Patent application number | Description | Published |
20130152779 | SHAFT ARRANGEMENT FOR AN AXIAL PISTON PUMP ASSEMBLY - A shaft arrangement for an axial piston pump assembly to couple to a rotatable member such as a gear therewith. A shaft extends at least partially through a housing chamber of the pump about a longitudinal axis. Reciprocating pistons are disposed within the chamber radially about the shaft. A cam unit is fitted over the shaft and provides an angled camming surface to engage the pistons. Bearing assemblies are fitted over the cam unit. An adapter can be fitted over the proximal end of the cam unit. The adapter has a distal surface which may abut the bearing assembly and be axially spaced from the cam unit, and an outer radial surface to engage the rotatable member. A clamping device provides a desired clamp load path between the rotatable member, the adapter, the cam unit, the bearing assemblies and the shaft. | 06-20-2013 |
20140334947 | FLUID PUMP SYSTEM - A fluid pump system for a fluid delivery system is disclosed. The fluid pump system includes a drive cylinder and a drive piston slidably disposed in the drive cylinder. A drive rod including a crowned end is connected to the drive piston. The fluid system further includes a pump cylinder and a pump piston slidably disposed in the pump cylinder. A pump rod including a crowned end is connected to the pump piston. The drive rod and the pump rod are configured to be detachably coupled to each other, wherein the crowned end of the drive rod cooperates with the crowned end of the pump rod. | 11-13-2014 |
20150369143 | ENGINE SYSTEM HAVING HYDRAULICALLY ACTUATED GAS INJECTOR - A fuel injector is disclosed for use in an engine system. The fuel injector may have a body defining a gas inlet, an oil inlet, and an oil outlet. The fuel injector may also have a nozzle connected to the body and having a base end in fluid communication with the gas inlet, and an injection tip located opposite the base end. The fuel injector may also have a valve check disposed in the nozzle and movable to selectively block and unblock the injection tip of the nozzle, and a plunger disposed in the body between the oil inlet and the oil outlet. The plunger may be movable between a flow-passing position and a flow-blocking position to cause movement of the valve check through the injection tip. The injector may further have a solenoid actuator configured to selectively move the plunger. | 12-24-2015 |
Patent application number | Description | Published |
20120285419 | Dual Fuel Injector Feed Using Differential Length Quills - A duel fuel quill assembly and method for assembling such an assembly for an engine are disclosed. The dual fuel quill assembly may comprise a cylinder head including a main bore and a receiving cavity, an outer quill tube, an inner quill tube nested within the outer quill tube, an adapter slidingly received inside the main bore of the cylinder head, and a manifold secured to the adapter. The adapter may be moveable between a first position and a second position and may define an axial bore configured to receive the outer quill tube and the nested inner quill tube. The manifold may define a recess configured to compress the outer and inner quill tubes against the cylinder head cavity when the adapter is in the second position. | 11-15-2012 |
20120291752 | Quill Assembly for a Dual Fuel Common Rail Fuel System - A quill assembly includes a first quill tube and a second quill tube nested within the first quill tube. A first compression assembly includes a first piston operably coupled to the first quill tube and fluidly communicates with the first fuel rail to apply a first piston axial force against the first quill tube inlet end, and a first spring operably coupled to the first piston and configured to apply a first spring axial force against the first quill tube inlet end. A second compression assembly includes a second piston operably coupled to the second quill tube inlet end and fluidly communicates with the second fuel rail to apply a second piston axial force against the second quill tube inlet end, and a second spring operably coupled to the second piston and configured to apply a second spring axial force against the second quill tube inlet end. | 11-22-2012 |
20130062291 | Re-Entrainment Reduction Structure For Fluid Filter Assembly - A fluid filter assembly includes a housing oriented along a vertical axis. A filter medium is disposed within the housing, oriented along the vertical axis, and has a filtration rating. The filter medium traps particulates having a particulate size greater than the filtration rating. A particulate containment space is located below the filter medium relative to the vertical axis and is defined by an inner surface of the housing and a lower end of the filter medium. A re-entrainment reduction structure, having an array of hollow cells, is positioned within the particulate containment space for receiving dislodged particulates. | 03-14-2013 |
20140000563 | Coaxial Quill Assembly Retainer And Common Rail Fuel System Using Same | 01-02-2014 |
