Patent application number | Description | Published |
20100207269 | Integrated Circuit Nanowires - Implementations of encapsulated nanowires are disclosed. | 08-19-2010 |
20100260452 | OPTICAL CIRCUIT DEVICE AND METHOD - Techniques are generally disclosed for optical devices that may be used to implement a variety of logic devices or other circuits by optical means. Example optical devices use a photodiode to alter the charge carrier concentration in a waveguide, thereby altering the index of refraction of the waveguide. The photodiode may be driven by an optical signal, which may be coupled to the photodiode through an optical waveguide. The optical signal may be configured to control the phase of coherent light coupled through the waveguide. A variety of logic devices and other circuits may be implemented by allowing the light coupled through the waveguide to constructively or destructively interfere with other coherent light. | 10-14-2010 |
20100276666 | CONTROLLED QUANTUM DOT GROWTH - The present disclosure generally relates to techniques for controlled quantum dot growth as well as a quantum dot structures. In some examples, a method is described that includes one or more of providing a substrate, forming a defect on the substrate, depositing a layer on the substrate and forming quantum dots along the defect. | 11-04-2010 |
20100300728 | NANOWIRES USING A CARBON NANOTUBE TEMPLATE - The present disclosure generally describes methods for forming nanowires on a substrate, where carbon nanotubes may be placed in a pattern on a surface of a substrate. The surface of the substrate may be exposed to conditions such that carbothermal reduction occurs between the carbon nanotubes and the substrate to form nanotrenches in the pattern, and a conductive material may be deposited into the nanotrenches for forming nanowires. | 12-02-2010 |
20100326509 | Doped Diamond Solar Cell - Implementations and techniques for doped diamond solar cells are generally disclosed. | 12-30-2010 |
20110011436 | Solar Array of Transparent Nanoantennas - Implementations and techniques for solar arrays of transparent nanoantennas are generally disclosed. | 01-20-2011 |
20110017598 | Electrophoretic Deposition - The present disclosure generally relates to systems, arrangements, and techniques for electrophoretic deposition of a plating material on a surface of a substrate. Example systems may include one or more of a substrate for receiving the plating material, a gel, a source element, and a conductive layer. | 01-27-2011 |
20110018813 | ELECTRO-OSMOTIC TACTILE DISPLAY - The present disclosure generally relates to tactile display devices that include a reservoir for containing a driving fluid. A plurality of toxel portions may be sensitively drivable by the fluid for causing toxels to be displayed, and a pump member associated with the reservoir and toxel portions may pump the fluid from the reservoir to selected toxel portions to display a tactile image. The pump member may include an electro-osmotic pump configured to pump the fluid electro-osmotically in response to an applied voltage, and may be configured to selectively pump the fluid to generally activate the toxels independently from each other. The toxel layer may include the plurality of toxels as well as an elastomeric membrane that may have a pattern of the toxels, and may be configured such that the toxels may be expandable generally independently of each other in response to increased pressure of the fluid pumped into association therewith. | 01-27-2011 |
20110018814 | Virtual Device Buttons - Various implementations of virtual device button simulation are disclosed. | 01-27-2011 |
20110019180 | Enabling Spectrometry on IR Sensors - Various implementations of enabling spectroscopy on IR sensors are disclosed. | 01-27-2011 |
20110024300 | ELECTRO-DEPOSITION OF NANO-PATTERNS - The present disclosure generally relates to techniques for electro-depositing nano-patterns. More specifically, systems and methods for fabricating periodic structures in complex nano-patterns are described. An electrical signal may be applied to one or more electrodes that are positioned about a surface of a substrate. The periodicity of the deposited pattern may be influenced by one or more parameters associated with an applied electrical signal, including one or more of frequency, amplitude, period, duty cycle, etc. The weight of each deposited line on the substrate may be influenced by the described parameters, and the shape of the pattern may be influenced by the number, shape, and position of electrodes. | 02-03-2011 |
20110024950 | SELF-ASSEMBLED NANO-LITHOGRAPHIC IMPRINT MASKS - The present disclosure relates to techniques for replicating large-scale nano-pattern structures using a block copolymer structure as a mask in a replication process. Example methods may include performing self-assembling block copolymer reactions to create large self-assembling nano-structures. The nano-structures may then be replicated by using the large self-assembling nano-structure as a mask in nano-imprint lithography. | 02-03-2011 |
20110025608 | TACTILE DISPLAY CONTROL - Examples of methods, systems and computer accessible mediums related to tactile imaging are generally described herein. Some examples may comprise using a receiver to receive information related to a tactile image. Examples may also comprise using a processing arrangement to determine a top hierarchical area of the display corresponding to the image information and/or determining a sub-hierarchical area of the display within the top hierarchical area corresponding to the image information. Some Examples may further comprise using a transmitter to transmit a signal to a tactile display based on the determined sub-hierarchical area for activating a toxel in the determined sub-hierarchical area of the tactile display. Activation of the toxel may comprise activating a plurality of toxels in a determined sub-hierarchical area in response to the transmitted signal. The hierarchical area may include a plurality of sub-hierarchical areas within the top hierarchical area. | 02-03-2011 |
20110042223 | Magnetic Electro-Plating - The present disclosure generally relates to techniques for magnetic electroplating or electro-deposition. Example methods may include utilizing a magnet during electro-deposition to modify kinetics of deposition of plating material on a substrate. | 02-24-2011 |
20110091389 | PARTICLES WITH RADIATION ACTIVATED ADHESIVE - Techniques are generally described for particles with a surface including an adhesion material. The adhesion material may be selectively activated in response to radiation. The particles may be distributed proximate to a target through a fluid system. Radiation may be emitted toward the target causing the adhesion material to activate. The activated adhesive material on the surface of the particles may adhere to the target providing a fiducial mark or reference point. The fiducial mark may be visible through a medical imaging technique. In some examples, the particles may be nanoparticles. In some examples, the radiation may be infrared radiation. | 04-21-2011 |
20110113791 | THERMAL MANAGEMENT WITH ELECTROCALORIC EFFECT LAYER - Techniques described herein are generally related to a thermal management with an electrocaloric effect layer. Example embodiments include systems, articles, methods and apparatus, as well as other embodiments that are described and claimed. | 05-19-2011 |
20110125971 | Shared Upper Level Cache Architecture - Various implementations of shared upper level cache architectures are disclosed. | 05-26-2011 |
20110153208 | 3D PATH ANALYSIS FOR ENVIRONMENTAL MODELING - Techniques for constructing a path analysis in an area are provided. Data are received from a mobile device in an area. The data is based on a path that is traversed by the mobile device. A traversable path is then determined from the data received from the mobile device. The traversable path is superimposed on a map and the map, including the traversable path, is packaged for delivery or display to requesting devices. | 06-23-2011 |
20110154345 | Multicore Processor Including Two or More Collision Domain Networks - Implementations and techniques for multicore processors having a domain interconnection network configured to associate a first collision domain network with a second collision domain network in communication are generally disclosed. | 06-23-2011 |
20110209611 | NANOPARTICLE FILTRATION - The present disclosure generally relates to cyclonic separation or filtering of nanoparticles suspended in a gas. A plume of liquid droplets may be generated using an ultrasound or other generator. The gas may be mixed with the plume of liquid droplets, which may have received an electrostatic charge prior to mixing, to promote preferential adhesion of the nanoparticles to the liquid droplets. The gas with suspended nanoparticles and suspended liquid particles may flow through a cyclonic separator that spins rapidly, causing the cleaned gas to flow out of the filter while the liquid with adhered nanoparticles may be discharged, collected, and/or re-used in the plume generator. By causing nanoparticles to adhere to larger liquid particles, the filter may allow the filtering and collection of much smaller particles than current systems may filter under atmospheric pressure. | 09-01-2011 |
20110213223 | ECHOGRAM DETECTION OF SKIN CONDITIONS - Technologies adapted for using acoustic pulses to diagnose skin conditions are disclosed. A series of acoustic pulses may be directed at a skin through the speaker of a device. Acoustic reflections may be received at a microphone. The reflections may be sampled and stored as echogram data. The echogram may be analyzed to identify potential skin conditions. | 09-01-2011 |
20110213253 | MULTIDIRECTIONAL SCAN AND ALGORITHMIC SKIN HEALTH ANALYSIS - Technologies generally applicable to detecting skin conditions are disclosed. A computer graphics scanning apparatus may be configured to capture skin image data, and use the captured skin image data to calculate a subsurface transfer function for the skin, which may identify subsurface properties of the skin. The identified subsurface properties may be correlated to one or more skin conditions for medical and/or cosmetic treatment diagnosis. | 09-01-2011 |
20110221770 | SELECTIVE MOTOR CONTROL CLASSIFICATION - Techniques for detecting and classifying motion of a human subject are generally described. More particularly, techniques are described for detecting and classifying motion as either a broad selection or a precise selection to facilitate interaction with augmented reality (AR) systems. An example may include detecting a motion of human and repeatedly analyzing a step response associated with the motion to determine one or more of a peak time t | 09-15-2011 |
20110231379 | SEARCH ENGINE INFERENCE BASED VIRTUAL ASSISTANCE - Techniques described herein generally relate to real time inference based systems. Example embodiments may set forth devices, methods, and computer programs related to search engine inference based virtual assistance. One example method may include a computing device adapted to receive text as input and a computer processor arranged to determine at least one inference regarding subject matter of the text based on one or more web searches of one or more terms within the text. The inference(s) may then be automatically displayed upon the inference(s) being determined. The text may be automatically received as input from a voice-to-text converter as voice-to-text conversion producing the text is occurring. | 09-22-2011 |
20110286150 | Ultracapacitors employing phase change materials - Implementations and techniques for employing phase change materials in ultracapacitor devices or systems are generally disclosed. | 11-24-2011 |
20110302297 | Agent-less Follow-me Service for Cloud-based Applications - Technologies are generally described herein for providing an agent-less follow-me service. An example web browser may be configured to receive a first link to a reference table from a portable token. The web browser may be configured to retrieve a second link to an on-going web application from the reference table. The second link may reflect a first state of the on-going web application. The web browser may be configured to open the on-going web application corresponding to the second link. As a user interacts with the on-going web application, the on-going web application may be configured to transition from the first state to a second state. The web browser may be configured to update the second link in the reference table to reflect the second state of the on-going web application. | 12-08-2011 |
20110304583 | Communication Between Touch-Panel Devices - Technologies described herein generally relate to communications between electronic systems. Each electronic system includes a touch-panel device that may be positioned in proximity to one another such that the near field emissions of the touch-panel devices interact with one another. The touch-panel devices can be adapted to sense one another based on these near field emissions. Once detected, the touch-panel devices can be configured to establish a communication channel to communicate information between one another via modulated near field emissions. Such exchanged information may include identification information, network addresses, security keys, and so forth. The exchanged information may be used for discovery or pairing between the touch-panel devices. The technology presented herein can support an intuitive user experience and improved security over traditional wireless pairing approaches. | 12-15-2011 |
