Patent application number | Description | Published |
20120230700 | Optical Module Design in an SFP Form Factor to Support Increased Rates of Data Transmission - A small form-factor pluggable (SFP) module includes a board with an end portion to be inserted into a connector device. A first set of signal pads is arranged along an edge of a first surface of the SFP board at the end portion and a second set of signal pads along an edge of a second surface of the SFP board at the end portion. A third set of signal pads is disposed on the second surface at the end portion, offset from the edge of the second surface. A transceiver, coupled to the signal pads of the first, second, and third sets of signal pads, is configured to transmit and receive signals via the third set of signal pads and to transmit and receive signals via at least one of the first and second sets of signal pads. | 09-13-2012 |
20130034097 | Reverse path forwarding lookup with link bundles - In one embodiment, a method includes receiving a packet at an interface at a network device having a plurality of interfaces connected to a plurality of links forming a bundle, performing a Reverse Path Forwarding (RPF) check on the received packet, and forwarding the packet if it passes the RPF check. The RPF check includes a lookup in an RPF table having a plurality of entries for the bundle, each of the entries including the bundle and one of the links in the bundle, and verification that the interface receiving the packet is connected to one of the links in the bundle identified in the lookup. An apparatus is also disclosed. | 02-07-2013 |
20130064246 | Packet Forwarding Using an Approximate Ingress Table and an Exact Egress Table - Techniques are provided for forwarding packets via an intermediate network device. A packet comprising a destination MAC address is received at a first port of a network device having a plurality of bi-directional ports. A second port of the network device to which the packet should be forwarded is identified through the use of at least an approximate ingress table at the first port comprising a plurality of compressed destination MAC addresses each having an associated egress port, and the packet is forwarded to the second port. At the second port, a subsequent network device to which the packet should be forwarded is identified through the use of an exact egress table at the second port including exact destination MAC addresses each associated with a network device connected to the second port, and the packet is forwarded to the subsequent network device. | 03-14-2013 |
Patent application number | Description | Published |
20150124590 | VIRTUAL PORT CHANNEL BOUNCE IN OVERLAY NETWORK - Aspects of the subject disclosure relate to methods for detecting a link failure between the first network device and a destination node, receiving a data packet addressed to the destination node, and rewriting encapsulation information of the first data packet. Subsequent to rewriting the encapsulation information of the first data packet, the first data packet is forwarded to a second network device (e.g., using updated address information in the packet header), wherein the second network device is paired with the first network device in the virtual port channel. In certain aspects, systems and computer readable media are also provided. | 05-07-2015 |
20150124821 | SOURCE ADDRESS TRANSLATION IN OVERLAY NETWORKS - Systems, methods, and non-transitory computer-readable storage media for translating source addresses in an overlay network. An access switch in an overlay network, such as a VXLAN, may receive an encapsulated packet from a tunnel endpoint in the overlay network. The encapsulated packet may originate from a host associated with the tunnel endpoint and be encapsulated at the tunnel endpoint with a first source tunnel endpoint address and a destination tunnel endpoint address. The access switch may replace the first source tunnel endpoint address in the encapsulated packet with a second source tunnel endpoint address of the access switch to yield a translated packet. The access switch may then transmit the translated packet towards the destination tunnel endpoint address. | 05-07-2015 |
20150124822 | MANAGING ROUTING INFORMATION FOR TUNNEL ENDPOINTS IN OVERLAY NETWORKS - Systems, methods, and non-transitory computer-readable storage media for managing routing information in overlay networks. A first tunnel endpoint in an overlay network may receive an encapsulated packet from a second tunnel endpoint. The encapsulated packet may have been encapsulated at the second tunnel endpoint based on another packet originating from a source host that is associated with the second tunnel endpoint. The encapsulated packet can include a source host address for the source host and a source tunnel endpoint address for the second tunnel endpoint. The first tunnel endpoint can then update a lookup table based on an association between the source host address and the source tunnel endpoint address. | 05-07-2015 |
20150124825 | SYSTEM AND METHOD FOR IDENTIFICATION OF LARGE-DATA FLOWS - Apparatus, systems and methods may be used to monitor data flows and to select and track particularly large data flows. A method of tracking data flows and identifying large-data (“elephant”) flows comprises extracting fields from a packet of data to construct a flow key, computing a hash value on the flow key to provide a hashed flow signature, entering and/or comparing the hashed flow signature with entries in a flow hash table. Each hash table entry includes a byte count for a respective flow. When the byte count for a flow exceeds a threshold value, the flow is added to a large-data flow (“elephant”) table and the flow is then tracked in the large-data flow table. | 05-07-2015 |
