Brown, AZ
Andrew Bransford Brown, Scottsdale, AZ US
Patent application number | Description | Published |
---|---|---|
20110020893 | Trapping discrete particles in fluids (For example, filtering for specific virus, molecule, or other identifiable particle in water, blood, air or other fluids) - The invention describes a way to target and trap a specific particle (atom, molecule, bacterium, photon, ion, virus, etc.) that can be extracted from a moving fluid flow. Since every particle has a unique and identifiable shape and/or electromagnetic signature, a trap can be built to target it. The fluid is assumed to be moving and the trap is to be placed in the flow to capture the specific particle. Other particles would not be captured unless specifically targeted. Once trapped, the particle can be returned to the flow or be pulled out, the trap cleaned and replaced to catch a new particle. This can be used to remove specific particles from the fluid flow for mining purposes or to clean the fluid (EG. removing sodium molecules from flowing water or removing a virus from the blood stream). | 01-27-2011 |
Andrew Timothy Brown, Scottsdale, AZ US
Patent application number | Description | Published |
---|---|---|
20130059517 | THRUST RECOVERY OUTFLOW VALVE WITH A SINGLE BI-FOLD DOOR AND METHOD OF CONTROLLING AIRCRAFT CABIN PRESSURE - A bi-fold valve door and method for controlling aircraft cabin pressure are provided. The bi-fold valve door includes an aft door section and a forward door section, and only the forward door section is selectively rotated about one rotational axis to a position between a closed position and a full-open position, while the aft door section is maintained in its closed position. The forward door section is selectively rotated about the rotational axis to a full-open position to engage the aft door section, while the aft door section is maintained in its closed position. When the forward door section is in the full-open position, the aft door section and the forward door section are simultaneously rotated about another rotational axis. | 03-07-2013 |
Bill Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20150220997 | Reputation Tiers for a Marketing Campaign - Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: transmit a marketing campaign from a first virtual internet protocol (IP) address; identify, during a transmission of the marketing campaign, a quantity of undeliverable or unsolicited email; determine whether the quantity of undeliverable or unsolicited email is equal to or greater than a threshold quantity of undeliverable or unsolicited email; and responsive to a determination that the quantity of undeliverable or unsolicited email is equal to or greater than the threshold quantity, transmit, prior to a conclusion of the transmission, the marketing campaign from a second virtual IP address. | 08-06-2015 |
20150310481 | SYSTEM AND METHOD FOR MANAGEMENT OF MARKETING CAMPAIGNS - A system and method for automatically assigning marketing allocations, including advertisements and coupons, for a business to marketing channels. An investment engine and recommendation engine uses input data to assign marketing allocations to marketing channels. Consumer activity is generated that produces corresponding output data. The investment engine calculates a return-on-investment (ROI) metric, and the recommendation engine generates a report related to the input and output data. The input data, marketing allocations or channels are adjusted to optimize the ROI metric and recommend marketing campaign strategies. The system also automatically determines which keywords the business should assign their marketing allocations to when a consumer utilizes similar keywords on a search engine. Targeted keywords are determined by applying budget weights to keywords related to the business and monitoring output data, such as a click through rate of the marketing allocations. Keywords with higher click through rates receive higher budget weights. | 10-29-2015 |
Carlton E. Brown, Tucson, AZ US
Patent application number | Description | Published |
---|---|---|
20090072042 | Air Diffusing and Water Misting Apparatus and Method - An apparatus, system, and method for providing a fluid stream into an environment for cooling purposes are disclosed. Such an apparatus includes a body portion and a nozzle, the nozzle being adapted to direct water into the environment. Such an apparatus may include a body portion having a flow channel defined therein for gas flow therethrough; and, a nozzle operatively disposed within the flow channel; said nozzle adapted to direct a liquid therefrom; wherein the channel and the nozzle are operatively disposed relative to each other so that a gas flowing through the channel and the liquid are combined into a fluid stream directed from the apparatus into the surrounding environment. | 03-19-2009 |
20110309158 | AIR DIFFUSING AND WATER MISTING APPARATUS AND METHOD - An apparatus, system, and method for providing a fluid stream into an environment for cooling purposes are disclosed. Such an apparatus includes a body portion and a nozzle, the nozzle being adapted to direct water into the environment. Such an apparatus may include a body portion having a flow channel defined therein for gas flow therethrough; and, a nozzle operatively disposed within the flow channel; said nozzle adapted to direct a liquid therefrom; wherein the channel and the nozzle are operatively disposed relative to each other so that a gas flowing through the channel and the liquid are combined into a fluid stream directed from the apparatus into the surrounding environment. | 12-22-2011 |
Chris Brown, Gilbert, AZ US
Patent application number | Description | Published |
---|---|---|
20100148083 | SPECTROPHOTOMETER AND METHOD - A spectrophotometer includes a plurality of LEDs arranged in a circular array, each having a calibrated power input determined by the use of pulse width modulation and each having a unique wavelength band determined by the utilization of a unique fluorescent phosphor coating or lens. At least one of the LEDs comprising a phosphor-free high energy UV LED. Light reflected to the spectrophotometer is divided into predetermined wavelength ranges through the utilization of a linear variable filter and photo detectors wherein the analog signal from a photo detector is converted to a digital value through the use of auto-ranging gain technique. | 06-17-2010 |
Clem H. Brown, Scottsdale, AZ US
Patent application number | Description | Published |
---|---|---|
20090261482 | SEMICONDUCTOR PACKAGE AND METHOD OF MAKING SAME - A semiconductor package ( | 10-22-2009 |
Colyn Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20140089126 | ONLINE AUCTION SYSTEM - An online auction system includes a set of memory resources that store auction data and one or more processors. The one or more processors implement multiple auction forums for transacting a corresponding set of assets. The one or more processors enable a registrant to participate in any of the multiple auction forums by providing the registrant with multiple interfaces to prompt the user for input or action. In some embodiments, the one or more processors provide an entity type interface to prompt the registrant to declare an entity type of the registrant. The one or more processors operate to determine a set of requirements for the registrant based at least in part on (i) a type designation provided by the user, and (ii) a geographic region of one or more assets that are being transacted by the multiple auction forums. | 03-27-2014 |
Daniel Brown, Surprise, AZ US
Patent application number | Description | Published |
---|---|---|
20090065297 | DUAL ACTION INLET DOOR AND METHOD FOR USE THEREOF - An inlet door assembly and method for reducing noise from an auxiliary power unit (APU) contained within an aircraft housing is provided. The inlet assembly includes an inlet duct, an actuator, and a door. The inlet duct is configured to extend from the auxiliary power unit to the aircraft housing and has a sidewall that defines a flow passage through which APU noise propagates. The actuator is disposed at least partially within the inlet duct. The door coupled to the actuator. The actuator is also configured to selectively rotate the door between at least a first position, in which at least a portion of the door deflects APU noise in a first direction, and a second position, in which at least a portion of the door deflects the APU noise in a second direction. | 03-12-2009 |
Daniel V. Brown, Surprise, AZ US
Patent application number | Description | Published |
---|---|---|
20100090153 | Fiber-based acoustic treatment material and methods of making the same - A fiber-based acoustic treatment material is provided. The material includes between about 3% and about 25% by weight of fibrillated microfibers, between about 20% and about 75% by weight of reinforcement microfibers, and between about 15% and about 60% by weight of a binder. Methods of making the material are also provided | 04-15-2010 |
Deanna Brown, Queen Creek, AZ US
Patent application number | Description | Published |
---|---|---|
20090204833 | MINIMIZATION OF POWER CONSUMPTION IN SERVER ENVIRONMENT - A method for minimizing power consumption in a computer server is provided. Collected data for an event is compared with an entry in a power consumption table. A power reduction mechanism is triggered if the collected data and the entry are within a specified range. The power consumption table is updated with the collected data if the collected data and the entry are not within the specified range. | 08-13-2009 |
Deanna L. Brown, Queen Creek, AZ US
Patent application number | Description | Published |
---|---|---|
20140198669 | DYNAMICALLY DETERMINING PACKET SAMPLING RATES - For dynamically determining packet sampling rates, a method including setting a packet sampling rate for one or more switch ports, collecting for an interval of time a plurality of statistics for the one or more switch ports, and adjusting the packet sampling rate in response to one or more of the plurality of statistics. | 07-17-2014 |
Deanna L.q. Brown, Queen Creek, AZ US
Patent application number | Description | Published |
---|---|---|
20150113183 | Zoning of Devices in a Storage Area Network with LUN Masking/Mapping - Host port information is pulled directly from the switch before zoning is performed and is organized by chassis as an assist for mapping and masking an entire chassis. A graphical user interface allows a user to select storage by chassis to map and to select servers by chassis to map. The user then applies that mapping such that all servers selected are mapped to all storage selected. The user may repeat this mapping for another set of storage and servers. In a mixed environment, an icon may be shown in the graphical user interface to represent the mix. When the LUN mapping/masking is done, the LUN mapping/masking may be provided to the SAN manager to perform zoning. The LUN mapping/masking defines which host ports see which storage ports. | 04-23-2015 |
20150127830 | MANAGEMENT OF ADDRESSES IN VIRTUAL MACHINES - Methods for managing an address on a switching device, managing an address on a network switch, and screening addresses in a cloud computing environment are provided. One embodiment is directed towards a computer-implemented method for managing an address on a switching device that is communicatively coupled to a plurality of virtual machines. The method includes accessing an address pool that includes an assigned address for each virtual machine from the plurality of virtual machines. The method includes determining, on the switching device, a used address for the virtual machine from the plurality of virtual machines. The method includes determining whether the used address is matching the assigned address for each virtual machine. The method also includes routing traffic from the virtual machine to a hypervisor in response to the used address matching the assigned address. | 05-07-2015 |
20150128245 | MANAGEMENT OF ADDRESSES IN VIRTUAL MACHINES - Methods for managing an address on a switching device, managing an address on a network switch, and screening addresses in a cloud computing environment are provided. One embodiment is directed towards a computer-implemented method for managing an address on a switching device that is communicatively coupled to a plurality of virtual machines. The method includes accessing an address pool that includes an assigned address for each virtual machine from the plurality of virtual machines. The method includes determining, on the switching device, a used address for the virtual machine from the plurality of virtual machines. The method includes determining whether the used address is matching the assigned address for each virtual machine. The method also includes routing traffic from the virtual machine to a hypervisor in response to the used address matching the assigned address. | 05-07-2015 |
Deanna Lynn Quigg Brown, Queen Creek, AZ US
Patent application number | Description | Published |
---|---|---|
20090210735 | APPARATUS, SYSTEM, AND METHOD FOR CONTROLLING POWER SEQUENCE IN A BLADE CENTER ENVIRONMENT - An apparatus, system, and method are disclosed for controlling power sequence in a blade center environment. A blade center environment has many devices requiring power. A relationship component module creates a topology of interdependent relationships of the devices. A monitor component module monitors commands to regulate power for devices. A validating module validates that the commands do not violate the interdependent relationships defined in the topology and returns a failure message if the command is not validated. | 08-20-2009 |
20090222733 | Zoning of Devices in a Storage Area Network with LUN Masking/Mapping - Host port information is pulled directly from the switch before zoning is performed and is organized by chassis as an assist for mapping and masking an entire chassis. A graphical user interface allows a user to select storage by chassis to map and to select servers by chassis to map. The user then applies that mapping such that all servers selected are mapped to all storage selected. The user may repeat this mapping for another set of storage and servers. In a mixed environment, an icon may be shown in the graphical user interface to represent the mix. When the LUN mapping/masking is done, the LUN mapping/masking may be provided to the SAN manager to perform zoning. The LUN mapping/masking defines which host ports see which storage ports. | 09-03-2009 |
