Patent application number | Description | Published |
20130339617 | AUTOMATIC PATTERN-BASED OPERAND PREFETCHING - Embodiments relate to automatic pattern-based operand prefetching. An aspect includes receiving, by prefetch logic in a processor, an operand cache miss from a pipeline of the processor. Another aspect includes determining that an entry in a history table corresponding to the operand cache miss exists based on an instruction address of the operand cache miss. Yet another aspect includes, based on determining that the entry corresponding to the operand cache miss exists in the history table, issuing a prefetch instruction for a second operand based on the determined entry in the history table, and writing the determined entry into a miss buffer. | 12-19-2013 |
20130339650 | PREFETCH ADDRESS TRANSLATION USING PREFETCH BUFFER - Embodiments relate to prefetch address translation in a computer processor. An aspect includes issuing, by prefetch logic, a prefetch request comprising a virtual page address. Another aspect includes, based on the prefetch request missing the TLB and the address translation logic of the processor being busy performing a current translation request, comparing a page of the prefetch request to a page of the current translation request. Yet another aspect includes, based on the page of the prefetch request matching the page of the current translation request, storing the prefetch request in a prefetch buffer. | 12-19-2013 |
20130339665 | COLLISION-BASED ALTERNATE HASHING - Embodiments relate to collision-based alternate hashing. An aspect includes receiving an incoming instruction address. Another aspect includes determining whether an entry for the incoming instruction address exists in a history table based on a hash of the incoming instruction address. Another aspect includes based on determining that the entry for the incoming instruction address exists in the history table, determining whether the incoming instruction address matches an address tag in the determined entry. Another aspect includes based on determining that the incoming instruction address does not match the address tag in the determined entry, determining whether a collision exists for the incoming instruction address. Another aspect includes based on determining that the collision exists for the incoming instruction address, activating alternate hashing for the incoming instruction address using an alternate hash buffer. | 12-19-2013 |
20150365092 | SOLVING CONSTRAINT SATISFACTION PROBLEMS USING A FIELD PROGRAMMABLE GATE ARRAY - A method for configuring a Field Programmable Gate Array (FPGA) with a Constraint Satisfaction Problem (CSP) assignment having multiple constraint expressions, the method comprising: setting each of the multiple constraint expressions as a configurable logic block (CLB) in the FPGA, to yield multiple CLBs; setting an assignment vector in the FPGA, wherein the assignment vector is a number vector configured to store a candidate solution to the CSP assignment; and forming a feedback loop by connecting the assignment vector to inputs of the multiple CLBs, and connecting outputs of the multiple CLBs to the assignment vector. Further disclosed is a design structure for the FPGA, optionally residing on a storage medium as a data format used for the exchange of layout data of integrated circuits. | 12-17-2015 |
Patent application number | Description | Published |
20110139175 | ENHANCED PASSIVATION PROCESS TO PROTECT SILICON PRIOR TO HIGH DOSE IMPLANT STRIP - Improved methods and apparatus for stripping photoresist and removing ion implant related residues from a work piece surface are provided. According to various embodiments, the workpiece is exposed to a passivation plasma, allowed to cool for a period of time, and then exposed to an oxygen-based or hydrogen-based plasma to remove the photoresist and ion implant related residues. Aspects of the invention include reducing silicon loss, leaving little or no residue while maintaining an acceptable strip rate. In certain embodiments, methods and apparatus remove photoresist material after high-dose ion implantation processes. | 06-16-2011 |
20110143548 | ULTRA LOW SILICON LOSS HIGH DOSE IMPLANT STRIP - Improved methods for stripping photoresist and removing ion implant related residues from a work piece surface are provided. According to various embodiments, plasma is generated using elemental hydrogen, a fluorine-containing gas and a protectant gas. The plasma-activated gases reacts with the high-dose implant resist, removing both the crust and bulk resist layers, while simultaneously protecting exposed portions of the work piece surface. The work piece surface is substantially residue free with low silicon loss. | 06-16-2011 |