20150124826 | NETWORK FABRIC OVERLAY - Disclosed herein are methods of forwarding packets on a network, such as a leaf-spine network having leaf devices and spine devices. The methods may include receiving a packet at an ingress leaf device, and determining based, at least in part, on a header of the packet whether the packet is to be transmitted to a spine device. The methods may further include ascertaining based, at least in part, on a header of the packet whether to perform encapsulation on the packet, encapsulating the packet according to a result of the ascertaining, and then transmitting the packet to a spine device according to a result of the determining. Also disclosed herein are network apparatuses which include a processor and a memory, at least one of the processor or the memory being configured to perform some or all of the foregoing described methods. | 05-07-2015 |
20150127701 | MULTICAST MULTIPATHING IN AN IP OVERLAY NETWORK - The subject technology addresses the need in the art for improving utilization of network bandwidth in a multicast network environment. More specifically, the disclosed technology addresses the need in the art for extending multipathing to tenant multicast traffic in an IP overlay network, which enables the network to fully utilize available bandwidth for multicast traffic. In some examples, nodes in the overlay network may be connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. | 05-07-2015 |
20150127900 | TERNARY CONTENT ADDRESSABLE MEMORY UTILIZING COMMON MASKS AND HASH LOOKUPS - A ternary content-addressable memory (TCAM) that is implemented based on other types of memory (e.g., SRAM) in conjunction with processing, including hashing functions. Such a H-TCAM may be used, for example, in implementation of routing equipment. A method of storing routing information on a network device, the routing information comprising a plurality of entries, each entry has a key value and a mask value, commences by identifying a plurality of groups, each group comprising a subset number of entries having a different common mask. The groups are identified by determining a subset number of entries that have a common mask value, meaning at least a portion of the mask value that is the same for all entries of the subset number of entries. | 05-07-2015 |
Patent application number | Description | Published |
20080220270 | Fabricating Tall Micro Structures - A micro structure includes a seed electrode layer on a substrate and a plurality of conductive layers on the seed electrode layer. The combined thickness of the seed electrode layer and the plurality of conductive layers can be more than 0.1 mm and the lateral dimensions of the seed electrode layer and the plurality of conductive layers vary less than 20% along the direction normal to a surface of the substrate and the micro structure has striations on an outer surface. | 09-11-2008 |
20090289349 | HERMETIC SEALING OF MICRO DEVICES - An encapsulated device includes a micro device on a substrate, a micro chamber that encapsulates the micro device on the substrate; and a layer of hermetic-sealing material that provides at least some degree of hermeticity on one or more outer surfaces of the micro chamber to at least partially hermetically seal the micro device in the micro chamber. | 11-26-2009 |
20100067088 | REDUCING SPECKLE PATTERN IN DISPLAY IMAGES - A display system includes a coherent light source that can emit a coherent light beam, a de-speckling device configured to distort a wavefront of the coherent light beam to produce a distorted coherent light beam, and a two-dimensional array of light modulators that can selectively modulate the distorted coherent light beam to select a plurality of pixels for display. | 03-18-2010 |
20100291410 | Corrosion Protection and Lubrication of MEMS Devices - Systems and methods, such as for a MEMS device, can include a component having a contact portion that includes on one side a layer including hydrophilic functional groups and a coating formed on the layer. The coating can include hydrophilic functional groups adapted to interact with the hydrophilic functional groups of the layer. The coating can also include hydrophobic functional groups opposite the hydrophilic functional groups of the coating. The layer can be bonded to the component, and the coating can be bonded to the layer. The coating can be adapted to be formed on the layer while in vapor form and can include a lubricant. The layer can be an atomic monolayer or multilayer, such as of aluminum oxide, and the coating can include a fluorinated acid, such as perfluorodecanoic acid. | 11-18-2010 |
20120134006 | METHOD FOR REDUCING SPECKLE PATTERN IN DISPLAY IMAGES - A display system includes a coherent light source that can emit a coherent light beam, a de-speckling device configured to distort a wavefront of the coherent light beam to produce a distorted coherent light beam, and a two-dimensional array of light modulators that can selectively modulate the distorted coherent light beam to select a plurality of pixels for display. | 05-31-2012 |
Patent application number | Description | Published |
