Patent application number | Description | Published |
20130214247 | AC LED DEVICE AND ITS MANUFACTURING PROCESS FOR GENERAL LIGHTING APPLICATIONS - The present invention relates to a plurality of light emitting diodes connected in series to elevate the working voltage and to enable the devices to be connected directly to the AC voltage sources. The LED device has five pluralities of series-connected diodes. Four pluralities of series-connected diodes are arranged to at as a rectifier bridge so the fifth plurality of diodes is always forward biased and energized. The light emitting diodes in the device are arranged to accommodate various AC line voltages, diode operating voltages, and diode reverse breakdown voltages. The plurality of diodes was manufactured by first etching epitaxial layer to the insulating substrate to isolate individual diodes, and then use metal lines to interconnect them according to the layout design. The number of die-attach and wire-bonding steps used in the subsequent chip array and lamp manufacturing process is therefore greatly reduced or eliminated. This invention simplifies LED array and lamp process flow, lowers the manufacturing cost, improves product reliability and LED device efficacy. | 08-22-2013 |
20140261660 | TCOs for Heterojunction Solar Cells - Methods are used to develop and evaluate new materials and deposition processes for use as TCO materials in HJCS solar cells. The TCO layers allow improved control over the uniformity of the TCO conductivity and interface properties, and reduce the sensitivity to the texture of the wafer. In Some embodiments, the TCO materials include indium, zinc, tin, and aluminum. | 09-18-2014 |
20150060910 | Conductive Transparent Reflector - Methods to improve the reflection of light emitting devices are disclosed. A method consistent with the present disclosure includes forming a light generating layer over a site-isolated region of a substrate. Next, forming a first transparent conductive layer over the light generating layer. Forming a low refractive index material over the first transparent conductive layer, and in time, forming a second transparent conductive layer over the low refractive index material. Subsequently, forming a reflective material layer thereon. Accordingly, methods consistent with the present disclosure may form a plurality of light emitting devices in various site-isolated regions on a substrate. | 03-05-2015 |
20150091032 | Nickel-Titanium and Related Alloys as Silver Diffusion Barriers - Diffusion of silver from LED reflector layers is blocked by 10-50 nm barrier layers of nickel-titanium (NiTi) alloys. Optionally, the alloys also include one or more of tungsten (W), niobium (Nb), aluminum (Al), vanadium (V), tantalum (Ta), or chromium (Cr). These barriers may omit the noble-metal (e.g., platinum or gold) cap used with silver barriers based on other materials. | 04-02-2015 |
20150093500 | Corrosion-Resistant Silver Coatings with Improved Adhesion to III-V Materials - The electrical and optical performance of silver LED reflective contacts in III-V devices such as GaN LEDs is limited by silver's tendency to agglomerate during annealing processes and to corrode on contact with silver-reactive materials elsewhere in the device (for example, gallium or aluminum). Agglomeration and reaction are prevented, and crystalline morphology of the silver layer may be optimized, by forming a diffusion-resistant transparent conductive layer between the silver and the source of silver-reacting metal, (2) doping the silver or the diffusion-resistant transparent conductive layer for improved adhesion to adjacent layers, or (3) doping the silver with titanium, which in some embodiments prevents agglomeration and promotes crystallization of the silver in the preferred <111> orientation. | 04-02-2015 |
20150311397 | Zinc Stannate Ohmic Contacts for P-Type Gallium Nitride - Transparent ohmic contacts to p-GaN and other high-work-function (≧4.2 eV) semiconductors are fabricated from zinc stannate (e.g., ZnSnO | 10-29-2015 |
20150318446 | Low-Temperature Fabrication of Transparent Conductive Contacts for p-GaN and n-GaN - A ternary transparent conductive oxide, indium zinc oxide (IZO), is formed as a thin film by co-sputtering zinc oxide with indium oxide at a deposition temperature between 25 and 200 C. Optionally, up to 1-2% Al may be added by various methods. The layers may be annealed at temperatures between 200 and 400 C. Measurements of IZO with 75-85 wt % In | 11-05-2015 |
20160111603 | Indium Zinc Oxide for Transparent Conductive Oxide Layer and Methods of Forming Thereof - Provided are light emitting diodes (LEDs) and methods of fabricating such LEDs. Specifically, an LED has an epitaxial stack and current distribution layer disposed on and interfacing the epitaxial stack. The current distribution layer includes indium oxide and zinc oxide such that the concentration of indium oxide is between about 5% and 15% by weight. During fabrication, the current distribution layer is annealed at a temperature of less than about 500° C. or even at less than about 400° C. These low anneal temperature helps preserving the overall thermal budget of the LED while still yielding a current distribution layer having a low resistivity and low adsorption. A particular composition and method of forming the current distribution layer allows using lower annealing temperatures. In some embodiments, the current distribution layer is sputtered using indium oxide and zinc oxide targets at a pressure of less than 5 mTorr. | 04-21-2016 |
Patent application number | Description | Published |
20120264737 | Heterocyclic Modulators of Lipid Synthesis - Compounds that are fatty acid synthesis modulators are provided. The compounds may be used to treat disorders characterized by disregulation of the fatty acid synthase function by modulating the function and/or the fatty acid synthase pathway. Methods are provided for treating such disorders including viral infections, such as hepatitis C infection, cancer and metabolic disorders. | 10-18-2012 |
