Patent application number | Description | Published |
20150159174 | Methods and Compositions for the Targeted Modification of a Genome - Compositions and methods are provided for modifying a genomic locus of interest in a eukaryotic cell, a mammalian cell, a human cell or a non-human mammalian cell using a large targeting vector (LTVEC) comprising various endogenous or exogenous nucleic acid sequences as described herein. Further methods combine the use of the LTVEC with a CRISPR/Cas system. Compositions and methods for generating a genetically modified non-human animal comprising one or more targeted genetic modifications in their germline are also provided. | 06-11-2015 |
20150159175 | METHODS AND COMPOSITIONS FOR THE TARGETED MODIFICATION OF A GENOME - Compositions and methods are provided for modifying a genomic locus of interest in a eukaryotic cell, a mammalian cell, a human cell or a non-human mammalian cell using a large targeting vector (LTVEC) comprising various endogenous or exogenous nucleic acid sequences as described herein. Further methods combine the use of the LTVEC with a CRISPR/Cas system. Compositions and methods for generating a genetically modified non-human animal comprising one or more targeted genetic modifications in their germline are also provided. | 06-11-2015 |
20150376650 | METHODS AND COMPOSITIONS FOR MODIFYING A TARGETED LOCUS - Methods and compositions are provided for modifying one or more target loci in a cell. Such methods comprise providing a cell comprising a first polynucleotide encoding a first selection marker operably linked to a first promoter active in the cell, wherein the first polynucleotide further comprises a first recognition site for a first nuclease agent. A first nuclease agent is introduced into a cell, wherein the first nuclease agent induces a nick or double-strand break at the first recognition site. Further introduced into the cell is a first targeting vector comprising a first insert polynucleotide flanked by a first and a second homology arm that correspond to a first and a second target site located in sufficient proximity to the first recognition site. At least one cell is then identified comprising in its genome the first insert polynucleotide integrated at the target locus. | 12-31-2015 |
20150376651 | METHODS AND COMPOSITIONS FOR TARGETED GENETIC MODIFICATIONS AND METHODS OF USE - Methods and compositions are provided for generating targeted genetic modifications on the Y chromosome or a challenging target locus. Compositions include an in vitro culture comprising an XY pluripotent and/or totipotent animal cell (i.e., XY ES cells or XY iPS cells) having a modification that decreases the level and/or activity of an Sry protein; and, culturing these cells in a medium that promotes development of XY F0 fertile females. Such compositions find use in various methods for making a fertile female XY non-human mammal in an F0 generation. | 12-31-2015 |
20160046960 | METHODS AND COMPOSITIONS FOR TARGETED GENETIC MODIFICATIONS AND METHODS OF USE - Methods and compositions are provided for generating targeted genetic modifications on the Y chromosome or a challenging target locus. Compositions include an in vitro culture comprising an XY pluripotent and/or totipotent animal cell (i.e., XY ES cells or XY iPS cells) having a modification that decreases the level and/or activity of an Sry protein; and, culturing these cells in a medium that promotes development of XY F0 fertile females. Such compositions find use in various methods for making a fertile female XY non-human mammal in an F0 generation. | 02-18-2016 |
20160060657 | METHODS AND COMPOSITIONS FOR THE TARGETED MODIFICATION OF A GENOME - Compositions and methods are provided for modifying a genomic locus of interest in a eukaryotic cell, a mammalian cell, a human cell or a non-human mammalian cell using a large targeting vector (LTVEC) comprising various endogenous or exogenous nucleic acid sequences as described herein. Further methods combine the use of the LTVEC with a CRISPR/Cas system. Compositions and methods for generating a genetically modified non-human animal comprising one or more targeted genetic modifications in their germline are also provided. | 03-03-2016 |
Patent application number | Description | Published |
20120128954 | ENHANCED, PROTECTED SILVER COATINGS ON ALUMINUM FOR OPTICAL MIRROR AND METHOD OF MAKING SAME - The disclosure is directed to enhanced silver coated aluminum substrates for use as optical mirrors in which galvanic corrosion between the silver and aluminum is prevented and a method of making such silver coating and mirrors. The optical mirror according to the disclosure has an in-situ formed “barrier” layer inserted between the aluminum substrate and the silver layer. In addition, selected layers are densified by carrying out their deposition using a high power RF ion source during their deposition. | 05-24-2012 |
