Haury
Axel Haury, Le Cannet FR
Patent application number | Description | Published |
---|---|---|
20100070556 | Architectural Design for Data Migration Application Software - Methods, systems, and apparatus, including computer program products, for implementing a software architecture design for a software application implementing data migration. The application is structured as multiple process components interacting with each other through service interfaces, and multiple service operations, each being implemented for a respective process component. The process components include a Product Property Management process component, a Production Model Management process component, a Business Partner Data Management process component, a Product Data Maintenance process component, an Installed Base Data Management process component, a Price Master Data Management process component, an Identity Management process component, an Engineering Change Processing process component, a Migration Data Dispatching process component, and several other process components. | 03-18-2010 |
Christian Haury, Paris FR
Patent application number | Description | Published |
---|---|---|
20100299742 | BIDIRECTIONAL GATEWAY WITH ENHANCED SECURITY LEVEL - A bidirectional gateway with enhanced security level between a high-security communication network and a low-security communication network. The return pathway from the low-security network to the high-security network comprises a low-speed link. The physical layer of the low-speed link differs from the physical layers involved in the high-security network and the low-security network. The low-speed link having a linking layer according to a protocol differing from the protocols used on the linking layers used on the high-security network and the low-security network. The linking layer of the low-speed link has an authentication protocol to guarantee the data's origin. | 11-25-2010 |
20140029184 | ASSEMBLY FOR THE ELECTRONIC PROCESSING OF DATA WITH MUTUALIZED RESOURCES - Assembly for the electronic processing of data, comprising a central module and peripheral modules linked to the central module by electrical power supply and data links, the modules comprising: a processing unit, a memory, an input/output unit and an isolation of the power and data links; the central module furthermore comprising an electrical power supply unit for the peripheral modules, a common startup unit shared by the modules, and a star communication interface with the peripheral modules; each peripheral module furthermore comprising a serial link interface to the communication interface of the central module. | 01-30-2014 |
Johan A. Haury, Sewickley, PA US
Patent application number | Description | Published |
---|---|---|
20090177155 | FLUID INJECTION SYSTEM AND PRESSURE JACKET ASSEMBLY WITH SYRINGE ILLUMINATION - The fluid injection apparatus for use with a syringe includes an injector and a pressure jacket assembly associated with the injector. The injector includes a housing defining a central opening and a drive piston extendable through the central opening for imparting motive forces to a syringe plunger disposed within the syringe. The pressure jacket assembly includes a pressure jacket and at least one support arm associated with and extending outward from the housing. A syringe retaining member is attached to the at least one support arm. The syringe-retaining member defines a syringe receiving slot for receiving at least a portion of the syringe. A light source is located on the support arm and faces the pressure jacket for illuminating the syringe. | 07-09-2009 |
Lane Haury, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20120159256 | File System Resiliency Management - Perceived corruptions encountered on file system volumes, and which cannot be initially remedied online, are processed to verify whether they are true, existing volume data structure corruptions or, alternatively, false positives. Upon the verification of one or more of a volume's corruptions, error scanning is performed to check for, and attempt to remedy online, all the existing corruptions on the volume. Subsequent to error scanning processing, if one or more verified corruptions continue to exist on a file system volume, at file system boot up time spot corruption correction is performed to attempt to remedy the existing, verified corruptions on the volume. Spot corruption correction is performed to attempt to correct verified data structure corruptions on a volume of the file system while the volume is maintained offline for the time necessary to attempt to correct its prior identified corruptions. | 06-21-2012 |
20130073819 | EFFICIENT FILE SYSTEM METADATA SCANNING USING SCOPED SNAPSHOTS - Volumes of a file system remain online, and thus available for use, while being proactively error scanned for corruptions thereon. A snapshot of each volume being proactively error scanned is maintained for the volume during the proactive error scanner processing of the volume. Proactive error scanner processing only requires access to tile system metadata to correctly process a volume for an identification of the corruptions thereon, and thus, a snapshot of the entire volume nerd not be generated nor maintained. The clusters of a volume that store file system metadata are identified and only these clusters are maintained in a scoped snapshot for the volume during proactive error scanning of the volume. | 03-21-2013 |