20150198124 | Asymmetrical Orifice for Bypass Control - An asymmetrical orifice for bypass control in a clean fuel module may include a body having first and second end surfaces and an inner surface defining a bore through the body extending from a first opening through the first end surface to a second opening through the second end surface. The first opening has a first opening inner diameter and the second opening has a second opening inner diameter that is less than the first opening inner diameter. The asymmetrical orifice also includes a flow control contour in the second end surface surrounding the second opening of the bore. The configuration may give the asymmetrical orifice a first discharge coefficient for fluid flowing from the first opening to the second opening that is greater than a second discharge coefficient for fluid flowing in a second direction from the second opening to the first opening | 07-16-2015 |
Patent application number | Description | Published |
20110104717 | METHODS FOR DIAGNOSIS, PROGNOSIS AND METHODS OF TREATMENT - The present invention provides an approach for the determination of the activation states of a plurality of proteins in single cells. This approach permits the rapid detection of heterogeneity in a complex cell population based on activation states, expression markers and other criteria, and the identification of cellular subsets that exhibit correlated changes in activation within the cell population. Moreover, this approach allows the correlation of cellular activities or properties. In addition, the use of modulators of cellular activation allows for characterization of pathways and cell populations. Several exemplary diseases that can be analyzed using the invention include AML, MDS, and MPN. | 05-05-2011 |
20110269154 | Methods for Diagnosis, Prognosis and Methods of Treatment - The present invention provides an approach for the determination of the activation states of a plurality of proteins in single cells. This approach permits the rapid detection of heterogeneity in a complex cell population based on activation states, expression markers and other criteria, and the identification of cellular subsets that exhibit correlated changes in activation within the cell population. Moreover, this approach allows the correlation of cellular activities or properties. In addition, the use of modulators of cellular activation allows for characterization of pathways and cell populations. Several exemplary diseases that can be analyzed using the invention include AML, MDS, and MPN. | 11-03-2011 |
20130034862 | Methods for Diagnosis, Prognosis and Methods of Treatment - The present invention provides an approach for the determination of the activation states of a plurality of proteins in single cells. This approach permits the rapid detection of heterogeneity in a complex cell population based on activation states, expression markers and other criteria, and the identification of cellular subsets that exhibit correlated changes in activation within the cell population. Moreover, this approach allows the correlation of cellular activities or properties. In addition, the use of modulators of cellular activation allows for characterization of pathways and cell populations. Several exemplary diseases that can be analyzed using the invention include AML, MDS, and MPN. | 02-07-2013 |
20140147857 | METHODS FOR DIAGNOSIS PROGNOSIS AND METHODS OF TREATMENT - The present invention provides an approach for the determination of the activation states of a plurality of proteins in single cells. This approach permits the rapid detection of heterogeneity in a complex cell population based on activation states, expression markers and other criteria, and the identification of cellular subsets that exhibit correlated changes in activation within the cell population. Moreover, this approach allows the correlation of cellular activities or properties. In addition, the use of modulators of cellular activation allows for characterization of pathways and cell populations. Several exemplary diseases that can be analyzed using the invention include AML, MDS, and MPN. | 05-29-2014 |
20150276745 | METHODS FOR DIAGNOSIS, PROGNOSIS AND METHODS OF TREATMENT - The present invention provides an approach for the determination of the activation states of a plurality of proteins in single cells. This approach permits the rapid detection of heterogeneity in a complex cell population based on activation states, expression markers and other criteria, and the identification of cellular subsets that exhibit correlated changes in activation within the cell population. Moreover, this approach allows the correlation of cellular activities or properties. In addition, the use of modulators of cellular activation allows for characterization of pathways and cell populations. Several exemplary diseases that can be analyzed using the invention include AML, MDS, and MPN. | 10-01-2015 |
Patent application number | Description | Published |
20100147853 | Lock Box with Sliding Lid - The present invention is directed to a secured group lock box. The group lock box includes a body having a latch and a lid connected to the body. The lid includes a main member and a back member. The main member of the lid includes a plurality of slots and the back member of the lid includes a plurality of pins. One of the pins is installed in each of the slots for enabling the main member of the lid to slidingly extend over the body of the group lock box before the lid is rotated away from the body to provide access to the contents therein. | 06-17-2010 |
