Clay, TX
Benjamin Franklin Clay, Houston, TX US
Patent application number | Description | Published |
---|---|---|
20130060657 | Hosting E-Commerce Based on Cloud Computing - A method of secure automated communication comprises communicating by a computer with a cloud computing service having an address in a first Internet domain, the communicating performed during a first electronic commerce session using an electronic commerce web page rendered by a browser executing on the computer; communicating by the computer with a transaction server having an address in the first Internet domain via a virtual private network (VPN), the communicating performed during the first electronic commerce session using the electronic commerce web page rendered by the browser; determining when the browser is accessing a product information portion of the electronic commerce web page during the first electronic commerce session; determining when the browser is providing confidential information to the electronic commerce web page during the first electronic commerce session; and directing the confidential information to the transaction server via the virtual private network during the first electronic commerce session. | 03-07-2013 |
James C. Clay, Cedar Park, TX US
Patent application number | Description | Published |
---|---|---|
20100205093 | METHOD AND SYSTEM FOR AN INTER-FINANCIAL INSTITUTION TRANSACTIONAL NETWORK - Systems and methods for conducting transactions across financial institutions are presented. More specifically, in one embodiment a financial transaction center may be provided such that transactions may be coordinated and controlled utilizing the financial transaction center. The financial transaction center may determine a financial institution associated received requests and issue requests to financial institutions. By coordinating the fulfillment of transactions between financial institutions through the financial transaction center a level of abstraction may be introduced whereby transactions may be conducted across financial intuitions without knowledge of host systems at the financial institutions or overly compromising the privacy or security of these host systems. | 08-12-2010 |
Joseph M. Clay, Houston, TX US
Patent application number | Description | Published |
---|---|---|
20100294921 | METHOD AND APPARATUS FOR CONVERTING OR OTHERWISE UTILIZING RADIATION PRESSURE TO GENERATE MECHANICAL WORK - A photon engine and variations thereof and methods of operating the photon engines, the photon engines comprising a primary prism and a secondary prism, the method and apparatus repeatedly imparting linear momentum to multiple reflective surfaces of the photon engine communicating with an energy system. | 11-25-2010 |
20110096384 | METHOD AND APPARATUS FOR COMMUNICATING RADIATION PRESSURE PROVIDED BY A LIGHT WAVE - In one aspect of the present invention, a method is provided for communicating radiation pressure provided by a light wave. The method entails positioning a reflective prism ( | 04-28-2011 |
Joseph Michael Clay, Houston, TX US
Patent application number | Description | Published |
---|---|---|
20140124626 | SPACE SHUTTLE PROGRAM ORBITAL VEHICLE COMPRISING A MULTIPLE PASSENGER BAY MODULE - The application provides a Space Shuttle Program (SSP) Orbital vehicle comprising a payload bay comprising a pressure vessel comprising a passenger bay module adapted to provide and maintain habitable conditions for twenty or more passengers during a mission traveling from earth to space and back to earth. | 05-08-2014 |
20140124627 | COMMERCIALLY FEASIBLE METHOD OF FLYING REPEATED ORBITAL MISSIONS USING A SPACE SHUTTLE PROGRAM ORBITAL VEHICLE - The application provides a commercially feasible method of flying repeated orbital missions using a Space Shuttle Program (SSP) Orbital Vehicle. | 05-08-2014 |
Laurence E. Clay, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20140019961 | System and Method for Automated Assignment of Virtual Machines and Physical Machines to Hosts - A system and method for reconfiguring a computing environment comprising a consumption analysis server, a placement server, an infrastructure management client and a data warehouse in communication with a set of data collection agents and a database. The consumption analysis server operates on measured resource utilization data to yield a set of resource consumptions in regularized time blocks, collects host and virtual machine configurations from the computing environment and determines available capacity for a set of target hosts. The placement server assigns a set of target virtual machines to the target set of hosts in a new placement. In one mode of operation the new placement is nearly optimal. In another mode of operation, the new placement is “good enough” to achieve a threshold score based on an objective function of resource capacity headroom. The new placement is implemented in the computing environment. | 01-16-2014 |
20140019964 | SYSTEM AND METHOD FOR AUTOMATED ASSIGNMENT OF VIRTUAL MACHINES AND PHYSICAL MACHINES TO HOSTS USING INTERVAL ANALYSIS - A system and method for reconfiguring a computing environment comprising a consumption analysis server, a placement server and a data warehouse in communication with a set of data collection agents and a database. The consumption analysis server operates on measured resource utilization data to yield a set of resource consumptions in a set of regularized time blocks in a set of sample periods, and, to group regularized time blocks across a set of sample periods to form a set of interval groups. The placement server assigns a set of target virtual machines to the target set of hosts in a new placement and scores the new placement in an effort to meet a threshold score based on an objective function of resource capacity headroom. In one aspect, the scoring relies on percentile analysis of resource consumption in the interval groups. The new placement is implemented in the computing environment. | 01-16-2014 |
