Patent application number | Description | Published |
20110113134 | Server Access Processing System - A method, programmed medium and system are provided for preventing the denial of file system access to a plurality of clients accessing a NFS server. In one example, an NFS server is configured to listen on a server port. The server runs a separate daemon which “watches” client requests as they are received at the NFS server. The server processing system tracks the number of times a client sends consecutive TCP zero-window packets in response to a data packet from the server. If the number of zero-window packets crosses a user-defined threshold, then a routine is called to stop responding to that client using a backoff algorithm. When the server reaches a point where the number of available threads or any other relevant resource dips below a user-defined threshold, the server process starts terminating connections to the clients starting from the ones with the oldest entry in the table. | 05-12-2011 |
20110138404 | REMOTE PROCEDURE CALL (RPC) BIND SERVICE WITH PHYSICAL INTERFACE QUERY AND SELECTION - A service module that provides for discovery of one or more network interfaces connecting a prospective remote procedure call (RPC) client, facilitates the provision of RPC programs in a network including multi-horned systems. When a request for a network address to an RPC application providing an RPC program is received from the RPC client, the RPC bind daemon discovers from the module, using the client response address, over which interface(s) the client is accessible. The daemon then selects an address of a network path to the RPC application that the prospective client can access and returns the corresponding network address. The service module monitors the network stack for RPC get address requests and builds tables of client address entries with corresponding network interface identifiers. The entries are retired according to an aging policy. When multiple network paths to the RPC application are available, the service can be selected using a heuristic such as preferred interface, non-firewalled interface, least number of return path links or other criteria. | 06-09-2011 |
20110153825 | SERVER RESOURCE ALLOCATION - A method, programmed medium and system are disclosed which provide for end-to-end QoS for a set of processes that comprise a workload over nfs. A set of processes that comprise a workload such as the processes of a WPAR, or an entire LPAR are given a class designation and assigned priority/limits. The data are then passed to the server which allocates resources based on the sum total of all the current classes and their priorities and/or limits. This requires re-engineering the nfs client code to be workload-aware and the nfs server code to accommodate the resource allocation and prioritization needs of the nfs clients. | 06-23-2011 |
20120124582 | Calculating Processor Load - A method, computer system, and computer program product for identifying a transient thread. A thread of a process is placed in a run queue associated with a processor. Data is added to the thread indicating a time that the thread was placed into the run queue. | 05-17-2012 |
20120215916 | Server Access Processing System - A method, programmed medium and system are provided for preventing the denial of file system access to a plurality of clients accessing a NFS server. In one example, an NFS server is configured to listen on a server port. The server runs a separate daemon which “watches” client requests as they are received at the NFS server. The server processing system tracks the number of times a client sends consecutive TCP zero-window packets in response to a data packet from the server. If the number of zero-window packets crosses a user-defined threshold, then a routine is called to stop responding to that client using a backoff algorithm. When the server reaches a point where the number of available threads or any other relevant resource dips below a user-defined threshold, the server process starts terminating connections to the clients starting from the ones with the oldest entry in the table. | 08-23-2012 |
20120215922 | Server Resource Allocation - A method, programmed medium and system are disclosed which provide for end-to-end QoS for a set of processes that comprise a workload over nfs. A set of processes that comprise a workload such as the processes of a WPAR, or an entire LPAR are given a class designation and assigned priority/limits. The data are then passed to the server which allocates resources based on the sum total of all the current classes and their priorities and/or limits. This requires re-engineering the nfs client code to be workload-aware and the nfs server code to accommodate the resource allocation and prioritization needs of the nfs clients. | 08-23-2012 |
20120226800 | REGULATING NETWORK BANDWIDTH IN A VIRTUALIZED ENVIRONMENT - In a method for regulating network bandwidth in a virtualized computer environment, a computer having a hypervisor program receives a request from a first virtual client to transmit data. In response, the computer transfers the data from a memory of the first virtual client to a memory of a virtual server. The computer receives an error notification from a shared virtual network adapter of the virtual server, indicative of insufficient network bandwidth available to transmit the data. In response, the computer notifies the first virtual client that insufficient network bandwidth is available to transmit the data. | 09-06-2012 |