20120108072 | SHOWERHEAD CONFIGURATIONS FOR PLASMA REACTORS - Apparatus, devices, and methods for increasing the ion energy in a plasma processing devices are provided. In various embodiments, the surface area of a showerhead facing the work piece includes a plurality of features. The plurality of features increases the surface area of the showerhead relative to a flat surface. Increasing the surface area of the showerhead increases the ion energy without increasing the power used to generate the plasma. Increasing the ion energy using such a showerhead allows for the broader application of plasma processes in integrated circuit manufacturing. | 05-03-2012 |
20150332933 | ULTRA LOW SILICON LOSS HIGH DOSE IMPLANT STRIP - Improved methods for stripping photoresist and removing ion implant related residues from a work piece surface are provided. According to various embodiments, plasma is generated using elemental hydrogen, a fluorine-containing gas and a protectant gas. The plasma-activated gases reacts with the high-dose implant resist, removing both the crust and bulk resist layers, while simultaneously protecting exposed portions of the work piece surface. The work piece surface is substantially residue free with low silicon loss. | 11-19-2015 |
20160097590 | SYSTEMS AND METHODS FOR DRYING HIGH ASPECT RATIO STRUCTURES WITHOUT COLLAPSE USING SACRIFICIAL BRACING MATERIAL THAT IS REMOVED USING HYDROGEN-RICH PLASMA - Systems and methods for drying a substrate including a plurality of high aspect ratio (HAR) structures are performed after at least one of wet etching and/or wet cleaning the substrate using at least one of wet etching solution and/or wet cleaning solution, respectively, and without drying the substrate. Fluid between the plurality of HAR structures is displaced using a solvent including a bracing material. After the solvent evaporates, the bracing material precipitates out of solution and at least partially fills the plurality of HAR structures. The substrate is exposed to plasma generated using a plasma gas chemistry that is hydrogen rich to remove the bracing material thereby drying the substrate including the HAR structures without damaging the plurality of HAR structures. | 04-07-2016 |
Patent application number | Description | Published |
20100049930 | Managing Backups Using Virtual Machines - One embodiment is a method for providing incremental backups for a source computing machine, the method including: (a) creating a first backup snapshot including a virtual machine (VM) snapshot of an initial copy of a source computing machine volume, wherein said VM snapshot includes a timestamp and a first redo log file; (b) reconfiguring and customizing said first backup snapshot to create a first bootable VM, writing changes associated with said reconfiguring and customizing into said first redo log file, then creating a first bootable snapshot including a VM snapshot of said first bootable VM, wherein said VM snapshot of said first bootable VM includes a timestamp for said first bootable VM and a redo log file; (c) performing an incremental update of said first backup snapshot or a subsequent backup snapshot, then creating a subsequent backup snapshot including a VM snapshot of said incremental update, wherein said VM snapshot of said incremental update includes a timestamp for said incremental update and a redo log file; and (d) reconfiguring and customizing said subsequent backup snapshot to create a subsequent bootable VM, then creating a subsequent bootable snapshot including a VM snapshot of said subsequent bootable VM, wherein said VM snapshot of said subsequent bootable VM includes a timestamp for said subsequent bootable VM and a redo log file. | 02-25-2010 |
20100077165 | Tracking Block-Level Changes Using Snapshots - Writes to blocks of a protected storage volume that occur between the beginning of a prior backup interval and the beginning of a current backup interval are tracked using a first snapshot that is maintained through the current backup interval. At the beginning of the current backup interval, a second snapshot is generated. Blocks that are indicated by a dirty block list of the first snapshot as having been changed are read from the snapshot volume for the second snapshot and copied to a backup storage volume. For the next backup interval, the second snapshot or alternatively, a newly generated third snapshot, is used to track writes to blocks of a protected storage volume that occur between the beginning of the current backup interval and the beginning of a next backup interval. | 03-25-2010 |
20110088027 | TRACKING BLOCK-LEVEL WRITES - One embodiment is a method of installing a block-level write tracking driver in a Microsoft Windows™ operating system so that no reboot of the system is need, another embodiment is a method of installing a block-level write tracking driver in a Linux operating system so that no reboot of the system is needed, and still another embodiment is a method of tracking block-level writes to snapshots under newer Microsoft Windows™ operating systems. | 04-14-2011 |