20120152295 | ARRAYS OF FILLED NANOSTRUCTURES WITH PROTRUDING SEGMENTS AND METHODS THEREOF - A structure and method for at least one array of nanowires partially embedded in a matrix includes nanowires and one or more fill materials located between the nanowires. Each of the nanowires including a first segment associated with a first end, a second segment associated with a second end, and a third segment between the first segment and the second segment. The nanowires are substantially parallel to each other and are fixed in position relative to each other by the one or more fill materials. The third segment is substantially surrounded by the one or more fill materials. The first segment protrudes from the one or more fill materials. | 06-21-2012 |
20120247527 | ELECTRODE STRUCTURES FOR ARRAYS OF NANOSTRUCTURES AND METHODS THEREOF - A thermoelectric device and methods thereof. The thermoelectric device includes nanowires, a contact layer, and a shunt. Each of the nanowires includes a first end and a second end. The contact layer electrically couples the nanowires through at least the first end of each of the nanowires. The shunt is electrically coupled to the contact layer. All of the nanowires are substantially parallel to each other. A first contact resistivity between the first end and the contact layer ranges from 10 | 10-04-2012 |
20120319082 | LOW THERMAL CONDUCTIVITY MATRICES WITH EMBEDDED NANOSTRUCTURES AND METHODS THEREOF - A matrix with at least one embedded array of nanowires and method thereof. The matrix includes nanowires and one or more fill materials located between the nanowires. Each of the nanowires including a first end and a second end. The nanowires are substantially parallel to each other and are fixed in position relative to each other by the one or more fill materials. Each of the one or more fill materials is associated with a thermal conductivity less than 50 Watts per meter per degree Kelvin. And, the matrix is associated with at least a sublimation temperature and a melting temperature, the sublimation temperature and the melting temperature each being above 350° C. | 12-20-2012 |
20130086063 | Deriving User Influences on Topics from Visual and Social Content - Analyzing digital content associated with a entity to identifier the entity's interest and influence related thereto. A set of digital content, such as text, pictures, or video, which the entity has submitted to one or more social media services, is identified. A set of interests for the entity is identified. This may be performed, in part, by analyzing a set of pictures to identify a set of visual attributes for each picture. Then, one or more descriptive labels that characterize the content shown in each picture are determined based on the set of visual attributes for each picture. Next, one or more subject categories for each picture are determined based upon the one or more descriptive labels for each picture. Thereafter, a set of actual interests for the entity is identified based, at least in part, upon the one or more subject categories associated with each digital picture. | 04-04-2013 |
20130187130 | BULK NANO-RIBBON AND/OR NANO-POROUS STRUCTURES FOR THERMOELECTRIC DEVICES AND METHODS FOR MAKING THE SAME - Structure including nano-ribbons and method thereof. The structure include multiple nano-ribbons. Each of the multiple nano-ribbons corresponds to a first end and a second end, and the first end and the second end are separated by a first distance of at least 100 μm. Each of the multiple nano-ribbons corresponds to a cross-sectional area associated with a ribbon thickness, and the ribbon thickness ranges from 5 nm to 500 nm. Each of the multiple nano-ribbons is separated from at least another nano-ribbon selected from the multiple nano-ribbons by a second distance ranging from 5 nm to 500 nm. | 07-25-2013 |
20140193982 | LOW THERMAL CONDUCTIVITY MATRICES WITH EMBEDDED NANOSTRUCTURES AND METHODS THEREOF - A matrix with at least one embedded array of nanowires and method thereof. The matrix includes nanowires and one or more fill materials located between the nanowires. Each of the nanowires including a first end and a second end. The nanowires are substantially parallel to each other and are fixed in position relative to each other by the one or more fill materials. Each of the one or more fill materials is associated with a thermal conductivity less than 50 Watts per meter per degree Kelvin. And, the matrix is associated with at least a sublimation temperature and a melting temperature, the sublimation temperature and the melting temperature each being above 350° C. | 07-10-2014 |
20140329389 | BULK NANO-RIBBON AND/OR NANO-POROUS STRUCTURES FOR THERMOELECTRIC DEVICES AND METHODS FOR MAKING THE SAME - Structure including nano-ribbons and method thereof. The structure include multiple nano-ribbons. Each of the multiple nano-ribbons corresponds to a first end and a second end, and the first end and the second end are separated by a first distance of at least 100 μm. Each of the multiple nano-ribbons corresponds to a cross-sectional area associated with a ribbon thickness, and the ribbon thickness ranges from 5 nm to 500 nm. Each of the multiple nano-ribbons is separated from at least another nano-ribbon selected from the multiple nano-ribbons by a second distance ranging from 5 nm to 500 nm. | 11-06-2014 |
20150147842 | ARRAYS OF FILLED NANOSTRUCTURES WITH PROTRUDING SEGMENTS AND METHODS THEREOF - A structure and method for at least one array of nanowires partially embedded in a matrix includes nanowires and one or more fill materials located between the nanowires. Each of the nanowires including a first segment associated with a first end, a second segment associated with a second end, and a third segment between the first segment and the second segment. The nanowires are substantially parallel to each other and are fixed in position relative to each other by the one or more fill materials. The third segment is substantially surrounded by the one or more fill materials. The first segment protrudes from the one or more fill materials. | 05-28-2015 |