20120324483 | REMOTE PROCEDURE CALL (RPC) BIND SERVICE WITH PHYSICAL INTERFACE QUERY AND SELECTION - A service module that provides for discovery of one or more network interfaces connecting a prospective remote procedure call (RPC) client, facilitates the provision of RPC programs in a network including multi-horned systems. When a request for a network address to an RPC application providing an RPC program is received from the RPC client, the RPC bind daemon discovers from the module, using the client response address, over which interface(s) the client is accessible. The daemon then selects an address of a network path to the RPC application that the prospective client can access and returns the corresponding network address. The service module monitors the network stack for RPC get address requests and builds tables of client address entries with corresponding network interface identifiers. The entries are retired according to an aging policy. | 12-20-2012 |
20120331223 | PARALLEL BLOCK ALLOCATION FOR DECLUSTERED LOGICAL DISKS - In a method for allocating space on a logical disk, a computer receives an allocation request to allocate a number of requested logical disk extents. The computer selects one of a first group having an array of logical disk extents and a second group having an array of logical disk extents. The computer selects a group having a number of free logical disk extents that is greater than or equal to the number of requested logical disk extents. The logical disk extents in the array of the first group and in the array of the second group correspond to disk blocks on a logical disk. The logical disk spans one or more physical random access disks. The computer locks the selected group to prevent allocating a logical disk extent other than in response to the allocation request. | 12-27-2012 |
20130275693 | PREFERENTIAL BLOCK RECYCLING IN A REDIRECT-ON-WRITE FILESYSTEM - Provided are techniques for more efficient data storage on a computing system. An inode table is provided and populated with information relating to current and N previous locations within data storage that a particular data block has been stored. When a particular data block is modified in a redirect on write system, the modified data block is stored, if possible is a previous storage location for that particular data block and the current data location may be saved for use as the location for a subsequent modification. | 10-17-2013 |
20140141793 | SYSTEM AND METHOD TO MANAGE QOS IN A BANDWIDTH-CONSTRAINED NETWORK (CELLULAR) BY SENDING TOWER-INITIATED POLICY CHANGES TO INDIVIDUAL PHONES - A method, system and computer-usable medium are disclosed for preemptively managing bandwidth consumption in a wireless network environment. A wireless service provider monitors network activity to generate network bandwidth availability data. The network bandwidth availability data is processed with bandwidth consumption projection data to determine whether the wireless network is able to provide a first amount of bandwidth. If the wireless network is unable to provide the first amount of bandwidth, then it generates a bandwidth mitigation request, which it in turn provides to a mobile device. If an affirmative response is received from the mobile device, then it is provided a second amount of bandwidth, which is less than the first amount of bandwidth. | 05-22-2014 |
20140222889 | COLLABORATIVE NEGOTIATION OF SYSTEM RESOURCES AMONG VIRTUAL SERVERS RUNNING IN A NETWORK COMPUTING ENVIRONMENT - Virtual machines within a network computing environment negotiate among themselves with regard to the sharing of resources via respective resource managers. The resource agent monitors resource allocation patterns of its virtual machine and responsively updates usage data in a resource availability map and compares the updated usage data to a minimum operational requirements threshold and a surplus amount threshold. If the updated usage fails to meet the minimum operational requirements threshold, the resource agent determines a needed shortfall amount of resources, searches the resource availability map for offers of the shortfall from resource agents, and sends out a request to a resource agent offering the shortfall amount. If the updated usage data meets the minimum operational requirements threshold, the resource agent determines a surplus amount of a resource that exceeds the surplus amount threshold and creates and broadcasts an offer of the surplus amount to the other resource agents. | 08-07-2014 |
20140365728 | PARALLEL BLOCK ALLOCATION FOR DECLUSTERED LOGICAL DISKS - In a method for allocating space on a logical disk, a computer receives an allocation request to allocate a number of requested logical disk extents. The computer selects one of a first group having an array of logical disk extents and a second group having an array of logical disk extents. The computer selects a group having a number of free logical disk extents that is greater than or equal to the number of requested logical disk extents. The logical disk extents in the array of the first group and in the array of the second group correspond to disk blocks on a logical disk. The logical disk spans one or more physical random access disks. The computer locks the selected group to prevent allocating a logical disk extent other than in response to the allocation request. | 12-11-2014 |
20140380303 | STORAGE MANAGEMENT FOR A CLUSTER OF INTEGRATED COMPUTING SYSTEMS - Integrated computing systems with independently managed infrastructures including compute nodes and storage nodes form a cluster. Storage resource agents manage storage resources in the cluster. The resource agents identify storage requirements associated with allocation sets for resource consumers dispatched in the cluster, communicate with each other to locate inter-system storage resources that primarily satisfy locality criteria associated with resource consumer workloads, secondarily satisfy allocation set activity criteria associated with the allocation sets, and allocate the storage resources to the resource consumers to satisfy the storage requirements. The storage resource agents may base storage assignments on data placement information from a priority map. Data may be later relocated to alternate storage resources in satisfaction of cluster-wide storage policies, priority determinations, and data access rate determinations. | 12-25-2014 |
