Patent application number | Description | Published |
20120219833 | LOW TEMPERATURE MOLTEN SODIUM SECONDARY CELL WITH SODIUM ION CONDUCTIVE ELECTROLYTE MEMBRANE - The present invention provides a molten sodium secondary cell. In some cases, the secondary cell includes a sodium metal negative electrode, a positive electrode compartment that includes a positive electrode disposed in a liquid positive electrode solution, and a sodium ion conductive electrolyte membrane that separates the negative electrode from the positive electrode solution. In such cases, the electrolyte membrane can comprise any suitable material, including, without limitation, a NaSICON-type membrane. Furthermore, in such cases, the liquid positive electrode solution can comprise any suitable positive electrode solution, including, but not limited to, an aqueous sodium hydroxide solution. Generally, when the cell functions, the sodium negative electrode is molten and in contact with the electrolyte membrane. Additionally, the cell is functional at an operating temperature between about 100° C. and about 170° C. Indeed, in some instances, the molten sodium secondary cell is functional between about 110° C. and about 130° C. | 08-30-2012 |
20150030896 | SODIUM-HALOGEN SECONDARY CELL - A sodium-halogen secondary cell that includes a negative electrode compartment housing a negative, sodium-based electrode and a positive electrode compartment housing a current collector disposed in a liquid positive electrode solution. The liquid positive electrode solution includes a halogen and/or a halide. The cell includes a sodium ion conductive electrolyte membrane that separates the negative electrode from the liquid positive electrode solution. Although in some cases, the negative sodium-based electrode is molten during cell operation, in other cases, the negative electrode includes a sodium electrode or a sodium intercalation carbon electrode that is solid during operation. | 01-29-2015 |
20150086826 | Intermediate Temperature Sodium-Metal Halide Battery - An intermediate temperature molten sodium-metal halide rechargeable battery utilizes a molten eutectic mixture of sodium haloaluminate salts having a relatively low melting point that enables the battery to operate at substantially lower temperature compared to the traditional ZEBRA battery system and utilize a highly conductive NaSICON solid electrolyte membrane. The positive electrode comprises a mixture of NaX and MX, where X is a halogen selected from Cl, Br and I and M is a metal selected Ni, Fe, and Zn. The positive electrode is disposed in a mixed molten salt positive electrolyte comprising at least two salts that can be represented by the formula NaAlX′ | 03-26-2015 |
Patent application number | Description | Published |
20080320316 | Selective Encryption System and Method for I/O Operations - Upon occurrence of a trigger condition, writes of allocation units of data (including code) to a device, such as writes of blocks to a disk, are first encrypted. Each allocation unit is preferably a predetermined integral multiple number of minimum I/O units. A data structure is marked to indicate which units are encrypted. Upon reads from the device, only those allocation units marked as encrypted are decrypted. The disk protected by selective encryption is preferably the virtual disk of a virtual machine (VM). The trigger condition is preferably either that the virtual disk has been initialized or that the VM has been powered on. Mechanisms are also provided for selectively declassifying (storing in unencrypted form) already-encrypted, stored data, and for determining which data units represent public, general-use data units that do not need to be encrypted. The “encrypt-on-write” feature of the invention may be used in conjunction with a “copy-on-write” technique. | 12-25-2008 |
20090216975 | EXTENDING SERVER-BASED DESKTOP VIRTUAL MACHINE ARCHITECTURE TO CLIENT MACHINES - A server-based desktop-virtual machines architecture may be extended to a client machine. In one embodiment, a user desktop is remotely accessed from a client system. The remote desktop is generated by a first virtual machine running on a server system, which may comprise one or more server computers. During execution of the first virtual machine, writes to a corresponding virtual disk are directed to a delta disk file or redo log. A copy of the virtual disk is created on the client system. When a user decides to “check out” his or her desktop, the first virtual machine is terminated (if it is running) and a copy of the delta disk is created on the client system. Once the delta disk is present on the client system, a second virtual machine can be started on the client system using the virtual disk and delta disk to provide local access to the user's desktop at the client system. This allows the user to then access his or her desktop without being connected to a network. | 08-27-2009 |