20140322355 | HETEROCYCLIC MODULATORS OF LIPID SYNTHESIS - Compounds that are fatty acid synthesis modulators are provided. The compounds may be used to treat disorders characterized by disregulation of the fatty acid synthase function by modulating the function and/or the fatty acid synthase pathway. Methods are provided for treating such disorders including viral infections, such as hepatitis C infection, cancer and metabolic disorders. | 10-30-2014 |
20150210688 | HETEROCYCLIC MODULATORS OF LIPID SYNTHESIS - Heterocyclic modulators of lipid synthesis are provided as well as pharmaceutically acceptable salts thereof; pharmaceutical compositions comprising such compounds; and methods of treating conditions characterized by disregulation of a fatty acid synthase pathway by the administration of such compounds. | 07-30-2015 |
20150259292 | HETEROCYCLIC MODULATORS OF LIPID SYNTHESIS - Compounds that are fatty acid synthesis modulators are provided. The compounds may be used to treat disorders characterized by disregulation of the fatty acid synthase function by modulating the function and/or the fatty acid synthase pathway. Methods are provided for treating such disorders including viral infections, such as hepatits C infection, cancer and metabolic disorders. | 09-17-2015 |
20160102091 | HETEROCYCLIC MODULATORS OF LIPID SYNTHESIS - Compounds that are fatty acid synthesis modulators are provided. The compounds may be used to treat disorders characterized by disregulation of the fatty acid synthase function by modulating the function and/or the fatty acid synthase pathway. Methods are provided for treating such disorders including viral infections, such as hepatitis C infection, cancer and metabolic disorders. | 04-14-2016 |
Patent application number | Description | Published |
20090193211 | SOFTWARE AUTHENTICATION FOR COMPUTER SYSTEMS - A technique for authenticating software in a computer system is provided that can be used to prevent unauthorized users from accessing or using certain features or resources of the computer system. In accordance with the technique, a relatively small hash table is authenticated at system boot up and then used during run-time to authenticate selected portions of a software image. The technique advantageously permits software to be authenticated in a manner that does not impose significant delays upon the boot-up time associated with the computer system. The technique is applicable to both general-purpose and special-purpose computer systems, including embedded systems. | 07-30-2009 |
20090212813 | ELECTRONIC DEVICE BOARD LEVEL SECURITY - A system may include a printed circuit board, a first component located on the printed circuit board, the first component having a first unique identifier and a processor located on the printed circuit board, the processor including a one time programming section. The processor may acquire the first unique identifier from the first component and store the first unique identifier in the one time programming section during the first time initialization. Upon subsequent initializations, the processor may acquire the first unique identifier from the first component and compare the first unique identifier to the stored first unique identifier. The processor may allow the subsequent initializations to proceed if the first unique identifier matches the stored first unique. The processor may disallow the subsequent initializations from proceeding if the first unique identifier does not match the stored first unique identifier. | 08-27-2009 |
20120306530 | ELECTRONIC DEVICE BOARD LEVEL SECURITY - A system may include a printed circuit board, a first component located on the printed circuit board, the first component having a first unique identifier and a processor located on the printed circuit board, the processor including a one time programming section. The processor may acquire the first unique identifier from the first component and store the first unique identifier in the one time programming section during the first time initialization. Upon subsequent initializations, the processor may acquire the first unique identifier from the first component and compare the first unique identifier to the stored first unique identifier. The processor may allow the subsequent initializations to proceed if the first unique identifier matches the stored first unique. The processor may disallow the subsequent initializations from proceeding if the first unique identifier does not match the stored first unique identifier. | 12-06-2012 |
Patent application number | Description | Published |
20080275843 | Identifying an application user as a source of database activity - Determining an application user as a source of database activity is disclosed. A communication is received. A thread that is configured to handle the communication is associated with an application user with which the communication is associated. The application user is associated with a database query generated by the thread. | 11-06-2008 |
20150220571 | PIPELINED RE-SHUFFLING FOR DISTRIBUTED COLUMN STORE - A method of pipelining re-shuffled data of a distributed column oriented relational database management system (RDBMS). A request is received from a consumer process that requires RDBMS column data to be shuffled in a specific order according to an order that each of a plurality of columns will be used by the consumer process. For each of the plurality of columns, the method re-shuffles the RDBMS column data according to the specific order to form re-shuffled RDBMS column data, and sends the re-shuffled RDBMS column data to the consumer process. | 08-06-2015 |