20110307953 | Radio Channel Metrics for Secure Wireless Network Pairing - Technologies are generally described for using metrics of radio path characteristics within a wireless network to establish signal signature vectors. These signal signature vectors may be used as a shared secret between network nodes to establish affirmative identification. For example, a signal signature vector may be established when a new node sends a fixed number of packets to the existing nodes and the existing nodes send a fixed number of other packets back to the new node. The number of properly received packets can be counted to establish a success probability between the new node and each existing node. These probabilities can be normalized and quantized to generate signal signature vectors at each node. Without every transmitting any of the vectors, the vector at the new node should be highly correlated to the vectors at existing nodes since the pair-wise channels between each of the nodes should be reasonably symmetrical. | 12-15-2011 |
20110309463 | ELECTROCALORIC EFFECT MATERIALS AND THERMAL DIODES - Examples are generally described that include a substrate, an electrocaloric effect material at least partially supported by the substrate, and a thermal diode at least partially supported by the electrocaloric effect material. | 12-22-2011 |
20120011692 | INDUCTIVELY REMOVABLE ASSEMBLY BONDING - Technologies are generally described for providing inductively removable assembly bonding. Inductive elements may be placed strategically at bonding locations between two or more coupled components. At disassembly time, the elements may be heated through Radio Frequency (RF) energy causing the bonds to break and components to separate. For example, inductive elements placed near plastic stake bonds between dissimilar materials in an electronic device may be employed to separate the dissimilar materials during a recycling process. According to some examples, the elements may also be heated through a directly applied electric current via a network of connections designed into the assembly. | 01-19-2012 |
20120012461 | ELECTROPHORETIC DEPOSITION - The present disclosure generally relates to systems, arrangements, and techniques for electrophoretic deposition of a plating material on a surface of a substrate. Example systems may include one or more of a substrate for receiving the plating material, a gel, a source element, and a conductive layer. | 01-19-2012 |
20120033556 | COMMUNICATION NETWORK MONITORING - Techniques described herein generally include methods, devices and systems related to monitoring a flow of data packets in a communication network. Some example devices may include one or more of a stream capture unit, and/or an analyzer. The stream capture unit can be coupled to a communication network, and configured to monitor a flow of data packets associated with communication steams in the communication network, and identify a first stream of data packets and a second stream of data packets from the monitored flow of data packets. The first stream and the second stream are associated with a single destination. The analyzer can be coupled to the stream capture unit and configured to identify an event associated with from the first stream identified by the stream capture unit, identify information related to the identified event from the second stream identified by the stream capture unit, and determine a response based on the event and the information related to the event. | 02-09-2012 |
20120034141 | FLUORINE BASED VANADIUM BORIDE NANOPARTICLE SYNTHESIS - The present disclosure generally relates to Vanadium Boride nanoparticle synthesis. In some examples, a method is described that includes fluorine based Vanadium Boride nanoparticle synthesis. In some examples, the method includes providing Vanadium Boride battery waste products, treating the battery waste products to treat precursors for fluoridation, heating the precursors for fluoridation to form VF | 02-09-2012 |
20120047023 | DISPLAY MANAGEMENT - Technologies are generally described for managing display of data on a display. In some examples, the display includes a display area. In some examples, a method for managing display of data on the display includes receiving a first request from a first user, to display first data in the display area. In some examples, the method includes determining a first price for the first user, to display the first data in a first display sub-area in the display area and allocating in a memory the first data to the first display sub-area. In some examples, the method includes receiving a second request from a second user, to display second data in the display area. In some examples, the method includes determining a second price for the second user, to display the second data in a second display sub-area in the display area and allocating in the memory the second data to the second display sub-area. | 02-23-2012 |
20120055174 | ELECTROCALORIC HEAT TRANSFER - Techniques for transferring heat from a heat source to a heat destination, and systems for transferring heat from a heat source to a heat destination are provided. More particularly, techniques and systems for transferring heat by utilizing one or more electrocaloric heat pumps are provided. An example heat pump may include an electrocaloric element for receiving heat from a heat source, and a chamber containing a phase change material, an evaporator and a condenser. Upon altering the voltage applied to the electrocaloric element, the phase change material may transform from a liquid state to a vapor state to transfer heat away from the heat source. | 03-08-2012 |
20120056159 | CONTROLLED QUANTUM DOT GROWTH - The present disclosure generally relates to techniques for controlled quantum dot growth as well as a quantum dot structures. In some examples, a method is described that includes one or more of providing a substrate, forming a defect on the substrate, depositing a layer on the substrate and forming quantum dots along the defect. | 03-08-2012 |
20120057454 | Admission and Eviction Policies for Mobile Devices with Non-Telephonic Functionality - Implementations and techniques for admission and/or eviction policies for wireless devices having non-telephonic functionality are generally disclosed. | 03-08-2012 |
20120057567 | Dynamic Internetwork Load Balancing - Examples are disclosed for executing vertical handovers of wireless devices configured to couple with heterogeneous wireless networks. | 03-08-2012 |
20120059920 | Traffic Modeling of Overlaid Networks - Implementations and techniques for traffic modeling of overlaid networks are generally disclosed. | 03-08-2012 |
20120064239 | ACTIVATED PH CONTROL FOR PROTEIN GLUES - A glue composition can include: one or more glue proteins selected to undergo a conformational change responsive to a pH change; and one or more pH components selected to change the pH of the one or more glue proteins in response to a change in one or more conditions. The glue can be prepared by: providing one or more glue proteins selected to undergo a conformational change in response to a pH change; and combining the glue proteins with one or more pH components selected to change the pH of the one or more glue proteins in response to a change in one or more conditions. | 03-15-2012 |
20120068845 | MEASURING AND IMPROVING THE QUALITY OF A USER EXPERIENCE - A disposable nozzle for use on the discharge end of the barrel of a needleless injector is threaded onto the front end of a holder mounted in the barrel. A resilient detent extending outwardly at an acute angle from the inner wall of a recess in the rear end of the nozzle repeatedly enters and exits notches in a sleeve on the holder when the nozzle is mounted on the holder providing an audible signal that the nozzle has not been used. Reverse rotation of the nozzle during removal from the holder results in breaking of the detent. Thus, mounting of a used nozzle on the holder would not be accompanied by a signal that the nozzle is unused. | 03-22-2012 |
20120080107 | Cyclonic Catalytic Ducts - Implementations and techniques for cyclonic catalytic ducts are generally disclosed. | 04-05-2012 |
20120082027 | Determining Optimum Delivery Conditions Associated with a Restoration Plan in a Communication Network - Technologies for determining optimum delivery conditions associated with a restoration plan that addresses potentially troubled nodes are generally disclosed. | 04-05-2012 |
20120082383 | PROJECTING PATTERNS FOR HIGH RESOLUTION TEXTURE EXTRACTION - Camera-based texture extraction in Augmented Reality (AR) systems is enhanced by manipulating projected patterns. One or more fine line patterns are projected onto a textured surface, a Moiré interference pattern measured, and different properties of the projected pattern(s) adjusted until the Moiré interference pattern measurements indicate that a similar texture pattern to that of the three dimensional target is being projected. Thereby, the target texture may be more closely matched even as sub-pixel resolutions, variable lighting conditions, and/or complicated geometries. | 04-05-2012 |
20120082889 | Containing Electrolyte Leaks - Implementations and techniques for containing electrolyte leaks are generally disclosed. | 04-05-2012 |
20120082921 | Metal Air Battery Including a Composite Anode - Implementations and techniques for metal air batteries including a composite anode are generally disclosed. | 04-05-2012 |
20120083299 | Model Based Doppler Compensation Using Traffic Data - Implementations and techniques for model based Doppler compensation using traffic data are generally disclosed. | 04-05-2012 |
20120106597 | Collaborative Data Sharing for CDMA Interference Subtraction - Implementations and techniques for collaborative data sharing for CDMA interference subtraction are generally disclosed. | 05-03-2012 |
20120128538 | ADJUSTABLE PRESSURE MICROREACTOR - Technologies are generally described for adjusting a pressure in a microreactor system. An example microreactor system may include a reaction chamber, wherein the reaction chamber is effective to receive at least one reactant, and carry out a reaction on the reactant to produce a product. An example method may comprise controlling a first electroosmotic pump to drive a first fluid toward the reaction chamber with a first force. In some examples. the method may further comprise controlling a second electroosmotic pump to drive a second fluid toward the reaction chamber with a second force. In some examples, the method may further comprise carrying out the reaction on the reactants in the reaction chamber to produce the product. The first and the second forces may be effective to generate a pressure inside the reaction chamber, where the pressure is greater than one atmosphere. | 05-24-2012 |
20120140622 | Suppression of Discovery of Mobile Devices in a Wireless Network - Technologies are generally described for suppressing discovery of mobile devices in a wireless ubiquitous computing (ubicomp) network, reducing the number of network transmissions by devices in the network and reducing network congestion and prolonging battery life. A mobile device may add supplementary information to introductory beacons transmitted by the device that indicate no response is necessary from other devices participating in the network except for a coordinator of the network. The mobile device may transmit a malformed introductory beacon that will be ignored by other devices in the network except for the coordinator. The coordinator of the wireless network may detect the mobile device moving through the network and transmit a suppression signal to other devices in the network causing the devices to ignore the introductory beacons transmitted by the mobile device. | 06-07-2012 |
20120140935 | Audio Fingerprint Differences for End-to-End Quality of Experience Measurement - Implementations and techniques for audio fingerprint differences for end-to-end quality of experience measurement are generally disclosed. | 06-07-2012 |
20120141208 | Subsurface Induced Pore Clogging to Prevent Spill Flow - Implementations and techniques for providing subsurface permeation barriers are generally disclosed. | 06-07-2012 |
20120144324 | Reshaping Interfaces Using Content-Preserving Warps - Technologies are generally described herein for reshaping a graphical user interface. The graphical user interface may include one or more content elements. An interface design tool may enable users to define one or more borders with respect to the graphical user interface. The interface design tool may also perform a content-preserving warp on the graphical user interface. When the interface design tool performs the content-preserving warp, the interface design tool may preserve a shape and dimensions of any content elements defined by the borders. | 06-07-2012 |
20120146227 | INTEGRATED CIRCUIT NANOWIRES - Implementations of encapsulated nanowires are disclosed. | 06-14-2012 |
20120202239 | MATERIALS, MONITORING, AND CONTROLLING TISSUE GROWTH USING MAGNETIC NANOPARTICLES - Systems and method for releasing a biological factor in a tissue or organ are disclosed. The system includes one or more nanoparticles distributed in the tissue or organ, the nanoparticles including the biological factor; and a magnetic field generator configured to generate a magnetic field at a first frequency and to apply to the tissue or organ the magnetic field at the first frequency thereby causing at least some of the biological factor to be released from each of the nanoparticles into the tissue or organ. | 08-09-2012 |
20120216355 | DYE-CHARGED PARTICLES - Methods, compositions, and systems for dyeing textiles are described. In particular, the methods may include contacting a textile with a plurality of dye-charged particles under dye-discharging conditions, agitating the textile and the dye-charged particles to transfer the dye from the particles to the textile, and separating the particles from the textile. Also disclosed are methods for charging a particle with dye, porous beads charged with dye, and kits for carrying out the claimed methods. | 08-30-2012 |