20120185914 | IMPLEMENTING NETWORK TRAFFIC MANAGEMENT FOR VIRTUAL AND PHYSICAL MACHINES - A virtualization framework provides security between multiple virtual machines with respect to network communications between the virtual machines and between the virtual machines and a physical network coupled to the underlying physical computer platform. The virtualization framework includes a network interface controller driver that provides an interface to the platform network interface controller and supports execution of a plurality of virtual machines. Each virtual machine includes a virtual network interface controller that provides a network communications path between the virtual machines and to the network interface controller driver. Each virtual network interface controller further contains a programmable network packet filter that controls the selective transfer of network packets with respect to a corresponding virtual machine. | 07-19-2012 |
20140189816 | EXTENDING SERVER-BASED DESKTOP VIRTUAL MACHINE ARCHITECTURE TO CLIENT MACHINES - A server-based desktop-virtual machines architecture may be extended to a client machine. In one embodiment, a user desktop is remotely accessed from a client system. The remote desktop is generated by a first virtual machine running on a server system, which may comprise one or more server computers. During execution of the first virtual machine, writes to a corresponding virtual disk are directed to a delta disk file or redo log. A copy of the virtual disk is created on the client system. When a user decides to “check out” his or her desktop, the first virtual machine is terminated (if it is running) and a copy of the delta disk is created on the client system. Once the delta disk is present on the client system, a second virtual machine can be started on the client system using the virtual disk and delta disk to provide local access to the user's desktop at the client system. This allows the user to then access his or her desktop without being connected to a network. | 07-03-2014 |
20150296012 | Migrating Shared Content Items Between Accounts - Shared content items are migrated between accounts on a content management system. Users store content items synchronized between one or more client devices and the content management system. A user may have multiple accounts including personal and organization accounts. Content items may be shared with accounts belonging to other users to enable those other users to view or manipulate the content items. A user initiates a migration of content items between accounts of different categories via a user interface, e.g., by dragging and dropping a folder from one account to another. The content management system recognizes that the user has deleted the folder from the user's first account and determines that an identical folder has been created in another account belonging to the same user. In response the content management system joins the second account to the shared folder, and removes the first account from the shared folder. | 10-15-2015 |
Patent application number | Description | Published |
20100070870 | Unified Secure Virtual Machine Player and Remote Desktop Client - A virtual machine (VM) is accessed by receiving user log-in information, the log-in information identifying a user and a corresponding VM, the VM having a local copy and a remote copy. A selected copy of the VM is identified based on at least one of a policy and a user selection, the selected copy being one of the local copy and the remote copy of the VM. A desktop generated by the selected copy of the VM is presented to the user in a common application graphical user interface, the common application graphical user interface being used regardless as to whether the selected copy of the VM is the local copy or the remote copy. | 03-18-2010 |
20120278726 | UNIFIED SECURE VIRTUAL MACHINE PLAYER AND REMOTE DESKTOP CLIENT - A virtual machine (VM) is accessed by receiving user log-in information, the log-in information identifying a user and a corresponding VM, the VM having a local copy and a remote copy. A selected copy of the VM is identified based on at least one of a policy and a user selection, the selected copy being one of the local copy and the remote copy of the VM. A desktop generated by the selected copy of the VM is presented to the user in a common application graphical user interface, the common application graphical user interface being used regardless as to whether the selected copy of the VM is the local copy or the remote copy. | 11-01-2012 |
20140351956 | ENFORCING RESTRICTIONS RELATED TO A VIRTUALIZED COMPUTER ENVIRONMENT - An administrator may set restrictions related to the operation of a virtual machine (VM), and virtualization software enforces such restrictions. There may be restrictions related to the general use of the VM, such as who may use the VM, when the VM may be used, and on what physical computers the VM may be used. There may be similar restrictions related to a general ability to modify a VM, such as who may modify the VM. There may also be restrictions related to what modifications may be made to a VM, such as whether the VM may be modified to enable access to various devices or other resources. There may also be restrictions related to how the VM may be used and what may be done with the VM. Information related to the VM and any restrictions placed on the operation of the VM may be encrypted to inhibit a user from circumventing the restrictions. | 11-27-2014 |