Patent application number | Description | Published |
20090313625 | Workload management, control, and monitoring - A first computer program runs in user memory space of a computing environment, and a second computer program runs in kernel memory space of the computing environment. The first computer program determines processes that constitute a workload. The second computer program creates a workload identifier corresponding to the workload, and associates the processes with the workload identifier. The first computer program requests metrics regarding the workload. In response, the second computer program collects such metrics by collecting metrics regarding the processes that constitute the workload and that are associated with the workload identifier The second computer program reports the metrics regarding the workload to the first computer program. | 12-17-2009 |
20100036767 | Reserving amount of payment from financial account balance - In response to a payor planning a specific payment for a given amount to a payee, the given amount is reserved from a balance of a financial account of the payor from which the specific payment is to be made. As such, the given amount reserved from the balance is only available for settling the specific payment and is otherwise unavailable. After the payor has planned the specific payment for the given amount to the payee, in response to the specific payment for the given amount actually being made to the payee, the given amount reserved from the balance of the financial account is used to settle the specific payment for the given amount being made to the payee. | 02-11-2010 |
20100054443 | Phone call screening - A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user. | 03-04-2010 |
20120016890 | ASSIGNING VISUAL CHARACTERISTICS TO RECORDS - Systems, methods and computer program products are disclosed herein for assigning visual characteristics to records of a data structure and displaying those records. In response to an attribute being selected, records of the data structure may be sorted by values of the selected attribute of the records. A first set of records having values of the selected attribute that correspond to a first value may be identified. A second set of records having values of the selected attribute that correspond to a second value also may be identified. A first visual characteristic may automatically be assigned to each record of the first set of records and a second visual characteristic, that is different from the first visual characteristic, may be automatically assigned to each record of the second set of records. | 01-19-2012 |
20120260246 | SOFTWARE APPLICATION INSTALLATION - Systems, methods and computer program products may provide software installation on a computer in a computer system. A software installation method may include installing at a server in a computer system a first files package including computer program files for a first software application, the computer system including at least a first computer installed with a first configuration package, the first configuration package including files necessary to configure and register the first software application, receiving a request at the server from the first computer for access to the first files package, and making the first files package available for use by the first computer. | 10-11-2012 |
20120323481 | NAVIGATING OUT OF A PARKING LOT - In a method for selecting a parking lot exit, a computer receives geographic coordinates of a first parking exit of a parking facility. The computer receives geographic coordinates of a second parking exit of the parking facility. The computer determines a first route from the first parking exit to a destination, using the geographic coordinates of the first parking exit. The computer determines a second route from the second parking exit to the destination, using the geographic coordinates of the second parking exit. The computer selects one of the first parking exit and the second parking exit based on the first route and the second route. | 12-20-2012 |
20130054868 | IMAGE STORAGE OPTIMIZATION IN VIRTUAL ENVIRONMENTS - Method, system and computer program product for monitoring and managing virtual machine image storage in a virtualized computing environment, where the method for managing storage utilized by a virtual machine can include identifying one or more unused disk blocks in a guest virtual machine image, and removing the unused disk blocks from the guest virtual machine image. | 02-28-2013 |
20140089557 | IMAGE STORAGE OPTIMIZATION IN VIRTUAL ENVIRONMENTS - A method for monitoring and managing virtual machine image storage in a virtualized computing environment is proposed, where the method for managing storage utilized by a virtual machine can include identifying one or more unused disk blocks in a guest virtual machine image, and removing the unused disk blocks from the guest virtual machine image. | 03-27-2014 |