20120233146 | SEARCH ENGINE INFERENCE BASED VIRTUAL ASSISTANCE - Techniques described herein generally relate to real time inference based systems. Example embodiments may set forth devices, methods, and computer programs related to search engine inference based virtual assistance. One example method may include a computing device adapted to receive text as input and a computer processor arranged to determine at least one inference regarding subject matter of the text based on one or more web searches of one or more terms within the text. The inference(s) may then be automatically displayed upon the inference(s) being determined. The text may be automatically received as input from a voice-to-text converter as voice-to-text conversion producing the text is occurring. | 09-13-2012 |
20120239491 | ASSOCIATING AD RESULTS WITH PURCHASES MADE VIA MOBILE DEVICES - Implementations and techniques for associating ad results with purchases made via mobile devices are generally disclosed. | 09-20-2012 |
20120251897 | Aluminum Air Battery Including a Composite Anode - A method to produce an aluminium air battery, comprising: forming a selectively reactive coating on a surface of an anode core to form a composite anode, the selectively reactive coating comprising a zinc alloy and the anode core comprising aluminium; and storing an electrolyte in contact with the composite anode, wherein the selectively reactive coating is capable of chemically reacting with the electrolyte during discharging of the aluminium air battery the reactive coating may also include an anode corrosion inhibitor material consisting of one or more of indium, gallium, lead, thallium or mercury | 10-04-2012 |
20120265898 | ADJUSTING THE QUALITY OF SERVICE BASED ON NETWORK ADDRESSES ASSOCIATED WITH A MOBILE DEVICE - Implementations and techniques for adjusting the quality of service on an application-by-application basis based at least in part on a plurality of network addresses associated with a given mobile device are generally discussed. | 10-18-2012 |
20120267090 | Heterogeneous Electrocaloric Effect Heat Transfer Device - Technologies are generally described herein for electrocaloric effect heat transfer devices and methods effective to facilitate heat transfer over a wide operating temperature range of a corresponding heat source. Some example heat transfer devices may include multiple heat transfer stacks with at least two heat transfer stacks having electrocaloric effect materials with varying effective temperature ranges. The combined effective temperature ranges of the multiple heat transfer stacks encompass the operating temperature range of the heat source. | 10-25-2012 |
20120276901 | WIRELESS DEVICE HANDOFF BETWEEN WIRELESS NETWORKS - Examples are disclosed for a wireless device handoff between a first wireless network and a second wireless network. | 11-01-2012 |
20120278678 | FORWARD ERROR CORRECTION FOR A DATA FLOW ASSOCIATED WITH A CONNECTIONLESS PACKET NETWORK SERVICE - Examples are disclosed for forwarding or receiving a data flow associated with a connectionless packet network service. In some examples the data flow may have been split into a plurality of data streams separately or jointly including forward error correction. | 11-01-2012 |
20120284537 | DEVICE POWER MANAGEMENT USING COMPILER INSERTED DEVICE ALERTS - Technologies and implementations for device power management using compiler inserted device alerts are generally disclosed. | 11-08-2012 |
20120299554 | DEVICE BATTERY MANAGEMENT - Technologies and implementations for device battery management are generally disclosed. | 11-29-2012 |
20120300622 | MAINTAINING SERVICE PRIORITY FOR MOBILE DEVICES DURING NETWORK HANDOFFS - Implementations and techniques for maintaining service priority for mobile devices during network handoffs are generally discussed. | 11-29-2012 |
20120314096 | TWO-DIMENSIONAL IMAGE CAPTURE FOR AN AUGMENTED REALITY REPRESENTATION - Technologies and implementations for capturing two-dimensional images for an augmented reality representation are generally disclosed. | 12-13-2012 |
20120325740 | ORGANISM METABOLITES FOR REMOVAL OF POLLUTANTS FROM BRINE - This disclosure relates generally to methods, apparatuses, and cellular compositions and cellular products for purifying environmental liquids, such as wastewater and brine, using halophilic bacteria that produce, or can be made to produce, siderophore metal chelators. | 12-27-2012 |
20130009981 | TRANSCODING DETECTION AND ADJUSTMENT OF CONTENT FOR OPTIMAL DISPLAY - Technologies are generally described for detecting transcoding and adjusting visual content for optimal display on user devices. A content provider may deliver visual content to a service provider for transmission over a network to user devices, and may monitor the quality of the visual content that the user devices receive. The service provider may apply transcoding to the visual content during the transmission causing the quality of the received visual content to be degraded. The content provider may receive a sample of the visual content from the user devices and may compare the sample with the original visual content to evaluate the transcoding applied by the service provider network. The content provider may adjust quality aspects of the visual content based on the evaluation of the visual content and may transmit visual content with adjusted quality aspects for optimal display over the service provider network to user device(s). | 01-10-2013 |
20130013377 | VENDOR OPTIMIZATION IN AGGREGATED ENVIRONMENTS - Technologies are generally described for systems and methods effective to optimize vendors in a cloud computing environment. In an example, bundled services can be de-aggregated and a hierarchical tree can be generated showing the relationships between the service providers and infrastructure providers. When itemized bills are received from the service providers, the hierarchical tree can be used to match items from the itemized bills to specific infrastructure providers. A transaction report showing all the services rendered by the infrastructure providers can then be sent to the respective infrastructure providers to take advantage of discounts and bulk rates. In another example, a set of infrastructure providers that provide the services at the lowest cost can be determined, and the service providers can be configured or requested to switch to that set of infrastructure providers. | 01-10-2013 |
20130026108 | PIEZOELECTRIC DISCHARGE WATER PURIFICATION - The fluid purification disclosed herein provides the advantages of high-voltage purification without electrocution risks. In illustrative purifiers, a contaminated fluid, such as contaminated water, is aerated and passed through a cavity that contains highly porous piezoelectric material and an ultrasonic transducer. The transducer emits ultrasonic energy that causes the piezoelectric material to discharge a high-voltage field, which produces strong oxidizing agents that kill organisms and oxidize organic pollutants. Since the ultrasonic actuator operates at relatively low voltages (e.g., 20-110 V) and can be electrically isolated from the fluid, illustrative purification is safe, environmentally friendly, and scalable from small to large size applications. | 01-31-2013 |
20130042722 | ELECTRIC ARC FURNACE DUST RECYCLING APPARATUS AND METHOD - The present technology provides an illustrative apparatus for recycle electric arc furnace (EAF) dust and method of use related to the same. The apparatus has a heat controlling region coupled to a separation volume and includes at least one magnet and a cooling region. The heating controlling region operates at a temperature sufficient to transform at least some of the EAF dust into a mixture of gaseous zinc and one or more additional metals. The magnet separates the iron-rich material from the mixture of gaseous zinc and one or more additional metals and the cooling region condenses the gaseous zinc. | 02-21-2013 |
20130053059 | Radio Localization Database Generation by Capturing Cognitive Radio Spectrum Sensing Data - Technologies are generally described herein for determining a location of a computing device using radio frequency (“RF”) information. Some example technologies may receive a local RF fingerprint for radio signals detected by the computing device. The technologies may determine a location of the computing device by identifying a subset of RF information matching the local RF fingerprint. The technologies may provide the location to the computing device. | 02-28-2013 |
20130054793 | VIRTUAL DATACENTER PRIVATE SUBLETS FOR QUARANTINED ACCESS TO DATA - Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications, however, may be controlled by a supervisor that analyses an output and enforces limitations on content and/or volume based on a level of purchased access. | 02-28-2013 |
20130055280 | QUALITY OF SERVICE AWARE CAPTIVE AGGREGATION WITH TRUE DATACENTER TESTING - Technologies are generally described for efficient datacenter management. In some examples, client jobs on a datacenter are subcontracted out to another datacenter so that the subcontracted jobs can be pulled back to the original datacenter when capacity becomes available again. A captive aggregator module combining network message, command management, data analysis on QoS effects of traffic relay, and strategic management decides whether it makes sense to keep tasks captively aggregated. A middleware system for testing true performance of an application or surrogate and optimizing among multiple datacenters based on true performance evaluates candidate datacenters prior to subcontracting jobs from the original datacenter. The middleware deploys the application to multiple candidate clouds to perform substantially similar tasks on resources that claim to be roughly equivalent in price/performance. The middleware receives data on actual cost and resource consumption, analyzes differences, and redistributes actual work tasks to take advantage of differences. | 02-28-2013 |
20130067471 | OPERATION TRANSFER FROM AN ORIGIN VIRTUAL MACHINE TO A DESTINATION VIRTUAL MACHINE - Technologies and implementations for transferring operation from an origin virtual machine to a destination virtual machine while the origin virtual machine continues to execute an origin executable are generally disclosed. | 03-14-2013 |
20130067934 | Electrocaloric Effect Heat Transfer Device Dimensional Stress Control - Technologies are generally described herein for electrocaloric effect heat transfer devices and methods effective to facilitate thermal energy transfer while mitigating mechanical stresses caused by expansion or contraction of electrocaloric effect material layers during thermal energy transfer operations. Some example heat transfer devices may include heat transfer stacks with at least two electrocaloric effect materials. Expanding electrocaloric effect material and contracting electrocaloric effect material are utilized to cancel the aggregate longitudinal dimensional change during application of an electric field. Some example heat transfer devices may utilize segmented electrocaloric effect material layers with stress relief gaps separating segments to mitigate delamination stress caused by lateral expansion or contraction of the electrocaloric effect material. | 03-21-2013 |
20130067935 | Heterogeneous Electrocaloric Effect Heat Transfer - Technologies are generally described herein for electrocaloric effect heat transfer devices, methods, and systems that may be effective to efficiently transfer and distribute thermal energy from a heat source utilizing coordinated application of out of phase electric signals to adjacent heat transfer stacks coupled with a thermal distribution layer. Some electrocaloric effect heat transfer stacks may include alternating layers of electrocaloric effect material and thermal rectifier material. The out of phase electric signals produce electric fields that bias the electrocaloric effect material of one heat transfer stack to a hot phase, emitting thermal energy, while biasing the electrocaloric effect material of an adjacent heat transfer stack to a cold phase, absorbing thermal energy. The thermal distribution layer allows for thermal energy from the material in the hot phase to be distributed to the material of the adjacent stack in the cold phase rather than back to the heat source. | 03-21-2013 |
20130079142 | MATCHING SPONSORED GAME CONTENT TO LOCATION BY GENRE AND PLAYABILITY - Technologies are generally described for matching sponsored game content to location by genre and playability. In some examples, a search system for finding real-environment matched gaming content for a user based at least partially on analyzed properties of potential locations may employ game script/flow information and match against local features from map data to screen content for which a game plot can be executed across appropriate areas and transitions or other physical requirements. Additionally, a broker server system may enable businesses to advertise or sponsor a game in order to get the game set up in their location. A keyword auction or similar process may be used during keyword related game organization that is also within specific geographic locations such that the game is set up with the auction winner's location as a plot related-location. | 03-28-2013 |
20130095992 | CLOSED-CYCLE CONTINUOUS FLOW SEPARATORS, SYSTEMS AND METHODS FOR THE CONTINUOUS ISOLATION OF TARGET CELLS - Provided are closed-cycle continuous flow separator systems for isolating target cell populations, which comprises in operable connection, a binding area for binding a target cell to a binding particle; a first continuous flow centrifuge for separating target cell bound binding particles from non-target cells; a de-binding area for de-binding the target cell from the binding particle; and a second continuous flow centrifuge for separating the target cell from the binding particle. | 04-18-2013 |