20150046969 | ADJUSTING MULTI-FACTOR AUTHENTICATION USING CONTEXT AND PRE-REGISTRATION OF OBJECTS - A system and method and computer program product for user authentication that uses information about a user's context or context of their personal device(s) to dynamically modify that user's authentication or login requirements to an application in a computer or mobile device. The system is configured to run methods that detect and make use of a user's context that includes: a current environment or personal context, and uses this capability to enable variable strength authentication when attempting to log in or enter another application or resource. In one embodiment, the system implements methods to dynamically adjust the authentication challenge as a differential of all accumulated user contexts (e.g., providing a shorter password or pin-code). | 02-12-2015 |
20150156119 | Autonomic Traffic Load Balancing in Link Aggregation Groups - Mechanisms are provided for performing traffic load balancing on ingress traffic directed to a Link Aggregation Group (LAG). The mechanisms monitor a ingress traffic load across a plurality of links of the Link Aggregation Group (LAG). The mechanisms determine if the ingress traffic load across the plurality of links is unbalanced. Moreover, the mechanisms, in response to determining that the ingress traffic load across the plurality of links is unbalanced, send a message to a switch associated with the LAG requesting the switch to modify routing of ingress traffic to the LAG to perform ingress traffic load balancing. | 06-04-2015 |
20150156127 | Autonomic Traffic Load Balancing in Link Aggregation Groups - Mechanisms are provided for performing traffic load balancing on ingress traffic directed to a Link Aggregation Group (LAG). The mechanisms monitor a ingress traffic load across a plurality of links of the Link Aggregation Group (LAG). The mechanisms determine if the ingress traffic load across the plurality of links is unbalanced. Moreover, the mechanisms, in response to determining that the ingress traffic load across the plurality of links is unbalanced, send a message to a switch associated with the LAG requesting the switch to modify routing of ingress traffic to the LAG to perform ingress traffic load balancing. | 06-04-2015 |
20150178219 | Application Startup Page Fault Management in a Hardware Multithreading Environment - A method, system and computer-usable medium are disclosed for startup page fault management improves application startup performance by assigning startup tasks to a hardware thread 0 across plural processing cores in a simultaneous multithreading environment to provide more rapid processing of processor bound page faults. I/O bound page faults are flagged to associated with predetermined cache locations to improve data and text first reference page-in I/O response. | 06-25-2015 |
Patent application number | Description | Published |
20110066851 | Secure Route Discovery Node and Policing Mechanism - A computer implemented method and computer program product for obtaining a secure route. A trusted host sets a node security association for a trusted host. The trusted host receives, at the trusted host, a client communication request directed to a destination host. The trusted host builds a secure route query comprising a trusted host address, a destination host address, and at least one security level, to form at least one secure route. The trusted host sends packets from the trusted host to the destination host based on the at least one secure route. The packets are responsive to the client communication request, and the packets each have a security label that matches the security level. | 03-17-2011 |
20110099253 | CONSOLIDATED NOTIFICATIONS TO NFS CLIENTS - A computer implemented method and apparatus for rebooting a host having a plurality of network interfaces. A server reboots the host by stopping an NFS server process on the host. The server sends at least one consolidated notification to a plurality of clients identified in a consolidated notification table, wherein the consolidated notification comprises at least two addresses of network interfaces of the host. The server determines that an acknowledgement is received from each of the plurality of clients. The server halts resending of consolidated notifications, responsive to determining that an acknowledgement is received from the each of the plurality of clients. | 04-28-2011 |
20120272016 | MEMORY AFFINITIZATION IN MULTITHREADED ENVIRONMENTS - A method, system, and computer program product for memory affinitization in a multithreaded environment are provided in the illustrative embodiments. A first affinity domain formed in a computer receives from a second thread executing in a second affinity domain a request to access a unit of memory in the first affinity domain. The computer determines whether to migrate the unit of memory to the second affinity domain. The computer migrates, responsive the determining being affirmative, the unit of memory to the second affinity domain, thereby affinitizing the unit of memory with the second thread. | 10-25-2012 |