20100064102 | COMPONENT DISCOVERY IN MULTI-BLADE SERVER CHASSIS - A method for discovering components on a multi-blade server chassis having an input/output (I/O) module in communication with a plurality of components managed by an advanced management module (AMM) is provided. The I/O module includes a switch module, a redundant array of independent disks (RAID) controller and a baseboard management controller (BMC). A first address for a first component of the plurality of components is received. The first address is provided by a user. The switch module is queried for additional addresses for additional components of the plurality of components. The switch module obtains the additional addresses for the additional components from a first persistent storage location associated with the switch module. The first and additional addresses for the first and additional components are stored in a second persistent storage location accessible by the BMC, the switch module, and the RAID controller. | 03-11-2010 |
20120198261 | CONTROLLING POWER SEQUENCE IN A BLADE CENTER ENVIRONMENT - For controlling power sequence in a blade center environment, a relationship component module creates a topology of interdependent relationships of devices in the blade center environment. The devices include server blades, storage blades, and switch modules. A sequence module defines a sequence of the devices in the blade center environment to power off and on based on the topology of interdependent relationships. The sequence includes an order of a first independent blade server, each dependent storage blade of the first independent blade server, and a second independent blade server. A monitor component module monitors a command from an Advanced Management Module (AMM) to regulate power for the devices in the blade center environment. The AMM regulates power within the blade center. A validation module validates that the command does not violate the interdependent relationships and the sequence of devices or else blocks the command if the command is not validated. | 08-02-2012 |
Deanna Q. Brown, Queen Creek, AZ US
Patent application number | Description | Published |
---|---|---|
20100223667 | APPARATUS, SYSTEM, AND METHOD FOR START-UP AUTHENTICATION - An apparatus, system, and method are disclosed for start-up authentication. A prompt module prompts for a hardware password and authentication data on a single display screen. The authentication data comprises a user password. The user password is distinct from the hardware password. A store module stores the authentication data in a target storage space. In addition, the store module stores a pointer to the target storage space in a system register. A retrieve module retrieves the authentication data from the target storage space using the pointer. An authentication module automatically authenticates a user with the authentication data. | 09-02-2010 |
Diane M. Brown, Mesa, AZ US
Patent application number | Description | Published |
---|---|---|
20130275176 | RISK ASSESSMENT OF A SUPPLIER OF AN ORGANIZATION - According to one embodiment of the present invention, risk associated with a supplier of an organization may be assessed. A supplier associated with an organization is identified for risk assessment. The risk assessment comprises a plurality of questions where each question has a priority level. A plurality of selections for the supplier associated with the plurality of questions is determined. A respective selection of the plurality of selections is associated with a respective question of the plurality of questions. A plurality of values associated with the plurality of selections is determined. A respective value of the plurality of values is associated with a respective selection of the plurality of selections. Using a processor, a risk score for the supplier is calculated according to the plurality of values and the priority level of each of the plurality of questions. | 10-17-2013 |
Elijah Ethan Brown, Prescott, AZ US
Patent application number | Description | Published |
---|---|---|
20130139195 | Method for More Efficient Collecting of Information - Apparatus and processes for locating and processing QR codes or other Scannable Icons (SI's) in video or television signals. A number of client elements (which may correspond to users) may be in communication of one or more control elements; the client elements may be found in user set top boxes, digital video recorders or other equipment employed to receive video or television signals. The control elements may be found in software in server platforms or such user equipment. The client elements may locate and decode SI's according to various areas of interest of users. The control elements may control which client elements monitor various video or television signals; receive information related to decoded SI's; and report information to client elements so that (among other things) users can be aware of SI's in far more video or television signals than their own client elements are able to monitor. | 05-30-2013 |
Elijah Ethan Brown, Prescott Valley, AZ US
Patent application number | Description | Published |
---|---|---|
20130188095 | System for Scanable Icon Detection and Management - This invention enables Scanable Icons, which may be predetermined graphical images, and similar encoded information to be applied to video systems in a manner that is user-friendly and brings many of the advantages of easy information access and management to the video environment. The optical path normally required when using such encoded information is avoided. Supplementary information, including more details for advertisements, is provided in a non-invasive manner, allowing the user to access the supplementary information at convenient times and locations. The Scanable Icon adds a symbol to the existing advertisement without increasing its duration. Advertising is made substantially more effective for the advertiser and more useful for the consumer. | 07-25-2013 |
Fitzroy Brown, Chandler, AZ US
Patent application number | Description | Published |
---|---|---|
20130071550 | Self-Sealing PTFE Graft with Kink Resistance - A self-sealing vascular graft, including a substrate with a sealant layer and several optional additional layers, is described. The substrate can be ePTFE and the material used for the sealant and additional layers can be polyurethane. The sealant layer and additional layers may include one or more base layers, one or more foam layers, beading of different sizes and shapes, and ePTFE tape. A flared cuff may be integral to one or both ends of the substrate or may be attached to one or both ends. Various methods of making a self-sealing vascular graft are also described, including methods of disposition, methods of forming, methods of bonding and methods of attaching. | 03-21-2013 |
F. Michel Brown, Glendale, AZ US
Patent application number | Description | Published |
---|---|---|
20110093837 | Method and apparatus for enabling parallel processing during execution of a cobol source program using two-stage compilation - A method and apparatus is disclosed for compilation of an original Cobol program and building an executable program with support for improved performance by increased parallelism during execution using multiple threads of processing. The approach includes a compilation (or translation) step utilizing a first compiler or translating program which is a parallel aware translating first compiler. The parallel aware first compiler is a specialized compiler/translator which takes as input a Cobol source program, and produces as output an intermediate computer program in a second computer programming language, the intermediate program including parallelization directives, the intermediate program intended for further compilation utilizing an existing selected second compiler, the second compiler providing support for parallelism for programs described in the second programming language. The approach optionally allows for use of pragmas serving as parallelization directives to the compiler in the original Cobol program or in the intermediate program. | 04-21-2011 |
20140189663 | METHOD AND APPARATUS ENABLING MULTI THREADED PROGRAM EXECUTION FOR A COBOL PROGRAM INCLUDING OPENMP DIRECTIVES BY UTILIZING A TWO-STAGE COMPILATION PROCESS - A method and apparatus is disclosed for compilation of an original Cobol program with support for improved performance by increased parallelism during execution using multiple threads of processing. The approach includes a two stage compilation process, the first compilation/translation step by a first specialized compiler/translator that takes as input a Cobol source program that includes parallelization directives, and produces as output an intermediate computer program in a second computer programming language, the intermediate program including parallelization directives in the second computer programming language. The intermediate program is then compiled utilizing a selected second compiler that provides support for parallelism described in the second programming language. The approach optionally allows for use of pragmas serving as parallelization directives to the compiler in the original Cobol program or in the intermediate program. | 07-03-2014 |
Gregory John Brown, Mesa, AZ US
Patent application number | Description | Published |
---|---|---|
20160029867 | Ceiling debris collection bin - The Ceiling Debris Collection Bin is a receptacle with a wide opening that facilitates the nearly complete collection of acoustic ceiling debris removed by the Popcorn Ceiling Scraper—U.S. Pat. No. 6,101,663. The makers this Scraper recommend use of a plastic trash bag for collection of debris but a trash bag is not efficient enough, being limited to an opening defined by the scraper's flexible band. The new Ceiling Debris Collection Bin is very efficient owing to the flared side design. Debris that flies all over and might escape collection by a trash bag would be captured by this uniquely designed Ceiling Debris Collection Bin with nearly three times the collection area. The collapsible wings of the bin accommodate the flexible metal band of the Popcorn Ceiling Scraper, so that the Scraper can be pushed up to where the ceiling meets the wall. | 02-04-2016 |
Harold Lee Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20100076724 | Method for capturing and analyzing test result data - A method, system, and graphical user interface display for an efficient and effective characterization and analysis of test data for diverse products from a wide variety of industries using both successful test data and failure test data. | 03-25-2010 |
James Mikel Brown, Mesa, AZ US
Patent application number | Description | Published |
---|---|---|
20100083558 | FISHING HOOK RETAINING APPARATUS - A fishing hook retaining apparatus is provided. In a first aspect, a first member and a second member of the fishing hook retaining apparatus oppose one another and pivotally rotate about a shaft from a closed position to an open position when compressive force is applied to lower portions of the first and second members. While open, an operator may insert a fishing hook into the fishing hook retaining device and subsequently release the applied force to permit the first and second members to close and thus secure the fishing hook within the fishing hook retaining device. In a second aspect, when in the closed position, the first and second members not only secure the fishing hook therewithin, but compressively grip a cylindrical rod placed therebetween, which secures the fishing hook retaining apparatus to the cylindrical rod, wherein the cylindrical rod is a fishing pole. | 04-08-2010 |
20130014426 | APPARATUS FOR SECURING FISHING TACKLE - A retaining apparatus for fishing tackle is provided. The retaining member comprises a main body defining a hollow interior, and coupling means for releasably coupling the retaining member to a fishing rod, wherein the hollow interior houses the fishing tackle. The coupling means may comprise an engagement member that pivots about the main body between an engaged position and an open position, the engagement member being biased toward the engaged position, wherein pivoting the engagement member to the open position allows the retaining member to be placed on or removed from the fishing rod and pivoting the engagement member to the engaged position secures the retaining member to the fishing rod. | 01-17-2013 |
James S. Brown, Gilbert, AZ US
Patent application number | Description | Published |
---|---|---|
20080254150 | Management of dermatitic symptoms of mammalian integument with emollient disinfectant formulations - Botanically-sourced and botanically-derived emollient sanitation compositions for topical use are disclosed. Representative compositions generally aid reconstitution of the lipid profile of the stratum corneum by providing botanical lipids and/or lipid-derivatives that resemble human sebum—these components being ordinarily diminished with the use of conventional hand sanitizer products. Disclosed features and specifications may be variously controlled, adapted or optionally modified to realize, for example, improved hand sanitizer formulations. Representative embodiments of the present invention generally provide anti-microbial compositions blended with botanically sourced lipids and/or lipid-derivatives to control or otherwise improve dermatitic symptoms associated with frequent use of conventional hand sanitizer products. | 10-16-2008 |
20090318554 | COSMETIC PARTICLES THAT TRANSFORM FROM HARD TO SOFT PARTICLES COMPRISING HYDROGENATED LONG-CHAIN TRIGLYCERIDE OILS - Cosmetic particle compositions are provided which are adapted to form hard cosmetic particles that transform to soft cosmetic particles after their incorporation into topical formulations, particularly surfactant-based topical formulations. The composition includes one or more partially or fully hydrogenated triglyceride oils, at least 50% of which have at least 15% by weight fatty acid moieties with carbon chain lengths of C | 12-24-2009 |
20130183259 | HUMAN SEBUM MIMETICS DERIVED FROM BOTANICAL SOURCES AND METHODS FOR MAKING THE SAME - Human sebum mimetics and methods for producing human sebum mimetics are provided. In one exemplary embodiment, a human sebum mimetic comprises a wax ester derived from interesterification of refined botanical oil comprising palmitoleic acid and refined jojoba oil, a phytosterol, and phytosqualene. A method for producing a human sebum mimetic comprises mixing refined macadamia oil and refined jojoba oil, interesterifying the refined macadamia oil and the refined jojoba oil, adding a phytosterol alter the interesterifying, and adding phytosqualene after the interesterifying, | 07-18-2013 |
20140094515 | COSMETIC PARTICLES THAT TRANSFORM FROM HARD TO SOFT PARTICLES COMPRISING HYDROGENATED LONG-CHAIN TRIGLYCERIDE OILS - Cosmetic particle compositions are provided which are adapted to form hard cosmetic particles that transform to soft cosmetic particles after their incorporation into topical formulations, particularly surfactant-based topical formulations. The composition includes one or more partially or fully hydrogenated triglyceride oils, at least 50% of which have at least 15% by weight fatty acid moieties with carbon chain lengths of C | 04-03-2014 |