20140019965 | SYSTEM AND METHOD FOR AUTOMATED ASSIGNMENT OF VIRTUAL MACHINES AND PHYSICAL MACHINES TO HOSTS WITH RIGHT-SIZING - A system and method for reconfiguring a computing environment comprising a consumption analysis server, a placement server and a data warehouse in communication with a set of data collection agents and a database. The consumption analysis server operates on measured resource utilization data to yield a set of resource consumptions in regularized time blocks, collects host and virtual machine configurations from the computing environment and determines available capacity for a set of target hosts. The placement server assigns a set of target virtual machines to the target set of hosts in a new placement that is right-sized according to a set of right-sizing constraints and rules. In one mode of operation the new placement is nearly optimal. In another mode of operation, the new placement is “good enough” to achieve a threshold score based on an objective function of capacity headroom. The new placement is implemented in the computing environment. | 01-16-2014 |
20140019966 | SYSTEM AND METHOD FOR CONTINUOUS OPTIMIZATION OF COMPUTING SYSTEMS WITH AUTOMATED ASSIGNMENT OF VIRTUAL MACHINES AND PHYSICAL MACHINES TO HOSTS - A system and method for automatically reconfiguring a computing environment comprises a consumption analysis server, a placement server, a deployment server in communication with a set of virtual machine monitors and a data warehouse in communication with a set of data collection agents, and a database. The consumption analysis server operates on measured resource utilization data in the data warehouse to yield a set of resource consumptions, available capacities and host and virtual machine configurations from the computing environment. The deployment server continuously monitors an event triggering condition and when the triggering condition is met, the placement server assigns a set of target virtual machines to a target set of hosts in a new placement and the deployment server implements the new placement through communication with the set of virtual machine monitors. The placement server right-sizes the virtual machines and the target set of hosts. | 01-16-2014 |
Matthew Clay, Fort Worth, TX US
Patent application number | Description | Published |
---|---|---|
20090183916 | SYSTEM AND METHOD FOR ENHANCED WELLBORE PERFORATIONS - A method for perforating a subterranean formation includes positioning a shaped charge and a reactant composite material in a carrier; positioning the carrier in the wellbore; detonating the shaped charge; and disintegrating the reactant composite material using a shock generated by the detonated shaped charge. The method may also include initiating a first deflagration by using carbon and heat resulting from the detonation of the shaped charge and an oxygen component of the disintegrated reactant composite material. A system for performing the method may include a carrier, a shaped charge positioned in the carrier; and a reactant composite material positioned in the carrier. The reactant composite material may be configured to disintegrate upon detonation of the shaped charge. | 07-23-2009 |
20130180701 | SYSTEM AND METHOD FOR ENHANCED WELLBORE PERFORATIONS - An apparatus for perforating a subterranean formation may include a casing, an energetic material, a liner, and an acid-generating material. The casing may have a slotted end configured to receive a detonator cord, and an open end. The energetic material may be disposed in the open end and in ballistic. The liner may enclose the open end, and the liner may include an acid-generating material that is configured to form an acid upon detonation of the explosive material. | 07-18-2013 |
Matthew Clay, Burleson, TX US
Patent application number | Description | Published |
---|---|---|
20120067578 | WELLBORE TUBULAR CUTTER - An apparatus and a method for cutting a wellbore tubular are described herein. The apparatus and the method may include an upper section and a lower section mating at a juncture plane defined by a plane transverse to the longitudinal axis of the wellbore tubular. Each section may include a support plate having a passage, a liner positioned adjacent to the support plate, and an energetic material disposed between the support plate and the liner. An initiator having a shaft may be positioned in the passages of the upper section and the lower section. | 03-22-2012 |
Matthew C. Clay, Burleson, TX US
Patent application number | Description | Published |
---|---|---|
20150285019 | DEVICES AND RELATED METHODS FOR ACTUATING WELLBORE TOOLS WITH A PRESSURIZED GAS - An apparatus for activating a wellbore tool may include a first sub having a an igniter disposed in the first chamber, the igniter generating a flame output when ignited and a power charge disposed in the second chamber, the power charge generating a high pressure gas when ignited by the flame output. The well tool also includes a gas transfer sub connectable with the first sub, the gas transfer sub having: a first end receiving a portion of the power charge, a longitudinal bore, and a plurality of flow passages radiating from the longitudinal bore, the plurality of flow passages providing fluid communication between the longitudinal bore and the second chamber of the first sub; and a second sub connectable with the gas transfer sub. The second sub may include a shaft having a first end connectable with the gas transfer sub, the shaft including: a passage in fluid communication with the longitudinal bore of the gas transfer sub and a face, and a piston positioned adjacent to the face, wherein a pressure chamber is formed between the shaft face and the piston is in fluid communication with the passage of the shaft. | 10-08-2015 |