20120297005 | BREAKING LOCKS HELD BY TWO-PHASE COMMIT TRANSACTIONS WHILE PRESERVING DATA CONSISTENCY - A technique for breaking locks held by two-phase commit (2PC) transactions while preserving data consistency that guarantees that either the “commit” phase or the “abort” phase of the 2PC protocol is completed at a higher-priority server. Accordingly, all locks on data objects are released and a high-priority operation can proceed. Data consistency is also preserved because the 2PC coordinator adheres to the 2PC protocol and properly notifies both the higher-priority server and one or more lower-priority servers when they are available. | 11-22-2012 |
20150370659 | USING STRETCHED STORAGE TO OPTIMIZE DISASTER RECOVERY - Exemplary methods, apparatuses, and systems include receiving a command to perform a failover workflow for a plurality of logical storage devices from a protected site to a recovery site. A first logical storage device within the plurality of logical storage devices is determined to be a stretched storage device. In response to the failover command, a site preference for the first logical storage device is switched from the protected site to the recovery site. The failover includes a live migration of a virtual machine that resides on the first logical storage device. The live migration is performed without interruption to one or more services provided by the virtual machine. The site preference for the first logical storage device is switched prior to performing the live migration of the virtual machine. | 12-24-2015 |
20150370660 | USING STRETCHED STORAGE TO OPTIMIZE DISASTER RECOVERY - Exemplary methods, apparatuses, and systems include determining that at least a portion of a protected site has become unavailable. A first logical storage device within underlying storage of a recovery site is determined to be a stretched storage device stretched across the protected and recovery sites. A failover workflow is initiated in response to the unavailability of the protected site, wherein the failover workflow includes transmitting an instruction to the underlying storage to isolate the first logical storage device from a corresponding logical storage device within the protected site. | 12-24-2015 |
20150372945 | MAPPING COMPUTER RESOURCES TO CONSUMERS IN A COMPUTER SYSTEM - Mapping computer resources to consumers in a computer system is described. In an example, a method of mapping computer resources to consumers in a computer system includes: receiving tags assigned to the computer resources at a resource manager executing in the computer system, where the resource manager: identifies a first tag assigned to a first computer resource; determines whether a first consumer is associated with the first tag; enables the first consumer to access the first computer resource if the first consumer is associated with the first tag; and prevents the first consumer from accessing the first computer resource if the first consumer is not associated with the first tag. | 12-24-2015 |
20150378758 | Processing Virtual Machine Objects through Multistep Workflows - Techniques to process virtual machine objects through multistep workflows in a computer system are described. In an example, a method of processing virtual machine objects through a workflow having a plurality of ordered steps in a computer system includes executing the workflow on computing resources of the computer system using the virtual machine objects as parametric input, where the computing resources: divide the virtual machine objects into workgroups; perform instances of a step of the workflow in parallel on the workgroups as the workgroups complete a prior step in the workflow; and execute an agent to delegate the workgroups to, and receive results from, the instances of the step as the workflow is executed. | 12-31-2015 |
20150378759 | DETERMINING STATUS OF MIGRATING VIRTUAL MACHINES - Systems and techniques are described for determining the status of migrating virtual machines. A described technique includes initiating a migration of one or more virtual machines from a source host that is located at a source site to a destination host that is located at a destination site. A determination is made that a fault has occurred during the migration of the one or more virtual machines. In response to determining that the error has occurred, a determination is made, for each virtual machine of the one or more virtual machines, whether the virtual machine has been fully migrated from the source host to the destination host. | 12-31-2015 |
20150378767 | USING ACTIVE/ACTIVE ASYNCHRONOUS REPLICATED STORAGE FOR LIVE MIGRATION - Examples perform live migration of VMs from a source host to a destination host. The disclosure changes the storage environment, directly or through a vendor provider, to active/active synchronous and, during migration, migrates only data which is not already stored at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes, with exclusive access to the storage disks, and the system is returned to the previous storage environment (e.g., active/active asynchronous). | 12-31-2015 |
20150378771 | USING A DELTA QUERY TO SEED LIVE MIGRATION - Examples perform live migration of objects such as VMs from a source host to a destination host. The disclosure exposes the contents of the storage disk at the destination host, compares the storage disk of the destination host to the source host, and during migration, migrates only data which is not already stored at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes, with exclusive access to the storage disks. | 12-31-2015 |
