Patent application number | Description | Published |
20080274147 | Dry Limited Use Cloth - The present invention is directed to a dry cleansing cloth that comprises at least one personal care composition imparted to the cloth, wherein the composition acts as a visual indicator of the compositions depletion with each use, eventually signaling the consumer for the need of a replacement cloth. Accordingly, the cloth of the present invention may be any suitable limited use substrate, including wovens, nonwovens, films, and combinations thereof. Preferably, the limited use cloth comprises a nonwoven substrate, wherein the nonwoven substrates may include, but are not limited to airlaid fabrics, wetlaid fabrics, spunlace fabrics, spunbond fabrics, meltblown fabrics, coform fabrics, entangled spunbond fabrics, and combinations thereof. | 11-06-2008 |
Patent application number | Description | Published |
20080281996 | Latency Insensitive FIFO Signaling Protocol - Data from a source domain operating at a first data rate is transferred to a FIFO in another domain operating at a different data rate. The FIFO buffers data before transfer to a sink for further processing or storage. A source side counter tracks space available in the FIFO. In disclosed examples, the initial counter value corresponds to FIFO depth. The counter decrements in response to a data ready signal from the source domain, without delay. The counter increments in response to signaling from the sink domain of a read of data off the FIFO. Hence, incrementing is subject to the signaling latency between domains. The source may send one more beat of data when the counter indicates the FIFO is full. The last beat of data is continuously sent from the source until it is indicated that a FIFO position became available; effectively providing one more FIFO position. | 11-13-2008 |
20090031155 | Method and Apparatus for Adaptive Voltage Scaling Based on Instruction Usage - Different software applications may use a set of instructions having critical timing paths less than a worst case critical timing path of a processor complex. For such applications, a supply voltage may be reduced while still maintaining the clock frequency necessary to meet the application's performance requirements. In order to reduce the supply voltage, an adaptive voltage scaling method is used. A critical path is selected from a plurality of critical paths for analysis on emulation logic to determine an attribute of the selected critical path during on chip functional operations. The selected critical path is representative of the worst case critical path to be in operation during a program execution. During on-chip functional operations, a voltage is controlled in response to the attribute, wherein the voltage supplies power to a power domain associated with the plurality of critical paths. The reduction in voltage reduces power drain based on instruction set usage allowing battery life to be extended. | 01-29-2009 |
20090210663 | Power Efficient Instruction Prefetch Mechanism - A processor includes a conditional branch instruction prediction mechanism that generates weighted branch prediction values. For weakly weighted predictions, which tend to be less accurate than strongly weighted predictions, the power associating with speculatively filling and subsequently flushing the cache is saved by halting instruction prefetching. Instruction fetching continues when the branch condition is evaluated in the pipeline and the actual next address is known. Alternatively, prefetching may continue out of a cache. To avoid displacing good cache data with instructions prefetched based on a mispredicted branch, prefetching may be halted in response to a weakly weighted prediction in the event of a cache miss. | 08-20-2009 |
20090313695 | Methods and Systems for Checking Run-Time Integrity of Secure Code Cross-Reference to Related Applications - Methods and systems to guard against attacks designed to replace authenticated, secure code with non-authentic, unsecure code and using existing hardware resources in the CPU's memory management unit (MMU) are disclosed. In certain embodiments, permission entries indicating that pages in memory have been previously authenticated as secure are maintained in a translation lookaside buffer (TLB) and checked upon encountering an instruction residing at an external page. A TLB permission entry indicating permission is invalid causes on-demand authentication of the accessed page. Upon authentication, the permission entry in the TLB is updated to reflect that the page has been authenticated. As another example, in certain embodiments, a page of recently authenticated pages is maintained and checked upon encountering an instruction residing at an external page. | 12-17-2009 |