Matthew M. Clay, Fort Worth, TX US
Patent application number | Description | Published |
---|---|---|
20140123841 | BI-DIRECTIONAL SHAPED CHARGES FOR PERFORATING A WELLBORE - A shaped charge assembly for perforating a wellbore tubular and a subterranean formation intersected by a wellbore may include a first shaped charge and a second shaped charge disposed on an outer surface of the wellbore tubular. The first shaped charge points radially outward toward the formation, and the second shaped charge points radially inward toward the wellbore tubular. | 05-08-2014 |
Michael T. Clay, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20100217999 | METHOD AND SYSTEM FOR SECURE AUTHENTICATION - A system and method configured to provide secure Personal Identification Number (PIN) based authentication is disclosed. A passcode or PIN associated with a customer value card can be securely authenticated by an issuer prior to authorizing payment. An Access Control Server (ACS) can receive the PIN or passcode from a customer via a secure connection over a public network. The ACS can generate an encrypted PIN and can communicate the encrypted PIN to a remote issuer for authentication. The ACS can use one or more hardware security modules to generate the encrypted PIN. The hardware security modules can be emulated in software or implemented in hardware. The system can be configured such that the PIN is not exposed in an unencrypted form in a communication link or in hardware other than the originating customer terminal. | 08-26-2010 |
Michael Taylor Clay, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20130091192 | ASYNCHRONOUS MESSAGING BUS - Techniques for event message processing are presented. Embodiments may receive an event message from a first capability. The event message may include a header and a payload. Embodiments may then parse the header of the event message to identify a topic of the event message. Embodiments also identify a tenant identifier associated with the event message. Using the topic and the tenant identifier, embodiments may determine that a second capability is to receive the event message. Accordingly, embodiments send the event message to the second capability. | 04-11-2013 |
20150347207 | ASYNCHRONOUS MESSAGING BUS - Techniques for event message processing are presented. Embodiments may receive an event message from a first capability. The event message may include a header and a payload. Embodiments may then parse the header of the event message to identify a topic of the event message. Embodiments also identify a tenant identifier associated with the event message. Using the topic and the tenant identifier, embodiments may determine that a second capability is to receive the event message. Accordingly, embodiments send the event message to the second capability. | 12-03-2015 |
Patrick Clay, Frisco, TX US
Patent application number | Description | Published |
---|---|---|
20150355787 | DYNAMICALLY EXECUTING MULTI-DEVICE COMMANDS ON A DISTRIBUTED CONTROL - A system and method for sending of data to a specified device without needing to preprogram a dedicated key of a human interface device. One embodiment provides for selection of a display where the display does not need to be programmed ahead of time. A user interface (UI) which allows the user to select the display is arranged in a similar configuration as the configuration of the physical display. In some embodiments, a method using another human interface device may be used. One embodiment may include the sending of data to a server, or first device, by means of a companion device, or second device. One embodiment provides for the sending of data to specific output devices for printing or manufacturing. | 12-10-2015 |
20150358203 | PROXIMITY BASED CROSS-SCREEN EXPERIENCE APP FRAMEWORK FOR USE BETWEEN AN INDUSTRIAL AUTOMATION CONSOLE SERVER AND SMART MOBILE DEVICES - A system and method for a Graphic User Interface used as the human machine interface (HMI) for Industrial Automation (IA) systems. The system and method use a peer-to-peer session framework between a console with one or more physically connected displays within a control room environment and a companion device. One or more embodiments of the disclosure relate to control of a console, or first device, in a control room by means of a companion device, or second device, through a peer to peer session framework. The use of the second device may provide additional capabilities beyond the pre-purposed capability provided by a dedicated Operator keyboard of the console server. | 12-10-2015 |
Steven D. Clay, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20110282894 | System and Method for Remote File Search Integrated with Network Installable File System - A remote file system application program interface (API) for a remote file system installable file system (IFS) and operating system file system. The remote file system API enables a file content searching program that performs a search on a mapped remote drive to pass the file system path to search and the search criteria regular expression pattern to the remote system for searching and the results are returned to the client system in an IO stream. Such an application program interface is useful in the area of network file systems, network mapped drives, and file content searching programs such as a global regular expression processor (grep). | 11-17-2011 |