20120284496 | Memory affinitization in multithreaded environments - Illustrative embodiments include a method, system, and computer program product for estimating boot-time memory requirement of a data processing system. A data processing system identifies, using system configuration information associated with the data processing system, a set of components needed for booting up the data processing system. The data processing system determines a dependency of a component identified in the set of components, the component including a memory estimator program. The data processing system determines an ancestry of the component identified in the set of components. The data processing system receives, using the memory estimator program of the component, a boot-time memory requirement of the component. The data processing system calculates a total boot-time memory requirement. The data processing system determines whether an amount of real memory of the data processing system satisfies the total boot-time memory requirement. | 11-08-2012 |
20130111182 | STORING A SMALL FILE WITH A REDUCED STORAGE AND MEMORY FOOTPRINT | 05-02-2013 |
20130151828 | CONSOLIDATED NOTIFICATIONS TO NFS CLIENTS - A computer implemented method, system and apparatus for rebooting a host having a plurality of network interfaces. A server reboots the host by stopping an NFS server process on the host. The server sends at least one consolidated notification to a plurality of clients identified in a consolidated notification table, wherein the consolidated notification comprises at least two addresses of network interfaces of the host. The server determines that an acknowledgement is received from each of the plurality of clients. The server halts resending of consolidated notifications, responsive to determining that an acknowledgement is received from the each of the plurality of clients. | 06-13-2013 |
20130232548 | Secure Route Discovery Node and Policing Mechanism - A computer implemented method and computer program product for obtaining a secure route. A trusted host sets a node security association for a trusted host. The trusted host receives, at the trusted host, a client communication request directed to a destination host. The trusted host builds a secure route query comprising a trusted host address, a destination host address, and at least one security level, to form at least one secure route. The trusted host sends packets from the trusted host to the destination host based on the at least one secure route. The packets are responsive to the client communication request, and the packets each have a security label that matches the security level. | 09-05-2013 |
20130232559 | Secure Route Discovery Node and Policing Mechanism - A computer implemented method for obtaining a secure route. A trusted host sets a node security association for a trusted host. The trusted host receives, at the trusted host, a client communication request directed to a destination host. The trusted host builds a secure route query comprising a trusted host address, a destination host address, and at least one security level, to form at least one secure route. The trusted host sends packets from the trusted host to the destination host based on the at least one secure route. The packets are responsive to the client communication request, and the packets each have a security label that matches the security level. | 09-05-2013 |
20130311432 | CONTEXT SENSITIVE REUSABLE INLINE DATA DEDUPLICATION - A computer identifies a relationship among a subset of a set of data blocks, a basis of the relationship forming a context shared by the subset of data blocks. The computer selects a code data structure from a set of code data structures using the context. The context is associated with the code data structure, and the code data structure includes a set of codes. The computer computes, for a first data block in the subset of data blocks, a first code corresponding to a content of the first data block. The computer determines whether the first code matches a stored code in the code data structure. The computer replaces, responsive to the first code matching the stored code, the first data block with a reference to an instance of the first data block. The computer causes the reference to be stored in a target data processing system. | 11-21-2013 |
20140006854 | Resolution of System Hang due to Filesystem Corruption | 01-02-2014 |
20140068207 | Reducing Page Faults in Host OS Following a Live Partition Mobility Event - Page faults during partition migration from a source computing system to a destination computing system are reduced by assigning each page used by a process as being hot or cold according to their frequency of use by the process. During a live partition migration, the cold or coldest (least frequently used) pages are copied to the destination server first, followed copying the warmer (less frequently used) and concluded by copying the hottest (most frequently used) pages. After all dirtied pages have been refreshed, cutover from the instance on the source server to the destination server is made. By transferring the warm and hot pages last (or later) in the migration process, the number of dirtied pages is reduced, thereby reducing page faults subsequent to the cutover. | 03-06-2014 |
20140075148 | MEMORY UTILIZATION OF SPARSE PAGES - A method, system, and computer program product for improving memory utilization of sparse pages are provided in the illustrative embodiments. A set of virtual pages is identified. Each virtual page in the set of virtual pages is a sparse virtual page. The set of virtual pages includes a first sparse virtual page and a second sparse virtual page. At least a portion of data of the first sparse virtual page in the set of virtual pages is stored in a first physical page. The first physical page belongs to a set of consolidation physical pages, and the first physical page also stores at least a portion of the data of the second sparse virtual page. The first and the second sparse pages are mapped to the first physical page. | 03-13-2014 |