20100232756 | Block-Out Device For Fiber Optic Adapter - The present invention is directed toward a device for protecting an adapter from contamination, damage or misuse. The device includes a front member having an opening for receiving a removal tool. The device also includes cover members having a front portion and a back portion. The front member of the device interconnects the front portions of the cover members. The front portion of each cover member includes a sealing member for sealing an opening in the adapter when the cover member is installed within the adapter. The back portion of each cover member includes an arm extending upwardly therefrom for engaging the adapter to secure the device within the adapter. | 09-16-2010 |
20110194828 | Block-Out Device for Fiber Optic Adapter - The present invention is directed to a device that protects a fiber optic adapter from contamination, damage or misuse. The fiber optic adapter includes latches that extend from inner sides of the adapter. The device includes a front, a back and sides. The sides extend from the front to the back. Each side includes a slot molded along the sides of the device. The slots receive the latches of the fiber optic adapter when the device is installed in the fiber optic adapter. Once the latches are installed in the slots, the device is secured to the fiber optic adapter. | 08-11-2011 |
20110274401 | Block-Out Device for Fiber Optic Connector - The present invention is directed toward a device for protecting an adapter from contamination, damage or misuse. The device includes a front member having an opening for receiving a removal tool. The device also includes cover members having a front portion and a back portion. The front member of the device interconnects the front portions of the cover members. The front portion of each cover member includes a sealing member for sealing an opening in the adapter when the cover member is installed within the adapter. The back portion of each cover member includes an arm extending upwardly therefrom for engaging the adapter to secure the device within the adapter. | 11-10-2011 |
20120205224 | Circuit Breaker Lockout - A circuit breaker lockout device is disclosed. The circuit breaker lockout device includes a body having a top, a bottom, a front, a back and sides. The top of the body includes a padlock hole defined by a channel that is parallel to the body. The body also includes a toggle screw that extends through the body to secure the lockout device to a circuit breaker. | 08-16-2012 |
20130029505 | Blockout Device for USB Port - A blockout device for a USB port is disclosed. The blockout device prevents contamination, damage or misuse of the USB port when not in use. The blockout device includes a locking member, a body member and a shell. The locking member has a bottom and a top. The bottom of the locking member includes a plurality of teeth for engaging the USB port. The body member has a top, a bottom and sides defining a channel therein. The locking member is positioned within the channel of the body. The shell has a cavity that receives the locking member and the body member. The locking member and the body member are positioned within the cavity of the shell when the blockout device is installed in the USB port. | 01-31-2013 |
20130102167 | Blockout Device for USB Port - A blockout device for a USB port is disclosed. The USB port has an inner channel and metal clips positioned within the channel. The blockout device has a front that covers the inner channel of the USB port. The blockout device also includes a top, a bottom and sides extending from the front. The bottom extends parallel to the top with an open area therebetween. When the blockout device is installed in the USB port, the sides engage the metal clips positioned in the channel of the USB port to secure the blockout device to the USB port. | 04-25-2013 |
20130230993 | BLOCKOUT DEVICE FOR USB PORT - A blockout device for a USB port is disclosed. The blockout device prevents contamination, damage or misuse of the USB port when not in use. The blockout device includes a locking member, a body member and a shell. The locking member has a bottom and a top. The bottom of the locking member includes a plurality of teeth for engaging the USB port. The body member has a top, a bottom and sides defining a channel therein. The locking member is positioned within the channel of the body. The shell has a cavity that receives the locking member and the body member. The locking member and the body member are positioned within the cavity of the shell when the blockout device is installed in the USB port. | 09-05-2013 |
Patent application number | Description | Published |
20140222496 | DETERMINING COST AND RISK ASSOCIATED WITH ASSETS OF AN INFORMATION TECHNOLOGY ENVIRONMENT - A computer determines the cost and risk of assets. The computer analyzes an asset signature, associated with an asset representing a fundamental structural unit of an information technology environment, to determine that the asset is in a non-normal state. The computer determines the cost of the asset by evaluating a price formula associated with the asset signature of the asset, and the computer determines the risk of the asset by evaluating a risk formula associated with the asset signature of the asset. The computer maintains a configuration item for the asset, indicating the state, the risk, and the cost of the asset. One or both of the risk and the cost of the asset are used to determine the priority of recovering the asset. | 08-07-2014 |