20140105844 | HUMAN SEBUM MIMETICS DERIVED FROM BOTANICAL SOURCES AND METHODS FOR MAKING THE SAME - Human sebum mimetics and methods for producing human sebum mimetics are provided. In one exemplary embodiment, a human sebum mimetic comprises a wax ester derived from interesterification of a refined botanical triglyceride oil comprising palmitoleic acid and refined jojoba oil, a phytosterol, phytosqualene, and phytosteryl macadamiate. A method for producing a human sebum mimetic comprises mixing refined macadamia oil and refined jojoba oil, interesterifying the macadamia oil and the jojoba oil, adding a phytosterol, adding phytosteryl macadamiate, and adding phytosqualene after interesterification. | 04-17-2014 |
James Steven Brown, Gilbert, AZ US
Patent application number | Description | Published |
---|---|---|
20090274629 | Sanitizing Composition and Method of Preparation - The invention provides a sanitizing composition in the form of a viscous liquid or gel suitable for use as a handwash composition comprising alcohol, water and a thickener wherein the viscous liquid or gel has particles suspended therein, wherein said particles provide the composition with a granular texture and are capable of being worn away when rubbed. The particles may deliver one or more agents to the skin e.g. antimicrobial, antibacterial or antiviral agents, emollients and/or moisturizers, fragrances, colourings or UV markers. | 11-05-2009 |
20090287584 | SYSTEMS AND METHODS FOR PROVIDING INFORMATION ASSOCIATED WITH PRODUCT SAMPLES - Systems and methods are described for providing information associated with a particular product to a customer possessing a sample of the particular product. An identifier that is provided with the sample of the particular product and that uniquely identifies the product is received at a server. The information associated with the particular product is obtained based upon the received identifier. The information is provided from the server to the customer to thereby allow the customer to use the particular product that is in the customer's possession. The information provided may include safety information (e.g., a material safety data sheet (MSDS)) and usage information associated with the particular product. Such systems and methods may be particularly useful providing information relating to chemical components, such as those used in cosmetic, personal care or other industries. | 11-19-2009 |
20130183260 | HUMAN SEBUM MIMETICS DERIVED FROM BOTANICAL SOURCES AND METHODS FOR MAKING THE SAME - Human sebum mimetics and methods for producing human sebum mimetics are provided. In one exemplary embodiment, a human sebum mimetic comprises a wax ester derived from interesterification of refined botanical oil comprising palmitoleic acid and refined jojoba oil, a phytosterol, phytosqualene, and/or phytosteryl macadamiate. Method for producing a human sebum mimetic comprises mixing refined macadamia oil and refined jojoba oil, interesterifying the refined macadamia oil and the refined jojoba oil, adding a phytosterol, adding phytosteryl macadamiate, and adding phytosqualene after the interesterifying. | 07-18-2013 |
20140294965 | COMPOSITIONS AND METHODS FOR EXFOLIATING PARTICLES - Various embodiments provide compositions for exfoliating particles and methods for their manufacture. In one exemplary embodiment, the exfoliating particles may comprise a derivative of a botanically-sourced emollient, stearyl stearate, and at least one of: candelilla wax, is bran wax, sunflower wax, jojoba esters, carnauba wax, bees wax, corn wax, a saturated wax-ester, castor wax, ouricury wax, hydrogenated lanolin, and a hydrogenated triglyceride wax, Exemplary methods for producing the exfoliating particles may comprise melting, combining, and/or homogenizing the components of the exfoliating particles and cooling the resultant mixture in a process to form particles of a desired shape and/or size. The exfoliating particles may be for topical use and may be stable in personal care compositions. | 10-02-2014 |
20140301896 | SANITIZING COMPOSITION AND METHOD OF PREPARATION - The invention provides a sanitizing composition in the form of a viscous liquid or gel suitable for use as a handwash composition comprising alcohol, water and a thickener wherein the viscous liquid or gel has particles suspended therein, wherein said particles provide the composition with a granular texture and are capable of being worn away when rubbed. The particles may deliver one or more agents to the skin e.g. antimicrobial, antibacterial or antiviral agents, emollients and/or moisturizers, fragrances, colorings or UV markers. | 10-09-2014 |
John Eldo Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20100083558 | FISHING HOOK RETAINING APPARATUS - A fishing hook retaining apparatus is provided. In a first aspect, a first member and a second member of the fishing hook retaining apparatus oppose one another and pivotally rotate about a shaft from a closed position to an open position when compressive force is applied to lower portions of the first and second members. While open, an operator may insert a fishing hook into the fishing hook retaining device and subsequently release the applied force to permit the first and second members to close and thus secure the fishing hook within the fishing hook retaining device. In a second aspect, when in the closed position, the first and second members not only secure the fishing hook therewithin, but compressively grip a cylindrical rod placed therebetween, which secures the fishing hook retaining apparatus to the cylindrical rod, wherein the cylindrical rod is a fishing pole. | 04-08-2010 |
20130014426 | APPARATUS FOR SECURING FISHING TACKLE - A retaining apparatus for fishing tackle is provided. The retaining member comprises a main body defining a hollow interior, and coupling means for releasably coupling the retaining member to a fishing rod, wherein the hollow interior houses the fishing tackle. The coupling means may comprise an engagement member that pivots about the main body between an engaged position and an open position, the engagement member being biased toward the engaged position, wherein pivoting the engagement member to the open position allows the retaining member to be placed on or removed from the fishing rod and pivoting the engagement member to the engaged position secures the retaining member to the fishing rod. | 01-17-2013 |
Justin Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20150176072 | MOLECULAR MALIGNANCY IN MELANOCYTIC LESIONS - Disclosed are methods for determining whether a melanocyte-containing sample (such as a nevus or other pigmented lesion) is benign or a primary melanoma. These methods can include detecting (at the molecular level, e.g., mRNA, miRNA, or protein) the expression of at least two disclosed genes in a biological sample obtained from a subject. Also provided are arrays and kits that can be used with the methods. | 06-25-2015 |
Kenneth E. Brown, Litchfield Park, AZ US
Patent application number | Description | Published |
---|---|---|
20150269526 | METHOD AND SYSTEM FOR MATCHING A JOBSEEKER AND A JOB PROVIDER - A method and system for matching a jobseeker and a job provider. Particularly, the application provides a web based method and system for deriving at least one unique match between at least one qualification attributes of a jobseeker and attributes of job specification defined by a hiring manager. More particularly, the present application provides a method and system which is characterized in deriving said unique match out of a plurality of selectively invited jobseekers for applying by hiring manager. | 09-24-2015 |
Lance T. Brown, Tuscon, AZ US
Patent application number | Description | Published |
---|---|---|
20140036365 | THREE-POINT FOCUS SPACER AND WISHBONE RETENTION - A system includes a light detector, optics, a telescope camera mount, a plurality of spacers, and a retainer. The optics are configured to focus light on the light detector. The telescope camera mount is configured to at least partially support the optics. The plurality of spacers are positioned between the optics and the light detector. A retainer is coupled to the plurality of spacers. | 02-06-2014 |
Marc A. Brown, Tubac, AZ US
Patent application number | Description | Published |
---|---|---|
20090279383 | Autonomous Data Relay Buoy - An easily deployable data relay buoy, in some embodiments, has a diesel powered alternator and storage battery, providing long service life. The data relay buoy has mechanical characteristics that allow it to maintain antenna stability in the presence of seas states from at least zero through four and to survive in sea states up to sea state six. | 11-12-2009 |
20100068955 | Anchor Containing a Self Deploying Mooring System and Method of Automatically Deploying the Mooring System from the Anchor - An anchor holds a variety of mooring system elements, including processor-controlled cable brakes, prior to deployment of the anchor. The anchor is configured to automatically deploy the elements of the mooring system into a desired underwater configuration. A method of deploying an ocean anchor includes controlling cable brakes and results in the elements of the mooring system being deployed into a desired underwater configuration. | 03-18-2010 |
Matthew Scot Brown, Gilbert, AZ US
Patent application number | Description | Published |
---|---|---|
20140278635 | DELIVERY METHODS AND SYSTEMS UTILIZING A STAND-BY DELIVERY DRIVER - A system and related methods of a stand-by delivery driver is disclosed. The system may include a computer configured to prepare a stand-by driver pool of available stand-by drivers. The system further includes receiving a delivery request for a customer order and determining a ranked list of potential drivers to deliver the customer order. The system also includes selecting a potential driver from the ranked list of potential drivers and determining whether the potential driver accepts the delivery request. If the potential driver accepts the delivery request, the system includes transmitting an order authentication and receiving delivery notification from the delivery driver when the customer order is delivered to the customer. The system may also include transmitting driver-in-route notifications, providing real-time global positioning of the delivery driver. The system may be adapted for use in business delivery such as restaurant, local retail, legal, medical, pharmacy, online retail, and grocery delivery. | 09-18-2014 |
Michael A. Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20090059774 | Method of storing a data bit in a phase change alloy material with an electron beam - Alloy memory structures and methods are disclosed wherein a layer or volume of alloy material changes conductivity subsequent to introduction of a electron beam current-induced change in phase of the alloy, the conductivity change being detected using current detection means such as photon-emitting P-N junctions, and being associated with a change in data bit memory state. | 03-05-2009 |
Michael C. Brown, Tucson, AZ US
Patent application number | Description | Published |
---|---|---|
20140198864 | POLYNOMIAL PHASES FOR MULTI-CARRIER MODULATION SCHEMES WITH TIME DOMAIN WINDOWING - In one aspect, a method includes performing a mapping on bits to form a complex data symbol, applying a frequency rotation mask to the complex data symbol based on a polynomial phase, performing an inverse discrete Fourier transform (IDFT) after applying the frequency rotation mask, applying a time domain window after performing the IDFT, converting digital data to analog data after applying the time window and transmitting the analog data as an analog signal. | 07-17-2014 |
Michael D. Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20140331738 | OPTICAL SWITCH SYSTEM FOR A PROVER - Apparatus for flow prover precisely measures the volume and the flow rate of a fluid through a cylinder. The prover includes a piston within a cylinder supporting a shaft extending longitudinally through the cylinder, which cylinder receives and discharges the fluid by translation of the piston from the fluid receiving end to the fluid discharging end. Motive means draws the shaft and piston toward the fluid receiving end of the cylinder. Travel of the piston in the direction from the fluid receiving end to the fluid discharging end of the cylinder is sensed at discrete locations to provide an indication of the volume of fluid therebetween and the related flow rate. Each of a plurality of emitter/detector modules provides piston position sensing signals reflective of the volume and rate of fluid flowing through the cylinder. A switch bar rigidly and permanently fixes the position of the emitter/detector modules with respect to the piston and with respect to one another. An immovable gate or aperture regulates the cross-section of the light beam striking the detector and ensures that the measured volume is repeatable and cannot be altered due to external factors such as in-field use, service, maintenance on components or the like. | 11-13-2014 |
Michael Dean Brown, White Hills, AZ US
Patent application number | Description | Published |
---|---|---|
20120038441 | APPARATUS FOR GENERATING A MULTI-VIBRATIONAL FIELD - An apparatus may deliver multi-vibrational electromagnetic (MVEM) fields which are independent but may work simultaneously. The MVEM fields may be used in many applications, including eliminating calcium build-up in pipes, reducing soap usage in laundry, reducing salt usage in water softeners, reducing chlorine use in pools, inhibiting algae growth, increasing water clarity, restructuring or inhibiting nitrates, restructuring or inhibiting tannins, restructuring or inhibiting calcium salts and other minerals, treating pain, treating inflammation, enhancing after-surgery healing, and improving circulation in treated areas of animals and humans. The apparatus may be formed from a plurality of wire-wrapped rods connected to a power supply. The plurality of rods may be incased in flexible foam and wrapped in a fabric outer covering. | 02-16-2012 |
20130293327 | APPARATUS FOR GENERATING A MULTI-VIBRATIONAL FIELD - An apparatus may deliver multi-vibrational electromagnetic (MVEM) fields which are independent but may work simultaneously. The MVEM fields may be used in many applications, including eliminating calcium build-up in pipes, reducing soap usage in laundry, reducing salt usage in water softeners, reducing chlorine use in pools, inhibiting algae growth, increasing water clarity, restructuring or inhibiting nitrates, restructuring or inhibiting tannins, restructuring or inhibiting calcium salts and other minerals, treating pain, treating inflammation, enhancing after-surgery healing, and improving circulation in treated areas of animals and humans. The apparatus may be formed from a plurality of wire-wrapped rods connected to a power supply. The plurality of rods may be incased in flexible foam and wrapped in a fabric outer covering. | 11-07-2013 |
Mike Brown, Phoeniz, AZ US
