Begun
Andrew P. Begun, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20110300901 | Intelligent Input Handling - Various embodiments enable a device to utilize environmental state information and/or application state information to determine an appropriate response to received input. In at least some embodiments, a device receives input, obtains environmental information and/or application state information of the device, and evaluates input validity. Based upon the evaluated information and input, the device can behave in a manner that ignores the input, allows execution of associated operations, and or modifies the resultant behavior. | 12-08-2011 |
20130305354 | RESTRICTED EXECUTION MODES - In embodiments of restricted execution modes, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface is without receiving a PIN code entered on the device lock screen. The mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated. The restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated. | 11-14-2013 |
20140068755 | MOBILE DEVICE CHILD SHARE - In embodiments of mobile device child share, a mobile device can display a default device lock screen on an integrated display device, and receive an input effective to transition from the default device lock screen to display a child lock screen without receiving a PIN code entered on the default device lock screen. The mobile device can receive a second input effective to transition from the child lock screen to display a child space. The mobile device implements a device share service that activates a child share mode of the mobile device, and restricts functionality of device applications and access to device content based on designated restriction limits. | 03-06-2014 |
Brian Begun, Canoga Park, CA US
Patent application number | Description | Published |
---|---|---|
20120088023 | METHOD FOR MOLDING CHOCOLATE FROM THREE DIMENSIONAL IMAGES - A method is disclosed for molding chocolate, candy or other food materials into a molded, edible product in a shape based upon one or more three dimensional images of an original object that is desired to be replicated. Three dimensional molds are formed based upon three dimensional image data obtained by three dimensional scanning or processing of two dimensional images, and three dimensional printing of mold forms. The method of the invention minimizes distortion and loss of detail in the final molded product, utilizing food safe/FDA compliant materials in the construction of molds. | 04-12-2012 |
Ralph M. Begun, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20080263560 | STRUCTURE FOR SECURING LEASED RESOURCES ON A COMPUTER - A design structure embodied in a machine readable storage medium for designing, manufacturing, and/or testing a design is for securing of leased resources on a computer. The design structure includes a computer for securing resources may comprise at least one processor, a plurality of resources, wherein each resource is associated with configuration data and a programmable logic device connected to each of the plurality of resources. The programmable logic device may be configured for determining whether a resource is leased, reading un-encoded configuration data from a resource, and sending the configuration data to a first unit, if the resource is not leased. The programmable logic device may further be configured for reading encoded configuration data from a resource, decoding the configuration data, sending the configuration data that was decoded to a first unit, and logging use of the resource by the first unit, if the resource is leased. | 10-23-2008 |
20130091380 | Dynamically Reconfiguring A Primary Processor Identity Within A Multi-Processor Socket Server - Methods, apparatuses, and computer program products for dynamically reconfiguring a primary processor identity within a multi-processor socket server are provided. Embodiments include detecting, by the service processor, a processor socket reconfiguration event corresponding to a first processor socket; disabling, by the service processor, the first processor socket of the server in response to detecting the processor socket reconfiguration event; and reassigning, by the service processor, the primary processor identity to a second processor socket of the server. | 04-11-2013 |
Ralph Murray Begun, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20090158057 | SYSTEM AND METHOD FOR INTERCHANGEABLY POWERING SINGLE OR MULTIPLE MOTHERBOARDS - In one embodiment, a single electrical power supply is used to interchangeably power either a single motherboard or dual motherboards. Switchable output power and individual sequencing may be provided to each motherboard using FETs, such that the power supply may respond to the sequencing of each motherboard as if it were dedicated to that motherboard. In a two motherboard system, power to the first motherboard is reduced by removing some output voltages from the first motherboard. Fault circuitry may also be provided so that a power related fault on one domain does not affect operation of the other motherboard. | 06-18-2009 |
20090256512 | PLURALITY OF CONFIGURABLE INDEPENDENT COMPUTE NODES SHARING A FAN ASSEMBLY - A system comprising a chassis that includes a plurality of modules and a fan assembly disposed in a distal end of the chassis for drawing air in parallel pathways through the plurality of modules. At least one of the modules is a compute module having a thermal sensor disposed to sense the temperature of air flowing across a processor mounted on a motherboard. The system further comprises a fan controller receiving output from the thermal sensor, wherein the fan controller operates the fan assembly to cool the plurality of modules and maintain the thermal sensor output within an operating temperature range. The fan controller controls the fan speed according to predetermined thermal profile settings associated with one of the compute modules received in the chassis. For example, the predetermined thermal profile settings may include a minimum fan speed, a maximum fan speed, and control loop feedback settings. | 10-15-2009 |
Vladimir Begun, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20090049509 | SCOPE-CENTRIC ACCESS CONTROL MODEL - Apparatus, methods, and computer program products are disclosed that maintain an association graph made up of association tuples. Each of the association tuples belongs to an access-control-policy scope that imposes an access control policy. On receipt of a client reference and a supplier reference a scope-defining entity is identified from the client reference. The scope-defining entity has an explicit access control policy. An effective supplier reference is retrieved from a set of the association tuples matching the scope-defining entity and is presented. | 02-19-2009 |
20110276579 | ADAPTIVELY ROUTING TRANSACTIONS TO SERVERS - A method and apparatus is provided for dynamically generating data to dataset mappings and dataset to logical instance mappings and distributing these mappings to subscribers for the purpose of routing work. An advisory engine updates the mappings of data to data sets based at least in part on changing demands and patterns of access to data, and updates the mappings of datasets to logical instances based at least in part on anticipated capacity and change in conditions of the database servers. The subscribers receive and store the mapping information that maps the data to dataset identifiers, and dataset identifiers to logical database instances. The subscribers may also receive information that describes the current availability conditions of database instances, which are used to override the mapping of logical database instances to physical database instances. Subscribers may use the data to dataset mapping to map data identified from in an incoming database request to a dataset. Subscribers may use the dataset to logical instance mapping to map a dataset to a possible database server, and the logical instance to physical instance mapping to map a possible database server to an available database server. In this manner, the subscribers may route data efficiently even when access patterns and server conditions change. | 11-10-2011 |