20130117227 | CACHE BASED KEY-VALUE STORE MAPPING AND REPLICATION - Technologies are generally described for cache based key-value store mapping and replication. In some examples, key-value stores may be mapped for data structure replication through extraction of file breaks in an existing key-value store by iterating through the store and examining changes in cache addresses to detect jumps in address values. Specially formulated queries may be executed to return the values within an address range that spans a physical storage volume in order to recover full key-value sets that are physically grouped at a current data center including record duplicates. Such sets may be used to replicate or inform the key-value sets at a new location or in a new key-value store allowing construction of a replicated database tree structure complete with record duplications that develop as tables are optimized over time. | 05-09-2013 |
20130123004 | SPECULATIVE RENDERING USING HISTORICAL PLAYER DATA - Technologies are presented for reducing lag time via speculative graphics rendering in cloud based gaming. In some examples, historical data about statistically relevant large populations of players is provided. The historical data may include state transitions through various game locations or situations. In some of the game locations there may be a correlation between a probability of a particular upcoming scene and a player state. Example game locations or situations may include areas that players tend to cross in one or more straight lines, corners that players may round in a particular fashion, spots where certain player motions are commonly engaged in, such as looking up, and the like. The historical data may be tested against a certain predictive strength and rendered predicted game states may be prepared ahead of player need. | 05-16-2013 |
20130137441 | Wireless Communication Networks Including Mains-Connected Relay Nodes - A method of determining which nodes in a wireless network qualify as main-connected relay nodes; sending a request for connectivity information to the determined mains-connected relay nodes based at least in part on the determination of which nodes qualify as mains-connected relay nodes; receiving the connectivity information from the determined mains-connected relay nodes; and routing communication from a source node to a destination node via one or more of the determined mains-connected relay nodes based at least in part on the connectivity information from the determined mains-connected relay nodes. | 05-30-2013 |
20130145431 | INTEGRATED CIRCUITS AS A SERVICE - Technologies are generally described for provisioning and managing access to FPGAs as a service. In some examples, a system for allowing provisioning management for shared FPGA use and access control to enable a user's processes to access their custom programmed FPGA may accept user packages for compilation to an FPGA in communication with datacenter servers. The user packages may be imaged to the FPGA with an added management payload, and a driver and user key may be employed to allow selective access to the FPGA as a service for datacenter virtual machines. Together these elements allow a datacenter to provision rentable integrated circuits as a service (ICaaS). Additional services such as billing tracking, provision management, and access control may be provided to users allowing them to realize lower cost while the datacenter realizes greater return. | 06-06-2013 |
20130150161 | GRAPHICS RENDER MATCHING FOR DISPLAYS - Technologies are presented for matching pre-processing of graphics at rendering source to post-processing at a display device to reduce undesirable effects of pre- and post-processing combinations. A rendering source may receive information associated with or otherwise determine a type of display device to which images are to be delivered. Parameters of the rendering process may then be suitably modified to take advantage of the post-processing performed by the display device or eliminate processes that may be undone by the display device. In some examples, the rendering source may communicate its pre-processing parameters to the display device and cause adjustment of post-processing parameters at the display device or, alternatively, send instructions to the display device to adjust the post-processing parameters. | 06-13-2013 |
20130151484 | STORAGE DISCOUNTS FOR ALLOWING CROSS-USER DEDUPLICATION - Technologies are presented for deduplicating data storage across multiple separate users in a datacenter environment. In some examples, the deduplication may take into consideration separate encryption and packaging of various inactive data modules and machine instances, and may be performed based on customer proactive flagging of data as available for deduplication. Billing system records may be employed to track saved space for incentivizing users through discounts and as a garbage collection master reference for tracking usage of deduplication packages, which may otherwise be difficult in the multi-package environment. | 06-13-2013 |
20130166749 | Optimization Of Resource Utilization In A Collection Of Devices - Technologies are described herein for optimizing resource utilization in a collection of devices having hierarchical network layers. Some example technologies may identify packets exchanged between processes executed on collections of server computers. The hierarchical network layers may couple the collections of server computers. The technologies may determine virtual machine groups based on the identified packets. Each of the virtual machine groups may identify one or more virtual machines configured on the collections of server computers to execute one or more processes. The virtual machine groups may be configured to increase data traffic in a lower layer in the hierarchical network layers and to decrease the data traffic in a higher layer in the hierarchical network layers. The technologies may relocate the virtual machines between the collections of server computers according to the virtual machine groups. | 06-27-2013 |
20130185722 | DATACENTER RESOURCE ALLOCATION - Technologies and implementations for allocating datacenter resources are generally disclosed. | 07-18-2013 |
20130191531 | ITERATIVE SIMULATION OF REQUIREMENT METRICS FOR ASSUMPTION AND SCHEMA-FREE CONFIGURATION MANAGEMENT - Technologies are presented for a method and a system that is configured to receive a topology description of an existing customer deployment and a set of achieved performance metrics at a current datacenter and iterate simulations using policy settings across available service levels to find settings that match or exceed the achieved performance levels. Customer specifications may be received in a standardized format along with measured performance so that settings can be derived from fundamental simulation. The resulting simulations may be used to generate a menu of options and their performance automatically for a customer and that information may be provided to a configuration manager when the customer chooses a setup. | 07-25-2013 |
20130191672 | User Generated Data Center Power Savings - Technologies are described herein for providing power savings in a data center. Some example technologies may identify some user-provided hardware independent power saving codes from multiple virtual machines within the data center. The technologies may convert at least a portion of the user-provided hardware independent power saving codes into a device power management message specific to a computing system in the data center. The technologies may provide the device power management message to the computing system. The computing system may be configured to enable or disable one or more devices within the computing system according to the device power management message. | 07-25-2013 |
20130198743 | DATA CENTER WITH CONTINUOUS WORLD SWITCH SECURITY - Technologies related to continuous world switch security are generally described. In some examples, a world switch indicator may indicate whether continuous world switch security is on or off for a cloud customer. A hypervisor world switch security setting may be activated and deactivated, according to the world switch indicator, to optionally allow world switches and not context switches between virtual machines executed by a cloud server. Continuous world switch security may optionally be controlled by a cloud customer. Load balancing, cloud customer billing and other techniques are also disclosed to accommodate the activation/deactivation of continuous world switch security. | 08-01-2013 |
20130198746 | PREVENTING CLOUD CARTOGRAPHY - Technologies are presented for a network/hypervisor approach to maintain a stable and separate network address for the hypervisor on a multi-tenant system and changeable network addresses for the virtual machines (VMs). In some examples, the VM addresses may be decoupled from the domain address for the hypervisor so they can be changed arbitrarily and independently without impacting command messaging, and the domain address for the hypervisor may not form a part of the delivery chain for messages to the VMs. The system may also consume only the same number of IP addresses as currently used. | 08-01-2013 |
20130203496 | ONLINE GAMING - Technologies and implementations for providing and online gaming experience are generally disclosed. | 08-08-2013 |
20130205126 | CORE-LEVEL DYNAMIC VOLTAGE AND FREQUENCY SCALING IN A CHIP MULTIPROCESSOR - Techniques described herein generally include methods and systems related to manufacturing a chip multiprocessor having multiple processor cores. An example method may include receiving performance or reliability information associated with each of the multiple processor cores, wherein the received performance or reliability information is determined prior to packaging of the chip multiprocessor, and storing the received performance or reliability information such that stored performance or reliability information is used to adjust an operating parameter of at least one of the multiple processor cores of the chip multiprocessor. | 08-08-2013 |
20130206223 | Solar Array of Transparent Nanoantennas - Implementations and techniques for solar arrays of transparent nanoantennas are generally disclosed. | 08-15-2013 |
20130239099 | COMPILATION OF CODE IN A DATA CENTER - Technologies are generally described for a system, method and data center effective to execute a code. In an example, a method may include receiving, by a first processor, a first code from a second processor. The method may further include compiling the first code for first and second hardware stacks to produce first and second executable codes. The second hardware stack may be different from the first hardware stack. The method may include generating a reference to the first executable code and the second executable code and storing the reference. The method may further include receiving, by a third processor, an instance and a request to execute the instance. The method may further include executing the first executable code by the first hardware stack. | 09-12-2013 |
20130260846 | ENABLING LOCATION-BASED APPLICATIONS TO WORK WITH IMAGINARY LOCATIONS - Technologies for game providers to place their game worlds into existing map databases and communicate the relevant locations to location-based applications are generally described. In some examples, this may be achieved by generating maps that use non-physical locations that are still within standard location data formats at a game service provider and providing the maps and/or map data to map server providers showing game worlds mapped to those coordinates. Alternatively, the game service provider may provide the map data to the map service provider and the map may be generated at the map service provider. The imaginary location maps may be identified by extreme or non-physical altitudes, for example. Game clients may be enabled to publish the location of their game persona on an imaginary map and/or their real persona on a real map and receive location-based services for either or both personas. | 10-03-2013 |
20130260891 | RESOURCE MANAGEMENT FOR DATA CENTER BASED GAMING - Technologies are presented for managing a resource demand on a data center providing game services by adjusting a probability of various kinds of game events. Data center load data may be received and used to adjust occurrence tables associated with both one-off and lengthy game events that may direct game clients toward events that may involve lesser resource demand. Contrary to conventional load balancing for non-gaming applications, the methods described herein may take advantage of the pseudorandom event nature that may be a part of a game experience in gaming applications. The resource demand may be altered without changing the number of customers served or the quality of service provided. Thus, resource management may be enhanced while serving the same number of customers. | 10-03-2013 |
20130262382 | DETERMINING USER KEY-VALUE STORAGE NEEDS FROM EXAMPLE QUERIES - Technologies are generally provided for conveying tree and index needs of a database by collecting and forwarding a statistically representative set of data requests so that a new datacenter can use its existing auto-learning and adjustment techniques to create local indices before receiving its first real or live requests. In some examples, requests at an origin datacenter may be collected to provide a small population of queries that are representative of a larger population of queries. Filters and/or anonymizers may be employed to adhere to data sharing rules and restrictions while still allowing a new datacenter to build indices and test performance. Thus, the new datacenter may be trained asynchronously from another site and without actual data changing hands. Training and testing of destination database services may be completed before committing to customer migration. | 10-03-2013 |
20130275591 | DATA CENTER ACCESS AND MANAGEMENT SETTINGS TRANSFER - Technologies and implementations for providing a data center access and management settings transfer service are generally disclosed. | 10-17-2013 |
20130275971 | DETERMINING DESTINATION CLOUD SYSTEM REQUIREMENTS - Technologies and implementations for testing cloud systems to determine destination cloud system requirements are generally disclosed. | 10-17-2013 |