Patent application number | Description | Published |
---|---|---|
20090001338 | Seek-and-scan probe memory devices with nanostructures for improved bit size and resistance contrast when reading and writing to phase-change media - A seek-and-scan probe memory device comprising a patterned capping layer over a phase-change media, where the patterned capping layer defines the bit locations on the phase-change media. The patterned capping layer may be formed from self-assembled structures. In other embodiments, nanostructures are formed on the bottom electrode below the phase-change media to focus an applied electric field from the probe, so as to increase bit density and contrast. The nanostructures may be a regular or random array of nanostructures, formed by using a self-assembling material. The nanostructures may be conductive or non-conductive. Other embodiments are described and claimed. | 01-01-2009 |
Paul J. Brown, Paradise Valley, AZ US
Patent application number | Description | Published |
---|---|---|
20150323113 | Anti-Tangling Coupling Device - An anti-tangling coupling device has an inner portion which is rotatably engaged with an outer portion. Fluid containment devices such as hoses can be coupled at either end of the device. One hose is secured to the inner portion while a second hose is secured to the outer portion, with the hoses being positioned at opposite ends of each other. Fluid communication is maintained throughout the inner portion and the outer portion, allowing water to flow between hoses coupled with the device. The rotational engagement is achieved by a bearing assembly, the bearing assembly including an inner race, and outer race, and ball bearings secured in cages. The ball bearings are capable of rotational movement (imparted from contact with the first race and second race), but are prevented from translational movement by a cage. As a result the likelihood of tangling between coupled hoses is greatly reduced. | 11-12-2015 |
Richard Brown, Scottsdale, AZ US
Patent application number | Description | Published |
---|---|---|
20100150536 | Lighting system for audio visual recording booth - A system to make an audiovisual recording in a booth includes in the booth a camera mounted on the front wall, LED lighting mounted on the front wall, and a green screen extending over the back wall of the booth. | 06-17-2010 |
Richard L. Brown, Mesa, AZ US
Patent application number | Description | Published |
---|---|---|
20120065497 | Three Dimensional Minimally-Invasive Spinal Imaging System and Method - A method and system is disclosed that is operable to generate a location value associated with an implant that has been implanted in a predetermined location of a vertebra of a spine. The location value can be utilized to generate a three-dimensional animation of the spine in motion. The system includes a plurality of implants that include a controller having a memory. The implants also include a telemetry unit connected with the controller that is used to wirelessly transmit and receive data. In addition, the implants include an acoustic generator that is configured to generate an acoustic pulse in response to a signal from the controller. An external control unit is wirelessly connected with the implant for receiving various data values from the implant. | 03-15-2012 |
20140257140 | 3-DIMENSIONAL MINIMALLY INVASIVE SPINAL IMAGING SYSTEM AND METHOD - A method and system is disclosed that is operable to generate a location value associated with an implant that has been implanted in a predetermined location of a vertebra of a spine. The location value can be utilized to generate a three-dimensional animation of the spine in motion. The system includes a plurality of implants that include a controller having a memory. The implants also include a telemetry unit connected with the controller that is used to wirelessly transmit and receive data. In addition, the implants include an acoustic generator that is configured to generate an acoustic pulse in response to a signal from the controller. An external control unit is wirelessly connected with the implant for receiving various data values from the implant. | 09-11-2014 |
Richard Lee Brown, Mesa, AZ US
Patent application number | Description | Published |
---|---|---|
20100249576 | DEVICES, SYSTEMS, AND METHODS OF TRACKING ANATOMICAL FEATURES - Devices, systems, and methods of tracking one or more anatomical features of a patient are disclosed. In one embodiment, a method of tracking anatomical features of a patient includes introducing a first implantable magnetic source into a patient's body, fixedly securing the magnetic source to a first anatomical feature, and monitoring the magnetic field generated by the magnetic source with a magnetic sensing system positioned outside the patient's body in order to track a position of the magnetic source. In another embodiment, a method of tracking anatomical features of a patient includes introducing a first implantable magnetic sensor into a patient's body, fixedly securing the sensor to a first anatomical feature of the patient, and monitoring a strength of a magnetic field generated by a magnetic source positioned outside the patient's body with the sensor in order to track a position of the sensor relative to the magnetic source. | 09-30-2010 |
Robert K. Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20080292410 | METHODS AND APPARATUS FOR FOUNDATION SYSTEMS - Methods and apparatus for supporting a slab on a surface material according to various aspects of the present invention operate in conjunction with coupling a vertical support to the slab and removing a portion of the surface material from below the slab to form a void. A supplemental support is placed in the void between the surface material and the slab. The vertical support is removed from the slab. | 11-27-2008 |
20110138736 | METHODS AND APPARATUS FOR FOUNDATION SYSTEM - Methods and apparatus for foundation systems generally include a vertical support, a horizontal support configured to couple to the vertical support, and a composite material configured to couple to the horizontal support. The vertical support may be configured to resist fluctuation in soil elevation. The composite material may comprise a block material and a fibrous material. | 06-16-2011 |
Roger Wayne Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20090208588 | GERD carbohydrate compositions - In accordance with the present invention, there is to provide a dietary supplement of essential sugars that provides humans and animals with the essential carbohydrates needed to maintain proper health and to provide a healthier alternative to PPI medications for the treatment of GERD using a mixture of honey and essential sugar carbohydrates and to provide pets with an equal level of medications as that afforded to humans. | 08-20-2009 |
20090209486 | Compositions of carbohydrates as dietary supplements - In accordance with the present invention, there is to provide a dietary supplement that provides humans and animals with the essential carbohydrates needed to maintain proper health and functionality, to fend off illness, act as viral inhibitors, lessen the aging process of cells and to provide pets with another level of medications equal to that for humans. | 08-20-2009 |
20090209487 | Compositions of carbohydrates as dietary supplements - In accordance with the present invention, there is to provide a dietary supplement that provides a mammal with the essential carbohydrates needed to maintain proper health and functionality, to fend off illness, lessen the aging process of cells and to provide pets with another level of medications equal to that for humans. | 08-20-2009 |
20090209488 | Compositions for the treatment of exercise induced asthma - In accordance with the present invention, there is to provide a dietary supplement that provides a mammal with the essential carbohydrates needed to maintain proper health and functionality, to fend off illness, to provide an alternative treatment for exercise induced asthma and asthma related illnesses, to lessen the aging process of cells and to provide pets with another level of medications equal to that for humans. | 08-20-2009 |
20090209489 | Compositions for the treatment of diabetis, system PH disorders, high blood pressure, and a cancer marker system - In accordance with the present invention, there is to provide a dietary supplement that provides a mammal with the essential carbohydrates needed to maintain proper health and functionality, to fend off illness, to restore proper system pH, to provide a new treatment for pH based illnesses, to provide a new marker system for the early detection of cancer, to provide a new treatment for borderline diabetics, to provide a new treatment for high blood pressure, to lessen the aging process of cells and to provide pets with another level of medications equal to that for humans. | 08-20-2009 |
Ryan Brown, Chandler, AZ US
Patent application number | Description | Published |
---|---|---|
20100192593 | LINEAR QUADRATIC REGULATOR CONTROL FOR BLEED AIR SYSTEM FAN AIR VALVE - A system and method are provided for controlling the temperature of engine bleed air from a turbofan gas turbine engine. The system includes a fan air valve and a fan air valve controller. The fan air valve is adapted to receive a flow of fan air from a turbofan gas turbine engine intake fan. The fan air valve is coupled to receive valve position commands and is configured, in response to the valve position commands, to move to a valve position to thereby control the engine bleed air temperature. The fan air valve controller is configured to implement a linear quadratic regulator (LQR) control. The fan air valve controller is adapted to receive a plurality of sensor signals, each sensor signal representative of one or more system parameters, and is configured, in response to the sensor signals, to supply the valve position commands to the fan air valve. | 08-05-2010 |
20120025118 | BUTTERFLY VALVE PLATE SEALING ASSEMBLIES - A sealing assembly for use in a valve plate assembly includes a sealing ring and a retention spacer. The sealing ring has a radial ring section and an axial ring section, the axial ring section extends axially from the radial section and includes an outer diameter surface and a contact face, the contact face includes a contact surface and an annular slot, and the contact surface is located radially outward relative to the annular slot. The retention spacer is configured to be positioned adjacent the sealing ring | 02-02-2012 |
Sedar Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20090318786 | CHANNELED TISSUE SAMPLE PROBE METHOD AND APPARATUS - Sampling is controlled in order to enhance analyte concentration estimation derived from noninvasive sampling. More particularly, sampling is controlled using controlled fluid delivery to a region between a tip of a sample probe and a tissue measurement site. The controlled fluid delivery enhances coverage of a skin sample site with the thin layer of fluid. Delivery of contact fluid is controlled in terms of spatial delivery, volume, thickness, distribution, temperature, and/or pressure. | 12-24-2009 |
Sedar R. Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20080319382 | METHOD AND APPARATUS FOR COUPLING A CHANNELED SAMPLE PROBE TO TISSUE - Sampling is controlled in order to enhance analyte concentration estimation derived from noninvasive sampling. More particularly, sampling is controlled using controlled fluid delivery to a region between a tip of a sample probe and a tissue measurement site. The controlled fluid delivery enhances coverage of a skin sample site with the thin layer of fluid. Delivery of contact fluid is controlled in terms of spatial delivery, volume, thickness, distribution, temperature, and/or pressure. | 12-25-2008 |
Stephen T. Brown, Lake Havasu, AZ US
Patent application number | Description | Published |
---|---|---|
20140209744 | Box Structures for Carrying Loads and Methods of Making the Same - There is provided a box structure for carrying load having upper and lower composite integrated sandwich panels. The panels have facesheets sandwiching one or more core portions and adjacent dense packs oriented in an axial direction. The box structure further has a plurality of spars. Each spar has a web and web attachments and has a spar length in the axial direction. The plurality of spars are connected to the panels with the web attachments located at the dense packs. The facesheets are configured to carry primarily torsion and pressure loads in shear and no significant axial loads. The dense packs are configured to carry all significant box bending in axial tension and compression loads. | 07-31-2014 |
20150195947 | Translating Equipment Rack System - An apparatus and method comprising a rack and a translation mechanism. The rack may be configured to hold components. The rack may comprise movable rack segments that are movable independently of each other. The translation mechanism may be configured to move a portion of the movable rack segments relative to another portion of the movable rack segments inside a platform such that internal access to at least a portion of the components is provided inside the platform. | 07-09-2015 |
Steve Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20140380403 | SECURE ACCESS ENFORCEMENT PROXY - Efficient architecture for a secure access enforcement proxy is described. The proxy interfaces with multiple subsystems and multiple shared resources. The proxy identifies an original transaction command being sent from one of the subsystems to one of the shared resources, identifies a policy corresponding to the subsystem, performs an action pertaining to the original transaction command based on the policy, and sends a response to the subsystem based on the action. | 12-25-2014 |
Steve J. Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20090323971 | Protecting independent vendor encryption keys with a common primary encryption key - Apparatus, systems and methods for protection of independent vendor encryption keys with a common primary encryption key are disclosed including an apparatus including memory to store a plurality of encrypted vendor keys, memory to store a primary key; and cipher logic to use the primary key to decrypt an encrypted vendor key of the plurality of encrypted vendor keys to provide an effective key. Other implementations are disclosed. | 12-31-2009 |
20100088288 | Apparatus and Method for Resolving Security Association Database Update Coherency in High-Speed Systems Having Multiple Security Channels - An apparatus and method for updating security association database entries in a system having multiple security channels by selectively granting access to the entries by a plurality of the multiple security channels that may need to update the same entry using a first-come, first-served scheme. The apparatus includes a controller circuit that functions to carry out the method which, for each of the multiple security channels, includes determining whether another of the security channels has a higher priority to access a particular security association database entry. If no other channel has a higher priority, then the channel requesting access to the entry retrieves it from its address location, modifies it, and writes the modified entry back to its address location. The controller prevents other channels from simultaneously, or substantially simultaneously, retrieving and modifying the same entry. | 04-08-2010 |