20150160977 | Load Based Dynamic Resource Sets - A method, system and computer-usable medium are disclosed for dynamic load based resource sets that provide flexible assignment of resources to processes with nested resource sets. Resource sets include plural resource subsets so that processes that are assigned to a resource subset can have additional resources flexibly made available by providing additional resources from a parent resource set. A resource threshold is monitored to selectively adjust process resource subset assignments based upon utilization of resources within a resource subset, such as by comparing the number of threads assigned to a resource subset with the number processors available to run the threads. | 06-11-2015 |
Patent application number | Description | Published |
20080201818 | Temperature Altering Garment and Methods of Use Thereon - Human clothing has inner and outer flexible layers that define a space sufficiently large to position a thermal transfer element in any of multiple, non-overlapping positions. The space and the thermal transfer element preferably have cooperating sides of a hook-and-loop attachment. All suitable items of clothing are contemplated, but especially a shirt, jacket or pants that appear to others as a substantially normal garment. Each space has one or more openings, in either the inner or outer layers, and preferably at the shoulders or sides of the torso, or at the pocket areas of pants. The spaces are preferably large, not only relative to the size of a corresponding thermal transfer element, but also to the size of the garment. Thermal transfer elements are preferably disposed in pouches having a thermal insulation on that side, and have only a very thin, thermally transmissive, fabric on the other side. | 08-28-2008 |
20100257655 | Temperature Altering Garment and Methods of Use Thereon - Human clothing has inner and outer flexible layers that define a space sufficiently large to position a thermal transfer element in any of multiple, non-overlapping positions. The space and the thermal transfer element preferably have cooperating sides of a hook-and-loop attachment. All suitable items of clothing are contemplated, but especially a shirt, jacket or pants that appear to others as a substantially normal garment. Each space has one or more openings, in either the inner or outer layers, and preferably at the shoulders or sides of the torso, or at the pocket areas of pants. The spaces are preferably large, not only relative to the size of a corresponding thermal transfer element, but also to the size of the garment. Thermal transfer elements are preferably disposed in pouches having a thermal insulation on that side, and have only a very thin, thermally transmissive, fabric on the other side. | 10-14-2010 |
20110162125 | Temperature Altering Garment and Methods of Use Thereon - Human clothing has inner and outer flexible layers that define a space sufficiently large to position a thermal transfer element in any of multiple, non-overlapping positions. The space and the thermal transfer element preferably have cooperating sides of a hook-and-loop attachment. All suitable items of clothing are contemplated, but especially a shirt, jacket or pants that appear to others as a substantially normal garment. Each space has one or more openings, in either the inner or outer layers, and preferably at the shoulders or sides of the torso, or at the pocket areas of pants. The spaces are preferably large, not only relative to the size of a corresponding thermal transfer element, but also to the size of the garment. Thermal transfer elements are preferably disposed in pouches having a thermal insulation on that side, and have only a very thin, thermally transmissive, fabric on the other side. | 07-07-2011 |
20110231979 | Temperature Altering Garment and Methods of Use Thereon - Human clothing has inner and outer flexible layers that define a space sufficiently large to position a thermal transfer element in any of multiple, non-overlapping positions. The space and the thermal transfer element preferably have cooperating sides of a hook-and-loop attachment. All suitable items of clothing are contemplated, but especially a shirt, jacket or pants that appear to others as a substantially normal garment. Each space has one or more openings, in either the inner or outer layers, and preferably at the shoulders or sides of the torso, or at the pocket areas of pants. The spaces are preferably large, not only relative to the size of a corresponding thermal transfer element, but also to the size of the garment. Thermal transfer elements are preferably disposed in pouches having a thermal insulation on that side, and have only a very thin, thermally transmissive, fabric on the other side. | 09-29-2011 |
Patent application number | Description | Published |
20090245598 | Methods for Assessing Molecular Expression of Subcellular Molecules - The present techniques provide fully automated methods for quantifying the location, strength and percent of expressed target molecules or other biological markers in immunohistochemically stained biological samples. The samples may be automatically segmented, for example into subcellular compartments, from images of compartmental markers. Then, the distribution of a target molecule on each of these compartments is calculated that includes the percentage and strength of expression. This is different than existing intensity or ratio based methods where abundant low expression levels are indistinguishable from scarce high expression levels. | 10-01-2009 |