20140259008 | PERFORMING UNATTENDED SOFTWARE INSTALLATION - Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The systems and computer program products may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The systems and computer program products may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The systems and computer program products may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files. | 09-11-2014 |
20140259009 | PERFORMING UNATTENDED SOFTWARE INSTALLATION - Methods may perform unattended software installation. The method may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The method may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The method may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The method may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files. | 09-11-2014 |
Patent application number | Description | Published |
20100274698 | Soft Limits for Credit Card Transactions - A method, system, and article are provided for effectively managing a financial account for fraud prevention. The account is provided with a soft credit limit parameter and a tool for management of the soft credit limit parameter. The soft credit limit is in addition to a hard credit limit. More specifically, the hard credit limit is static and fixed by a credit issuing authority. In contrast, the soft credit limit is amendable under different circumstances and in conjunction with the tool is managed by the holder of the account. | 10-28-2010 |
20110264991 | Method and System for Management of Electronic Mail Communication - A method, system, and article for management of email communication content across a computer system network. An archive of email communications is retained on storage media in communication with the network. In addition, email communication is retained on storage media in communication with a client machine in the network. To mitigate duplication of email communications, duplicate communications are replaced with a hyperlink to the archive communication. This replacement supports removal of the duplicate communication from the storage media in communication with the client machine. | 10-27-2011 |
20130055108 | Managing an On-Line Conference Session - Embodiments of the invention relate to an on-line communication tool. A set of windows are employed to manage threads of communication. A first window maintains a list of threads available for discussion during the communication. A second window maintains a continuous log of the communication, and functions in a read-only mode. A third window maintains a read-write channel for a thread of the communication, and functions in a read-write mode. One or more threads may be selected from the first window, with each thread selection opening a separate third window. Text pertaining to a specific thread of the communication may be entered into the specific third window and populated to the continuous log of the second window. | 02-28-2013 |
20130055382 | Managing Access to Storage Media - Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user. | 02-28-2013 |
Patent application number | Description | Published |
20090164633 | METHOD OF MANAGING WORKLOADS - A method of managing software application workloads starts, on a machine, a software application from startup script. The startup script includes startup tasks. The machine includes an operating system. The operating system includes a kernel. The method requests an application group identifier from the kernel. The method associates the startup tasks with the application group identifier until the startup script ends. The method requests application group identifiers from the kernel. If said application group identifier is a workload, the method requests the kernel to aggregate usage data for the application group identifier. If the application group identifier is not a workload, the method determines a set of application group identifiers that comprise a work load, and requests the kernel to aggregate usage data for the set of application group identifiers. The method receives the aggregated usage data from the kernel, and uses the aggregated usage data to manage the workload. | 06-25-2009 |
20090164934 | METHOD OF DISPLAYING TAB TITLES - A method of displaying tab titles in a computer user interface receives a request to display a new tab in a tab area having a length. The new tab has a width and the new tab has a title having a length. The method determines a number of tabs to be displayed in the area and determines if the number of tabs to be displayed multiplied by the tab width is greater than the length of the tab area. If so, the method sets the tab width equal to the length of the tab area divided by the number of tabs. The method determines if the length of the title is greater than the tab width. If so, the method determines if the title has any words in common with any other titles of tabs. If so, the method deletes the common words from the titles, and displays the titles with the deleted common words in the tabs. The method may set a maximum number of tabs to be displayed in the tab area. The maximum number of tabs may be determined by the length of the tab area and a minimum tab width. If the number of tabs is greater than the maximum number of tabs is to be displayed, the method collapses some of the tabs in to a tab of tabs. | 06-25-2009 |