Steven D. Clay, Pflugerville, TX US
Patent application number | Description | Published |
---|---|---|
20090031019 | Technique for Graphically Displaying Application Processing Time Distributions in Real-Time - A technique for displaying application processing times includes monitoring incoming packets and outgoing packets as the incoming packets enter and the outgoing packets exit a time critical application. The incoming packets and the outgoing packets are correlated to determine application processing times for the time critical application. Finally, application processing time distributions for a desired time period are graphically displayed for the application processing times. | 01-29-2009 |
20110004735 | METHOD AND APPARATUS FOR TWO-PHASE STORAGE-AWARE PLACEMENT OF VIRTUAL MACHINES - Techniques for placement of a virtual machine in a computing system. A first request is sent from a pool management subsystem to a placement subsystem. The first request includes specification of available storage capacities of storage systems in a computer network. The placement subsystem automatically determines a target storage system based, at least in part, on the available storage capacities. An identification of the target storage system is received at the pool management subsystem. At least one disk image of the virtual machine is written to the target storage system. Then, a second request is sent to the placement subsystem. The placement subsystem automatically determines a target computer. The latter determination is based, at least in part, on connectivity between the target computer and the target storage system. The virtual machine is installed at the target computer. The techniques facilitate live migration of virtual machines placed thereby. | 01-06-2011 |
20130304923 | ALLOCATION AND RESERVATION OF VIRTUALIZATION-BASED RESOURCES - According to one aspect of the present disclosure a method and technique for allocating and reserving virtualization-based resources is disclosed. The method includes: receiving, by a virtualization-based resource management system, a reservation request to reserve a set of computing resources; dynamically allocating the set of computing resources to the reservation request; assigning a key to the allocated set of computing resources; and maintaining the allocated set of computing resources in a reserved state until a utilization request is received to utilize the allocated set of computing resources, the utilization request including the key. | 11-14-2013 |
20140379796 | MANAGING PAST ACTIVITIES BASED ON RELATIONSHIP CHANGES IN A SOCIAL NETWORK - Various embodiments provide for dynamically and automatically managing activities of two parties (e.g., friends, business associates, family members) based on a change in relationship (e.g., no longer friends, break-up, divorce, no longer working together) between the two parties in a network (e.g., a social network implemented using a social networking website). In one specific example, mechanisms are provided for dynamically and automatically adjusting privacy control (e.g. removing, hiding, scraping, deleting, obscuring) of past activity data (e.g. social network wall posts, social network wall re-posts, pictures, forum posts, blog posts, blog comments, documents, files, videos, tags etc.) of the two parties upon detecting a change in relationship between the two parties in the social network. | 12-25-2014 |
Steven D. Clay, Round Rock, TX US
Patent application number | Description | Published |
---|---|---|
20150381487 | CLOUD-BASED ANONYMOUS ROUTING - A system and computer-implemented method for cloud-based anonymous traffic routing is disclosed. The method may include receiving, from a client application by a router, network traffic identified for a destination. The method may include determining, for a set of internal cloud nodes distinct from both the client application and the destination, a set of internet protocol (IP) addresses including a first IP address for a first internal cloud node of the set of internal cloud nodes. The method may also include establishing an anonymity algorithm for cloud-based anonymous traffic routing, the anonymity algorithm configured to use the set of IP addresses. The method may also include routing, based on the anonymity algorithm, the network traffic to the first internal cloud node using the first IP address. The method may also include routing the network traffic from the set of internal cloud nodes to the destination identified by the client application. | 12-31-2015 |
Steven Duane Clay, Round Rock, TX US
Patent application number | Description | Published |
---|---|---|
20140007249 | Privacy Control in a Social Network | 01-02-2014 |
Steven Duane Clay, Pflugerville, TX US
Patent application number | Description | Published |
---|---|---|
20080229129 | Remote Control Save and Sleep Override - An approach is provided that handles a power down signal received by a device. Other types of signals, such as suspend or save and sleep, may also be handled. A device, such as a parent device, sends a power down signal to another device, such as a child device. The power down signal is received by the child device and acted upon, based on the activities currently being executed by the child device. Each activity currently being executed by the child device is handled according to its corresponding setting in an activity list. For example, if the child device is currently executing a preferred activity, the power down signal is ignored. A user of the child device may also send an explanation (or explanations) to the parent device. | 09-18-2008 |
20140007255 | Privacy Control in a Social Network | 01-02-2014 |