20140240821 | ENHANCED, DURABLE SILVER COATING STACKS FOR HIGHLY REFLECTIVE MIRRORS - The disclosure is directed to a highly reflective multiband mirror that is reflective in the VIS-NIR_SWIR-MWIR-LWIR bands, the mirror being a complete thin film stack that consists of a plurality of layers on a selected substrate. In order from substrate to the final layer, the mirror consists of (a) substrate, (b) barrier layer, (c) first interface layer, (d) a reflective layer, (e) a second interface layer, (f) tuning layer(s) and (g) a protective layer. In some embodiments the tuning layer and the protective are combined into a single layer using a single coating material. The multiband mirror is more durable than existing mirrors on light weight metal substrates, for example 6061-Al, designed for similar applications. In each of the five layer types methods and materials are used to process each layer so as to achieve the desired layer characteristics, which aid to enhancing the durability performance of the stack. | 08-28-2014 |
Patent application number | Description | Published |
20090176443 | STRUCTURED FIXED ABRASIVE ARTICLES INCLUDING SURFACE TREATED NANO-CERIA FILLER, AND METHOD FOR MAKING AND USING THE SAME - Structured fixed abrasive articles including a multiplicity of three-dimensional abrasive composites fixed to the abrasive article, the abrasive composites further including a multiplicity of ceria abrasive particles having a volume mean diameter from 100 to 500 nanometers (nm) in a matrix material, the matrix material further including a polymeric binder and a multiplicity of surface treated ceria filler particles having a volume mean diameter less than 100 nm. Also provided are methods of making and using structured fixed abrasive articles according to the disclosure. | 07-09-2009 |
20100056024 | STRUCTURED ABRASIVE ARTICLE, METHOD OF MAKING THE SAME, AND USE IN WAFER PLANARIZATION - A structured abrasive article comprises an at least translucent film backing and an abrasive layer disposed on the backing. The abrasive layer comprises a plurality of shaped abrasive composites. The shaped abrasive composites comprise abrasive particles dispersed in a binder. The abrasive particles consist essentially of ceria particles having an average primary particle size of less than 100 nanometers. The binder comprises a polyether acid and a reaction product of components comprising a carboxylic(meth)acrylate and a poly(meth)acrylate, and, based on a total weight of the abrasive layer, the abrasive particles are present in an amount of at least 70 percent by weight. Methods of making and using the structured abrasive article are also disclosed. | 03-04-2010 |
20100243471 | COMPOSITION, METHOD AND PROCESS FOR POLISHING A WAFER - A composition for use in polishing a wafer is disclosed. The composition includes an aqueous solution of initial components substantially free of loose abrasive particles and having a pH in the range of about 2 to 7, the aqueous solution including at least one polyelectrolyte and a surfactant. In certain embodiments, the wafer polishing composition can be adjusted to control cut rate and selectivity for modifying semiconductor wafers using a fixed abrasive Chemical Mechanical Polishing (CMP) process. Also disclosed is a CMP method and a process for polishing a wafer using the polishing composition. | 09-30-2010 |
20110306276 | SPLICING TECHNIQUE FOR FIXED ABRASIVES USED IN CHEMICAL MECHANICAL PLANARIZATION - An abrasive article includes a support pad, a first abrasive element, a second abrasive element and a fixation mechanism. The support pad has a first major surface, a second major surface, a first edge, a second edge and a channel. The channel is formed within the first major surface and extends from the first edge to the second edge. The first and second abrasive elements are each positionable over a portion of the support pad. The fixation mechanism is positioned within the channel ad secures an edge of the first abrasive element and an edge of the second abrasive element to the support pad. | 12-15-2011 |
20120094487 | COMPOSITIONS AND METHODS FOR MODIFYING A SURFACE SUITED FOR SEMICONDUCTOR FABRICATION - The method of the present invention comprises providing a wafer including a first, second and third material; contacting the third material in the presence of a working liquid with abrasive composites fixed to an abrasive article; and moving the wafer until an exposed surface of the wafer is substantially planar and comprises at least one area of exposed third material and one area of exposed second material. The components of the working liquid include an aqueous solvent; a pH buffer exhibiting a pK | 04-19-2012 |
Patent application number | Description | Published |