Patent application number | Description | Published |
20090164535 | DISK SEEK OPTIMIZED FILE SYSTEM - A disk-seek optimized file system is provided that may be advantageously deployed in a computer system that supports simultaneous Digital Video Recorder (DVR) functionality and user interaction, such as recording several television (TV) shows while simultaneously supporting a video game played by a user. A computing device hard drive is logically divided into “chunks,”—a first chunk comprising volume metadata, and subsequent chunks comprising equal size “blocks.” A first block of a subsequent chunk comprises block bitmaps and a stream identifier table. The block bitmaps indicate subsequent blocks in the chunk that contain stream data for particular streams, which are identified in corresponding entries in the stream identifier table. | 06-25-2009 |
20150174496 | TELEVISION VIEWING ON GAMING CONSOLES - An integrated gaming and media experience is disclosed, including television viewing on a gaming console. A client component is installed via a bootstrap process that uses authentication information to accomplish this task. Once installed, it integrates itself into a typical gaming display. Various console hardware details are used to enable communication between the client component and downstream servers providing the content. Once up and running, the client component allows users to watch television as if they were interacting with a set-top box. Users may switch between various applications on the gaming console, including but not limited to game titles, DVR, VOD, DVD programs, and so on. | 06-25-2015 |
Patent application number | Description | Published |
20080294728 | Service Discovery for Electronic Messaging Clients - An autodiscovery service for clients in an electronic messaging system is disclosed. Client devices in the system request messaging system configuration settings from an autodiscover server. Clients may derive the address of the autodiscover server from user input, such as an email address, or the address may be obtained by other means. The autodiscover server responds to the request with settings for that client. The settings requested may include addresses of electronic mail servers and other servers that provide client services. The autodiscover server may determine the settings for the client based on various criteria, including client location and user mailbox location. Third party servers may participate in the autodiscovery service, and addresses of third party servers may be included in the settings provided to the client devices. | 11-27-2008 |
20100080365 | OFFLINE VOICEMAIL - A method for accessing offline voicemail messages within a mobile messaging application may be provided. First, a voice mail message may be received and the voicemail message may be transcribed to text. Next, the voicemail message and the text transcription may be stored. The recipient may then be presented with a list of voicemail messages and the voicemail message may be retrieved in response to the recipient. The recipient may read or listen to the voicemail message or both. The recipient may also annotate the voicemail message. | 04-01-2010 |
20100082759 | COMMUNICATIONS GROUPED AS CONVERSATIONS - Described are embodiments for displaying groups of communications, such as messages, as a conversation. Conversations are groups of communications that can be traced back as related to an original communication. The embodiments allow a user to select a conversation mode for displaying communications, e.g., messages, as conversations. In response to the user's selection, embodiments provide for displaying a graphical element associated with a conversation. The graphical element can be selected to display the messages associated with the conversation. Additionally, embodiments provide for selecting a conversation and applying actions to the conversation, resulting in the application of the action to the messages that are associated with the conversation. | 04-01-2010 |
20100121922 | AUTO-RESOLVE RECIPIENTS CACHE - In embodiments, mobile devices request and utilize recipient caches. Recipient caches store information regarding previous recipients of communications. The information on recipients includes when the recipient was last contacted and the frequency with which a recipient is contacted. In embodiments, a mobile device requests a recipient cache from a server. When a user types a string of text, the mobile device then uses the recipient cache as well as the contacts and emails on the mobile device and resolves a recipient list. In other embodiments, a recipient cache on a server is updated when a mobile device sends a message with new recipient information. In another embodiment, a server resolves conflicting messages by using recipient information | 05-13-2010 |
20100317325 | RETRIEVING UNIQUE MESSAGE PARTS ON A MOBILE COMPUTING DEVICE - Embodiments are provided for retrieving unique message parts on a mobile computing device. One or more message parts, containing unique portions of a message, may be requested by the mobile computing device. After the one or more message parts are received at the mobile computing device, the one or more message parts are rendered on the mobile computing device. | 12-16-2010 |