20110119305 | Apparatus and Method for Resolving Security Association Database Update Coherency in High-Speed Systems Having Multiple Security Channels - An apparatus and method for updating security association database entries in a system having multiple security channels by selectively granting access to the entries by a plurality of the multiple security channels that may need to update the same entry using a first-come, first-served scheme. The apparatus includes a controller circuit that functions to carry out the method which, for each of the multiple security channels, includes determining whether another of the security channels has a higher priority to access a particular security association database entry. If no other channel has a higher priority, then the channel requesting access to the entry retrieves it from its address location, modifies it, and writes the modified entry back to its address location. The controller prevents other channels from simultaneously, or substantially simultaneously, retrieving and modifying the same entry. | 05-19-2011 |
20140254233 | Redundant Fuse Coding - In accordance with some embodiments, fuse information may be written into a fuse array in a way that provides sufficient redundancy, making it harder for malicious parties to attack the fuse array. | 09-11-2014 |
Steve J. Brown, Chandler, AZ US
Patent application number | Description | Published |
---|---|---|
20130080764 | Secure Remote Credential Provisioning - An embodiment uses hardware secrets secured within a security engine to provide a secure solution for field key provisioning. An embodiment is operating system independent due to the out-of-band communications with the security engine. Secrets need not be provisioned during manufacturing time. An embodiment may ensure only security engine specific provisioned secrets are used at runtime. Other embodiments are addressed herein. | 03-28-2013 |
Steven J. Brown, Phoenix, AZ US
Patent application number | Description | Published |
---|---|---|
20140082724 | METHODS AND APPARATUS TO PROTECT MEMORY REGIONS DURING LOW-POWER STATES - A disclosed example method involves when transitioning a processor system to a low-power mode, generating at least a first signature based on a data structure storing memory addresses of memory regions to be protected during the low-power mode. During a resume process of the processor system from the low-power mode, at least a second signature is generated based on the data structure storing the memory addresses of the memory regions to be protected during the low-power mode. When the first signature matches the second signature, the processor system resumes from the low-power mode. When the first signature does not match the second signature, an error is generated. | 03-20-2014 |
20150178500 | METHODS AND APPARATUS TO PROTECT MEMORY REGIONS DURING LOW-POWER STATES - A disclosed example method involves configuring a processor to, when transitioning the processor system to a low-power mode, use a key and a random or pseudo-random value to generate a first signature based on a sample of memory regions to be protected during the low-power mode, the memory regions based on a manufacturer required regions table and a third-party required regions table. The disclosed example method also involves configuring a processor to, during a resume process of the processor system from the low-power mode, generate a second signature based on the sample of the memory regions protected during the low-power mode. The disclosed example method also involves configuring a processor to, when the first signature matches the second signature, cause the processor system to resume from the low-power mode, and when the first signature does not match the second signature, generate an error. | 06-25-2015 |
Suzanne Brown, Tucson, AZ US
Patent application number | Description | Published |
---|---|---|
20100308031 | Apparatus and Method for Producing Transformation of A Three Dimensional Object - A new and useful apparatus and method is provided for producing transformation of a three dimensional object, e.g. a child's craft object, by application of heat to the object. The object is preferably a non edible, transformable product configured to change state and/or appearance when heated. | 12-09-2010 |
Theresa M. Brown, Tucson, AZ US
Patent application number | Description | Published |
---|---|---|
20100179831 | UNIVERSAL PERSONAL MEDICAL DATABASE ACCESS CONTROL - Various embodiments for configuring a medical database by a processor in communication with at least one storage device in a computing environment are provided. Medical data are assigned to a patient. A plurality of data types is organized for the medical data. Portions of each of the plurality of data types are designated as public and private data. A plurality of access levels is organized for the medical data. Each of the plurality of data types includes the plurality of access levels. A first access level of the plurality of access levels corresponds to the patient. The medical data is classified according to the plurality of data types, for each of the plurality of data types, according to the plurality of access levels, and according to one of the public and the private data. The medical data is encrypted in a hierarchical structure corresponding to each of the plurality of access levels. | 07-15-2010 |
20120089795 | MULTIPLE INCREMENTAL VIRTUAL COPIES - Provided are techniques for, in response to establishing each incremental virtual copy from a source to a target, creating a target change recording structure for the target. While performing destage to a source data block at the source, it is determined that there is at least one incremental virtual copy target for this source data block. For each incremental virtual copy relationship where the source data block is newer than the incremental virtual copy relationship and an indicator is set in a target inheritance structure on the target for a corresponding target data block, the source data block is copied to each corresponding target data block, and an indicator is set in each target change recording structure on each target for the target data block corresponding to the source data block being destaged. | 04-12-2012 |
20120191930 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 07-26-2012 |
20120198150 | ASSIGNING DEVICE ADAPTORS AND BACKGROUND TASKS TO USE TO COPY SOURCE EXTENTS TO TARGET EXTENTS IN A COPY RELATIONSHIP - Provided are a computer program product, system, and method for assigning device adaptors and background tasks to use to copy source extents to target extents in a copy relationship. A relation is provided of a plurality of source extents in source ranks to copy to a plurality of target extents in target ranks in the storage system. One target rank in the relation is used to determine an order in which the target ranks in the relation are selected to register for copying. For each selected target rank in the relation selected according to the determined order, an iteration of a registration operation is performed to register the selected target rank and a selected source rank copied to the selected target rank in the relation. The registration operation comprises indicating in a device adaptor assignment data structure a source device adaptor and target device adaptor to use to copy the selected rank to the selected target rank and adding an entry to a priority queue for the relation for the selected target rank. The selected source rank is copied to the selected target rank using as the source and target device adaptors indicated in the device adaptor assignment data structure for the selected target rank in response to processing the entry in the priority queue added to the priority queue for the selected target rank. | 08-02-2012 |
20120216009 | SOURCE-TARGET RELATIONS MAPPING - A data preservation function is provided which, in one embodiment, includes mapping in a plurality of maps for a target storage device, map extent ranges of each map, to corresponding target extent ranges of storage locations on the target storage device. Usage of a particular map extent range by a relationship between a source extent range of storage locations on a source storage device containing data to be preserved in the source extent range, and the target extent range mapped to the map particular extent range, may be indicated by the map. In another aspect, in response to receipt of a data preservation command, a data preservation operation is performed including determining whether a map indicates availability of a map extent range mapped to the identified target extent range. Upon determining that a particular map indicates availability of a map extent range mapped to the identified target extent range, a relationship between the identified source extent range and the identified target extent range is established. In yet another aspect, upon determining that no map indicates availability of a map extent range mapped to the identified target extent range, establishing of a relationship between the identified source extent range and the identified target extent range may be delayed until it is determined that a particular map indicates availability of a map extent range mapped to the identified target extent range. Other features and aspects may be realized, depending upon the particular application. | 08-23-2012 |
20120221823 | MULTIPLE INCREMENTAL VIRTUAL COPIES - Provided are techniques for, in response to establishing each incremental virtual copy from a source to a target, creating a target change recording structure for the target. While performing destage to a source data block at the source, it is determined that there is at least one incremental virtual copy target for this source data block. For each incremental virtual copy relationship where the source data block is newer than the incremental virtual copy relationship and an indicator is set in a target inheritance structure on the target for a corresponding target data block, the source data block is copied to each corresponding target data block, and an indicator is set in each target change recording structure on each target for the target data block corresponding to the source data block being destaged. | 08-30-2012 |
20120233121 | DELETING RELATIONS BETWEEN SOURCES AND SPACE-EFFICIENT TARGETS IN MULTI-TARGET ARCHITECTURES - A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple space-efficient (SE) targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A space-efficient (SE) target associated with the relation is then identified. A mapping structure maps data in logical tracks of the SE target to physical tracks of a repository. The method then identifies a sibling SE target that inherits data from the SE target. Once the SE target and the sibling SE target are identified, the method modifies the mapping structure to map the data in the physical tracks of the repository to the logical tracks of the sibling SE target. The relation is then deleted between the source and the SE target. A corresponding computer program product is also described herein. | 09-13-2012 |
20120233136 | DELETING RELATIONS BETWEEN SOURCES AND SPACE-EFFICIENT TARGETS IN MULTI-TARGET ARCHITECTURES - A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple space-efficient (SE) targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A space-efficient (SE) target associated with the relation is then identified. A mapping structure maps data in logical tracks of the SE target to physical tracks of a repository. The method then identifies a sibling SE target that inherits data from the SE target. Once the SE target and the sibling SE target are identified, the method modifies the mapping structure to map the data in the physical tracks of the repository to the logical tracks of the sibling SE target. The relation is then deleted between the source and the SE target. | 09-13-2012 |
20120233404 | DELETING RELATIONS IN MULTI-TARGET, POINT-IN-TIME-COPY ARCHITECTURES WITH DATA DEDUPLICATION - A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A target associated with the relation is then identified. The method then identifies a sibling target that inherits data from the target. Once the target and the sibling target are identified, the method copies the data from the target to the sibling target. The relation between the source and the target is then deleted. A corresponding computer program product is also disclosed and claimed herein. | 09-13-2012 |
20120233416 | MULTI-TARGET, POINT-IN-TIME-COPY ARCHITECTURE WITH DATA DEDUPLICATION - A method for performing a write to a source volume in a multi-target architecture is described. The multi-target architecture includes a source volume and multiple target volumes mapped thereto. In one embodiment, such a method includes copying data in a track of the source volume to a corresponding track of a target volume (target x). The method enables one or more sibling target volumes (siblings) mapped to the source volume to inherit the data from the target x. When the data is successfully copied to the target x, the method performs a write to the track of the source volume. Other methods for reading and writing data to volumes in the multi-target architecture are also described. | 09-13-2012 |
20120233421 | CYCLIC POINT-IN-TIME-COPY ARCHITECTURE WITH DATA DEDUPLICATION - A method for performing a write to a volume x in a cyclic point-in-time-copy architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume. The method then determines whether the target bit maps (TBMs) of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Once the HS volume is found, the method determines whether the HS volume and the child volume are the same volume. If the HS volume and the child volume are not the same volume, the method copies the data from the HS volume to the child volume. The method then performs the write to the volume x. | 09-13-2012 |
20120233422 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 09-13-2012 |
20120233429 | CASCADED, POINT-IN-TIME-COPY ARCHITECTURE WITH DATA DEDUPLICATION - A method for performing a write to a volume x in a cascaded architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume, wherein each of the volume x and the child volume have a target bit map (TBM) associated therewith. The method then determines whether the TBMs of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Finding the HS volume includes travelling up the cascaded architecture until the source of the data is found. Once the HS volume is found, the method copies the data from the HS volume to the child volume and performs the write to the volume x. A method for performing a read is also disclosed herein. | 09-13-2012 |