20100226204 | MARINE SEISMIC SURVEYING IN ICY OR OBSTRUCTED WATERS - A skeg mounts from the stern of a towing vessel and extends below the waterline. A channel in the skeg protects cables for steamers and a source of a seismic system deployed from the vessel. Tow points on the skeg lie below the water's surface and connect to towlines to support the steamers and source. A floatation device supports the source and tows below the water's surface to avoid ice floes. The streamers can have vehicles deployed thereon for controlling a position on the streamer. To facilitate locating the streamers, these vehicles on the streamers can be brought to the surface when clear of ice floes so that GPS readings can be obtained and communicated to a control system. After obtaining readings, the vehicles can be floated back under the surface. Deploying, using, and retrieving the system accounts for ice at the surface in icy regions. In addition, handling the seismic record can account for noise generated by ice impact events. | 09-09-2010 |
20120134234 | Declination Compensation For Seismic Survey - In seismic survey for icy waters, streamers are towed behind a vessel under the water's surface to avoid ice. GPS readings may not be consistently obtained because the ice prevents a tail buoy with a GPS receiver from trailing from streamer at the surface. Instead, a device tows on the streamer under the water's surface. The streamer's absolute position is tracked by intermittently bringing the towed device toward the surface so GPS readings can be obtained. The streamer's absolute position can then be used in conjunction with compass readings and can correlate various seismic sensor signals obtained along the streamer during the survey. The compass readings can be corrected for declination using declinometer readings, which can be compensated for iron effects from the vessel or other device carrying the declinometer. | 05-31-2012 |
20120316769 | Marine Threat Monitoring and Defense System - A marine threat monitoring and defense system and method protects a target vessel in icy or other marine regions. The system uses communications, user interfaces, and data sources to identify marine obstacles (e.g., icebergs, ice floes, pack ice, etc.) near a target vessel performing set operations (e.g., a stationed structure performing drilling or production operations or a seismic survey vessel performing exploration operations with a planned route). The system monitors positions of these identified marine obstacles over time relative to the target vessel and predicts any potential threats. When a threat is predicted, the system plans deployment of support vessels, beacons, and the like to respond to the threat. For example, the system can direct a support vessel to divert the path or break up ice threatening the target vessel. | 12-13-2012 |
20130182531 | Marine Seismic Surveying with Towed Components Below Water Surface - A skeg mounts from the stern of a towing vessel and extends below the waterline. A channel in the skeg protects cables for steamers and a source (e.g., air gun array) of a seismic system deployed from the vessel. Tow points on the skeg lie below the water's surface and connect to towlines to support the steamers and the source. A floatation device supports the source and tows below the water's surface to avoid ice floes or other issues encountered at the water's surface. The floatation device has a depth controlled float and one or more adjustable buoyancy floats. The controlled float has its buoyancy controlled with pressurized gas used for the air gun source and actively controls the depth of air gun source in the water. Each of the adjustable float connects in line with the controlled float with flexible connections. Each adjustable float has its buoyancy preconfigured to counterbalance the weight in water of the air gun or portion of the source that the float supports. | 07-18-2013 |
20140067249 | Marine Threat Monitoring and Defense System - A marine threat monitoring and defense system and method protects a target vessel in icy or other marine regions. The system uses communications, user interfaces, and data sources to identify marine obstacles (e.g., icebergs, ice floes, pack ice, etc.) near a target vessel performing set operations (e.g., a stationed structure performing drilling or production operations or a seismic survey vessel performing exploration operations with a planned route). The system monitors positions of these identified marine obstacles over time relative to the target vessel and predicts any potential threats. When a threat is predicted, the system plans deployment of support vessels, beacons, and the like to respond to the threat. For example, the system can direct a support vessel to divert the path or break up ice threatening the target vessel. | 03-06-2014 |