20140223428 | MANAGING VIRTUAL CLUSTERING ENVIRONMENTS ACCORDING TO REQUIREMENTS - Managing virtual machines includes determining an operating parameter of a device during operation of the device as part of a cluster of devices while the device hosts a virtual machine and comparing, using a processor, a requirement for the virtual machine with the operating parameter. A view of the virtual machine operating within the device of the cluster can be displayed. A result of the comparison can be indicated through application of a visualization technique to an identifier representing the virtual machine within the view. | 08-07-2014 |
20140245297 | MANAGING ALLOCATION OF HARDWARE RESOURCES IN A VIRTUALIZED ENVIRONMENT - Hardware resources in a virtualized environment are managed. Via at least one processor external to a physical host that hosts a plurality of virtual machines, resource statistics are received pertaining to hardware resources of the physical host that are allocated to each of the plurality of virtual machines. External to the physical host and in real time, the resource statistics are analyzed to determine whether allocation of the hardware resources to each of the plurality of virtual machines is optimized. When the allocation of the hardware resources to at least one of the virtual machines is not optimized, in real time, at least one resource allocation message is communicated to the physical host, the resource allocation message indicating at least one hardware resource that is to be allocated to, or de-allocated from, the at least one virtual machine. | 08-28-2014 |
20150244792 | DYNAMIC ALLOCATION OF A WORKLOAD ACROSS A PLURALITY OF CLOUDS - A method of allocating cloud resources. A user interface can be presented to a user. The user interface can be configured to receive a user selection of a change of context for at least one of a plurality of workloads allocated to at least one cloud. Responsive to receiving the user selection of the change of context for the workload, via a processor, a service level agreement applicable to the workload can be dynamically changed from a first service level agreement to a second service level agreement, while the workload remains in an available state. | 08-27-2015 |
Patent application number | Description | Published |
20120151036 | IDENTIFYING STRAY ASSETS IN A COMPUTING ENVIROMENT AND RESPONSIVELY TAKING RESOLUTION ACTIONS - In a discovery stage, a set of suspect rules can be utilized to determine if each environment asset of the computing environment is to be considered a suspect asset or a standard environment asset, where suspect assets are a subset of environment assets of the computing environment. In a confirmation stage, a set of stray rules can be used to determine whether each suspect asset is to be considered a stray asset, wherein stray assets are a subset of the suspect assets. A stray asset can be an asset defined and configured by a configuration management system that is active in the computing environment and is consuming resources of the computing environment yet is not needed by active processes of the computing environment and is unneeded by other active environment assets. For each stray asset, at least one resolution action (e.g., alert action, containment action, delete action) can be performed. | 06-14-2012 |
20120290348 | ROUTING SERVICE REQUESTS BASED ON LOWEST ACTUAL COST WITHIN A FEDERATED VIRTUAL SERVICE CLOUD - A method for providing a virtual cloud service at the lowest actual cost can begin with an optimal transaction handler of a federated virtual service cloud maintaining a virtual resource pool of transactional units. Each transactional unit can represent a service application deployed to a cloud service provided by a cloud service provider having a usage-based service cost model that allows transactional units to be placed in an inactive state to suspend its operating expense. Operational metrics data for the cloud service providers can be continuously captured. In response to a service request, the transactional unit that meets fulfillment requirements of the service request and incurs a lowest actual cost can be determined based upon cost factors derived from the operational metrics data, the usage-based service cost model, and a current usage state of the virtual resource pool. The received service request can be routed to the determined transactional unit. | 11-15-2012 |