20150269202 | SYSTEM AND METHOD FOR COLUMN-SPECIFIC MATERIALIZATION SCHEDULING - A method of dynamically computing an optimal materialization schedule for each column in a column oriented RDBMS. Dynamic column-specific materialization scheduling in a distributed column oriented RDBMS is optimized by choosing a materialization strategy based on execution cost including central processing unit (CPU), disk, and network costs for each individual exchange operator. The dynamic programming approach is computationally feasible because the optimal schedule for a sub-plan is path independent. | 09-24-2015 |
20160078079 | STATEMENT BASED MIGRATION FOR ADAPTIVELY BUILDING AND UPDATING A COLUMN STORE DATABASE FROM A ROW STORE DATABASE BASED ON QUERY DEMANDS USING DISPARATE DATABASE SYSTEMS - A method for updating a column store database and includes establishing a row store database, wherein each row comprises a plurality of attributes. The method includes establishing a column store database including attribute vectors corresponding to at least one attribute in the row store, wherein each attribute vector includes data used to satisfy at least one of previously received analytic queries. The method includes collecting a SQL change statements beginning from a synchronization point indicating when the row store database and the column store database are synchronized, and continuing until an analytic query is received. The method includes sending the plurality of SQL change statements to the column store database upon receipt of the analytic query for updating the column store database for purposes of satisfying the query, wherein the analytic query is directed to a queried range of primary key attributes in the plurality of attributes | 03-17-2016 |
20160078085 | METHOD AND SYSTEM FOR ADAPTIVELY BUILDING AND UPDATING A COLUMN STORE DATABASE FROM A ROW STORE DATABASE BASED ON QUERY DEMANDS - A method for adaptively building and updating a column store database from a row store database using queries. The method includes establishing the row store database for storing data, wherein at least one row of the row store includes attributes. The method includes establishing the column store including data structured to satisfy received analytic queries, wherein the column store includes attribute vectors corresponding to attributes in the row store, wherein at least one of the attribute vectors includes data used to satisfy previously received analytic queries. The method includes receiving change transactions directed to the row store, wherein the change transactions are ordered. The method includes when a first referenced attribute referenced by an analytic query corresponds to an attribute vector in the column store, updating the attribute vector based on log information corresponding to change transactions directed to the referenced attribute to satisfy the analytic query. | 03-17-2016 |
20160078089 | METHOD AND SYSTEM FOR ADAPTIVELY BUILDING A COLUMN STORE DATABASE FROM A TEMPORAL ROW STORE DATABASE BASED ON QUERY DEMANDS - A method for dynamically building a column store database from a row store database. The method includes establishing the row store database for storing data, wherein each row includes a plurality of attributes, and wherein data in row store database is current to a temporal point in time. The method includes establishing the column store database including data structured to satisfy received analytic queries. The method includes beginning from an initial state of the column store database, for each subsequently received analytic query, importing a targeted amount of data from a corresponding temporal state of the row store database into the column store database to satisfy the corresponding subsequently received analytic query. | 03-17-2016 |
Patent application number | Description | Published |
20080235291 | Readable physical storage replica and standby database system - A standby database system or another replica data system replicates changes, made to data blocks at a source database system or another primary data copy, to replicas of the data blocks at the standby database system or other replica. While replicating the changes to the data blocks thereof, the standby database system (or other replica) receives queries (or reads) issued thereto and computes the queries based on data read from the data blocks thereof. | 09-25-2008 |
20090106327 | Data Recovery Advisor - A computer is programmed to identify failures and perform recovery of data. Specifically, in several embodiments, the computer is programmed to automatically check integrity of data in a storage structure to identify a set of failures related to the storage structure. The computer is further programmed in some embodiments to identify, based on one failure in the set of failures, a group of repairs to fix that one failure. Each repair in the group of repairs is alternative to another repair in the group. The computer is also programmed in some embodiments to execute at least one repair in the group of repairs, so as to generate corrected data to fix the one failure. In certain embodiments, the corrected data is stored in non-volatile storage media of the computer. | 04-23-2009 |
20090106578 | Repair Planning Engine for Data Corruptions - A computer is programmed to automatically generate repairs to fix failure(s) while taking into account dependencies between repairs relative to one another, by grouping failures. In some embodiments, the computer uses a map that associates each failure type with repair types that are alternatives to one another, and uses another map that associates each repair type with a template that creates the repair when instantiated. In certain embodiments, repairs within a repair plan are consolidated, to avoid duplicates and redundancies. | 04-23-2009 |