20140102347 | MARINE SEISMIC SURVEYING IN ICY OR OBSTRUCTED WATERS - A skeg mounts from the stern of a towing vessel and extends below the waterline. A channel in the skeg protects cables for steamers and a source of a seismic system deployed from the vessel. Tow points on the skeg lie below the water's surface and connect to towlines to support the steamers and source. A floatation device supports the source and tows below the water's surface to avoid ice floes. The streamers can have vehicles deployed thereon for controlling a position on the streamer. To facilitate locating the streamers, these vehicles on the streamers can be brought to the surface when clear of ice floes so that GPS readings can be obtained and communicated to a control system. After obtaining readings, the vehicles can be floated back under the surface. Deploying, using, and retrieving the system accounts for ice at the surface in icy regions. In addition, handling the seismic record can account for noise generated by ice impact events. | 04-17-2014 |
20140104985 | MARINE SEISMIC SURVEYING IN ICY OR OBSTRUCTED WATERS - A skeg mounts from the stern of a towing vessel and extends below the waterline. A channel in the skeg protects cables for steamers and a source of a seismic system deployed from the vessel. Tow points on the skeg lie below the water's surface and connect to towlines to support the steamers and source. A floatation device supports the source and tows below the water's surface to avoid ice floes. The streamers can have vehicles deployed thereon for controlling a position on the streamer. To facilitate locating the streamers, these vehicles on the streamers can be brought to the surface when clear of ice floes so that GPS readings can be obtained and communicated to a control system. After obtaining readings, the vehicles can be floated back under the surface. Deploying, using, and retrieving the system accounts for ice at the surface in icy regions. In addition, handling the seismic record can account for noise generated by ice impact events. | 04-17-2014 |
20140269174 | Arctic Seismic Surveying Operations - A marine seismic survey is performed in icy waters by initially planning a survey track traversing a survey area. The initial track is planned based on initial ice conditions in the survey area having the icy waters. After preparing the system, a seismic system is deployed into the water from a survey vessel at the survey area. This is typically done in an area relatively free of ice. At least one escort vessel escorts the survey vessel as it traverses the survey track and obtains seismic data. The survey vessel tows the seismic system under the surface of the icy water to avoid the ice. All the while, systems and operators monitor the survey area along the survey track for actual ice conditions. In this way, the escort vessel can handling the actual ice conditions along the survey track so the survey vessel does not need to halt. | 09-18-2014 |
Patent application number | Description | Published |
20090157850 | CONTENT DELIVERY NETWORK - A content delivery system for providing content from a content delivery network to end users may include a plurality of delivery servers that host one or more content items and an inventory server having an inventory of content. The inventory of content can indicate which of the delivery servers host the content items. The inventory server may receive a request for a content item from an end user system and may access the inventory of content to determine one or more delivery servers that host the content item. In response to this determination, the inventory server may redirect the request for the content item to a selected one of the delivery servers. The selected delivery server can then serve the content item to the end user system. | 06-18-2009 |
20090157899 | CONTENT DELIVERY NETWORK - A content delivery system for providing content from a content delivery network to end users may include a plurality of delivery servers that host one or more content items and an inventory server having an inventory of content. The inventory of content can indicate which of the delivery servers host the content items. The inventory server may receive a request for a content item from an end user system and may access the inventory of content to determine one or more delivery servers that host the content item. In response to this determination, the inventory server may redirect the request for the content item to a selected one of the delivery servers. The selected delivery server can then serve the content item to the end user system. | 06-18-2009 |
20100306368 | CONTENT DELIVERY NETWORK WITH CUSTOMIZED TRACKING OF DELIVERY DATA - A custom tracking system can provide functionality for operators of content sites to specify types of content delivery data to be tracked in a content delivery network. The custom tracking system can propagate operator tracking preferences to edge nodes in the content delivery network, such as delivery servers, which can track delivery data according to the preferences. The custom tracking system can use one or more tracking filters to reduce the storage burden of certain tracking requests while still providing relevant results. The custom tracking system can output results of the custom tracking for presentation to the content site operator. | 12-02-2010 |