20120297053 | UTILIZING SIGNATURES TO DISCOVER AND MANAGE DERELICT ASSETS OF AN INFORMATION TECHNOLOGY ENVIRONMENT - A set of asset signatures can be analyzed. Each asset signature can be associated with an asset. Derelict assets can be discovered based on the asset signatures. The asset can represent a fundamental structural unit of an information technology (IT) environment. A multi-stage screening process can be performed to discover derelict assets. In a first stage, assets having a normal state are able to be changed to a suspect state based on results of analyzing the corresponding asset signature. In a second stage, assets having a suspect state are able to be selectively changed in state to a normal state or to a derelict state. An asset management system record can be maintained for each of the set of assets. Each record of the asset management system can be a configuration item (CI), which indicates whether each of the set of assets is in a normal state, a suspect state, or a derelict state. The asset management system can periodically reclaim resources consumed by derelict assets. | 11-22-2012 |
20130246782 | UTILIZING SIGNATURES TO DISCOVER AND MANAGE DERELICT ASSETS OF AN INFORMATION TECHNOLOGY ENVIRONMENT - A set of asset signatures can be analyzed. Each asset signature can be associated with an asset. Derelict assets can be discovered based on the asset signatures. The asset can represent a fundamental structural unit of an information technology (IT) environment. A multi-stage screening process can be performed to discover derelict assets. In a first stage, assets having a normal state are able to be changed to a suspect state based on results of analyzing the corresponding asset signature. In a second stage, assets having a suspect state are able to be selectively changed in state to a normal state or to a derelict state. An asset management system record can be maintained for each of the set of assets. Each record of the asset management system can be a configuration item (CI), which indicates whether each of the set of assets is in a normal state, a suspect state, or a derelict state. The asset management system can periodically reclaim resources consumed by derelict assets. | 09-19-2013 |
20130268861 | DYNAMIC ALLOCATION OF A WORKLOAD ACROSS A PLURALITY OF CLOUDS - A method of allocating cloud resources. A user interface can be presented to a user. The user interface can be configured to receive a user selection of a change of context for at least one of a plurality of workloads allocated to at least one cloud. Responsive to receiving the user selection of the change of context for the workload, via a processor, a service level agreement applicable to the workload can be dynamically changed from a first service level agreement to a second service level agreement, while the workload remains in an available state. | 10-10-2013 |
Patent application number | Description | Published |
20140279394 | Multi-Dimensional Credibility Scoring - A credibility scoring system produces a multi-dimensional entity credibility score that is derived from multiple dimensional component scores. The credibility scoring system derives each dimensional component score from a different set of credibility data pertaining to different dimensional aspect of overall credibility. The different dimensional aspects factoring into the overall credibility determination include a stability dimension, transparency dimension, trustworthiness dimension, and sentiment dimension. | 09-18-2014 |
20140280217 | Custom Score Generation System and Methods - Some embodiments provide a custom score generation system by offering third parties access to data from a shared database that they can merge with their own proprietary data for the purpose of defining and producing new data services. The system provides interfaces for selecting data elements from the shared database, attributing weights to the selected data elements, and defining scoring rules or parameters to automatically evaluate the significance of the data element values. Additionally, conditions may be specified to include different sets of the selected data elements, to attribute different weights to the different sets of the selected data elements, and to define different scoring rules according to which conditions are satisfied. The system then automatically formulates the algorithm to produce the custom score in conformance with the provided inputs and based on values for the selected data elements that are specific to different entities. | 09-18-2014 |
20160117782 | Base-Business Cards - Some embodiments provide a system that generates different customized decks of cards with each deck being customized for a different user with a condensed and filtered set of business data that is relevant to that user. The customizations are based in part on monitored user behavior and user interactions with the cards. Cards identifying businesses that the user has viewed for the most amount of time, recommended to others, approved, or positively reviewed or rated are assigned high values. Cards identifying businesses that the user has viewed for the least amount of time, rejected, or negatively reviewed or rated are assigned low values. The system then continually updates the deck to remove cards identifying business with the lowest values while adding cards identifying businesses that resemble other businesses with assigned high values. | 04-28-2016 |
Patent application number | Description | Published |