20110140752 | Adaptive Clock Generators, Systems, and Methods - Adaptive clock generators, systems, and related methods than can be used to generate a clock signal for a functional circuit to avoid or reduce performance margin are disclosed. In certain embodiments, a clock generator autonomously and adaptively generates a clock signal according to a delay path(s) provided in a delay circuit(s) relating to a selected delay path(s) in the functional circuit(s). The clock generator includes a delay circuit(s) adapted to receive an input signal and delay the input signal by an amount relating to a delay path(s) of a functional circuit(s) to produce an output signal. A feedback circuit is coupled to the delay circuit(s) and responsive to the output signal, wherein the feedback circuit is adapted to generate the input signal back to the delay circuit(s) in an oscillation loop configuration. The input signal can be used to provide a clock signal to the functional circuit(s). | 06-16-2011 |
20110241423 | Circuits, Systems and Methods to Detect and Accommodate Power Supply Voltage Droop - Circuits, systems, and methods for monitoring a power supply voltage and determining if the power supply voltage has drooped are disclosed. In one embodiment, a voltage monitoring circuit is provided and configured to determine if the power supply voltage supplied to a functional circuit has drooped. When no droop of the power supply voltage is detected, the voltage monitoring circuit is configured to provide an indication to the functional circuit to operate in a first mode. When droop of the power supply voltage is detected, the voltage monitoring circuit is configured to provide an indication to the functional circuit to operate in a second mode. In this manner, operating margin in the power supply may be reduced since the functional circuit may be configured to properly operate when a voltage droop of the power supply voltage occurs. | 10-06-2011 |
20130019117 | Methods and Apparatus for Voltage ScalingAANM Michalak; Gerald PaulAACI CaryAAST NCAACO USAAGP Michalak; Gerald Paul Cary NC USAANM Bridges; Jeffrey ToddAACI RaleighAAST NCAACO USAAGP Bridges; Jeffrey Todd Raleigh NC US - Methods and apparatus for voltage scaling are provided. In an example, an operational limit of a processor is determined by varying a supply voltage to force a processor interrupt fault and/or a processor reset. A clock frequency and the supply voltage can be maintained substantially constant for a time duration. If these operational parameters do not force the processor interrupt fault and/or the processor reset, the supply voltage is varied again, and the clock frequency and the supply voltage are maintained substantially constant for a second time duration. The variation continues until initiation of the processor interrupt fault and/or the processor reset, at which time least one of a clock frequency, the supply voltage, and a temperature are recorded as an operational limit. After determining the operational limit, the supply voltage is adjusted to within the operational limit. | 01-17-2013 |
20140040647 | SYNTHESIZING INTERMEDIATE PERFORMANCE LEVELS IN INTEGRATED CIRCUITS, AND RELATED PROCESSOR SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA - Synthesizing intermediate performance levels in integrated circuits, and related processor systems, methods, and computer-readable media are disclosed. In one embodiment, a synthesized performance level setting circuit receives an input indicating a synthesized performance mode. The circuit generates a power source selection output to select a first power source providing power to an integrated circuit functional block at a first voltage level, and generate a clock frequency setting output to select a first clock frequency associated with the first voltage level to clock the functional block, for a first predefined time interval. The circuit also generates the power source selection output to select a second power source to provide power at a second voltage level lower than the first voltage level, and generate the clock frequency setting output to select a second clock frequency associated with the second voltage level to clock the functional block, for a second predefined time interval. | 02-06-2014 |
20140312951 | ADAPTIVE VOLTAGE SCALERS (AVSs), SYSTEMS, AND RELATED METHODS - Adaptive voltage scalers (AVSs), systems, and related methods are disclosed. The AVSs are configured to adaptively adjust voltage levels powering a functional circuit(s) based on target operating frequencies and delay variation conditions to avoid or reduce voltage margin. In one embodiment, the AVS includes an AVS database. The AVS database can be configured to store voltage levels for various operating frequencies of a functional circuit(s) to avoid or reduce voltage margin. The AVS database allows rapid voltage level decisions. The voltage levels stored in the AVS database may be initial, minimum, learned, populated, explored, backed out, temperature-based, and/or age-based voltage levels according to disclosed embodiments to further avoid or reduce voltage margin. An AVS module may be a software-based module that consults the AVS database to make voltage level decisions. Providing the AVS module as a software-based module may allow flexibility in configuring the AVS module and/or the AVS database. | 10-23-2014 |