Patent application number | Description | Published |
20130042326 | Mobile-Device User Authentication - In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second users respectively associated with one or more second mobile devices; accessing information known about one or more users and one or more mobile devices respectively associated with the one or more users; identifying at least one candidate for the first user based on the information known about the one or more users and the one or more mobile devices; and confirming one or more of the at least one candidate as the one or more second users. | 02-14-2013 |
20140047020 | Handling Notifications - In particular embodiments, one or more notifications are presented on a screen of a personal computing device while the personal computing device is in a locked state. Entry of one or more user responses may be detected on the personal computing device while still in the locked state. Each user response may be associated with at least one notification. An authorization event associated with the personal computing device may be detected, thereby unlocking the personal computing device. The one or more user responses on the personal computing device may then be presented to the user for confirmation. Once user confirmation is received, confirmed user responses may then be published. | 02-13-2014 |
20140095606 | Mobile Device-Related Measures of Affinity - In one embodiment, a method includes receiving a request for a measure of affinity for a particular action associated with a user of the social-networking system; and determining results for each predictor function based at least in part upon a number of actions previously preformed by the user with respect to the mobile-computing device. Each predictor function calculating a likelihood the user performs one or more actions; The method also includes computing a measure of affinity associated with the user based on the results for the predictor functions; and providing the computed measure of affinity. | 04-03-2014 |
20140108153 | Sponsored Stories in Notifications - Particular embodiments receive a request from a user of the social networking system to view notifications. One or more notifications for the user may be assessed based on advertisement criteria for target social actions. Advertisements and corresponding criteria may be provided by a third party. Relevance scores may be determined for at least one of the one or more advertisements with respect to the user. At least one advertisement may be selected for delivery to the user in a notification interface. Advertisement(s) may be selected when corresponding relevance score(s) exceed a pre-determined threshold score. Finally, the selected at least one advertisement may be provided to a notification controller for delivery to the user. | 04-17-2014 |
20140123273 | Contextual Device Locking/Unlocking - Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device. | 05-01-2014 |
20140164141 | Software Application Notifications - In one embodiment, a method includes a server computing system receiving a notification from a software application on a client computing device associated with a first user. The notification indicates a user interaction with the application has occurred. At least one of the application's functionalities related to the notification complies with one or more specifications of a software development kit. The server system generates a content object associated with the event and the first user for presentation to one or more second users, with the content object promoting the software application or a provider of the software application to the second user. The server system them provides the content object for presentation to the second users. | 06-12-2014 |
20150067791 | CONTEXTUAL DEVICE LOCKING/UNLOCKING - Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device. | 03-05-2015 |
20150264029 | MOBILE-DEVICE USER AUTHENTICATION - In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second users respectively associated with one or more second mobile devices; accessing information known about one or more users and one or more mobile devices respectively associated with the one or more users; identifying at least one candidate for the first user based on the information known about the one or more users and the one or more mobile devices; and confirming one or more of the at least one candidate as the one or more second users. | 09-17-2015 |
20150347730 | Contextual Device Locking/Unlocking - Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device. | 12-03-2015 |
Patent application number | Description | Published |
20100252626 | PORTABLE CONTAINER INVENTORY CONTROL SYSTEM - A portable container inventory control system uses RFID technology for automatically monitoring the talking and returning operations of items such as, but not limited to, tools, weapons, jewelry, surgical instruments, from one or more receptacles inside a portable container to maintain a status of each item as well as an operational record of each item. Furthermore, the system may register which item has been taken from or stored from which receptacle by which worker and when it was taken and returned, and compile the information of all storage locations in one database and system for administering, reporting and sending alarms in order to have total item control, accountability, item service control (maintenance, calibration, repairs, and/or replacement), and administration of usage for the items controlled by the system. | 10-07-2010 |