20130282692 | SEARCH ENGINE INFERENCE BASED VIRTUAL ASSISTANCE - Techniques described herein generally relate to real time inference based systems. Example embodiments may set forth devices, methods, and computer programs related to search engine inference based virtual assistance. One example method may include a computing device adapted to receive text as input and a computer processor arranged to determine at least one inference regarding subject matter of the text based on one or more web searches of one or more terms within the text. The inference(s) may then be automatically displayed upon the inference(s) being determined. The text may be automatically received as input from a voice-to-text converter as voice-to-text conversion producing the text is occurring. | 10-24-2013 |
20130282791 | MIGRATION IN PLACE - Technologies related to migration in place are generally described. In some examples, software and/or data associated with a platform customer can be “migrated” to a new platform while allowing the platform customer's software and/or data to remain on same hardware. A data center and/or Infrastructure as a Service (IaaS) provider may be configured to support migration in place for example by providing hardware identifiers upon request, providing platform identifiers upon request, providing platform compatibility information upon request and/or approving platforms for migration in place operations, deploying platform modules to migration in place hardware, providing user session support during migration in place operations, and/or performing security operations. | 10-24-2013 |
20130289362 | INFRARED GUIDE STARS FOR ENDOSCOPIC ORIENTEERING - Briefly stated, technologies are generally described for tracking a location and an orientation of a medical tool inside a body. The method may include positioning multiple light emitting diodes (LEDs) in infrared (IR) wavelength range near a tip of the medical tool. Upon insertion of the medical tool inside the body, the LEDs may emit IR light in unique patterns, which may be detectable through bodily tissue. The emitted light patterns may be detected through an IR detector device external to the body. One or more IR markers may be placed near the body to serve as reference points and the IR detector may determine the location and the orientation of the medical tool inside the body based on the detected light patterns. The location and the orientation of the medical tool inside the body may be displayed on a monitor. | 10-31-2013 |
20130289367 | SENSING OF GASEOUS LEAKAGE INTO BODY FOR EARLY DETECTION OF COLORECTAL ANASTOMOTIC LEAKAGE - Technologies are generally described for a system for detecting the presence of gas in the intraperitoneal space of the abdominal cavity and indicating anastomotic leakage. A sensing device may be implanted inside the abdominal cavity of a body near the location of an anastomosis. The sensing device may utilize a sensor configured to detect gas presence and measure the concentrations of gases, including hydrogen sulfide and/or methane, within the intraperitoneal space. The sensing device may be configured to transmit gas detection information to an external wireless communication device, and the wireless communication device may be configured to generate an alert if a gas concentration level rises above a predetermined acceptable level. The wireless communication device may also be configured to transmit gas detection information to an external monitoring system for performing statistical analysis on the gas detection information for generating more accurate data and more accurately indicating potential anastomotic leakage. | 10-31-2013 |
20130290343 | MULTIPLE VARIABLE COVERAGE MEMORY FOR DATABASE INDEXING - Technologies related to multiple variable coverage memory for database indexing are generally described. Disclosed methods may be performed to implement high-speed database access to digital service provider customer data as the digital service provider builds an optimized index for a database. Initially, the digital service provider may maintain an appropriate level of service by keeping a relatively slow performing, basic index in a relatively high performance first memory. As the digital service provider builds the optimized index, the digital service provider may maintain the appropriate level of service by gradually shifting from use of the first memory to the use of a relatively lower performance second memory. | 10-31-2013 |
20130290932 | Application Programming Interface Testing Services - Technologies and implementations for providing an application programming interface testing service for transferring data center services. | 10-31-2013 |
20130290941 | CERTIFICATION FOR FLEXIBLE RESOURCE DEMAND APPLICATIONS - Technologies are generally provided for optimizing virtual machine performances at a datacenter and managing sudden resource demand changes by co-residing applications on same virtual machines through a flexible resource demand certification approach. A flexible resource demand certificate may be generated for applications including predetermined operating compilation architectures that run well but have different resource demands. A Just In Time (JIT) compiler may be directed to selected target settings for a combination of operational parameter settings such that the co-residing applications can share resources without overloading system resources. Applications to be migrated to a new datacenter or a new virtual machine at a datacenter may be assigned and adjusted according to their and potential co-residing applications' certificates providing optimized resource usage. | 10-31-2013 |
20130290956 | VIRTUAL MACHINE SWITCHING BASED ON MEASURED NETWORK DELAY - Technologies related to virtual machine switching based on measured network delay are generally described. A network delay aware Virtual Machine (VM) may be configured to adapt a Virtual Machine Monitor (VMM) to delay switching back to the network delay aware VM by a delay amount determined using a measured network delay. The measured network delay may comprise a delay between sending a network communication and receiving a network response. By delaying switching back to the network delay aware VM, additional processing resources are freed for other VMs managed by the VMM, thereby increasing efficiency of computing devices including network delay aware VMs, and correspondingly increasing efficiency of data centers including such computing devices. | 10-31-2013 |
20130294729 | OPTICAL ANTENNAS WITH ENHANCED FIELDS AND ELECTRON EMISSION - An electromagnetic energy collecting and sensing device is described. The device uses enhanced fields to emit electrons for energy collection. The device is configured to collect energy from visible light, infrared radiation and ultraviolet electromagnetic radiation. The device includes a waveguide with a geometry selected to enhance the electric field along a conductor to create a high, localized electric field, which causes electron emission across a gap to an electron return plane. | 11-07-2013 |
20130309706 | SELECTIVE 3D BIOPATTERNING - Methods, systems, and articles for selective three dimensional (3D) biopatterning are disclosed. A biological target may be imaged and a selected area of the image may define a desired pattern for guiding the emission of EM radiation into the biological target. Two or more groups of photosensitive elements responsive to different activation wavelengths may be provided. The photosensitive elements may be selectively activated on or within the biological target based on location and activation wavelength in order to guide cell differentiation, adhesion of growth factors to a scaffold, release of growth factors, and/or deletion of cells. | 11-21-2013 |
20130311628 | Reliability in Distributed Environments - Technologies are generally described herein for deploying an application in a ubiquitous computing system. An allocation module may receive a command to deploy the application having multiple application modules to various nodes in the ubiquitous computing system. For at least one application module, the allocation module may identify, within the ubiquitous computing system, a set of heterogeneous nodes capable of executing the application module and having greater diversity over other sets of nodes in the ubiquitous computing system. The allocation module may deploy the application to the set of heterogeneous nodes. | 11-21-2013 |
20130317667 | AUTOMATIC FLIGHT CONTROL FOR UAV BASED SOLID MODELING - Technologies are generally described for controlling a flight path of a UAV based image capture system for solid modeling. Upon determining an initial movement path based on an estimate of a structure to be modeled, images of the structure to be modeled may be captured and surface hypotheses formed for unobserved surfaces based on the captured images. A normal vector and a viewing cone may be computed for each hypothesized surface. A set of desired locations may be determined based on the viewing cones for the entire structure to be modeled and a least impact path for the UAV determined based on the desired locations and desired flight parameters. | 11-28-2013 |
20130320086 | REACTIVE TAGS FOR OBTAINING CONSUMER SURVEY RESPONSES - Technologies are generally described for obtaining consumer survey responses encoded on a reactive tag associated with an item. Prior to distributing a product to consumers, a manufacturer may affix a reactive tag to the item for gathering consumer feedback about the product. Consumer survey questions and responses may be encoded on the reactive tag, and the consumer may be able to remove a portion of the tag in order to select a consumer survey response. The reactive tag may be configured to react to the removal of a portion of the reactive tag by encoding data on the reactive tag for the consumer response and/or changing a physico-chemical state of the reactive tag for storing the consumer survey responses. When the consumer has finished with the product, the product may be received at a recycling facility, where a machine may scan the reactive tag to retrieve consumer survey responses. | 12-05-2013 |
20130323841 | DYNAMICALLY ALTERABLE CELL SUPPORT - A dynamically alterable cell support may be altered at a large scale to induce mechanical removal of adherent cells in culture without the use of a removal solution. For example, adherent cells may be cultured on an elastic support with one or more textured surface regions and removed by expansion/contraction of the support. Mechanical removal of adherent cells may reduce or minimize damage to cell surface markers, cellular morphology, and/or cellular physiology associated with the detachment and resuspension of cultured adherent cells. | 12-05-2013 |
20130326623 | CROSS-USER CORRELATION FOR DETECTING SERVER-SIDE MULTI-TARGET INTRUSION - Technologies are generally described for time-correlating administrative events within virtual machines of a datacenter across many users and/or deployments. In some examples, the correlation of administrative events enables the detection of confluences of repeated unusual events that may indicate a mass hacking attack, thereby allowing attacks lacking network signatures to be detected. Detection of the attack may also allow the repair of affected systems and the prevention of further hacking before the vulnerability has been analyzed or repaired. | 12-05-2013 |
20130332380 | DETERMINATION OF A CONTRACTOR TEAM - Technologies are generally described for systems, methods and devices configured to determine a contractor team from a group of contractors. An example method may include receiving hiring details, receiving profiles of contractors in the group, receiving social data and determining the contractor team based on the hiring details, the profiles, and the social data. The hiring details may include technical details and social details. The technical details may indicate requested first skills of contractors in the contractor team. The social details may indicate a request of a first strength of a social connection between two or more of the contractors in the contractor team. The profiles may indicate second skills of respective contractors. The social data may relate to a second strength of a social connection between at least two of the contractors in the group. | 12-12-2013 |
20130332710 | MODULATING DYNAMIC OPTIMAIZATIONS OF A COMPUTER PROGRAM - Technologies and implementations for modulating dynamic optimizations of a computer program during execution are generally disclosed. | 12-12-2013 |
20130336364 | COGNITIVE RADIO SPECTRUM SENSING VIA CDMA RECEIVER CODING - Technologies are generally described for cognitive radio spectrum sensing via Code Division Multiple Access (CDMA) receiver coding. A CDMA module in the front-end of a cognitive radio system may be used to sense spectrum. When the system is not decoding or transmitting signals, a modified CDMA receiver coding may replace a pseudorandom code used in decoding with relatively pure, non-random detection frequency to scan for energy from primary users of the spectrum. Multiplication of the received signal by spectrally pure codes in place of the CDMA code renders the CDMA processor effectively a scanning spectrum analyzer and may detect energy at multiple frequencies. The allocation of sub-bands and/or timing may be adjusted to account for the detected energy. | 12-19-2013 |
20140012764 | PROOF OF DEGRADATION TAGS FOR BIODEGRADABLE PLASTICS - Technologies are generally described for proof of degradation for biodegradable materials through use of tags in items containing biodegradable materials. In order to incentivize actual degradation based recycling of biodegradable products, identification tags or trackers may be embedded into the biodegradable portion of such products. Tags may be selected such that a non-degradation destruction of the product would destroy the tags as well. At a recycling facility, information associated with the products may be obtained from the tags by separating the tags during degradation or collecting the tags themselves and providing the information or the tags to an entity such as the manufacturer, a government entity, or the like. | 01-09-2014 |