20120233430 | CYCLIC POINT-IN-TIME-COPY ARCHITECTURE WITH DATA DEDUPLICATION - A method for performing a write to a volume x in a cyclic point-in-time-copy architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume. The method then determines whether the target bit maps (TBMs) of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Once the HS volume is found, the method determines whether the HS volume and the child volume are the same volume. If the HS volume and the child volume are not the same volume, the method copies the data from the HS volume to the child volume. The method then performs the write to the volume x. A corresponding computer program product is also described. | 09-13-2012 |
20120254122 | NEAR CONTINUOUS SPACE-EFFICIENT DATA PROTECTION - A method for providing rolling continuous data protection of source data is disclosed. In one embodiment, such a method includes enabling a user to select source data and establish a first interval when point-in-time copies of the source data are generated. The method further enables the user to specify a first number of point-in-time copies to retain at the first interval. The method further enables the user to specify a second number of point-in-time copies to retain at a second interval, wherein the second interval is a (n≧2) multiple of the first interval. The method further enables the user to specify a third number of point-in-time copies to retain at a third interval, wherein the third interval is a (n≧2) multiple of the second interval. A corresponding apparatus and computer program product are also disclosed. | 10-04-2012 |
20120254547 | MANAGING METADATA FOR DATA IN A COPY RELATIONSHIP - Provided are a computer program product, system, and method for managing metadata for data in a copy relationship copied from a source storage to a target storage. Information is maintained on a copy relationship of source data in the source storage and target data in the target storage. The source data is copied from the source storage to the cache to copy to target data in the target storage indicated in the copy relationship. Target metadata is generated for the target data comprising the source data copied to the cache. An access request to requested target data comprising the target data in the cache is processed and access is provided to the requested target data in the cache. A determination is made as to whether the requested target data in the cache has been destaged to the target storage. The target metadata for the requested target data in the target storage is discarded in response to determining that the requested target data in the cache has not been destaged to the target storage. | 10-04-2012 |
20130080704 | MANAGEMENT OF POINT-IN-TIME COPY RELATIONSHIP FOR EXTENT SPACE EFFICIENT VOLUMES - A storage controller receives a request to establish a point-in-time copy operation by placing a space efficient source volume in a point-in-time copy relationship with a space efficient target volume, wherein subsequent to being established the point-in-time copy operation is configurable to consistently copy the space efficient source volume to the space efficient target volume at a point in time. A determination is made as to whether any track of an extent is staging into a cache from the space efficient target volume or destaging from the cache to the space efficient target volume. In response to a determination that at least one track of the extent is staging into the cache from the space efficient target volume or destaging from the cache to the space efficient target volume, release of the extent from the space efficient target volume is avoided. | 03-28-2013 |
20130145100 | MANAGING METADATA FOR DATA IN A COPY RELATIONSHIP - Provided is a method for managing metadata for data in a copy relationship copied from a source storage to a target storage. Information is maintained on a copy relationship of source data in the source storage and target data in the target storage. The source data is copied from the source storage to the cache to copy to target data in the target storage indicated in the copy relationship. Target metadata is generated for the target data comprising the source data copied to the cache. An access request to requested target data comprising the target data in the cache is processed and access is provided to the requested target data in the cache. The target metadata for the requested target data in the target storage is discarded in response to determining that the requested target data in the cache has not been destaged to the target storage. | 06-06-2013 |
20130173878 | SOURCE-TARGET RELATIONS MAPPING - A data preservation function is provided which, in one embodiment, includes indicating by a map, usage of a particular map extent range by a relationship between a source extent range of storage locations on a source storage device containing data to be preserved in the source extent range, and a target extent range mapped to the map particular extent range. In another aspect, in response to receipt of a data preservation command, a data preservation operation is performed including determining whether a map indicates availability of a map extent range mapped to the identified target extent range. Upon determining that a particular map indicates availability of a map extent range mapped to the identified target extent range, a relationship between the identified source extent range and the identified target extent range is established. Other features and aspects may be realized, depending upon the particular application. | 07-04-2013 |
20130204854 | EFFICIENT METADATA INVALIDATION FOR TARGET CKD VOLUMES - A method for invalidating metadata associated with a target count-key-data (CKD) volume is disclosed. The method initially receives a command for a target CKD volume. The command is either an “establish” command for establishing a point-in-time copy relationship, or a “withdraw” command for withdrawing a point-in-time copy relationship. The method determines a track range, spanning a number of data tracks in the CKD volume, associated with the command. Each data track in the track range is associated with a metadata track. For each metadata track whose associated data tracks are fully contained in the track range, the method performs a first procedure. For each metadata track whose associated data tracks are not fully contained in the track range, the method performs a second procedure different from the first procedure. A corresponding apparatus and computer program product are also disclosed. | 08-08-2013 |
20130205093 | MANAGEMENT OF POINT-IN-TIME COPY RELATIONSHIP FOR EXTENT SPACE EFFICIENT VOLUMES - A storage controller receives a request to establish a point-in-time copy operation by placing a space efficient source volume in a point-in-time copy relationship with a space efficient target volume, wherein subsequent to being established the point-in-time copy operation is configurable to consistently copy the space efficient source volume to the space efficient target volume at a point in time. A determination is made as to whether any track of an extent is staging into a cache from the space efficient target volume or destaging from the cache to the space efficient target volume. In response to a determination that at least one track of the extent is staging into the cache from the space efficient target volume or destaging from the cache to the space efficient target volume, release of the extent from the space efficient target volume is avoided. | 08-08-2013 |
20140059309 | MULTI-VOLUME INSTANT VIRTUAL COPY FREEZE - Provided are a computer implemented method, computer program product, and system for creating a consistency group. For each source volume that has an instant virtual copy relationship with a target volume, an indicator for the source volume is set to true in a Fast Incremental with Freeze (FIF) map. The consistency group for each source volume whose indicator is set to true in the FIF map and each associated target volume is created by: performing a quick Instant Virtual Copy (IVC) freeze command to freeze each source volume whose indicator is set to true in the FIF map and performing a consistency group created command to thaw each source volume whose indicator is set to true in the FIF map. | 02-27-2014 |
20140108345 | EXCHANGING LOCATIONS OF AN OUT OF SYNCHRONIZATION INDICATOR AND A CHANGE RECORDING INDICATOR VIA POINTERS - A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores indications of new host writes, subsequent to starting a point in time copy operation to form the consistency group. Locations of the first data structure and the second data structure are exchanged, subsequent to the consistency group being formed successfully. | 04-17-2014 |
20140108349 | MERGING AN OUT OF SYNCHRONIZATION INDICATOR AND A CHANGE RECORDING INDICATOR IN RESPONSE TO A FAILURE IN CONSISTENCY GROUP FORMATION - A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores indications of new host writes subsequent to starting a point in time copy operation to form the consistency group. Read access is secured to a metadata storage area and a determination is made as to whether the second data structure indicates that there are any new host writes. In response to determining that the second data structure indicates that there are new host writes, write access is secured to the metadata storage area, the first data structure is updated with contents of the second data structure to determine which additional storage locations need to be copied for formation of a next consistency group, and the second data structure is updated to indicate that that the second data structure is in an initialized state. | 04-17-2014 |
20140108680 | QUIESCING INPUT/OUTPUT (I/O) REQUESTS TO SUBSETS OF LOGICAL ADDRESSES IN A STORAGE FOR A REQUESTED OPERATION - Provided are a computer program product, system, and method for quiescing Input/Output (I/O) requests to subsets of logical addresses in a storage for a requested operation. A requested operation is received to a subset of addresses in the storage that requires that Input/Output (I/O) requests to the subset of addresses received following the requested operation be quiesced. The subset of addresses is indicated in quiesce information. I/O requests received following the receiving of the requested operation are quiesced when one address subject to the I/O request is included in the subset of addresses. If there are in-progress I/O requests pending against the subset of addresses when the requested operation was received, then the requested operation is indicated as executable. A quiesced I/O request is executed when no address subject to the quiesced I/O request is included in the subset of addresses indicated in the quiesce information. | 04-17-2014 |
20140108750 | ESTABLISHING A POINT-IN-TIME COPY RELATIONSHIP BETWEEN SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for establishing a point-in-time copy relationship between source logical addresses and target logical addresses. A point-in-time (PiT) copy establish command specifies a source set comprising a subset of source logical addresses in at least one storage and a target set comprising a subset of target logical addresses in the at least one storage. The source set of source logical addresses are copied to the target set of target logical addresses. The source logical addresses map to source tracks and wherein the target logical addresses map to target tracks. Copy information is generated indicating whether the source logical addresses in the source set have been copied to the target set. Complete is returned to the PiT copy establish command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108751 | PROCESSING A COPY COMMAND DIRECTED TO A FIRST STORAGE ARCHITECTURE FOR DATA THAT IS STORED IN A SECOND STORAGE ARCHITECTURE - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108752 | MANAGING UPDATES AND COPYING DATA IN A POINT-IN-TIME COPY RELATIONSHIP EXPRESSED AS SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses. A copy relationship indicates a source set of a subset of source logical addresses to copy to a target set comprising a subset of target logical addresses. An update is received to a source logical address that has not been copied. Determinations are made of the target logical address corresponding to the source logical address to be updated according to the copy relationship, a target group of target logical addresses in the target set that include the determined target logical address, and the source logical addresses in the source set that correspond to the target logical addresses in the target group. The determined source logical addresses are copied to the target logical addresses in the determined target group. | 04-17-2014 |
20140108753 | MERGING AN OUT OF SYNCHRONIZATION INDICATOR AND A CHANGE RECORDING INDICATOR IN RESPONSE TO A FAILURE IN CONSISTENCY GROUP FORMATION - A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores indications of new host writes subsequent to starting a point in time copy operation to form the consistency group. Read access is secured to a metadata storage area and a determination is made as to whether the second data structure indicates that there are any new host writes. In response to determining that the second data structure indicates that there are new host writes, write access is secured to the metadata storage area, the first data structure is updated with contents of the second data structure to determine which additional storage locations need to be copied for formation of a next consistency group, and the second data structure is updated to indicate that that the second data structure is in an initialized state. | 04-17-2014 |
20140108756 | BITMAP SELECTION FOR REMOTE COPYING OF UPDATES - In one embodiment of the present description, a copy relationship is established between a storage location at a first site and a storage location at a second site in a data storage system, wherein a dynamically assignable bitmap preset to one of a plurality of different predetermined bit patterns is selected as a function of both the availability of the selected bitmap and the type of predetermined bit pattern identified for the selected bitmap. The selected bitmap may be assigned as an out-of-sync bitmap wherein updates to the storage location at one site, which are to be copied to the storage location at the other site, are indicated in the selected bitmap, and data writes being written to the storage location at the one site, are copied to the storage location at the other site, using the selected bitmap as an out-of-sync bitmap. Other aspects are described. | 04-17-2014 |