Patent application number | Description | Published |
20090088023 | Locking Receptacle For Engaging A USB Device - A locking receptacle for engaging a USB device is provided. The locking receptacle comprising a four sided header with a top opening at the top of the header and a bottom opening at the bottom of the header, the top opening and the bottom opening for USB connections; the header connected to a pivotable locking tip on one side, the pivotable locking tip located to engage a standard opening on a side of a USB plug of a USB device when the USB plug is fully inserted in the locking receptacle; and the pivotable locking tip connected to a lever for pivoting the locking tip. | 04-02-2009 |
20100079936 | TOOL-LESS BACKPLANE RETENTION FOR COMPUTER HARDWARE - An apparatus is provided and includes a housing, including a housing mating device, through which an installation path for an assembly is defined with a space in which a first part is positioned, a backplane body having opposing faces on which a second part and a backplane mating device are respectively disposed, and a hub, in which a hub mating device is defined, and from which a two-stage mating device extends, the two-stage mating device including first and second elastically coupled stages. The hub and the backplane body are coupled to form the assembly and the assembly is installed/removed in/from the space with the second stage of the two-stage mating device elastically hooked by the housing mating device or released from the housing mating device and the first and second stages of the two-stage mating device biasing the hub and the backplane body to remain coupled. | 04-01-2010 |
20120255153 | TOOL-LESS BACKPLANE RETENTION FOR COMPUTER HARDWARE - An apparatus is provided and includes a housing, including a housing mating device, through which an installation path for an assembly is defined with a space in which a first part is positioned, a backplane body having opposing faces on which a second part and a backplane mating device are respectively disposed, and a hub, in which a hub mating device is defined, and from which a two-stage mating device extends, the two-stage mating device including first and second elastically coupled stages. The hub and the backplane body are coupled to form the assembly and the assembly is installed/removed in/from the space with the second stage of the two-stage mating device elastically hooked by the housing mating device or released from the housing mating device and the first and second stages of the two-stage mating device biasing the hub and the backplane body to remain coupled. | 10-11-2012 |
20130288502 | MEMORY MODULE CONNECTOR WITH AIR DEFLECTION SYSTEM - In one embodiment, a memory module connector includes sidewalls extending along a length of the connector body. A longitudinally oriented socket is provided between the sidewalls for receiving a card edge of a memory module. A top of the connector defines a socket opening. A bottom of the connector is for mounting to a system board. A plurality of air deflectors is provided adjacent to the connector body to manipulate airflow to improve cooling. The size, positioning, and spacing of the air deflectors may be selected to optimize cooling. | 10-31-2013 |
20140031971 | LIFT APPARATUS FOR STABLE PLACEMENT OF COMPONENTS INTO A RACK - A method uses scales onboard a lift apparatus to weigh an uninstalled component that is positioned on the lift apparatus for installation into a rack. Data is accessed that identifies the weight and rack location of components currently installed in the rack, and one or more available rack locations are identified where the component may be installed without violating one or more predetermined rack stability rules. The method then uses the lift apparatus to raise the component into a selected one of the one or more available rack locations. The components are preferably information technology components, such as servers, network switches and power distribution units. | 01-30-2014 |
20140071647 | INTEGRATED CIRCUIT RETENTION MECHANISM WITH RETRACTABLE COVER - A computer processor retention device comprises a load frame, a load plate, and a pair of retractable cover members. The load frame may be secured to a circuit board around a processor mounting site. The load plate is pivotally coupled to the load frame and is pivotable between being open for receiving a processor at the processor mounting site and closed in engagement with a periphery of the received processor. The load plate has a window that is open to the processor mounting site when the load plate is closed. The retractable cover members span the window and are alternately movable along a track toward one another to cover the processor mounting site and away from one another to expose the processor mounting site. | 03-13-2014 |