20110258342 | CONTENT DELIVERY NETWORK - A content delivery system for providing content from a content delivery network to end users may include a plurality of delivery servers that host one or more content items and an inventory server having an inventory of content. The inventory of content can indicate which of the delivery servers host the content items. The inventory server may receive a request for a content item from an end user system and may access the inventory of content to determine one or more delivery servers that host the content item. In response to this determination, the inventory server may redirect the request for the content item to a selected one of the delivery servers. The selected delivery server can then serve the content item to the end user system. | 10-20-2011 |
20120254421 | CONTENT DELIVERY NETWORK - A content delivery system for providing content from a content delivery network to end users may include a plurality of delivery servers that host one or more content items and an inventory server having an inventory of content. The inventory of content can indicate which of the delivery servers host the content items. The inventory server may receive a request for a content item from an end user system and may access the inventory of content to determine one or more delivery servers that host the content item. In response to this determination, the inventory server may redirect the request for the content item to a selected one of the delivery servers. The selected delivery server can then serve the content item to the end user system. | 10-04-2012 |
20140025811 | CONTENT DELIVERY NETWORK WITH CUSTOMIZED TRACKING OF DELIVERY DATA - A custom tracking system can provide functionality for operators of content sites to specify types of content delivery data to be tracked in a content delivery network. The custom tracking system can propagate operator tracking preferences to edge nodes in the content delivery network, such as delivery servers, which can track delivery data according to the preferences. The custom tracking system can use one or more tracking filters to reduce the storage burden of certain tracking requests while still providing relevant results. The custom tracking system can output results of the custom tracking for presentation to the content site operator. | 01-23-2014 |
Patent application number | Description | Published |
20110258209 | RULE ORGANIZATION FOR EFFICIENT TRANSACTION PATTERN MATCHING - Efficiently identifying transactions processed by a software application, such as a server application is disclosed. In one embodiment, transactions are identified by applying a set of rules to communications between a client and server to determine whether certain patterns are in the communications. For example, the rules may look for some combination of parameters in the transactions. As a particular example, the rules may be used to look for parameters in HTTP requests. The rules are organized in a way that allows efficient processing. For example, the rules may be organized based on the frequency with which the parameters are expected to occur in the transactions and the frequency with which each transaction is expected to occur. The rules may be updated if the expected frequencies deviate from actual frequencies, such that the rules can be organized for more efficient processing. | 10-20-2011 |
20110283263 | CONDITIONAL DYNAMIC INSTRUMENTATION OF SOFTWARE IN A SPECIFIED TRANSACTION CONTEXT - Techniques for analyzing software in which un-instrumented components can be discovered and conditionally instrumented during a runtime of the software. Initially, software such as an application can be configured with a baseline set of instrumented components such as methods. As the application runs, performance data gathered from the instrumentation may indicate that the performance of some methods is below expectations. To analyze this, any methods which are callable from a method at issue are discovered, such as by inspecting the byte code of loaded classes in a JAVA Virtual Machine (JVM). To limit and focus the diagnosis, the instrumentation which is added to the discovered components can be conditional, so that the instrumentation is executed only in a specified context. The context can involve, e.g., a specified sequence of components in which a discovered component is called, and/or transaction data in which a discovered component is called. | 11-17-2011 |