20150378785 | USING ACTIVE/PASSIVE ASYNCHRONOUS REPLICATED STORAGE FOR LIVE MIGRATION - The disclosure describes performing live migration of objects such as virtual machines (VMs) from a source host to a destination host. The disclosure changes the storage environment, directly or through a vendor provider, to active/passive synchronous or near synchronous and, during migration, migrates only data which has not already been replicated at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes with exclusive access to the storage disks, and the system is returned to the previous storage environment of active/passive asynchronous. | 12-31-2015 |
20150378831 | USING A RECOVERY SNAPSHOT DURING LIVE MIGRATION - Examples perform live migration of VMs from a source host to a destination host using destructive consistency breaking operations. The disclosure makes a record of a consistency group of VMs on storage at a source host as a fail-back in the event of failure. The source VMs are live migrated to the destination host, disregarding consistency during live migration, and potentially violating the recovery point objective. After live migration of all of the source VMs, consistency is automatically restored at the destination host and the live migration is declared a success. | 12-31-2015 |
20150378839 | RECOVERY SYSTEM AND METHOD FOR PERFORMING SITE RECOVERY USING REPLICATED RECOVERY-SPECIFIC METADATA - A recovery system and method for performing site recovery utilizes recovery-specific metadata and files of protected clients at a primary site to recreate the protected clients at a secondary site. The recovery-specific metadata is collected from at least one component at the primary site, and stored with the files of protected clients at the primary site. The recovery-specific metadata and the files of the protected clients are replicated to the secondary site so that the protected clients can be recreated at the secondary site using the replicated information. | 12-31-2015 |
20150378847 | MAINTAINING CONSISTENCY USING REVERSE REPLICATION DURING LIVE MIGRATION - Examples maintain consistency of writes for a plurality of VMs during live migration of the plurality from a source host to a destination host. The disclosure intercepts I/O writes to a migrated VM at a destination host and mirrors the I/O writes back to the source host. This “reverse replication” ensures that the CG of the source host is up to date, and that the source host is safe to fail back to if the migration fails. | 12-31-2015 |
20160062851 | PREVENTING MIGRATION OF A VIRTUAL MACHINE FROM AFFECTING DISASTER RECOVERY OF REPLICA - To prevent a user from initiating potentially dangerous virtual machine migrations, a storage migration engine is configured to be aware of replication properties for a source datastore and a destination datastore. The replication properties are obtained from a storage array configured to provide array-based replication. A recovery manager discovers the replication properties of the datastores stored in the storage array, and assigns custom tags to the datastores indicating the discovered replication properties. When storage migration of a virtual machine is requested, the storage migration engine performs or prevents the storage migration based on the assigned custom tags. | 03-03-2016 |
20160062853 | PREVENTING MIGRATION OF A VIRTUAL MACHINE FROM AFFECTING DISASTER RECOVERY OF REPLICA - A storage migration engine and a recovery manager are provided that enable failover operations to be performed in situations where storage migration and array-based replication are involved. The storage migration engine stores information related to storage migrations directly into a source datastore and a destination datastore, which are then replicated over to a recovery site. The recovery manager uses the information stored in the recovered datastores to select which instance of virtual machine data is to be used to fail over to a virtual machine at the recovery site. | 03-03-2016 |
20160062858 | STORAGE POLICY-BASED AUTOMATION OF PROTECTION FOR DISASTER RECOVERY - Exemplary methods, apparatuses, and systems include a recovery manager receiving selection of a storage profile to be protected. The storage profile is an abstraction of a set of one or more logical storage devices that are treated as a single entity based upon common storage capabilities. In response to the selection of the storage profile to be protected, a set of virtual datacenter entities associated with the storage profile is added to a disaster recovery plan to automate a failover of the set of virtual datacenter entities from a protection site to a recovery site. The set of one or more virtual datacenter entities includes one or more virtual machines, one or more logical storage devices, or a combination of virtual machines and logical storage devices. The set of virtual datacenter entities is expandable and interchangeable with other virtual datacenter entities. | 03-03-2016 |