20120246093 | Credibility Score and Reporting - Some embodiments provide methods, systems, and computer software products for producing a tangible asset in the form of a standardized score that quantifiably measures business credibility based on a variety of data sources and credibility data that includes quantitative data and qualitative data. Some embodiments produce a separate tangible asset in the form of a report from which each business can identify practices that have been successful, practices that have inhibited the success of the business, desired improvements by customers, where future growth opportunities lie, and changes that can be made to improve the future growth and success of the business and thereby improve on the credibility score of the business. | 09-27-2012 |
20120260209 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 10-11-2012 |
20120278767 | Indices for Credibility Trending, Monitoring, and Lead Generation - Some embodiments provide a credibility system that computes credibility scores to quantify the credibility of different businesses and to coalesce the generated credibility scores into various indices. The indices comparatively present the credibility of a particular business relative to other businesses along one or more dimensions. Based on the indices, the system identifies trends in the credibility of a particular business. The system derives preliminary credibility for a new business for which credibility data has not yet been obtained based on credibility that has been previously established for other businesses in an index associated with the new business. The system provides automated services for monitoring credibility of a business and for generating alerts to notify the business that its credibility has reached various thresholds. The system identifies business practices that improve upon or adversely affect the credibility of a particular business. | 11-01-2012 |
20120296804 | System and Methods for Producing a Credit Feedback Loop - Some embodiments provide a credit feedback loop system that directly identifies credit that is available to a credit seeker based on recent credit that others with similar qualifications (e.g., credit scores) as the credit seeker have obtained. The credit feedback loop system establishes a reciprocal system to benefit credit providers and credit seekers. The credit providers participate by providing information about the credit they have recently extended to credit seekers. In return, the credit feedback loop system acts as a lead generation platform for the credit providers by identifying potential new credit seekers. A credit seeker benefits by obtaining a direct and accurate measure of its available credit without having to divulge confidential information. In so doing, the credit feedback loop system allows a credit seeker to accurately identify its available credit and be quasi-preapproved for credit without having to apply for credit from any single credit provider. | 11-22-2012 |
20130031105 | Automated Ranking of Entities Based on Trade References - Some embodiments perform automated entity ranking to accurately portray the influence that each ranked entity holds within a particular field, industry, region, or some combination thereof. The ranking is primarily derived based on the number of trade references obtained for a particular entity and the influence of those trade references. The rankings can be sold as informational commodities and can be compiled to produce lists of the most influential entities within a particular field, industry, region, or some combination thereof. | 01-31-2013 |
20130103600 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 04-25-2013 |
20130238387 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 09-12-2013 |
20160071123 | Indices for Credibility Trending, Monitoring, and Lead Generation - Some embodiments provide a credibility system that computes credibility scores to quantify the credibility of different businesses and to coalesce the generated credibility scores into various indices. The indices comparatively present the credibility of a particular business relative to other businesses along one or more dimensions. Based on the indices, the system identifies trends in the credibility of a particular business. The system derives preliminary credibility for a new business for which credibility data has not yet been obtained based on credibility that has been previously established for other businesses in an index associated with the new business. The system provides automated services for monitoring credibility of a business and for generating alerts to notify the business that its credibility has reached various thresholds. The system identifies business practices that improve upon or adversely affect the credibility of a particular business. | 03-10-2016 |
Patent application number | Description | Published |
20090030556 | Methods for assessing reliability of a utility company's power system - Methods are provided for assessing reliability of a power system of a utility company. At least one main overview display is obtained. Violation markers are displayed on the one main overview display. A monitored elements tab is updated with a list of monitored elements. | 01-29-2009 |
20090030557 | Energy management system that provides real time situation awareness of a potential energy management failure - An energy management system has a control center at a utility company, and logic resources coupled to the power system that provide a real time notice of conditions which effect energy management of the utility company. At least one user interface is provided at the control center that is coupled to the logic resources. The user interface provides a real time situation awareness of a potential energy management failure. | 01-29-2009 |