20100318663 | OPTIMIZING MOBILE DEVICE SYNCHRONIZATION WITH MULTIPLE DATA SOURCES - Embodiments are provided for synchronizing data retrieval with multiple data sources on a mobile computing device while maintaining a predetermined quality of service and optimizing resource usage. A connection is established between the mobile computing device and the multiple data sources for a first synchronization interval. A synchronization request is sent over the connection during the first interval. A response to the request including data is received from a data source during the first interval to synchronize the data. After the data is received, the connection to the data source is severed. The connection between the mobile computing device and the data source is then re-established for a second synchronization interval based on quality of service parameters associated with the data source and a pending connection status associated with one or more additional data sources. Another synchronization request is then sent by the mobile computing device over the re-established connection. | 12-16-2010 |
20120150983 | AUTO-RESOLVE RECIPIENTS CACHE - In embodiments, mobile devices request and utilize recipient caches. Recipient caches store information regarding previous recipients of communications. The information on recipients includes when the recipient was last contacted and the frequency with which a recipient is contacted. In embodiments, a mobile device requests a recipient cache from a server. When a user types a string of text, the mobile device then uses the recipient cache as well as the contacts and emails on the mobile device and resolves a recipient list. In other embodiments, a recipient cache on a server is updated when a mobile device sends a message with new recipient information. In another embodiment, a server resolves conflicting messages by using recipient information | 06-14-2012 |
20130035075 | OFFLINE VOICEMAIL - A method for accessing offline voicemail messages within a mobile messaging application may be provided. First, a voice mail message may be received and the voicemail message may be transcribed to text. Next, the voicemail message and the text transcription may be stored. The recipient may then be presented with a list of voicemail messages and the voicemail message may be retrieved in response to the recipient. The recipient may read or listen to the voicemail message or both. The recipient may also annotate the voicemail message. | 02-07-2013 |
20130117805 | TECHNIQUES TO APPLY AND SHARE REMOTE POLICIES ON MOBILE DEVICES - Techniques to apply and share remote policies on personal devices are described. In an embodiment, a technique includes contacting an enterprise server from an enterprise application operating on a personal device. The enterprise application may receive policies from the enterprise server. The policies may be applied to the enterprise application. When a second enterprise application on the personal device is launched, the policies may also be applied to the second enterprise application. When a policy is changed on the enterprise server, notification is pushed to the personal device and all related enterprise applications on the personal device may be updated to enforce the policy change. Other embodiments are described and claimed. | 05-09-2013 |
20140169538 | OFFLINE VOICEMAIL - A method for accessing offline voicemail messages within a mobile messaging application may be provided. First, a voice mail message may be received and the voicemail message may be transcribed to text. Next, the voicemail message and the text transcription may be stored. The recipient may then be presented with a list of voicemail messages and the voicemail message may be retrieved in response to the recipient. The recipient may read or listen to the voicemail message or both. The recipient may also annotate the voicemail message. | 06-19-2014 |
20140208229 | COMMUNICATIONS GROUPED AS CONVERSATIONS - Described are embodiments for displaying groups of communications, such as messages, as a conversation. Conversations are groups of communications that can be traced back as related to an original communication. The embodiments allow a user to select a conversation mode for displaying communications, e.g., messages, as conversations. In response to the user's selection, embodiments provide for displaying a graphical element associated with a conversation. The graphical element can be selected to display the messages associated with the conversation. Additionally, embodiments provide for selecting a conversation and applying actions to the conversation, resulting in the application of the action to the messages that are associated with the conversation. | 07-24-2014 |