20140108757 | PROCESSING A COPY COMMAND DIRECTED TO A FIRST STORAGE ARCHITECTURE FOR DATA THAT IS STORED IN A SECOND STORAGE ARCHITECTURE - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108857 | BITMAP SELECTION FOR REMOTE COPYING OF UPDATES - In one embodiment of the present description, a copy relationship is established between a storage location at a first site and a storage location at a second site in a data storage system, wherein a dynamically assignable bitmap preset to one of a plurality of different predetermined bit patterns is selected as a function of both the availability of the selected bitmap and the type of predetermined bit pattern identified for the selected bitmap. The selected bitmap may be assigned as an out-of-sync bitmap wherein updates to the storage location at one site, which are to be copied to the storage location at the other site, are indicated in the selected bitmap, and data writes being written to the storage location at the one site, are copied to the storage location at the other site, using the selected bitmap as an out-of-sync bitmap. Other aspects are described. | 04-17-2014 |
20140223081 | POINT IN TIME COPY OPERATIONS FROM SOURCE VOLUMES TO SPACE EFFICIENT TARGET VOLUMES IN TWO STAGES VIA A NON-VOLATILE STORAGE - A request is received to perform a point in time copy operation from a source volume to a space efficient target volume. A controller copies data stored in a group of data storage units, from the source volume to a non-volatile storage, to preserve the point in time copy operation. A background process asynchronously copies the data from the non-volatile storage to the space efficient target volume to commit a physical point in time copy of the data from the source volume to the target volume. | 08-07-2014 |
20140223121 | POINT IN TIME COPY OPERATIONS FROM SOURCE VOLUMES TO SPACE EFFICIENT TARGET VOLUMES IN TWO STAGES VIA A NON-VOLATILE STORAGE - A request is received to perform a point in time copy operation from a source volume to a space efficient target volume. A controller copies data stored in a group of data storage units, from the source volume to a non-volatile storage, to preserve the point in time copy operation. A background process asynchronously copies the data from the non-volatile storage to the space efficient target volume to commit a physical point in time copy of the data from the source volume to the target volume. | 08-07-2014 |
20140344526 | METADATA MANAGEMENT - In one embodiment, a copy relationship is established between a storage location at a first site and a storage location at a second site, in a manner which includes selectively either 1) synchronously writing a modified metadata track from a cache to data storage if the metadata track in cache is a mixture of ones and zeros, before staging from data storage into the cache, the next track of the sequence of tracks of metadata, or 2) instead of synchronously writing from cache the modified metadata track, entering a journal entry to protect the modified metadata track in cache if the metadata track in cache is one of all ones and all zeros, so that asynchronous writing of the modified metadata track from cache is substituted for synchronous writing from cache. Other aspects are described. | 11-20-2014 |
20140344828 | ASSIGNING LEVELS OF POOLS OF RESOURCES TO A SUPER PROCESS HAVING SUB-PROCESSES - Provided are a computer program product, system, and method for assigning levels of pools of resources in an operating system to a super process having sub-processes. A plurality of first level pools of resources are reserved in the operating system for first level processes to perform a first level operation and invoke at least one second level process to perform a second level operation. A plurality of second level pools of resources are reserved in the operating system for second level processes. One of the second level pools of resources assigned to one of the second level processes is released and available to assign to another second level process when the second level process completes the second level operation for which it was invoked. | 11-20-2014 |
20140351533 | PARALLEL PROCESSES FOR PERFORMING MULTIPLE INCREMENTAL COPIES - A storage controller receives a write command with respect to a track, from a host. A first process determines that the track is a source track and also determines that at least one corresponding target track is in an incremental copy relation to the source track. A second process is generated to modify a target change recording structure, where the second process executes in parallel with the first process. | 11-27-2014 |
20140372718 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 12-18-2014 |
20150026423 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 01-22-2015 |
20150081628 | FLASHCOPY RESERVATION FOR FLASHCOPY ONTO A SYNCHRONOUSLY-MIRRORED SOURCE - A method, system and computer-usable medium are disclosed for improved point-in-time copying of data within an asynchronous data mirroring environment. A first establish for a first point-in-time copying process is generated, followed by submission of a request to initiate an asynchronous data mirroring process associated with the first point-in-time copying process. In response, a point-in-time establish reservation is generated for a second point-in-time copying process. If it is not possible to successfully perform the second point-in-time copying process, then the point-in-time establish reservation is cancelled and the first point-in-time copy establish is failed. Otherwise, the point-in-time establish reservation is then used to generate an establish for the second point-in-time copying process, which is then initiated. | 03-19-2015 |
20150089509 | DATA PROCESSING RESOURCE MANAGEMENT - In accordance with one aspect of the present description execution of a particular command by a data processor such as a storage controller, may include obtaining priority over a resource which is also associated with execution of another command, setting a timer for the duration of a dynamically set timeout period, and detecting a potential deadlock condition as a function of expiration of the dynamically set timeout period before execution of the particular command is completed. In one embodiment, the particular command releases priority over the resource upon detection of the potential deadlock condition, and then reobtains priority over the resource in a retry of the command. It is believed that such an arrangement can relieve a potential deadlock condition, allowing execution of one or more commands including the particular command to proceed. Other features and aspects may be realized, depending upon the particular application. | 03-26-2015 |
20150127904 | ASSIGNING DEVICE ADAPTORS TO USE TO COPY SOURCE EXTENTS TO TARGET EXTENTS IN A COPY RELATIONSHIP - Provided are a computer program product, system, and method for assigning device adaptors to use to copy source extents in source ranks to target extents in target ranks in a copy relation. A determination is made of an order of the target ranks in the copy relation. Target ranks in the copy relation are selected according to the determined order. For each selected target rank, indication is made in a device adaptor assignment data structure of a source device adaptor and target device adaptor of the device adaptors to use to copy the source rank to the selected target rank indicated in the copy relation, wherein indication is made for the selected target ranks according to the determined order. The source ranks are copied to the selected target ranks using the source and target device adaptors indicated in the device adaptor assignment data structure. | 05-07-2015 |
20150227455 | MANAGEMENT OF POINT-IN-TIME COPY RELATIONSHIP FOR EXTENT SPACE EFFICIENT VOLUMES - A storage controller receives a request to establish a point-in-time copy operation by placing a space efficient source volume in a point-in-time copy relationship with a space efficient target volume, wherein subsequent to being established the point-in-time copy operation is configurable to consistently copy the space efficient source volume to the space efficient target volume at a point in time. A determination is made as to whether any track of an extent is staging into a cache from the space efficient target volume or destaging from the cache to the space efficient target volume. In response to a determination that at least one track of the extent is staging into the cache from the space efficient target volume or destaging from the cache to the space efficient target volume, release of the extent from the space efficient target volume is avoided. | 08-13-2015 |
20150248239 | CASCADED, POINT-IN-TIME-COPY ARCHITECTURE WITH DATA DEDUPLICATION - A method for performing a write to a volume x in a cascaded architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume, wherein each of the volume x and the child volume have a target bit map (TBM) associated therewith. The method then determines whether the TBMs of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Finding the HS volume includes comparing ages of mapping relationships upstream from the volume x in order to determine a source of the data. Once the HS volume is found, the method copies the data from the HS volume to the child volume and performs the write to the volume x. A method for performing a read is also disclosed herein. | 09-03-2015 |
20150268889 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 09-24-2015 |
20150268893 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 09-24-2015 |
20150269069 | PROCESSING A POINT-IN-TIME COPY ESTABLISH COMMAND TO COPY DATA - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 09-24-2015 |
20150277798 | MANAGING UPDATES AND COPYING DATA IN A POINT-IN-TIME COPY RELATIONSHIP EXPRESSED AS SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses. A copy relationship indicates a source set of a subset of source logical addresses to copy to a target set comprising a subset of target logical addresses. An update is received to a source logical address that has not been copied. Determinations are made of the target logical address corresponding to the source logical address to be updated according to the copy relationship, a target group of target logical addresses in the target set that include the determined target logical address, and the source logical addresses in the source set that correspond to the target logical addresses in the target group. The determined source logical addresses are copied to the target logical addresses in the determined target group. | 10-01-2015 |
20150286538 | BITMAP SELECTION FOR REMOTE COPYING OF UPDATES - In one embodiment of the present description, a copy relationship is established between a storage location at a first site and a storage location at a second site in a data storage system, wherein a dynamically assignable bitmap preset to one of a plurality of different predetermined bit patterns is selected as a function of both the availability of the selected bitmap and the type of predetermined bit pattern identified for the selected bitmap. The selected bitmap may be assigned as an out-of-sync bitmap wherein updates to the storage location at one site, which are to be copied to the storage location at the other site, are indicated in the selected bitmap, and data writes being written to the storage location at the one site, are copied to the storage location at the other site, using the selected bitmap as an out-of-sync bitmap. Other aspects are described. | 10-08-2015 |
20150286545 | TERTIARY STORAGE UNIT MANAGEMENT IN BIDIRECTIONAL DATA COPYING - In one embodiment of the present description, mirroring is provided for a pair of storage units in bidirectional synchronous mirror relationships, and a tertiary storage unit. The mirroring includes multi-target mirroring to write updates written to the first storage unit to both the second storage unit and to a third storage unit. Similarly, for updates written to the second storage unit, multi-target mirroring is employed to write those to both the first storage unit and to the third storage unit. Other aspects are described. | 10-08-2015 |
20150331614 | USING QUEUES CORRESPONDING TO ATTRIBUTE VALUES ASSOCIATED WITH UNITS OF WORK AND SUB-UNITS OF THE UNIT OF WORK TO SELECT THE UNITS OF WORK AND THEIR SUB-UNITS TO PROCESS - Provided are a computer program product, system, and method for using queues corresponding to attribute values associated with units of work and sub-units of the unit of work to select the units of work and their sub-units to process. There are a plurality of work unit queues, each associated with different work unit attribute values that are associated with units of work, wherein the work unit queues include records for units of work to process having work unit attribute values associated with the work unit attribute values of the work unit queues. There are a plurality of work sub-unit queues, wherein each are associated with different work sub-unit attribute values that are associated with sub-units of work. Records are added for work sub-units of a unit of work to the work sub-unit queues, and records are selected from the work sub-unit queues to process the sub-units of work. | 11-19-2015 |
20150331710 | USING QUEUES CORRESPONDING TO ATTRIBUTE VALUES ASSOCIATED WITH UNITS OF WORK TO SELECT THE UNITS OF WORK TO PROCESS - Provided are a computer program product, system, and method for using queues corresponding to attribute values associated with units of work to select the units of work to process. A plurality of queues for each of a plurality of attribute types of attributes are associated with the units of work to process, wherein there are queues for different possible attribute values for each of the attribute types. A unit of work to process is received. A determination is made for each of the attribute types at least one of the queues corresponding to at least one attribute value for the attribute type associated with the received unit of work. A record for the received unit of work is added to each of the determined queues. | 11-19-2015 |
20150331712 | CONCURRENTLY PROCESSING PARTS OF CELLS OF A DATA STRUCTURE WITH MULTIPLE PROCESSES - Provided are a computer program product, system, and method for concurrently processing parts of cells of a data structure with multiple processes. Information is provided to indicate a partitioning of the cells of the data structure into a plurality of parts, and having a cursor pointing to a cell in the part. Processes concurrently process different parts of the data structure by performing: determining from the cursor for the part one of the cells in the part to process; processing the cells from the cursor to determine whether to process the unit of work corresponding to the cell; and setting the cursor to identify one of the cells from which processing is to continue in a subsequent iteration in response to processing the units of work for a plurality of the processed cells. | 11-19-2015 |