20110283264 | DETECTION OF METHOD CALLS TO STREAMLINE DIAGNOSIS OF CUSTOM CODE THROUGH DYNAMIC INSTRUMENTATION - A technique for analyzing software in which un-instrumented components can be discovered and dynamically instrumented during a runtime of the software. Initially, an application configured with a baseline set of instrumented components such as methods. As the application runs, performance data is gathered from the instrumentation, and it may be learned that the performance of some methods is an issue. To analyze the problem, any methods which are callable from a method at issue are discovered by inspecting the byte code of loaded classes in a JAVA Virtual Machine (JVM). Byte code of the class is parsed to identify opcodes which invoke byte code to call other methods. An index to an entry in a constants pool table is identified based on an opcode. A decision can then be made to instrument and/or report the discovered methods. | 11-17-2011 |
20110283265 | FAILSAFE MECHANISM FOR DYNAMIC INSTRUMENTATION OF SOFTWARE USING CALLBACKS - A failsafe mechanism for installing and removing temporary instrumentation during a runtime of an application. Initially, an application is configured with a baseline set of instrumented components such as methods. Additional instrumentation is then deployed in the application, such as to diagnose a performance problem. The failsafe mechanism ensures that the additional instrumentation is automatically removed, even when there is an interruption in a communication link to the application, a computing device failure, a software failure, or some other type of failure, which renders it impossible to manually roll back the instrumentation from a remote user interface. The failsafe mechanism can be provided using callbacks between the computing devices which detect when a connection is unexpectedly lost or closed. Termination of one callback can cascade to one or more other callbacks. The instrumentation rollback can involve reloading un-instrumented byte code of the application. | 11-17-2011 |
20120089966 | TWO PASS AUTOMATED APPLICATION INSTRUMENTATION - A two-pass technique for instrumenting an application is disclosed. One pass may be performed statically by analyzing the application and inserting probes while the application is not running. Another pass may be performed dynamically by analyzing data collected by the probes while the application runs to derive metrics for the probes. One or more metrics for each probe may be analyzed to determine whether to dynamically modify the probe. By dynamically modifying the probe, the application does not need to be shut down. Dynamically modifying the probe could include removing the probe from the application or moving the probe to another component (e.g., method) in the application, as examples. For example, the probe might be moved to a component that is either up or down the call graph from the component that the probe is presently in. | 04-12-2012 |
20130046779 | Efficiently Collecting Transaction-Separated Metrics In A Distributed Environment - Transaction-segregated metrics are obtained for component invocations of different transactions of an application. Corresponding tree data structures are maintained by an agent and a manager which describe sequences of invoked components of the different transactions. The start and end of each component are each represented by a node in each branch of the tree data structure. Each transaction is identified by matching a branch to a transaction trace. Gatherers are linked to one or more nodes to collect the transaction-segregated metrics. For example, metrics can be gathered separately for component invocations in different transactions. Metrics can also be gathered together for instances of different components in one or more transactions. A user interface includes a directed graph having vertices connected by edges. Edge portions are visually distinguished from one another based on the metrics of the gatherers. Each edge portion can be associated with one or more of the gatherers. | 02-21-2013 |
20130047169 | Efficient Data Structure To Gather And Distribute Transaction Events - A technique for monitoring software which efficiently communicates transaction trace data, including static and dynamic data, from an agent to a manager. Corresponding tree data structures are maintained by the agent and manager which describe sequences of invoked components of a monitored application. The start and end of each component are each represented by a node in a branch of the tree data structure. To identify a transaction from a transaction trace, the agent can identify a matching branch, and communicate a unique identifier of the branch, such as an identifier of its last node, to a manager, with dynamic data such as start and end times of components. The manager looks up the sequences of invoked of components based on the identifier, and provides a display of the transaction trace. The trace can be annotated with static data indexed to the matching branch. | 02-21-2013 |