20150065096 | OFFLINE VOICEMAIL - A method for accessing offline voicemail messages within a mobile messaging application may be provided. First, a voice mail message may be received and the voicemail message may be transcribed to text. Next, the voicemail message and the text transcription may be stored. The recipient may then be presented with a list of voicemail messages and the voicemail message may be retrieved in response to the recipient. The recipient may read or listen to the voicemail message or both. The recipient may also annotate the voicemail message. | 03-05-2015 |
Patent application number | Description | Published |
20150139873 | METHOD FOR THE EXTRACTION OF VANADIUMPENTOXIDE, V2O5, FROM A SOURCE CONTAINING VANADIUM - The invention relates to a method for the extraction of vanadium from various sources in the form of vanadiumpentoxide, V | 05-21-2015 |
20150203979 | RECOVERY OF RARE EARTH METALS - The invention concerns a process for recovering at least one rare earth metal (REM) from the group of Sc, Y, La, Ce, Pr, Nd, Pm, Sm, Eu, Gd, Tb, Dy, Ho, Er, Tm, Yb, and Lu. A chloride salt melt is provided and aluminium chloride is used to chlorinate a REMcontaining resource. The REM can be recovered by electrolysis, vaporisation or hydrometallurgical methods. | 07-23-2015 |
Patent application number | Description | Published |
20100252882 | MOS Transistor with Gate Trench Adjacent to Drain Extension Field Insulation - An integrated circuit containing an MOS transistor with a trenched gate abutting an isolation dielectric layer over a drift region. The body well and source diffused region overlap the bottom surface of the gate trench. An integrated circuit containing an MOS transistor with a first trenched gate abutting an isolation dielectric layer over a drift region, and a second trenched gate located over a heavily doped buried layer. The buried layer is the same conductivity type as the drift region. A process of forming an integrated circuit containing an MOS transistor, which includes an isolation dielectric layer over a drift region of a drain of the transistor, and a gate formed in a gate trench which abuts the isolation dielectric layer. The gate trench is formed by removing substrate material adjacent to the isolation dielectric layer. | 10-07-2010 |
20110108914 | MOS TRANSISTOR WITH GATE TRENCH ADJACENT TO DRAIN EXTENSION FIELD INSULATION - An integrated circuit containing an MOS transistor with a trenched gate abutting an isolation dielectric layer over a drift region. The body well and source diffused region overlap the bottom surface of the gate trench. An integrated circuit containing an MOS transistor with a first trenched gate abutting an isolation dielectric layer over a drift region, and a second trenched gate located over a heavily doped buried layer. The buried layer is the same conductivity type as the drift region. A process of forming an integrated circuit containing an MOS transistor, which includes an isolation dielectric layer over a drift region of a drain of the transistor, and a gate formed in a gate trench which abuts the isolation dielectric layer. The gate trench is formed by removing substrate material adjacent to the isolation dielectric layer. | 05-12-2011 |
20110111569 | MOS TRANSISTOR WITH GATE TRENCH ADJACENT TO DRAIN EXTENSION FIELD INSULATION - An integrated circuit containing an MOS transistor with a trenched gate abutting an isolation dielectric layer over a drift region. The body well and source diffused region overlap the bottom surface of the gate trench. An integrated circuit containing an MOS transistor with a first trenched gate abutting an isolation dielectric layer over a drift region, and a second trenched gate located over a heavily doped buried layer. The buried layer is the same conductivity type as the drift region. A process of forming an integrated circuit containing an MOS transistor, which includes an isolation dielectric layer over a drift region of a drain of the transistor, and a gate formed in a gate trench which abuts the isolation dielectric layer. The gate trench is formed by removing substrate material adjacent to the isolation dielectric layer. | 05-12-2011 |
Patent application number | Description | Published |
20110202651 | PRICE-AWARE NEIGHBORHOOD SELECTION FOR PEER-TO-PEER NETWORKS - A method and apparatus for peer-to-peer file sharing is provided. In some embodiments, the method includes receiving a request for a list of neighbor peers, where the request is made by a requesting peer device, and where the requesting peer device has a local internet service provider (ISP). The method may also include employing a server device to rank each neighbor peer in a plurality of neighbor peers based on whether the respective neighbor peer is external to the local ISP, and if the respective neighbor peer is external to the ISP, further based on a cost metric associated with a next ISP hop from the requesting peer device to the respective neighbor peer. The method may also include generating the list of neighbor peers based on the ranking of the neighbor peers, and enabling transmission of the list of neighbor peers to the requesting peer device. | 08-18-2011 |