20090030758 | Methods for assessing potentially compromising situations of a utility company - Methods are provided for assessing potentially compromising situations of a utility company. One or more source displays of a site are accessed. A fly-out or data lensing is used to bring forward a portion of the source displays. The fly-out or data lensing is used to draw attention to a potentially compromising situation and direct the operator's attention without loosing perspective of a whole power system of the utility company. | 01-29-2009 |
20090030759 | Methods for managing high or low voltage conditions from selected areas of a power system of a utility company - Methods are provided for managing high or low voltage conditions from selected areas of a power system of a utility company. Rubber-banding or lassoing is used to select geographic areas. Potential low or high voltage situations are identified in the selected geographic areas. Geographic displays are overlayed with superimposed VAR reserves to create overlayed geographic displays for the selected geographic areas. The overlayed geographic displays are used to identify potential low or high voltage instances in the selected geographic areas. | 01-29-2009 |
20090031241 | Energy management system that provides a real time assessment of a potentially compromising situation that can affect a utility company - An energy management system has a control center at a utility company and logic resources that provide a real time assessment of a potentially compromising situation that can effect the utility company. At least one situational dashboard panel is provided. The logic resources enable users to dynamically create their own dashboards from large overviews, regional schematic displays and station one-line displays that assist in assessing the potentially compromising situation of the utility company. | 01-29-2009 |
20090031249 | Methods for creating dynamic lists from selected areas of a power system of a utility company - Methods are provided for creating dynamic lists from selected areas of a power system of a utility company. The utility company has an energy management system with a control panel. The energy management system is used to access one or more source displays of a site. Rubber-banding or lassoing is used to create selected areas from at least a portion of the source displays, Lists are dynamically created. Operator defined information is displayed for each element type in a list of network elements from the selected areas that have been rubber-banded or lassoed. | 01-29-2009 |
20120316836 | Methods for assessing reliability of a utility company's power system - Methods are provided for assessing reliability of a power system of a utility company. At least one main overview display is obtained. Violation markers are displayed on the one main overview display. A monitored elements tab is updated with a list of monitored elements. | 12-13-2012 |
20130057579 | Methods for creating dynamic lists from selected areas of a power system of a utility company - Methods are provided for creating dynamic lists from selected areas of a power system of a utility company. The utility company has an energy management system with a control panel. The energy management system is used to access one or more source displays of a site. Rubber-banding or lassoing is used to create selected areas from at least a portion of the source displays. Lists are dynamically created. Operator defined information is displayed for each element type in a list of network elements from the selected areas that have been rubber-banded or lassoed. | 03-07-2013 |
20140210839 | METHODS FOR ASSESSING POTENTIALLY COMPROMISING SITUATIONS OF A UTILITY COMPANY - Methods are provided for assessing potentially compromising situations of a utility company. One or more source displays of a site are accessed. A fly-out or data lensing is used to bring forward a portion of the source displays. The fly-out or data lensing is used to draw attention to a potentially compromising situation and direct the operator's attention without loosing perspective of a whole power system of the utility company. | 07-31-2014 |
Patent application number | Description | Published |
20110236721 | STEEL COMPOSITIONS, METHODS OF FORMING THE SAME, AND ARTICLES FORMED THEREFROM - Maraging steel compositions, methods of forming the same, and articles formed therefrom comprising, by weight, 15.0 to 20.0% Ni, 2.0 to 6.0% Mo, 3.0 to 8.0% Ti, up to 0.5% Al, the balance Fe and residual impurities. The composition may be a first layer of a composite plate, and may have a second layer deposited on the first layer, the second layer having a composition comprising, by weight, 15.0 to 20.0% Ni, 2.0 to 6.0% Mo, 1.0 to 3.0 Ti, up to 0.5% Al, the balance Fe and residual impurities. The first layer may have a hardness value ranging from 58 to 64 RC, and the second layer may have a hardness value ranging from 48 to 54 RC. The first layer may be formed employing powdered metallurgical techniques. Articles formed from the compositions include armored plate. | 09-29-2011 |