20160098324 | DYNAMIC PROTECTION OF STORAGE RESOURCES FOR DISASTER RECOVERY - A recovery manager discovers replication properties of datastores stored in a storage array, and assigns custom tags to the datastores indicating the discovered replication properties. A user may create storage profiles with rules using any combination of these custom tags describe replication properties. The recovery manager protects a storage profile using a policy-based protection mechanism. Whenever a new replicated datastore is provisioned, the datastore is dynamically tagged with the replication properties of their underlying storage, and will belong to one or more storage profiles. The recovery manager monitors storage profiles for new datastores and protects the newly provisioned datastore dynamically, including any or all of the VMs stored in the datastore. | 04-07-2016 |
Patent application number | Description | Published |
20140354343 | ANALOG INTEGRATOR SYSTEM AND METHOD - Systems and methods are disclosed to integrate signals. Some embodiments include an integrator comprising an active input; a passive input; a first integrator having a first integrator input and a first integrator output; a second integrator having a second integrator input and a second integrator output; a first plurality of switches coupled with the first integrator input, the second integrator input, the active input, and the passive input; a second plurality of switches coupled with the first integrator output and the second integrator output; and a controller. The controller may be configured to control the operation of the first plurality of switches to switch the active input between the first integrator input and the second integrator input, and control the operation of the first plurality of switches to switch the passive input between the first integrator input and the second integrator input. | 12-04-2014 |
20150256086 | GALVANICALLY ISOLATED OUTPUT VARIABLE PULSE GENERATOR DISCLOSURE - A pulse generator is disclosed that includes at least the following stages a driver stage, a transformer stage, a rectifier stage, and an output stage. The driver stage may include at least one solid state switch such as, for example, of one or more IGBTs and/or one or more MOSFETs. The driver stage may also have a stray inductance less than 1,000 nH. The transformer stage may be coupled with the driver stage and/or with a balance stage and may include one or more transformers. The rectifier stage may be coupled with the transformer stage and may have a stray inductance less than 1,000 nH. The output stage may be coupled with the rectifier stage. The output stage may output a signal pulse with a voltage greater than 2 kilovolts and a frequency greater than 5 kHz. In some embodiments, the output stage may be galvanically isolated from a reference potential. | 09-10-2015 |
20150318846 | HIGH VOLTAGE NANOSECOND PULSER WITH VARIABLE PULSE WIDTH AND PULSE REPETITION FREQUENCY - A nanosecond pulser is disclosed. In some embodiments, the nanosecond pulser may include one or more switch circuits including one or more solid state switches, a transformer, and an output. In some embodiments, the transformer may include a first transformer core, a first primary winding wound at least partially around a portion of the first transformer core, and a secondary winding wound at least partially around a portion of the first transformer core. In some embodiments, each of the one or more switch circuits are coupled with at least a portion of the first primary winding. In some embodiments, the output may be electrically coupled with the secondary winding and outputs electrical pulses having a peak voltage greater than about 1 kilovolt and a rise time of less than 150 nanoseconds or less than 50 nanoseconds. | 11-05-2015 |
Patent application number | Description | Published |
20130054889 | COMPUTER SYSTEM ACCESSING OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. Prior to issuing input-output commands to a logical storage volume, the computer system sends a request to bind the logical storage volume to a protocol endpoint. In response a first identifier for the protocol endpoint and a second identifier for the logical storage volume is returned. Different second identifiers may be generated for different logical storage volumes even though the same protocol endpoint is being used. Therefore, a single protocol endpoint may serve as a gateway for multiple logical storage volumes. | 02-28-2013 |
20130054910 | VIRTUAL MACHINE SNAPSHOTTING IN OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects within logical storage containers. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. A snapshot profile can be separately defined for each of these logical storage volumes, even for those that are within the same storage container. The snapshot profile for a logical storage volume defines whether or not snapshot is enabled for that logical storage volume, the frequency of the snapshot, and the number of snapshots to be retained. | 02-28-2013 |