20100253506 | TRACKING SYSTEM - A tracking system for tracking the location of a plurality of persons, objects and groups of persons or objects or combination of persons and objects which allows creating person or object communities (such as vehicles, objects having a high monetary value or objects that continuously need to be monitored such as guns or medical equipment) and keep tracking of the communities in real time worldwide, as well as registering a tracking history of each person or object and creating customized monitoring zones worldwide and tracking rules for setting customized alarms, for example when the distance among one or more members of the group or members of different groups are greater or lesser than an predetermined value when a member of the group exits a predetermined area or is near a predetermined area or when a person or object remains in a single spot for more or less than a predetermined period of time, which is useful for monitoring the security of a person or object. | 10-07-2010 |
20110140849 | GEOGRAPHIC LOCALIZATION SYSTEM - A geographic localization system and method, which is able to accurately calculate its current location anywhere in the world based on the processing of information received from at least one of several wireless sources available at the moment, such as WiFi, Bluetooth, etc and from available positioning means such as GPS. | 06-16-2011 |
20130187760 | SYSTEM AND METHOD FOR IDENTIFYING ITEMS AND PERSONS INSIDE VEHICLES - A system and method for identifying and tracking items and persons inside one or more vehicles and provide reports such as inventory reports, report of persons onboard each vehicle, report of items that should not be onboard each vehicle during specific time and date, report of persons that should not be onboard each vehicle during specific times and dates, reports about the location of each item/person inside each vehicle, reports about items/persons that are located in a place in which they are not authorized to be; report about the items/persons that have boarded the vehicle, in which time and dates, and the locations where they were inside each vehicle. | 07-25-2013 |
Patent application number | Description | Published |
20090050208 | METHOD AND STRUCTURES FOR CONTROLLING THE GROUP IIIA MATERIAL PROFILE THROUGH A GROUP IBIIIAVIA COMPOUND LAYER - A method is provided for forming a Group IBIIIAVIA solar cell absorber layer including indium (In) and gallium (Ga) that are distributed substantially uniformly between the top surface and the bottom surface of the absorber layer. In one embodiment method includes forming a precursor by depositing a metallic layer including copper (Cu), indium (In) and gallium (Ga) on the base, and depositing a film comprising selenium (Se) and tellurium (Te) on the metallic layer. In the precursor, the molar ratio of Te to Ga is equal to or less than 1. In the following step, the precursor is heated to a temperature range of 400-600° C. to form the Group IBIIIAVIA solar cell absorber layer. | 02-26-2009 |
20120060924 | METHODS AND SYSTEMS FOR FORMING FUNCTIONALLY GRADED FILMS BY SPRAY PYROLYSIS - Method and system for forming a plurality of cadmium-sulfide layers. The method includes preparing a first solution and a second solution. The method further includes loading at least the first solution and the second solution into a pyrolysis-deposition system and placing a target structure into the pyrolysis-depositions system. The method further includes spraying the first solution through one or more first nozzles towards the target structure, forming, from the sprayed first solution, the first cadmium-sulfide layer, directly or indirectly, on the target structure, spraying the second solution through one or more second nozzles towards the target structure with at least the first cadmium-sulfide layer, and forming, from the sprayed second solution, the second cadmium-sulfide layer directly or indirectly, on the target structure. The first cadmium-sulfide layer includes a first cadmium-sulfide material the second cadmium-sulfide layer includes a second cadmium-sulfide material that are different in at least one material property. | 03-15-2012 |
20120064699 | METHODS AND SYSTEMS FOR SPRAY PYROLYSIS WITH ADDITION OF VOLATILE NON-POLAR MATERIALS - Method and system for forming a cadmium-sulfide layer on a substrate. The method includes preparing a solution and loading the solution into a pyrolysis-deposition system. The solution uses at least one cadmium-containing solute, at least one sulfur-containing solute, water, and at least one selected material. The pyrolysis-deposition system includes one or more nozzles and one or more heating devices. The method further includes placing a substrate into the pyrolysis-deposition system, adjusting a distance between the substrate and the one or more nozzles, heating the substrate with the one or more heating devices, and spraying the solution including the selected material towards the substrate. The selected material satisfies at least one property selected from a group consisting of the selected material being non-polar, the selected material having at least higher volatility than water, and the selected material having at least lower heat capacity than water. | 03-15-2012 |