20110211583 | APPARATUS, METHOD, MANUFACTURE, AND SYSTEM FOR PROVIDING NETWORK SERVICES FROM BUILDING BLOCKS - A method and apparatus for communicating over a network is provided. The method includes obtaining building block codes, where the building blocks codes are capable of being used together to provide an end-to-end service. The building block codes are sent to each appropriate building block controller, where each building block controller is associated with a corresponding network node. Upon receiving a first packet of a connection for the first end-to-end service, a determination as to which network nodes of the plurality of network nodes should be used as network hops for the connection, and as to, for each network node that should be used as a network hop for the connection, which building block codes should be used by the building block controller corresponding to the network node. These determinations are communicated to each of the appropriate building block controllers. | 09-01-2011 |
20110267954 | METHOD FOR ROUTING-ASSISTED TRAFFIC MONITORING - A method for routing-assisted traffic monitoring includes providing a set of flows, each flow having an associated ingress routing device and an associated egress routing device. A controller determines a micro-flowset routing for the set of flows, the micro-flowset routing defining which of a set of directed links connecting a plurality of routing devices are used to route each of the flows from the respective ingress routing device to the respective egress routing device. The controller transmits flow information to at least a first routing device of the plurality of routing devices according to the micro-flowset routing, the flow information defining which of the set of directed links are to be used to route at least one flow entering the first routing device to a second routing device of the plurality of routing devices. | 11-03-2011 |
Patent application number | Description | Published |
20080261073 | COATING SUITABLE FOR USE AS A BONDCOAT IN A THERMAL BARRIER COATING SYSTEM - A coating suitable for use as a bondcoat for a thermal barrier coating system includes about 5 to about 10 weight percent of aluminum (Al), about 10 to about 18 weight percent of cobalt (Co), about 4 to about 8 weight percent of chromium (Cr), about 0 to about 1 weight percent of hafnium (Hf), about 0 to about 1 weight percent of silicon (Si), about 0 to about 1 percent of yttrium (Y), about 1.5 to about 2.5 weight percent of molybdenum (Mo), about 2 to about 4 weight percent of rhenium (Re), about 5 to about 10 weight percent of tantalum (Ta), about 5 to about 8 weight percent of tungsten (W), about 0 to about 1 weight percent of zirconium (Zr), and a remainder of nickel (Ni). | 10-23-2008 |
20090035601 | ZIRCONIUM MODIFIED PROTECTIVE COATING - A protective coating system includes a nickel-aluminum-zirconium alloy coating having at least one phase selected from gamma phase nickel, gamma prime phase nickel-aluminum, or beta phase nickel-aluminum in combination with the gamma phase nickel or the gamma prime phase nickel-aluminum. For example, the nickel-aluminum-zirconium alloy coating includes about 0.001 wt % to 0.2 wt % zirconium. | 02-05-2009 |
20100086411 | MODERATE DENSITY, LOW DENSITY, AND EXTREMELY LOW DENSITY SINGLE CRYSTAL ALLOYS FOR HIGH AN2 APPLICATIONS - A single crystal alloy for high AN | 04-08-2010 |
20110256421 | METALLIC COATING FOR SINGLE CRYSTAL ALLOYS - A metallic coating for use in a high temperature application is created from a nickel base alloy containing from 5.0 to 10.5 wt % aluminum, from 4.0 to 15 wt % chromium, from 2.0 to 8.0 wt % tungsten, from 3.0 to 10 wt % tantalum, and the balance nickel. The metallic coating has particular utility in protecting single crystal superalloys used in high temperature applications such as turbine engine components. | 10-20-2011 |
20120328472 | FORGING OF GLASSY ALUMINUM-BASED ALLOYS - A forged devitrified aluminum alloy of forging devitrified aluminum alloys having a desired shape. The alloy is forged in a plane strain forging die with the axis of extrusion being parallel to the direction of forging. The alloy is then forged in a product forming forging die having a desired shape such that the original axis of extrusion is aligned with the axis of the forging die resulting in the desired shape | 12-27-2012 |
20130052479 | LASER SHOCK PEENING OF AIRFOILS - Disclosed is a method of laser shock peening an aluminum alloy fan airfoil to improve its resistance to failure by notched fatigue. In one example, the airfoil is made from 7255 aluminum alloy. The laser has a power density of at least 10 GW/cm | 02-28-2013 |
20130183157 | METHOD OF SURFACE TREATMENT FOR DOVETAIL IN GAS TURBINE ENGINE FAN BLADE - A method of surface treating a dovetail in a blade includes the steps of providing a burnishing operation along circumferential sides of the dovetail. Next, shot peening is provided at axial ends of the dovetail. A fan blade made by the method is also claimed. | 07-18-2013 |
20150110636 | WEAR PAD TO PREVENT CRACKING OF FAN BLADE - A fan blade of a gas turbine engine includes an airfoil, a root received in a slot of a hub, and a wear pad covering at least a portion of the root and made of an integrally bonded woven composite laminate. | 04-23-2015 |