20130054932 | OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. Logical storage volumes are created from a logical storage container having an address space that maps to storage locations of the physical data storage units. Each of the logical storage volumes so created has an address space that maps to the address space of the logical storage container. A logical storage container may span more than one storage system and logical storage volumes of different customers can be provisioned from the same logical storage container with appropriate security settings. | 02-28-2013 |
20130055248 | METHOD OF BALANCING WORKLOADS IN OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. When traffic through a particular protocol endpoint is busy, the logical storage volume undergoes a rebind process pursuant to which the logical storage volume is bound to a new protocol endpoint, and the binding to the old protocol endpoint is removed upon completion of all pending input-output commands issued through the old protocol endpoint. | 02-28-2013 |
20140244929 | OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. Logical storage volumes are created from a logical storage container having an address space that maps to storage locations of the physical data storage units. Each of the logical storage volumes so created has an address space that maps to the address space of the logical storage container. A logical storage container may span more than one storage system and logical storage volumes of different customers can be provisioned from the same logical storage container with appropriate security settings. | 08-28-2014 |
20140325170 | Conversion of Virtual Disk Snapshots Between Redo and Copy-on-Write Technologies - A framework for converting between copy-on-write (COW) and redo-based technologies is disclosed. To take a virtual disk snapshot, disk descriptor files, which include metadata information about data stored in virtual volumes (vvols), are “swizzled” such that the descriptor file for a latest redo log, to which IOs are currently performed, points to the base vvol of a COW-based vvol hierarchy. A disk descriptor file previously associated with the base vvol may also be updated to point to the vvol newly created by the snapshot operation. To revert to an earlier disk state, a snapshot may be taken before copying contents of a snapshot vvol of the COW-based vvol hierarchy to a base vvol of the hierarchy, thereby ensuring that the reversion can be rolled back if it is unsuccessful. Reference counting is performed to ensure that vvols in the vvol hierarchy are not orphaned in delete and revert use cases. Differences between vvols in the COW-based vvol hierarchy are used to clone the hierarchy and to migrate the hierarchy to a redo-based disk hierarchy. | 10-30-2014 |
20150032691 | TCP/UDP ACCELERATION - A method for accelerating TCP/UDP packet switching. The method involves determining whether exception processing is necessary; if not, the packet is forwarded to a special stack for expedited processing. Packets requiring exception processing are forwarded to the conventional stack. | 01-29-2015 |
Patent application number | Description | Published |
20080235527 | Operation of computer display using auxiliary display controller - A computing apparatus includes a display, a Central Processing Unit (CPU) having active and switched-off operational states and an auxiliary display controller, which is active when the CPU is in the switched-off operational state. The computing apparatus further includes a switch, which is operative to connect the CPU to the display when the CPU is in the active operational state, so as to display first information produced by the CPU, and to connect the auxiliary display controller to the display when the CPU is in the switched-off operational state, so as to display second information produced by the auxiliary display controller. | 09-25-2008 |
20080297433 | Secure activation of auxiliary display - A computing apparatus includes a primary keyboard and a primary display, which are respectively arranged to accept input from a user and to display information to the user. An auxiliary display is arranged to display auxiliary information to the user when the apparatus is in a switched-off operational state, and to hide the auxiliary information when deactivated. An activation controller is arranged to monitor the primary keyboard when the auxiliary display is deactivated, to detect an activation code comprising one or more keystrokes entered using the primary keyboard, and to activate the auxiliary display responsively to detecting the activation code. | 12-04-2008 |
