Patent application number | Description | Published |
20120309246 | CURABLE BIOPOLYMER NANOPARTICLE LATEX BINDER FOR MINERAL, NATURAL ORGANIC, OR SYNTHETIC FIBER PRODUCTS AND NON-WOVEN MATS - A curable aqueous binder composition includes a dispersion of biopolymer particles, optionally with and an inter-particle crosslinking agent, for use in the formation of composite materials such as mineral, natural organic, or synthetic fiber products, including mineral fiber insulation, non-woven mats, fiberglass insulation and related glass fiber products, and wood based products, and construction materials. In an application of the curable aqueous composition to making fiberglass insulation, the composition may be blended with a second resin which may be a non-formaldehyde resin. In an application of the composition to making fiberglass roofing shingles, the biopolymer particles may be mixed into a formaldehyde based resin during or after the polymerization of the resin. | 12-06-2012 |
20140295090 | CURABLE SHEARED OR EXTRUDED, CROSS LINKED STARCH NANOPARTICLE LATEX BINDER FOR USE WITH MINERAL, NATURAL ORGANIC OR SYNTHETIC FIBRE PRODUCTS AND NON-WOVEN MATS - A curable aqueous binder composition comprising sheared or extruded cross linked starch particles and a crosslinking agent for use in the formation of composite materials such as mineral, natural organic or synthetic fibre products including mineral fibre insulation, non-woven mats, fibreglass insulation and related glass fibre products as well as wood based products and construction materials. In one application the curable aqueous starch binder composition may be blended with a second non-formaldehyde resin to make fibreglass insulation. In another application the curable aqueous starch binder composition may be mixed into a formaldehyde based resin to make fibreglass roof shingles. | 10-02-2014 |
Patent application number | Description | Published |
20130275518 | METHOD AND SYSTEM FOR EVALUATING THE RESILIENCY OF A DISTRIBUTED COMPUTING SERVICE BY INDUCING A LATENCY - Techniques are disclosed for validating the resiliency of a networked application made available using a distributed computing infrastructure. In one embodiment, a latency monitoring application observes each active application component and at specified or unspecified intervals, selects one and introduces latency or error messages in one or more messages emanating from the selected active application component. The latency monitoring application then measures the effect of the latency or error messages on other active application components that are dependent on the affected active application component. By observing the effects of the failed server on the rest of the network application, a provider can ensure that each component can tolerate any unexpected latency or error conditions with the distributed computing infrastructure. | 10-17-2013 |
20130275593 | METHOD AND SYSTEM FOR RECLAIMING UNUSED RESOURCES IN A NETWORKED APPLICATION ENVIRONMENT - Techniques are disclosed for reclaiming resources within a distributed computing system. A reclamation application searches the distributed computing architecture for unused resources, classifies the unused resources, and determines an expiration period based on the classification. The reclamation application determines a candidate owner of the resource based on one or more characteristics of the resource. The reclamation application then notifies the candidate owner that the resource is to be reclaimed unless claimed by the candidate owner within the expiration period. If the candidate owner claims the resource within the expiration period, then the reclamation application terminates the reclamation of the resource. If the candidate owner does not claim the resource within the expiration period, then the reclamation application reclaims the resource after the duration of the expiration period. Advantageously, reclaiming resources results in more efficient utilization of resources, lower operation and maintenance costs, and improved system security. | 10-17-2013 |
20130276089 | METHOD AND SYSTEM FOR IMPROVING SECURITY AND RELIABILITY IN A NETWORKED APPLICATION ENVIRONMENT - A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database. The security application scans a distributed computing architecture for the existence of security certificates, places newly discovered security certificates in a database, and deletes outdated security certificates. Advantageously, security and reliability are improved in a distributed computing architecture. | 10-17-2013 |
20140281739 | CRITICAL SYSTEMS INSPECTOR - Techniques are described for identifying a root cause of a pattern of performance data in a system including a plurality of services. Embodiments provide dependency information for each of the plurality of services, where at least one of the plurality of services is dependent upon a first one of the plurality of services. Each of the plurality of services is monitored to collect performance data for the respective service. Embodiments further analyze the performance data to identify a cluster of services that each follow a pattern of performance data. The first one of the services in the cluster of services is determined to be a root cause of the pattern of performance data, based on the determined dependency information for each of the plurality of services. | 09-18-2014 |
20140282422 | USING CANARY INSTANCES FOR SOFTWARE ANALYSIS - Techniques for evaluating a second version of software. Embodiments selectively route incoming requests to software instances within a plurality of baseline instances and a plurality of canary instances, where the baseline instances run a first software version and the canary instances run the second software version. The software instances are monitored to collect performance data for a plurality of performance metrics. Embodiments calculate aggregate baseline performance metrics, where each of the aggregate baseline performance metrics is calculated based on the collected performance data for the plurality of baseline instances. For each of the performance metrics and canary instances, embodiments calculate a relative performance value that measures the collected performance data for the respective canary instance and for the respective performance metric, relative to the corresponding aggregate baseline performance metric. A final measure of performance is calculated for the second version of software, based on the relative performance values. | 09-18-2014 |
20140379901 | PROGRESSIVE DEPLOYMENT AND TERMINATION OF CANARY INSTANCES FOR SOFTWARE ANALYSIS - A data processing method, comprising: using computing apparatus, causing instantiating a plurality of baseline application instances that are running a first version of software, and one or more canary application instances that are running a second version of the software; using computing apparatus including a load balancer, causing selectively routing a first proportion of incoming requests to the baseline instances, and routing a second proportion of the incoming requests to the canary instances; monitoring the plurality of canary instances to collect performance data for performance metrics; determining that the performance data indicates a negative performance issue, and in response thereto: using computing apparatus, automatically updating the first proportion to be larger and updating the second proportion to be smaller, and then reconfiguring the load balancer based upon the first proportion and the second proportion; terminating one or more of the canary application instances. | 12-25-2014 |