20150195940 | SEQUENCED ORTHOGONAL DISCONNECTION OF ELECTRONIC MODULES - An electronic enclosure includes a first electronic module, a second electronic module, a third electronic module and a handle. The first electronic module is physically connected to the second electronic module and the third electronic module is physically connected to the second electronic module. The second electronic module vertically disengages from the first electronic module and the third electronic module horizontally disengages from the second electronic module. The handle forces sequenced orthogonal disconnection of the electronic modules such that the third electronic module horizontally disengages from the second electronic module prior to the second electronic module vertically disengages from the first electronic module. | 07-09-2015 |
Patent application number | Description | Published |
20100054657 | INTRUSION DETECTION SYSTEM FOR USE ON SINGLE MODE OPTICAL FIBER USING A COST REDUCED POLARIMETER - A telecommunications optical fiber is secured against intrusion by detecting manipulation of the optical fiber prior to an intrusion event. This can be used in a non-locating system where the detection end is opposite the transmit end or in a locating system which uses Fresnel reflections and Rayleigh backscattering to the transmit end to detect and then locate the motion. The Rayleigh backscattering time sliced data can be stored in a register until an intrusion event is detected. The detection is carried out by a polarization detection system which includes an optical splitter which is manufactured in simplified form for economic construction. This uses a non-calibrated splitter and less than all four of the Stokes parameters. It can use a polarimeter type function limited to linear and circular polarization or two linear polarizers at 90 degrees. | 03-04-2010 |
20120076453 | Intrusion Detection System for Use on Single Mode Optical Fiber Using a Simplified Polarimeter - A telecommunications optical fiber is secured against intrusion by detecting manipulation of the optical fiber prior to an intrusion event. This can be used in a non-locating system where the detection end is opposite the transmit end or in a locating system which uses Fresnel reflections and Rayleigh backscattering to the transmit end to detect and then locate the motion. The Rayleigh backscattering time sliced data can be stored in a register until an intrusion event is detected. The detection is carried out by a polarization detection system which includes an optical splitter which is manufactured in simplified form for economic construction. This uses a non-calibrated splitter and less than all four of the Stokes parameters. It can use a polarimeter type function limited to linear and circular polarization or two linear polarizers at 90 degrees. | 03-29-2012 |
20140091929 | Systems and Methods for Secure Alarmed Armored Protective Distribution Systems and Management - A fiber optic network has alarmed fiber optic lines in the cables connecting a secured junction box to plural user lock boxes. An outgoing alarm line and return alarm line in each cable connect the junction box to each user box. The outgoing alarm line is looped to the return alarm line inside the user lock box. The return alarm line is looped to the outgoing alarm line of a different cable inside the junction box to interconnect a plurality of alarm lines passing through a plurality of user boxes. A detector detects an alarm signal in the connected alarm lines to trigger an intrusion alarm. | 04-03-2014 |
20140153889 | Hardware and Methods for Secure Alarmed Armored Protective Distribution Systems and Management - A fiber optic network has alarmed fiber optic lines in the cables connecting a secured junction box to plural user lock boxes. An outgoing alarm line and return alarm line in each cable connect the junction box to each user box. The outgoing alarm line is looped to the return alarm line inside the user lock box. The return alarm line is looped to the outgoing alarm line of a different cable inside the junction box to interconnect a plurality of alarm lines passing through a plurality of user boxes. A detector detects an alarm signal in the connected alarm lines to trigger an intrusion alarm. Power to the components in the box is disconnected when the box is opened and ventilation openings to the box are closed when the box is closed. | 06-05-2014 |
20140230553 | Method of Detecting Movement Using a Metallic Conductors - A method for monitoring movement of an element such as a cable is carried out by providing a pair of conductive elements each extending along an extent of the cable or other element to be monitored. A DC potential difference is applied between the conductive elements. The conductive elements are provided with an intervening material therebetween, which can be a continuous dielectric or can be other insulating material which varies in spacing and capacitance value along its length, such that the movement causes a change in capacitive coupling between the conductive elements at points or areas where the movement occurs so as to generate a changing voltage therebetween. The changing voltage as an amplified and filtered variable electrical signal is analyzed for monitoring the changing voltage for perturbations caused by the movement of the element. | 08-21-2014 |