20140012765 | PROVIDING RECYCLING PRODUCT PACKAGING - Technologies are generally described for allowing merchants to provide packaging for ready recyclable items. Consumers may list one or more products associated with special recycling on a registry for indicating the consumer has products that need to be recycled. When a new order for a new product is received from the consumer by a merchant, the merchant may identify a recyclable product in the registry. The merchant or a third party entity may select packaging for the new product that may be compatible with both the new product and the recyclable product if those two are not similar in size and shape. The merchant/third party entity may then ship the new product to the consumer in the selected packaging with a return shipping label, and the consumer may repackage and send the recyclable product in the provided packaging to a recycler for proper recycling. | 01-09-2014 |
20140019226 | SOCIAL NETWORK LIMITED OFFER DISTRIBUTION - Technologies related to social network limited offer distribution are generally described. In some examples, a limited number of root participants may be allowed to claim an offer, and the offer may be limited to branch participants connected in a social network to the root participants and/or other branch participants in the limited offer. Participants in the limited offer and connections there between may be stored as a limited offer social network graph for use in subsequent marketing efforts. In the absence of social network graph information, participant contact information may be gathered and used to build a social network graph. | 01-16-2014 |
20140020405 | Multistage Thermal Flow Device and Thermal Energy Transfer - Technologies are generally described herein for multistage thermal flow devices and methods effective to transfer thermal energy between a heat source and a heat sink having different surface areas and thermal energy flow characteristics. Some example multistage thermal flow devices may include multiple stages of heat transfer pumps utilizing electrocaloric effect material with thermal collection devices between stages. The heat flux associated with heat transfer pumps of consecutive stages may increase to concentrate the thermal energy through the multistage thermal flow device or may decrease to diffuse the thermal energy through the multistage thermal flow device. | 01-23-2014 |
20140025737 | CONTENT SUGGESTION FOR POSTING ON COMMUNICATION NETWORK - Technologies are presented for providing a suggestion list presenting options for posting information related to viewed content on a communication network. In some examples, a user may desire to contribute to posted content by adding comments and other relevant information. A system may identify one or more key terms included in the viewed content, and may compare the key terms with content, such as files, emails, websites, images and media content, on computing devices and web browser histories associated with the user to identify information that may be related to the viewed content. If the system identifies information related to the key terms of the viewed content, the system may present the identified information associated with key terms to the user, and may enable selection from a posting suggestion list for automatically posting. | 01-23-2014 |
20140026404 | INDUCTIVELY REMOVABLE ASSEMBLY BONDING - Technologies are generally described for providing inductively removable assembly bonding. Inductive elements may be placed strategically at bonding locations between two or more coupled components. At disassembly time, the elements may be heated through Radio Frequency (RF) energy causing the bonds to break and components to separate. For example, inductive elements placed near plastic stake bonds between dissimilar materials in an electronic device may be employed to separate the dissimilar materials during a recycling process. According to some examples, the elements may also be heated through a directly applied electric current via a network of connections designed into the assembly. | 01-30-2014 |
20140032249 | INSURANCE ADJUSTMENT FOR CLOUD BASED SERVICES - Technologies are generally described for an architecture and system for conducting insurance adjusting for cloud-related data or computing services. In some examples, the system may be configured to collect data regarding datacenter performance degradations, and may include an adjusting interface, a claim reporting interface, and connected infrastructure to collect instrumented data associated with cloud-related data/computing service performance. The collected data may be used for event classification and liability assignment so that insurance can be meaningfully written and processed. | 01-30-2014 |
20140032268 | IDENTIFYING ITEMS AT DISPOSAL FOR GENERATING HOUSEHOLD CONSUMPTION DATA - Technologies are generally described for gathering household consumption data at product disposal and determining a household consumption behavior. Disposed items may be identified through various identification techniques such as optical image capture based identification, a barcode based identification, or a Radio Frequency Identification (RFID) tag based identification at a point of disposal by a collecting entity associated with additional information such as address, date/time of collection, etc. for a household consumption database. A household consumption behavior may be determined based on analysis of the household consumption database and a report of the household consumption behavior may be provided to business and legal entities for allowing the entities to use the household consumption data for targeting consumers for marketing, as well as for legal, and regulatory purposes. | 01-30-2014 |
20140032843 | MANAGEMENT OF CHIP MULTIPROCESSOR COOPERATIVE CACHING BASED ON EVICTION RATE - Techniques described herein generally include methods and systems related to cooperatively caching data in a chip multiprocessor. Cooperatively caching of data in the chip multiprocessor is managed based on an eviction rate of data blocks from private caches associated with each individual processor core in the chip multiprocessor. The eviction rate of data blocks from each private cache in the cooperative caching system is monitored and used to determine an aggregate eviction rate for all private caches. When the aggregate eviction rate exceeds a predetermined value, for example the threshold beyond which network flooding can occur, the cooperative caching system for the chip multiprocessor is disabled, thereby avoiding network flooding of the chip multiprocessor. | 01-30-2014 |
20140038618 | NETWORK COVERAGE BY CYCLING THROUGH BEAM SHAPE COVERAGE CONFIGURATIONS - Technologies and implementations for providing network coverage by cycling through beam shape coverage configurations are generally disclosed. | 02-06-2014 |
20140038631 | OPTIMIZING CELL TRAFFIC LOAD AND INTERFERENCE THROUGH HIGH INTERFERENCE INDICATORS - Technologies are generally described for alleviating inter-cell interference experienced by relays in wireless networks such as cellular systems that rely on relays to facilitate some communication between end user devices and base stations (BTSs). A BTS serving a relay may gather information on resource blocks being used to communicate between the relay and an end user. Then, the BTS may send interference indication signals such as High Interference Indicators (HII) or related signals on behalf of sub-communications executed by entities within the cell. Another BTS of a neighboring cell receiving the signals may avoid scheduling on those resource blocks, if possible, thereby relieving the relay link from potentially significant interference. | 02-06-2014 |
20140045100 | Metal Air Battery Including a Composite Anode - Implementations and techniques for metal air batteries including a composite anode are generally disclosed. | 02-13-2014 |
20140052859 | UPDATING A CURRENTLY UTILIZED DEVICE - In one example, a system includes an authentication server that is configured to receive an authentication request for a primary application, provide time-based authentication credentials for the primary application, receive an updated authentication request for the primary application, wherein the updated authentication request includes a client device identifier (ID) corresponding to a client device from which the authentication request is received, and transmit the client device ID; the system may further include a push server that is configured to receive the transmitted client device ID, and push an update to the client device having the client device ID. | 02-20-2014 |
20140067872 | TREE COMPARISON TO MANAGE PROGRESSIVE DATA STORE SWITCHOVER WITH ASSURED PERFORMANCE - Technologies are generally provided for progressive key value store switchover by evaluating a maturity of a migrated data store and allowing piecewise switching of substructure area query servicing from an origin data store to a destination data store. In some examples, abstractions of origin and destination tree structures may be compared to each other in order to generate an evaluation metric at substantially reduced performance evaluation load. The evaluation metric may target performance sampling while assuring a desired performance level with localized query servicing switchover. Piecewise data transfer may also be optionally enabled such that overall storage can be similar to the storage of a single data store copy while reducing an impact on existing data store services. | 03-06-2014 |
20140068903 | Ultracapacitors Employing Phase Change Materials - Implementations and techniques for employing phase change materials in ultracapacitor devices or systems are generally disclosed. | 03-13-2014 |
20140078823 | Phase Change Memory Thermal Management with Electrocaloric Effect Materials - Technologies are generally described herein for managing heat within a phase change memory (PCM) structure utilizing electrocaloric effect materials. Some example PCM structures may include an electrocaloric effect material layer thermally coupled to an array of PCM cells. The electrocaloric effect material layer may be segmented so that activation of each segment is coordinated with a subset of the PCM cells within the array. While excess heat emanates from a PCM cell during memory operations, a corresponding electrocaloric effect material segment may be activated to decrease the thermal resistance of the electrocaloric effect material, which transfers the excess heat away from the neighboring PCM cells. | 03-20-2014 |
20140087871 | CHARACTER MODEL ANIMATION USING STORED RECORDINGS OF PLAYER MOVEMENT INTERFACE DATA - Technologies are generally described for providing full-motion animation-as-a-service. In some examples, short motion-capture segments may be captured from user motion user interface devices and stored in a database. When a full-motion animation is desired, a start pose and a target pose may be provided, and a multiple-path, multiple-iteration search through the database may be used to assemble the full-motion animation. Motion retargeting may be used to further refine the assembled full-motion animation. | 03-27-2014 |
20140090016 | SHARED SECRET IDENTIFICATION FOR SECURE COMMUNICATION - Technologies related to shared secret identification for secure communication are generally described. In some examples, devices may exchange hashes, such as file deduplication hashes, to identify a matching hash. The identified matching hash represents a shared data item which may be used as a shared secret to encrypt and/or decrypt subsequent secure communications between the devices. Each device retrieves the shared data item from its respective secure memory and may use the shared data item to encrypt and/or decrypt subsequent secure communications. An eavesdropper may observe the hash exchange, but will not be able to decrypt the secure communications without access to the shared data item, because hashes may be effectively non-invertible. | 03-27-2014 |
20140092127 | MEDIA ANNOTATIONS IN NETWORKED ENVIRONMENT - Technologies are generally described for allowing insertion of annotations on media and display of the annotations along with the media. For example, in some embodiments, the described technologies enable a user to insert annotations on media and enable viewers associated with the annotating user to view the annotations when viewing the media. The annotating user may be enabled to define who can view the annotations and/or when the annotations are to be displayed in reference to the media. A content provider hosting the media and/or a communication network intermediating request and transfer of the media may determine whether a requesting viewer has a relationship with the annotating user. If the viewer and annotating user are associated or the viewer has specifically requested the annotations from the annotating user, the annotated media may be provided to the requesting viewer. | 04-03-2014 |
20140106185 | RECHARGEABLE BATTERY RECYCLING - Technologies for recycling rechargeable batteries are described. For example, a rechargeable battery may be recycled through a cycle that includes one or more of determining a battery condition while the rechargeable battery may be used in a networkable device, updating a rechargeable battery database with the battery condition over a network, determining recycling instructions, and outputting the recycling instructions on the networkable device. In other examples, multiple rechargeable batteries may be recycled by receiving battery conditions and identification codes over a network, updating a rechargeable battery database with battery conditions and identification codes, and assigning rechargeable batteries to recycling processes according to battery conditions and identification codes. | 04-17-2014 |