20130152064 | Classloader/Instrumentation Approach For Invoking Non-Bound Libraries - An agent object can invoke one or more methods of an application object using a helper object. The application object passes a reference to itself to the agent object. The agent object identifies a class loader of the application from the reference. The agent object obtains byte code of a helper class and uses the byte code of the helper class to creating a helper class loader. A parent of the helper class loader is set as the class loader of the application. The helper class loader is used to load the helper class and define an instance of the helper object. Using the helper object, the one or more methods of the application object are invoked by the agent using casting, without having a direct class loader connection with the class loader of the application. | 06-13-2013 |
20140059527 | INJECTION OF UPDATED CLASSES FOR A JAVA AGENT - Technology is disclosed for updating an Agent. One embodiment comprises running the Agent for the Application while the Application is also running. The Agent is associated with an identified source of code for the Agent. The code for the Agent is updated, and the updated Agent is run with the Application. | 02-27-2014 |
20140059528 | HOT ROLLBACK OF UPDATED AGENT - Technology is disclosed herein for managing versions of an Agent associated with an application. Code for the Agent can be updated, and subsequently rolled back without being disruptive to the application. | 02-27-2014 |
20140108463 | DATA STRUCTURE FOR EFFICIENTLY IDENTIFYING TRANSACTIONS - A technique for monitoring software which efficiently communicates transaction trace data, including static and dynamic data, from an agent to a manager is disclosed. A tree data structure describes transactions as a sequence of transaction elements. Each branch may correspond to one type of transaction. The nodes along a branch may be associated with components of monitored software that are invoked to perform the transaction. A provisional branch may be constructed when an agent is unable to initially identify the transaction. Transaction data may be stored in association with the nodes in the provisional branch during the monitoring. After information needed to identify the transaction becomes available to the agent, the provisional branch is updated. The transaction data is reported in response to determining the branch in the tree data structure that matches the provisional branch. | 04-17-2014 |
20140149575 | ROUTING OF PERFORMANCE DATA TO DEPENDENT CALCULATORS - A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it. | 05-29-2014 |
Patent application number | Description | Published |
20080277636 | Hand Tool With An Extendable Plunger - A hand tool having an elongated plunger assembly that is rotatably and movably disposed in a socket. The plunger assembly can be rotated between a first orientation and a second orientation as well as being moved between a first, withdrawn position and a second, extended position. The plunger assembly also has an upper notch and a lower notch on a front side and at least one generally flat lateral side. A fixed latch member extends across a portion of the socket and defines a narrow passage within the socket. The hand tool, preferably, includes a compression spring biasing the plunger assembly toward the extended position. | 11-13-2008 |
20100186213 | HAND TOOL WITH AN EXTENDABLE PLUNGER - A hand tool having an elongated plunger assembly that is rotatably and movably disposed in a socket. The plunger assembly can be rotated between a first orientation and a second orientation as well as being moved between a first, withdrawn position and a second, extended position. The plunger assembly also has an upper notch and a lower notch on a front side and at least one generally flat lateral side. A fixed latch member extends across a portion of the socket and defines a narrow passage within the socket. The hand tool, preferably, includes a compression spring biasing the plunger assembly toward the extended position. | 07-29-2010 |
20110175042 | HAND TOOL WITH AN EXTENDABLE PLUNGER - A hand tool having an elongated plunger assembly that is rotatably and movably disposed in a socket. The plunger assembly can be rotated between a first orientation and a second orientation as well as being moved between a first, withdrawn position and a second, extended position. The plunger assembly also has an upper notch and a lower notch on a front side and at least one generally flat lateral side. A fixed latch member extends across a portion of the socket and defines a narrow passage within the socket. The hand tool, preferably, includes a compression spring biasing the plunger assembly toward the extended position. | 07-21-2011 |