20090021450 | Data synchronization of auxiliary display - A computing apparatus includes a network interface, a Central Processing Unit (CPU), an auxiliary controller and an activation controller. The CPU has active and switched-off operational states and is arranged, when operating in the active operational state, to accept data from a communication network using the network interface. The auxiliary display module is connected to the CPU and is arranged, when the CPU is in the switched-off operational state, to display auxiliary information to a user based on the data accepted by the CPU. The activation controller is coupled to intermittently switch the CPU to the active operational state and to cause the CPU to update the data from the communication network, so as to update the auxiliary information displayed by the auxiliary display module. | 01-22-2009 |
20110216038 | SYSTEMS AND METHODS FOR DETECTING MULTIPLE TOUCH POINTS IN SURFACE-CAPACITANCE TYPE TOUCH PANELS - Surface-capacitance-based multi-touch touch panel apparatus including a multiplicity of electrically conductive shapes e.g. diamonds arranged along at least one of rows and columns whose capacitance is measured by capacitive sensors; wherein the rows and columns include a set of linear arrays including at least one individual linear array which includes a plurality of first sets of shapes, each first set including n>=1 shapes all shorted to a single set-specific capacitive sensor such that no two first sets are both shorted to a common capacitive sensor. | 09-08-2011 |
20120239848 | MITIGATION OF EMBEDDED CONTROLLER STARVATION IN REAL-TIME SHARED SPI FLASH ARCHITECTURE - An embedded controller includes a microcontroller core, a first bus interface that does not support bus arbitration, a second bus interface and memory control circuitry. The first bus interface is configured to receive and transmit memory transactions from and to a Central Processing Unit (CPU) chipset. The second bus interface is configured to communicate with a memory and to transfer the memory transactions of the CPU chipset to and from the memory. The memory control circuitry is configured to evaluate a starvation condition that identifies an inability of the microcontroller core to access the memory via the second bus interface due to the memory transactions transferred between the CPU chipset and the memory via the first and second bus interfaces, and to invoke a predefined corrective action when the starvation condition is met. | 09-20-2012 |
20120262419 | SYSTEMS AND METHODS FOR DETECTING MULTIPLE TOUCH POINTS IN SURFACE-CAPACITANCE TYPE TOUCH PANELS - A multi touch sensing module comprising a plurality of electrically conductive touch surfaces, each connected to at least one trace, wherein the touch surfaces are arranged in more than two columns, each including more than two touch surfaces, wherein touch surfaces in corresponding positions in said columns form staggered rows, and all touch surfaces reside in a single layer of electrically conductive material. | 10-18-2012 |
Patent application number | Description | Published |
20080265154 | MASS SPECTROMETER ION GUIDE PROVIDING AXIAL FIELD, AND METHOD - An ion guide includes a plurality of rods, arranged about an axis that extends lengthwise from one end to the other of the guide. The rods guide ions in a guide region along and about the axis. A conductive casing surrounds the rods. The casing and the rods are geometrically arranged to produce an axial electric field along the axis. Specifically, the geometry is such that a first constant applied DC voltage (U | 10-30-2008 |
20090218484 | CONCENTRATING MASS SPECTROMETER ION GUIDE, SPECTROMETER AND METHOD - An ion guide includes multiple stages. An electric field within each stage guides ions along a guide axis. Within each stage, amplitude and frequency, and resolving potential of the electric field may be independently varied. The geometry of the rods maintains a similarly shaped field from stage to stage, allowing efficient guidance of the ions along the axis. In particular, each rod segment of the i | 09-03-2009 |
20100148059 | High sensitivity mass spectrometer interface for multiple ion sources - An interface for mass spectrometers. The interface uses non coaxial sampling pathways of the analyte ion beam prior to entering the entrance of a mass spectrometer for decreasing chemical background, and can be done in such a way as to permit multiple sprayers, increasing sample throughput and sensitivity for LC/MS (liquid chromatography/MS). The interface includes an ion source having an exit from which a beam of analyte ions are emitted, a curtain plate and an aperture in the curtain plate member, an orifice plate having an orifice therein. The orifice plate is being spaced from the curtain plate member defining a flow passageway therebetween, and the aperture in the orifice plate is aligned with a sample entrance to a first vacuum stage of a mass spectrometer maintained substantially lower than atmospheric pressure. The aperture in the curtain plate member is non coaxially aligned with the orifice in the orifice plate and the interface includes a gas flow mechanism for directing a counter flow gas into the flow passageway. | 06-17-2010 |