20140115151 | ERROR-CAPTURING SERVICE REPLACEMENT IN DATACENTER ENVIRONMENT FOR SIMPLIFIED APPLICATION RESTRUCTURING - Technologies are presented for addressing dependency interruptions due to inactivation of a service module in a modular datacenter environment through a diagnostic module. In some examples, the diagnostic module may substitute for one or more inactive service modules in a datacenter architecture. Messages and/or items that are directed to the inactive service module(s) may be intercepted by or rerouted to the diagnostic module and used to generate error reports and/or repair activity triggers. | 04-24-2014 |
20140123139 | SECURE SYSTEM TIME REPORTING - Technologies related to secure system time reporting are generally described. In some examples, responses to some system time requests may be manipulated to prevent leaking information that may be of interest for timing attacks, while responses to other system time requests need not be manipulated. In particular, responses to system time requests that are separated from a previous system time request by a predetermined minimum value, or less, may be manipulated. Responses to system time requests that are separated from a previous system time request by more than the predetermined minimum value need not be manipulated. Furthermore, secure system time reporting may be adaptively deployed to servers in a data center on an as-needed basis. | 05-01-2014 |
20140143674 | ROUTING WEB RENDERING TO SECONDARY DISPLAY AT GATEWAY - Technologies are presented for routing content rendering to a secondary display at a gateway. In some examples, a gateway system may be provided through which a user device may request content. The system may receive the requested content and route it to a renderer for rendering on a secondary display. The system may also route the requested content, in its original form or in a modified form, to the user device. | 05-22-2014 |
20140156400 | ASSOCIATING AD RESULTS WITH PURCHASES MADE VIA MOBILE DEVICES - Implementations and techniques for associating ad results with purchases made via mobile devices are generally disclosed. | 06-05-2014 |
20140162778 | USER ASSEMBLY OF LIGHTWEIGHT USER INTERFACE FOR GAMES - Technology is described for user assembly of lightweight user interfaces for games, e.g., massively multiplayer online games. The technology can include a set of pre-selectable action modules; an interface element, a messaging element, and a display element for each pre-selectable action module; and a component configured to enable a user to select a subset from the set of pre-selectable action modules. A first subset of the pre-selectable action modules can provide a different user interface than a second subset of the pre-selectable action modules when at least one pre-selectable action module is in the first subset but not the second subset. Action modules may be capable of communicating using a messaging platform with at least one server computing device and relates to a massively multiplayer online gaming system operating at a server computing device. | 06-12-2014 |
20140164400 | PERSONAL ASSISTANT CONTEXT BUILDING - Technologies related to personal assistant context building are generally described. In some examples, network service communications, such as network traffic resulting from the use of mobile applications or “apps” on a mobile device, may be captured, parsed, and included in personal assistant context databases for use in configuring automated personal assistant user interaction operations. In some examples, parsing services may be provided to parse forwarded network service communications and generate converted data for inclusion in personal assistant context databases. | 06-12-2014 |
20140164768 | DETECTING MATCHED CLOUD INFRASTRUCTURE CONNECTIONS FOR SECURE OFF-CHANNEL SECRET GENERATION - Technology is described for two parties, by leveraging previously established secure connections with third parties, to obtain a shared secret for generating a secure connection with each other in a way that reduces vulnerability to man-in-the-middle attacks. In some examples, the technology can include generating a session identifier; coordinating use of the session identifier by the two parties; finding an available secure communication channel to a third party; transmitting the session identifier to the third party via the available secure communication channel; receiving, via the available secure communication channel, a third party identifier and a session identifier-specific secret; sharing information about the received third party identifier; determining that the received third party identifier matches a third party identifier received by the second party; and using the session identifier-specific secret received with the matching third party identifier to generate a cryptographic key to secure communication between the two parties. | 06-12-2014 |
20140173032 | DISTRIBUTING CONTENT ELEMENTS AMONG DEVICES - Technologies are generally described for distributing displayed content elements among devices. In some examples, a system for moving and redistributing controls or other elements among web capable devices is presented using gateway managed redirection and injection of web page code. Injection capabilities of advertising gateways may be managed with a web application type interface for allowing a user to instruct the gateway to copy elements out of the web interface on one device and inject the elements into the interface on another device. Thus, transport of control or other elements may be enabled as suitable for various device capabilities. | 06-19-2014 |
20140173407 | PROGRESSIVELY TRIGGERED AUTO-FILL - Technologies are presented for a multi-step progressive auto-fill function that allows a series of gestures or touches to activate and guide an auto-fill function suitable for information entry. A first gesture may call forth a group of contextual domains for information. A subsequent gesture or motion may cause the selection of a contextual domain, and another action may allow the selection of particular content for placement at a location indicated by the first gesture. | 06-19-2014 |
20140189527 | APPLICATION EQUIVALENCE MAP FOR SYNCHRONIZED POSITIONING OF APPLICATION ICONS ACROSS DEVICE PLATFORMS - Technologies are presented for synchronizing associations between application icons and application functions across platforms. According to some examples, a layout and positioning of icons for different applications that perform similar functions may be synchronized across different devices. As a result, users may associate the position of an application icon on a device display with a particular function regardless of the actual device or platform. An application equivalence map may be used to synchronize application icon layout and positioning across the different devices and platforms. In other examples, icons for different applications that perform similar functions on different devices may be positioned similarly relative to equivalent display elements or features such as display corners, built-in interface elements, and comparable features. | 07-03-2014 |
20140189862 | VIRTUAL MACHINE MONITOR (VMM) EXTENSION FOR TIME SHARED ACCELERATOR MANAGEMENT AND SIDE-CHANNEL VULNERABILITY PREVENTION - Technologies are presented for automatically generating accelerator code for datacenter users, detecting multiple hardware tenants with overlapping accelerator needs, and managing the accelerator needs of the tenants so that they can share use of programmable accelerator hardware. In some examples, the accelerator code may also be customer supplied. In other examples, a delay that simulates accelerator programming for a user first accessing an accelerator that was virtualized from a pre-existing one may be applied. By simulating the delay, co-location detection (a form of side channel attack) may be prevented. | 07-03-2014 |
20140194747 | INFRARED SCANNER AND PROJECTOR TO INDICATE CANCEROUS CELLS - Provided herein are methods and devices for detecting and/or indicating cancerous cells. In some embodiments, infrared light can be used to induce an infrared signature of one or more cells and visible light can be used to indicate the one or more cells having the infrared signature. | 07-10-2014 |
20140195459 | MEASURING AND IMPROVING THE QUALITY OF A USER EXPERIENCE - Implementations and techniques for measuring and improving the quality of a user experience are generally disclosed. | 07-10-2014 |
20140201533 | QUORUM-BASED VIRTUAL MACHINE SECURITY - Technologies related to quorum-based Virtual Machine (VM) security are generally described. In some examples, VM data, such as a VM payload or other VM data, may be quorum-encrypted, such that that a quorum of decryption keys may be used to decrypt the data. Decryption keys may be distributed among multiple VMs, with different decryption keys provided to different VMs, so that single VMs may not decrypt the VM data without decryption keys held by other VMs. To decrypt its data, a VM may assemble a quorum of decryption keys by requesting decryption keys held by other operational VMs, and the VM may then decrypt its data using the assembled quorum of decryption keys. The VM may be prevented from decrypting its data without a sufficient quorum of other operational VMs. | 07-17-2014 |
20140215424 | DYNAMIC RECONFIGURATION OF PROGRAMMABLE HARDWARE - Technologies related to dynamic reconfiguration of programmable hardware are generally described. In some examples, coprocessor regions in programmable hardware such as a Field Programmable Gate Array (FPGA) may be dynamically assigned to transition the FPGA from a starting arrangement of coprocessor regions to an efficient arrangement. A placement algorithm may be executed to determine the efficient arrangement, and a path finding algorithm may be executed to determine path finding operations leading from the starting arrangement to the efficient arrangement. The path finding operations may be performed to implement the transition. | 07-31-2014 |
20140230453 | Electrocaloric Effect Heat Transfer Device Dimensional Stress Control - Technologies are generally described herein for electrocaloric effect heat transfer devices and methods effective to facilitate thermal energy transfer while mitigating mechanical stresses caused by expansion or contraction of electrocaloric effect material layers during thermal energy transfer operations. Some example heat transfer devices may include heat transfer stacks with at least two electrocaloric effect materials. Expanding electrocaloric effect material and contracting electrocaloric effect material are utilized to cancel the aggregate longitudinal dimensional change during application of an electric field. Some example heat transfer devices may utilize segmented electrocaloric effect material layers with stress relief gaps separating segments to mitigate delamination stress caused by lateral expansion or contraction of the electrocaloric effect material. | 08-21-2014 |
20140237284 | MASKING POWER USAGE OF CO-PROCESSORS ON FIELD-PROGRAMMABLE GATE ARRAYS - Technologies are generally described for masking power usage of co-processors on field-programmable gate arrays. In some examples, one or more moat brick circuits may be implemented around a co-processor loaded on a held-programmable gate array (FPGA). The moat brick circuits may be configured to use negative feedback and/or noise to mask the power usage variations of the co-processor from other co-processors on the FPGA. | 08-21-2014 |
20140245326 | LOCAL MESSAGE QUEUE PROCESSING FOR CO-LOCATED WORKERS - Technologies are provided for locally processing queue requests from co-located workers. In some examples, information about the usage of remote datacenter queues by co-located workers may be used to determine one or more matched queues. Messages from local workers to a remote datacenter queue classified as a matched queue may be stored locally. Subsequently, local workers that request messages from matched queues may be provided with the locally-stored messages. | 08-28-2014 |
20140297547 | SOCIAL NETWORK RECRUITING ALERTS - Technologies related to social network recruiting alerts are generally described. Passive recruiting targets may be registered, and a set of contacts linked to the passive recruiting target in a social network graph may be monitored. Recruiting alerts may be generated in response to changes in social network profile data associated with the set of contacts. | 10-02-2014 |
20140304704 | DATA CENTER WITH CONTINUOUS WORLD SWITCH SECURITY - Technologies related to continuous world switch security are generally described. In some examples, a world switch indicator may indicate whether continuous world switch security is on or off for a cloud customer. A hypervisor world switch security setting may be activated and deactivated, according to the world switch indicator, to optionally allow world switches and not context switches between virtual machines executed by a cloud server. Continuous world switch security may optionally be controlled by a cloud customer. Load balancing, cloud customer billing and other techniques are also disclosed to accommodate the activation/deactivation of continuous world switch security. | 10-09-2014 |
20140315631 | RESOURCE MANAGEMENT FOR DATA CENTER BASED GAMING - Technologies are presented for managing a resource demand on a data center providing game services by adjusting a probability of various kinds of game events. Data center load data may be received and used to adjust occurrence tables associated with both one-off and lengthy game events that may direct game clients toward events that may involve lesser resource demand. Contrary to conventional load balancing for non-gaming applications, the methods described herein may take advantage of the pseudorandom event nature that may be a part of a game experience in gaming applications. The resource demand may be altered without changing the number of customers served or the quality of service provided. Thus, resource management may be enhanced while serving the same number of customers. | 10-23-2014 |
