a smart grid - A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management activities (e.g., key creation, revocation, refresh, etc.) across the impacted components in the information technology and operational realms to ensure data security. In one use case, a security event detected by the event management sub-system triggers one or more actions within the asset/workload management sub-system. Service configuration records are identified from this scan, and assets defined in those records are identified. An event-asset association is then supplied to the key management sub-system, which uses this information to determine a key management operation. | 02-26-2015 |