20110133079 | MASS SPECTROMETER ION GUIDE PROVIDING AXIAL FIELD, AND METHOD - An ion guide includes a plurality of rods, arranged about an axis that extends lengthwise from one end to the other of the guide. The rods guide ions in a guide region along and about the axis. A conductive casing surrounds the rods. The casing and the rods are geometrically arranged to produce an axial electric field along the axis. Specifically, the geometry is such that a first constant applied DC voltage (U | 06-09-2011 |
Patent application number | Description | Published |
20120017094 | MANAGING USER ACCOUNTS - The present disclosure relates to managing user accounts in one or more computer systems. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of storing on a client computing device a first cookie containing plaintext representations of one or more user identifications, and a second cookie containing encrypted versions of the one or more user identifications; updating the cookies in coordination with each other based on communications received from a central server system in response to actions by a user of the client computing device to log on or off of accounts managed by the computer server system; and mediating user access to data stored locally on the client computing device by using the first and second cookies and determining whether the data is associated with one of the user identifiers. | 01-19-2012 |
20130184009 | PROVIDING HOTSPOTS TO USER DEVICES WITHIN SERVER-CONTROLLED ZONES - A user installs a hotspot alert application on their mobile device. The application employs the location technology of the user device to transmit the location of the device, and thus the location of the user. The location can be transmitted to a server located in a hotspot tracking system. By establishing the location of the user, the server may search for hotspots on a database stored on the system. The server establishes the dimensions of a hotspot zone around the user's location and transmits the hotspots and the zone dimensions to the application on the user device. The application monitors the location of the user device and deliver's configured alerts to the user when approaching a hotspot. When the device leaves a zone or remains idle for a configured amount of time, the device requests and receives an updated zone of hotspots. | 07-18-2013 |
20150193117 | Changing Icons for a Web Page - In general, the subject matter described in this disclosure can be embodied in methods, systems, and program products for changing a reference to a bookmark icon. The method includes receiving resources that include an HTML document and computer program script code. The HTML document does not include a reference to a bookmark icon. The method includes determining that the computing device has loaded the web page and, in response, adding, in a representation of the HTML document, a reference to a first bookmark icon. The method includes receiving a request to change a display of the web page from a first screen to a second screen, without requesting additional resources over the network. The method includes removing the reference to the first bookmark icon in the representation of the web page, and adding a reference to a second bookmark icon in the representation of the web page. | 07-09-2015 |
20150195340 | Determining if an Application is Cached - In general, the subject matter described in this specification can be embodied in methods, systems, and program products for determining if a web application is cached. A source web application that is executed by a web browser that is installed on a computing device determines that the web browser is to navigate to a target web application. The source web application determines whether resources for the target web application are cached at the computing device. The source web application performs actions to request resources for the target web application based on the determination whether resources for the target web application are cached, wherein the actions comprise requesting resources for the target web application using a first address if the target web application is determined to be cached and using a second address if the target web application is determined to not be cached. | 07-09-2015 |
20160029164 | PROVIDING HOTSPOTS TO USER DEVICES WITHIN SERVER-CONTROLLED ZONES - A user installs a hotspot alert application on their mobile device. The application employs the location technology of the user device to transmit the location of the device, and thus the location of the user. The location can be transmitted to a server located in a hotspot tracking system. By establishing the location of the user, the server may search for hotspots on a database stored on the system. The server establishes the dimensions of a hotspot zone around the user's location and transmits the hotspots and the zone dimensions to the application on the user device. The application monitors the location of the user device and deliver's configured alerts to the user when approaching a hotspot. When the device leaves a zone or remains idle for a configured amount of time, the device requests and receives an updated zone of hotspots. | 01-28-2016 |