20090106603 | Data Corruption Diagnostic Engine - A computer is programmed to execute a diagnostic procedure either on a pre-set schedule or asynchronously in response to an event, such as an error message, or a user command. When executed, the diagnostic procedure automatically checks for integrity of one or more portions of data in the computer, to identify any failure(s). In some embodiments, the failure(s) may be displayed to a human, after revalidation to exclude any failure that no longer exists. | 04-23-2009 |
20090183145 | TECHNIQUES FOR REDUCING DOWN TIME IN UPDATING APPLICATIONS WITH METADATA - A method and apparatus for reducing down time in updating applications with metadata is provided. The application contains both code and metadata. A copy of the application is made. A software update is installed on the copy of the application. During installation, the original application continues to run and service users, who may modify the metadata of the original application. Periodically, the metadata of the copy of the application is updated to incorporate changes to the metadata of the original application. When the software update is completed, users are prevented from further modifying the metadata of the original application. The metadata of the copy of the application is updated to incorporate the final changes to the metadata of the original application. Users are redirected from the original application to the copy of the application. | 07-16-2009 |
20110066791 | CACHING DATA BETWEEN A DATABASE SERVER AND A STORAGE SYSTEM - Techniques are provided for using an intermediate cache between the shared cache of a database server and the non-volatile storage of a storage system. The intermediate cache may be local to the machine upon which the database server is executing, or may be implemented within the storage system. In one embodiment, the database system includes both a DB server-side intermediate cache, and a storage-side intermediate cache. The caching policies used to populate the intermediate cache are intelligent, taking into account factors that may include which database object an item belongs to, the item type of the item, a characteristic of the item; or the database operation in which the item is involved. | 03-17-2011 |
20120072770 | Data Corruption Diagnostic Engine - A computer is programmed to execute a diagnostic procedure either on a pre-set schedule or asynchronously in response to an event, such as an error message, or a user command. When executed, the diagnostic procedure automatically checks for integrity of one or more portions of data in the computer, to identify any failure(s). In some embodiments, the failure(s) may be displayed to a human, after revalidation to exclude any failure that no longer exists. | 03-22-2012 |
20130086330 | Write-Back Storage Cache Based On Fast Persistent Memory - A storage device uses non-volatile memory devices for caching. The storage device operates in a mode referred to herein as write-back mode. In write-back mode, a storage device responds to a request to write data by persistently writing the data to a cache in a non-volatile memory device and acknowledges to the requestor that the data is written persistently in the storage device. The acknowledgement is sent without necessarily having written the data that was requested to be written to primary storage. Instead, the data is written to primary storage later. | 04-04-2013 |
20140059020 | REDUCED DISK SPACE STANDBY - A method and system for replicating database data is provided. One or more standby database replicas can be used for servicing read-only queries, and the amount of storage required is scalable in the size of the primary database storage. One technique is described for combining physical database replication to multiple physical databases residing within a common storage system that performs de-duplication. Having multiple physical databases allows for many read-only queries to be processed, and the de-duplicating storage system provides scalability in the size of the primary database storage. Another technique uses one or more diskless standby database systems that share a read-only copy of physical standby database files. Notification messages provide consistency between each diskless system's in-memory cache and the state of the shared database files. Use of a transaction sequence number ensures that each database system only accesses versions of data blocks that are consistent with a transaction checkpoint. | 02-27-2014 |
20140101100 | PROVIDING SERVICES ACROSS SYSTEMS THAT MANAGE DISTRIBUTED REPLICAS - Techniques are provided to allow users to define a global service that is offered across multiple replicated databases. Database clients connect to and use a global service just as they do with regular services on a single database today. Upon receiving a connection request, a collection of components, referred to collectively as the Global Data Service framework (GDS framework), automatically chooses the best database server instances to which to connect a client. Once those connections have been established, the clients determine which database server instance, of those database server instances to which they are connected, to send requests to based, at least in part, on advisory messages sent to the clients by the GDS framework. | 04-10-2014 |
20150058290 | PROVIDING SERVICES ACROSS SYSTEMS THAT MANAGE DISTRIBUTED REPLICAS - Techniques are provided to allow users to define a global service that is offered across multiple replicated databases. Database clients connect to and use a global service just as they do with regular services on a single database today. Upon receiving a connection request, a collection of components, referred to collectively as the Global Data Service framework (GDS framework), automatically chooses the best database server instances to which to connect a client. Once those connections have been established, the clients determine which database server instance, of those database server instances to which they are connected, to send requests to based, at least in part, on advisory messages sent to the clients by the GDS framework. | 02-26-2015 |