20140317273 | DATACENTER BORDER-ISSUED ANALYTICS FOR MONITORING FEDERATED SERVICES - Technologies are generally described for providing datacenter border-issued analytics for monitoring federated services. In some examples, a deployment manager, which manages placement of application deployment instances across a federation and thus already knows which datacenter each instance is in, may register a package trigger with a gateway at each datacenter when an application is placed in each datacenter. The datacenter gateway(s) may then search through data packets for registered package properties such as content of a packet header that indicates it is a monitoring packet, and inject additional data according to instructions from the deployment manager. For example, the deployment manager may instruct the gateway(s) to inject a datacenter identifier or a network location identifier to each monitoring data packet. The additional data may be customer-defined and the modified monitoring data including the additional data may be sent to a monitoring system to be analyzed. | 10-23-2014 |
20140325047 | COMPOUND CERTIFICATIONS FOR ASSURANCE WITHOUT REVEALING INFRASTRUCTURE - Technologies are presented for providing compound certificates via a certificate intermediary. In some examples, a certificate intermediary may generate a compound certificate that captures the certified behavior of an application and its underlying sub-services without revealing the identities of the sub-services for providing to a customer. The certificate intermediary may receive individual certificates from a certification authority. In other examples, the certification authority may generate the compound certificate, or the certificate intermediary may act as the certification authority for at least a portion of the sub-services. | 10-30-2014 |
20140325508 | PAUSING VIRTUAL MACHINES USING API SIGNALING - Technologies are generally described for pausing virtual machines using API signaling. In some examples, active threads in a VM may be listed on a registered thread list. When the active threads in the VM perform external API calls, they may provide wait messages, which may then be compared with the registered thread list to determine if the VM should be paused. Subsequently, one or more replies to the external API calls may be received and used to determine if the VM should be reactivated. | 10-30-2014 |
20140344550 | CORE AFFINITY BITMASK TRANSLATION - Technologies are generally described for systems methods, and devices related to core affinity bitmask translation. An example system may include first, second, third and fourth cores, and a dispatcher. The dispatcher may be configured to receive a first request where the first request include a core affinity bitmask and instructions. The core affinity bitmask can identify at least the first core and the second core. The dispatcher may be configured to determine a first affinity between the first core and the second core. The dispatcher may then identify the third core and the fourth core as having similar affinity to achieve a substantially similar performance. The dispatcher may also be configured to generate a second request that includes a translated core affinity bitmask. The translated core affinity bitmask may be effective to identify the third core and the fourth core as appropriate cores to execute the instructions. | 11-20-2014 |
20140351811 | DATACENTER APPLICATION PACKAGES WITH HARDWARE ACCELERATORS - Technologies are generally described for providing application packages with hardware accelerators. In some examples, an application package for a datacenter may include an application and multiple hardware accelerators associated with the application. Each hardware accelerator may be configured for a different datacenter hardware configuration. When a datacenter receives the application package, it may select the appropriate hardware accelerator for implementation based on its hardware configuration. | 11-27-2014 |
20140357365 | Electronic Game Personalization - Technologies are generally described for personalizing an electronic game. In some examples a method for personalizing an electronic game may include intercepting content, extracting particular content from the intercepted content, and personalizing the electronic game based on the extracted content. | 12-04-2014 |
20140357379 | CACHE-INFLUENCED VIDEO GAMES - Technologies related to cache-influenced video games are generally described. In some examples, the content of video game outputs as experienced by players of a video game may be adaptively modified to make more effective use of digital assets that are loaded in a computing system cache. Cache-influenced video games may increase cache use by increasing use, within a video game, of digital assets in a cache relative to assets not in the cache, e.g., assets that are on disk or in database storage. Cached digital assets can be retrieved more efficiently than assets stored elsewhere, and therefore video game performance may be improved. | 12-04-2014 |
20140359778 | FUNCTION-TARGETED VIRTUAL MACHINE SWITCHING - Technologies are provided for function-targeted virtual machine switching. In some examples, function usage times on a virtual machine (VM) may be profiled by a virtual machine manager (VMM) and used to manage VM switching in order to preferentially switch VMs during specific targeted functions. The targeted functions and/or VM switching preferences may be adjusted over time in order to provide switching unpredictability, for example to frustrate side-channel attackers by forcing the attackers to gather data for much longer periods of time (e.g., weeks or months) if they want to detect or attack. | 12-04-2014 |
20140369316 | DYNAMIC INTERNETWORK LOAD BALANCING - Examples are disclosed for executing vertical handovers of wireless devices configured to couple with heterogeneous wireless networks. In some examples, wireless devices on separate heterogeneous networks may be swapped between the heterogeneous networks. | 12-18-2014 |
20140370986 | SPECULATIVE RENDERING USING HISTORICAL PLAYER DATA - Technologies are presented for reducing lag time via speculative graphics rendering in cloud based gaming. In some examples, historical data about statistically relevant large populations of players is provided. The historical data may include state transitions through various game locations or situations. In some of the game locations there may be a correlation between a probability of a particular upcoming scene and a player state. Example game locations or situations may include areas that players tend to cross in one or more straight lines, corners that players may round in a particular fashion, spots where certain player motions are commonly engaged in, such as looking up, and the like. The historical data may be tested against a certain predictive strength and rendered predicted game states may be prepared ahead of player need. | 12-18-2014 |
20140372377 | DETERMINING USER KEY-VALUE STORAGE NEEDS FROM EXAMPLE QUERIES - Technologies are generally provided for conveying tree and index needs of a database by collecting and forwarding a statistically representative set of data requests so that a new datacenter can use its existing auto-learning and adjustment techniques to create local indices before receiving its first real or live requests. In some examples, requests at an origin datacenter may be collected to provide a small population of queries that are representative of a larger population of queries. Filters anonymizers may be employed to adhere to data sharing rules and restrictions while still allowing a new datacenter to build indices and test performance. Thus, the new datacenter may be trained asynchronously from another site and without actual data changing hands. Training and testing of destination database services may be completed before committing to customer migration. | 12-18-2014 |
20140374970 | ELECTRIC ARC FURNACE DUST RECYCLING APPARATUS AND METHOD - The present technology provides an illustrative apparatus for recycle electric arc furnace (EAF) dust and method of use related to the same. The apparatus has a heat controlling region coupled to a separation volume and includes at least one magnet and a cooling region. The heating controlling region operates at a temperature sufficient to transform at least some of the EAF dust into a mixture of gaseous zinc and one or more additional metals. The magnet separates the iron-rich material from the mixture of gaseous zinc and one or more additional metals and the cooling region condenses the gaseous zinc. | 12-25-2014 |
20140380025 | MANAGEMENT OF HARDWARE ACCELERATOR CONFIGURATIONS IN A PROCESSOR CHIP - Techniques described herein generally include methods for the management of hardware accelerator images in a processor chip that includes one or more programmable logic circuits. Hardware accelerator images may be optimized by swapping out which hardware accelerator images are implemented in the one or more programmable logic circuits. The hardware accelerator images may be chosen from a library of accelerator programs downloaded to a device associated with the processor chip. Furthermore, the specific hardware accelerator images that are implemented in the one or more programmable logic circuits at a particular time may be selected based on which combination of accelerator images best enhances performance and power usage of the processor chip. | 12-25-2014 |
20150020158 | SHARED SECRET TECHNIQUES FOR UBIQUITOUS COMPUTING DEVICES - Technologies and implementations for secure access to online services are generally disclosed. | 01-15-2015 |
20150023233 | SUPPRESSION OF DISCOVERY OF MOBILE DEVICES IN A WIRELESS NETWORK - Technologies are generally described for suppressing discovery of mobile devices in a wireless ubiquitous computing (ubicomp) network, reducing the number of network transmissions by devices in the network and reducing network congestion and prolonging battery life. A mobile device may add supplementary information to introductory beacons transmitted by the device that indicate no response is necessary from other devices participating in the network except for a coordinator of the network. The mobile device may transmit a malformed introductory beacon that will be ignored by other devices in the network except for the coordinator. The coordinator of the wireless network may detect the mobile device moving through the network and transmit a suppression signal to other devices in the network causing the devices to ignore the introductory beacons transmitted by the mobile device. | 01-22-2015 |
20150046923 | DIFFERENTIAL VOLTAGE AND FREQUENCY SCALING (DVFS) SWITCH REDUCTION - Technologies are generally described for systems, devices and methods effective to schedule access to a core. In some examples, a first differential voltage frequency scaling (DVFS) value of a first virtual machine may be received by a virtual machine manager. A second DVFS value of a second virtual machine may be received by the virtual machine manager. A third DVFS value of a third virtual machine may be received by the virtual machine manager. The third DVFS value may be substantially the same as the first DVFS value and different from the second DVFS value. A dispatch cycle may be generated to execute the first, second and third virtual machines on the core. After execution of the first virtual machine, the dispatch cycle may require execution of the third virtual machine before execution of the second virtual machine. | 02-12-2015 |
20150065033 | REPEATER EMULATION TO INCREASE NETWORK RANGE - Technologies are generally described for methods and systems configured to increase a range of a network. In an example, a method for increasing a range of a first network may include sending a request by a communication device to a network device while the communication device is in a range of the first network. The request may include a request for discovery data that identifies the first network. The method may further include receiving, by the communication device, the discovery data. The method may further include broadcasting, by the communication device, information based on the discovery data when the communication device is outside the range of the first network and when the communication device is configured to communicate over a second network. The second network may be different from the first network. | 03-05-2015 |
20150082318 | DATACENTER RESOURCE ALLOCATION - Technologies and implementations for allocating datacenter resources are generally disclosed. | 03-19-2015 |
20150088816 | COST REDUCTION FOR SERVICING A CLIENT THROUGH EXCESS NETWORK PERFORMANCE - Technologies are presented for reducing the network delivery speed of a datacenter deployment within a controlled performance definition while also reducing the overall bandwidth demand on core servers in the datacenter. In some examples, a throttle may be used adjusting (e.g., slowing) data flow that is informed of both network performance and total allowable delay, and a compression/deduplication process. The compression/deduplication process may reduce amounts of stored data by compressing stored data or removing duplicate data and may be a transportable infrastructure process. The compression/deduplication process may also be hardware-assisted with network processors in the datacenter. | 03-26-2015 |
20150089492 | CO-LOCATING REMOTELY-SERVED APPLICATION PROGRAMMING INTERFACE INSTANCES - Technologies are provided for locally installing remotely-served API instances. In some examples, a scale-out service may receive a request to provide an installation of a remotely-served API at a particular datacenter. In response to a determination by the scale-out service that a local instance of the remotely-served API can be installed at that datacenter, the scale-out service may install the local instance and route requests to that API from the datacenter to the local instance instead of the remotely-served API. | 03-26-2015 |