20150015398 | Alarm System for a Single Mode Optical Fiber Network - A method is provided for detecting intrusion into an optical cable of a single mode optical fiber network comprising where monitoring light signals are transmitted along a telecommunications optical fiber to be monitored either along a fiber additional to a data fiber or by multiplexing onto a common fiber. The received monitoring light signals after transmission along the telecommunications optical fiber are analyzed for changes indicative of movement of the optical fiber for detecting an intrusion event. The monitoring light signals at the receive end of the fiber signals are monitored by feeding the signals from the single mode fiber into a multi-mode fiber in a manner which causes changes in modal power distribution which can be detected by taking a portion only of the modes. | 01-15-2015 |
20150086195 | Drop Discriminating Network Alarm System Utilizing a Single Sensing Fiber - A method is provided for detecting movement indicative of intrusion events on optical drop fibers of a network where the individual drop fiber can be identified to locate the event. The method uses a monitor system at the network end and multiplexing the monitor signal along the individual fibers to the respective terminals. At each of the terminals, the monitor signal is returned unchanged or in modified form along the same or different fibers to the network end. At the network end the received monitor signals is analyzed for changes in said monitor signals indicative of movement. Which one or more of the drop fibers has triggered the alarm is determined by modifying the monitor signal in wavelength or polarization, or by applying a modulation at the source and/or at multiplexing and/or at returning so that the monitor signal of one drop fiber has a difference from the monitor signal of another drop fiber. | 03-26-2015 |
20150333822 | Network Alarm System Utilizing a Single Sensing Fiber - A method is provided for detecting intrusion into an optical cable of an optical network comprising where monitoring light signals are transmitted along a telecommunications optical fiber to be monitored either along a fiber additional to a data fiber or by multiplexing onto a common fiber. The received monitoring light signals after transmission along the telecommunications optical fiber are analyzed for changes indicative of movement of the optical fiber for detecting an intrusion event. The monitoring light signals at the receive end of the fiber signals are returned along the same fiber by a coupler where the legs are connected or by a reflective material. | 11-19-2015 |
Patent application number | Description | Published |
20130133215 | TAPE MEASURE WITH FINGER DRAG BRAKE - A tape measure has a finger recess in a housing, with at least a portion of the underside of a tape blade exposed in the finger recess. Pressing a finger against the underside of the tape allows the user to create a drag brake that acts against the retraction spring to slow and/or stop the retraction of the tape blade. The finger recess is located upstream (i.e. closer to the coiled portion of the retracted tape blade) than the point at which the tape measure's lock engages the tape blade. This arrangement results in a compact yet versatile overall tape measure with good tactile feedback during finger-braking. | 05-30-2013 |
20130264807 | TOOL KIT MOUNTING SYSTEM - A tool cart assembly including a tool cart having a horizontal surface defining a mounting aperture, a first rail including a bottom wall, a pair of opposed sidewalls, a front edge of each sidewall defining a catch, and at least one projection depending downwardly from the bottom wall, the projection being configured to be received in the mounting aperture such that the first rail is secured to the horizontal surface. A tool kit includes a sidewall and a first elongated rib, the elongated rib is configured to be slidably received by the first rail. The tool kit is removably secured to the tool cart by positioning the elongated first rib in the first rail and sliding the tool kit rearwardly such that the catches defined by the first rail engage a first portion of the tool kit. | 10-10-2013 |
20150040416 | Tape Measure with Finger Drag Brake - A tape measure is described that has a finger recess in a housing, with at least a portion of the underside of a tape blade exposed in the finger recess. Pressing a finger against the underside of the tape allows the user to create a drag brake that acts against the retraction spring to slow and/or stop the retraction of the tape blade. The lateral edges of the tape blade, for that portion of the tape blade disposed in the finger recess, are protected by the housing. This arrangement results in a compact yet versatile and safe overall tape measure with good tactile feedback during finger-braking. | 02-12-2015 |