20150331716 | USING QUEUES CORRESPONDING TO ATTRIBUTE VALUES AND PRIORITIES ASSOCIATED WITH UNITS OF WORK AND SUB-UNITS OF THE UNIT OF WORK TO SELECT THE UNITS OF WORK AND THEIR SUB-UNITS TO PROCESS - Provided are a computer program product, system, and method for using queues corresponding to attribute values and priorities associated with units of work and sub-units of the unit of work to select the units of work and their sub-units to process. There are a plurality of work unit queues, wherein each of the work unit queues are associated with different work unit attribute values that are associated with units of work, wherein a plurality of the work unit queues include records for units of work to process having work unit attribute values associated with the work unit attribute values of the work unit queues, and wherein the work unit queues are each associated with a different priority. A record for a unit of work to perform is added to the work unit queue associated with a priority and work unit attribute value associated with the work unit. | 11-19-2015 |
20150339074 | ASSIGNING DEVICE ADAPTORS TO USE TO COPY SOURCE EXTENTS TO TARGET EXTENTS IN A COPY RELATIONSHIP - Provided are a computer program product, system, and method for assigning device adaptors to use to copy source extents in source ranks to target extents in target ranks in a copy relation. A determination is made of an order of the target ranks in the copy relation. Target ranks in the copy relation are selected according to the determined order. For each selected target rank, indication is made in a device adaptor assignment data structure of a source device adaptor and target device adaptor of the device adaptors to use to copy the source rank to the selected target rank indicated in the copy relation, wherein indication is made for the selected target ranks according to the determined order. The source ranks are copied to the selected target ranks using the source and target device adaptors indicated in the device adaptor assignment data structure. | 11-26-2015 |
20150370722 | ESTABLISHING A POINT-IN-TIME COPY RELATIONSHIP BETWEEN SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for establishing a point-in-time copy relationship between source logical addresses and target logical addresses. A point-in-time (PiT) copy establish command specifies a source set comprising a subset of source logical addresses in at least one storage and a target set comprising a subset of target logical addresses in the at least one storage. The source set of source logical addresses are copied to the target set of target logical addresses. The source logical addresses map to source tracks and wherein the target logical addresses map to target tracks. Copy information is generated indicating whether the source logical addresses in the source set have been copied to the target set. Complete is returned to the PiT copy establish command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 12-24-2015 |
20150378620 | FLASH COPY RELATIONSHIP MANAGEMENT - A method for combining storage array copy requests for a disk storage system is disclosed. The method may include receiving a BGC (background copy) request, determining that the BGC request satisfies a set of background copy (BGC) criteria, and adding, based on the determining, the BGC request to a sorted position in the wait accumulation queue (WAQ). The method may also include combining, based on a set of track combining criteria, the BGC request and an adjacent BGC request into a combined BGC request including data locations corresponding to the BGC request and to the adjacent BGC request. The method may also include replacing, in a sorted position in the WAQ, the BGC request and the adjacent BGC request with the combined BGC request, and moving, based on the set of BGC criteria, the combined BGC request to a BGC queue. | 12-31-2015 |
20150378832 | PERFORMING A REMOTE POINT-IN-TIME COPY TO A SOURCE AND TARGET STORAGES IN FURTHER MIRROR COPY RELATIONSHIPS - Provided are a computer program product, system, and method for performing a remote point-in-time copy to a source and target storages in further mirror copy relationships. Each of a plurality of source copy relationships is from the source storage to one corresponding source copy storage. Each of a plurality of target copy relationships is from the target storage to one corresponding target copy storage, where in each relationship an indicator indicates whether to use a remote first type copy operation. The first type copy operation is used to copy data from the source storage to the target storage and copy data from the source copy storage to the target copy storage for the determined source and target copy relationships having the indicator set. A second type of copy operations is used for source and target relationships not having the indicator set. | 12-31-2015 |
20160026403 | MERGING AN OUT OF SYNCHRONIZATION INDICATOR AND A CHANGE RECORDING INDICATOR IN RESPONSE TO A FAILURE IN CONSISTENCY GROUP FORMATION - A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores indications of new host writes subsequent to starting a point in time copy operation to form the consistency group. Read access is secured to a metadata storage area and a determination is made as to whether the second data structure indicates that there are any new host writes. In response to determining that the second data structure indicates that there are new host writes, write access is secured to the metadata storage area, the first data structure is updated with contents of the second data structure to determine which additional storage locations need to be copied for formation of a next consistency group, and the second data structure is updated to indicate that that the second data structure is in an initialized state. | 01-28-2016 |
20160026540 | MERGING AN OUT OF SYNCHRONIZATION INDICATOR AND A CHANGE RECORDING INDICATOR IN RESPONSE TO A FAILURE IN CONSISTENCY GROUP FORMATION - A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores indications of new host writes subsequent to starting a point in time copy operation to form the consistency group. Read access is secured to a metadata storage area and a determination is made as to whether the second data structure indicates that there are any new host writes. In response to determining that the second data structure indicates that there are new host writes, write access is secured to the metadata storage area, the first data structure is updated with contents of the second data structure to determine which additional storage locations need to be copied for formation of a next consistency group, and the second data structure is updated to indicate that that the second data structure is in an initialized state. | 01-28-2016 |
Theresa Mary Brown, Tucson, AZ US
Patent application number | Description | Published |
---|---|---|
20130212347 | MULTI-TARGET, POINT-IN-TIME-COPY ARCHITECTURE WITH DATA DEDUPLICATION - A method for performing a write to a source volume in a multi-target architecture is described. The multi-target architecture includes a source volume and multiple target volumes mapped thereto. In one embodiment, such a method includes copying data in a track of the source volume to a corresponding track of a target volume (target x). The method enables one or more sibling target volumes (siblings) mapped to the source volume to inherit the data from the target x. When the data is successfully copied to the target x, the method performs a write to the track of the source volume. Other methods for reading and writing data to volumes in the multi-target architecture are also described. | 08-15-2013 |
20130219141 | CASCADED, POINT-IN-TIME-COPY ARCHITECTURE WITH DATA DEDUPLICATION - A method for performing a write to a volume x in a cascaded architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume, wherein each of the volume x and the child volume have a target bit map (TBM) associated therewith. The method then determines whether the TBMs of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Finding the HS volume includes travelling up the cascaded architecture until the source of the data is found. Once the HS volume is found, the method copies the data from the HS volume to the child volume and performs the write to the volume x. A method for performing a read is also disclosed herein. | 08-22-2013 |
20130219142 | DELETING RELATIONS IN MULTI-TARGET, POINT-IN-TIME-COPY ARCHITECTURES WITH DATA DEDUPLICATION - A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A target associated with the relation is then identified. The method then identifies a sibling target that inherits data from the target. Once the target and the sibling target are identified, the method copies the data from the target to the sibling target. The relation between the source and the target is then deleted. A corresponding computer program product is also disclosed and claimed herein. | 08-22-2013 |
Tyler J. Brown, Flagstaff, AZ US
Patent application number | Description | Published |
---|---|---|
20150351731 | SEALING DEVICE AND DELIVERY SYSTEM - A medical device for sealing a defect in a body includes a wire frame that includes a plurality of wires that form a first occluding member and a second occluding member. In some embodiments, a sealing member is in contact with the wire frame. In some embodiments, the sealing member is configured to define one or more openings in the sealing member. | 12-10-2015 |
Wallace N. Brown, Maricope, AZ US
Patent application number | Description | Published |
---|---|---|
20140041169 | AERIAL DISPOSAL AND DISPERSAL OF CREMATED REMAINS GOING OUT WITH A BANG - An aerial disposal and dispersal of cremated remains device is presented. It is used to spread the remains of loved ones over a desired area. The device comprises a canister and a mortar, the canister being cylindrical in shape having cardboard walls, the canister further containing an igniter and burster charge in an inner cardboard tube, such inner tube being fitted with an upper cap, the mortar being cylindrical in shape with steel walls, the mortar further comprising a lifting charge which sits below an obturator disc, the obturator disc having a hole in the center, the canister fitting inside the mortar such that the canister's igniter sits atop the hole in the obturator disc. At least one device is fitted to a horizontal member to launch remains from any location. | 02-13-2014 |
Ward Brown, Chandler, AZ US
Patent application number | Description | Published |
---|---|---|
20130057330 | ENHANCED COMPLEMENTARY WAVEFORM GENERATOR - An enhanced complementary waveform generator (ECWG) generates two complementary pulse width modulation (PWM) outputs determined by rising and falling event sources. In a simple configuration of the ECWG, the rising and falling event sources are the same signal which is a PWM signal having the desired period and duty cycle. The ECWG converts this single PWM input into dual complementary PWM outputs. The frequency and duty cycle of the dual PWM outputs substantially match those of the single input PWM signal. Blanking and deadband times may be introduced between the dual complementary PWM outputs, and the dual complementary PWM outputs may also be phase delayed. | 03-07-2013 |
Ward R. Brown, Chandler, AZ US
Patent application number | Description | Published |
---|---|---|
20100148700 | Constant Current Output Sink or Source - A constant current output sink or source eliminates a current limiting series resistor for a light emitting diode (LED) and maintains a constant light intensity from the LED for all operating and manufacturing variables of a digital device since the current through the LED is maintained at a constant value. The constant current output sink or source may be programmable for selection of a constant current value from a plurality of constant current values available. | 06-17-2010 |
20110084635 | SLOW SPEED OPERATION OF BRUSHLESS DIRECT CURRENT MOTORS BY GATING PULSE WIDTH MODULATION DRIVE - Slow speed operation of a brushless DC (BLDC) motor is enhanced by gating off some of the PWM pulses in each commutation period. By doing so, longer PWM pulse widths may be used at PWM signal frequencies that are inaudible while still allowing desired slow speed operation of the BLDC motor. Centering the non-gated PWM pulses in each commutation period where peak back EMF occurs, further reduces losses and improves delivery of maximum torque from the BLDC motor. | 04-14-2011 |
20110084639 | SYNCHRONIZED MINIMUM FREQUENCY PULSE WIDTH MODULATION DRIVE FOR SENSORLESS BRUSHLESS DIRECT CURRENT MOTOR - Drive voltages to a sensorless brushless DC motor are regulated by varying the width of a single drive pulse (PWM pulse) centered in each of the commutation periods. Switching losses are thereby cut to an absolute minimum because there are only two transitions (on and off) in each drive commutation period. Back EMF zero-cross detectors determine the electrical timing relationships during each electrical cycle. Since the PWM drive pulses are always centered in each of the commutation periods, there will always be back EMF available for measurement of “zero-crossings.” A digital device controls power switching transistors to produce one single PWM pulse during each of the commutation periods. | 04-14-2011 |
20110084640 | VARIABLE PULSE WIDTH MODULATION FOR REDUCED ZERO-CROSSING GRANULARITY IN SENSORLESS BRUSHLESS DIRECT CURRENT MOTORS - Zero-crossing detection accuracy is enhanced in a sensorless brushless direct current (BLDC) motor by increasing the PWM drive frequency in anticipation of a zero-crossing event in any one or more commutation periods. Once a zero-crossing event is detected, the PWM frequency can go back to a lower normal operating frequency. Switching losses of the power drive transistors are thereby minimized while maintaining accurate zero-crossing detection for stable operation of the BLDC motor. | 04-14-2011 |
20130234623 | Constant Current Output Sink Or Source - A constant current output sink or source eliminates a current limiting series resistor for a light emitting diode (LED) and maintains a constant light intensity from the LED for all operating and manufacturing variables of a digital device since the current through the LED is maintained at a constant value. The constant current output sink or source may be programmable for selection of a constant current value from a plurality of constant current values available. | 09-12-2013 |
20140265967 | Sine Modified Trapezoidal Drive for Brushless DC Motors - A pulse width modulated (PWM) trapezoidal commutation drive to a brushless direct current (BLDC) motor is sine modified so that the applied drive voltage substantially matches the induced voltage generated in the BLDC motor. The values of the cosine of the angles between −30 degrees and +30 degrees are used to modify the duty cycle of the PWM drive signal dependent upon the rotor angular positions determined from the times between the zero crossing BEMF voltages measured at the unconnected motor terminals. | 09-18-2014 |