20090245610 | Method and Apparatus for Detecting Irregularities in Tissue Microarrays - The present techniques provide systems and methods for registering images of tissue spots on a tissue microarray (TMA). In studies involving multiple biomarkers being studied on the same TMA, the TMA slide is removed from the microscope, stained, and then imaged, often multiple times. The present techniques relate to validation of the registration of the acquired images of the same TMA. An automatic approach to register the images and detect registration failures as provided herein may enhance the rapid analysis of the tissues. Artifacts such as tissue folding and tissue loss are also determined automatically. | 10-01-2009 |
20090245611 | Method and Apparatus for Removing Tissue Autofluorescence - Techniques for removing image autoflourescence from fluorescently stained biological images are provided herein. The techniques utilize non-negative matrix factorization that may constrain mixing coefficients to be non-negative. The probability of convergence to local minima is reduced by using smoothness constraints. The non-negative matrix factorization algorithm provides the advantage of removing both dark current and autofluorescence. | 10-01-2009 |
20090247416 | Method and Apparatus for Analysis of Tissue Microarrays - The present techniques include methods and systems for finding correspondences between tissue spots in tissue microarray serial sections belonging to the same recipient block. The present techniques may also be used to relate individual tissue cores to clinical information. Using either a whole slide image or the relative x-y coordinates of the tissue spots on the slide, individual tissue spots in different tissue microarrays may be linked to one another and their clinical information. | 10-01-2009 |
20110285837 | METHODS AND SYSTEMS FOR IDENTIFYING WELL WALL BOUNDARIES OF MICROPLATES - The present invention is directed to method and system for image processing of test wells on a microplates wherein the microplates' test well wall boundaries are identified through the use of a candidate edge image wherein the candidate edge image represents locations of one or more segments of the wall boundaries. | 11-24-2011 |
Patent application number | Description | Published |
20130137316 | METHODS AND APPARATUS FOR PREVENTING OXIDATION OF AN ELECTRICAL CONNECTION - A malleable wax-based antioxidant is provided for use between two electrical connectors. To form the example antioxidant, a wax-base is melted and particles, such as, for example, zinc particles, are provided in suspension with the melted wax. The suspension is then cooled and formed into a shape by, for example, molding, extrusion, die cutting, or other suitable forming method. The antioxidant remains viscose under normal operating temperatures of the electrical connector to avoid oozing and/or running out of the antioxidant, thus better preventing oxidation of the connector. The particles keep the connections running cool, particularly with aluminum to aluminum connections. | 05-30-2013 |
20130229067 | CONNECTOR HAVING WIRELESS CONTROL CAPABILITIES - A connector for connecting a source of low-voltage DC power to a low-voltage DC powered device includes a line-side interface arranged for releasably and electrically coupling the connector to the source of low-voltage DC power, a line-side interface arranged for electrically coupling the connector to the low-voltage DC powered device, a power controller electrically coupled to the line-side interface and the load-side interface and operarable to control a bringing of power to the load-side interface from the line-side interface, and an RF receiver electrically coupled to the power controller for receiving a first signal from a device external to the connector and for generating, in response thereto, a second signal for controlling operations of the power controller. | 09-05-2013 |
20140103742 | CONNECTOR HAVING WIRELESS CONTROL CAPABILITIES - A connector for connecting a source of AC power to a powered device includes a line-side interface arranged for releasably and electrically coupling the connector to the source of power, a load-side power interface arranged for electrically coupling the connector to the powered device, a load-side control interface for controlling the power supplied to the powered device, a controller electrically coupled to the line-side interface, the load-side power interface, and the load-side control interface and operable to control a bringing of power to the load-side power interface from the line-side interface and for bringing a control signal to the load-side control interface, and a receiver electrically coupled to the controller for receiving a first signal from a device external to the connector and for generating, in response thereto, a second signal for controlling operations of the controller. | 04-17-2014 |
20140203638 | ELECTRICAL OUTLET HAVING WIRELESS CONTROL CAPABILITIES - A line-in power is connectable to the disclosed outlet housing similar to any known power outlet. This provided power is used to drive an AC/DC converter to create a DC bus internal to the outlet housing. This DC bus powers the electronics, including, for example, a wireless transceiver incorporated within the outlet housing. In at least one instance, the wireless transceiver will receive a command from another wireless device to turn power ON or OFF to the local outlet and the downstream (e.g. daisychained, etc.) outlets. These outlets can be wired to the output terminations (push-in and/or other) on the back of the local outlet and/or outlet housing, or may be connected through any other suitable electrical connection | 07-24-2014 |