Patent application number | Description | Published |
20120079315 | SYSTEM AND METHOD FOR TRANSPARENT RECOVERY OF DAMAGED OR UNAVAILABLE OBJECTS IN A REPLICATED OBJECT STORAGE SYSTEM - A redundant array of independent nodes are networked together. Each node executes an instance of an application that provides object-based storage. The nodes are grouped into a plurality of systems each having multiple nodes. An object recovery method comprises: receiving, by a first system of the plurality of systems from a client application, a read request for an object, the object having been replicated to/from at least one second system among the plurality of systems; if the object of the read request is available in the first system, returning by the first system the object of the read request to the client application; and if the object of the read request is not available in the first system, performing a read from replica process by the first system to access a replica of the object from a second system among the plurality of systems and using the replica of the object to return the object of the read request to the client application. | 03-29-2012 |
20120079424 | SYSTEM AND METHOD FOR OPTIMIZING PROTECTION LEVELS WHEN REPLICATING DATA IN AN OBJECT STORAGE SYSTEM - A redundant array of independent nodes are networked together. Each node executes an instance of an application that provides object-based storage. The nodes are grouped into a plurality of systems each having multiple nodes. A data protection level method comprises setting a numerical value of a system dynamic data protection level for each system of nodes; and in response to user input, setting a value of a data protection level for one or more data objects in a system, the value being a fixed numerical value or a dynamic value. If the one or more data objects have a dynamic value of the data protection level in a system, the one or more data objects inherit the system dynamic data protection level of the system in which the one or more data objects reside. The value of the data protection level represents a number of copies of data of the one or more data objects to be kept where the one or more data objects reside. | 03-29-2012 |
20140181446 | SYSTEM AND METHOD FOR OPTIMIZING PROTECTION LEVELS WHEN REPLICATING DATA IN AN OBJECT STORAGE SYSTEM - A redundant array of independent nodes are networked together. Each node executes an instance of an application that provides object-based storage. The nodes are grouped into a plurality of systems each having multiple nodes. A data protection level method comprises setting a numerical value of a system dynamic data protection level for each system of nodes; and in response to user input, setting a value of a data protection level for one or more data objects in a system, the value being a fixed numerical value or a dynamic value. If the one or more data objects have a dynamic value of the data protection level in a system, the one or more data objects inherit the system dynamic data protection level of the system in which the one or more data objects reside. The value of the data protection level represents a number of copies of data of the one or more data objects to be kept where the one or more data objects reside. | 06-26-2014 |
20140330785 | HIGHLY AVAILABLE SEARCH INDEX WITH STORAGE NODE ADDITION AND REMOVAL - A redundant array of independent nodes are networked together. Each node executes an instance of an application that provides object-based storage. The nodes are grouped into systems each having multiple nodes. A search index is provided in each system for locating objects within the system. A method of managing the search index comprises splitting the search index into shards to be divided among a plurality of regions ( | 11-06-2014 |
20150278311 | CONTENT CLASS FOR OBJECT STORAGE INDEXING SYSTEM - A storage system comprises a controller; a memory; and one or more objects each including content data and metadata. The metadata is used to construct user-defined content properties, each content property providing an ability to extract a specific metadata field from the objects by referring to a user-defined content property name of the content property. The content properties are organized into user-defined content classes, each content class grouping a set of content properties into a named category under a user-defined content class name. The controller is operable to index the content properties of the content classes to create an index. The content properties being indexed are identified by the content property names. In some embodiments, the controller is operable to de-dupe the index, for content properties having same values expressed differently in different metadata formats, by directing the differently expressed values to same index field under same content property name. | 10-01-2015 |
20150293984 | DECOUPLED CONTENT AND METADATA IN A DISTRIBUTED OBJECT STORAGE ECOSYSTEM - A storage system comprises: a controller; a memory; one or more objects, each object having content data and metadata which includes system metadata; and a policy which governs writing of the content data and metadata of the one or more objects from the storage system to an external storage. The policy includes a configurable criterion for decoupling of the content data and the metadata of a given object and a rule for determining storage locations for the content data and the metadata between the storage system and the external storage in a decoupled manner if the content data and the metadata of the object are decoupled. The configurable criterion is based on an attribute of the metadata of the object. The controller is operable to execute the policy against the objects and to apply the rule to determine storage locations for the content data and metadata of a decoupled object. | 10-15-2015 |
20160004760 | SYSTEM AND METHOD FOR OPTIMIZING PROTECTION LEVELS WHEN REPLICATING DATA IN AN OBJECT STORAGE SYSTEM - A redundant array of independent nodes are networked together. Each node executes an instance of an application that provides object-based storage. The nodes are grouped into a plurality of systems each having multiple nodes. A data protection level method comprises setting a numerical value of a system dynamic data protection level for each system of nodes; and in response to user input, setting a value of a data protection level for one or more data objects in a system, the value being a fixed numerical value or a dynamic value. If the one or more data objects have a dynamic value of the data protection level in a system, the one or more data objects inherit the system dynamic data protection level of the system in which the one or more data objects reside. The value of the data protection level represents a number of copies of data of the one or more data objects to be kept where the one or more data objects reside. | 01-07-2016 |
Patent application number | Description | Published |
20110106770 | Fixed content storage within a partitioned content platform using namespaces, with versioning - Archive cluster management is enhanced by logically partitioning a physical cluster that comprises a redundant array of independent nodes. Using a web-based interface, an administrator defines one or more “tenants” within the archive cluster, wherein a tenant has a set of attributes: namespaces, administrative accounts, data access accounts, and a permission mask. A namespace is a logical partition of the cluster that serves as a collection of objects typically associated with at least one defined application. Each namespace has a private file system with respect to other namespaces. This approach enables a user to segregate cluster data into logical partitions. Using the administrative interface, a namespace associated with a given tenant is selectively configured without affecting a configuration of at least one other namespace in the set of namespaces. One configuration option is “versioning,” by which an administrator can elect to enable multiple versions of a same data object to be stored in association with a given namespace. Each version of the data object has associated therewith a time of storage attribute that uniquely identifies the version in the archive. Once versioning is enabled for a namespace, the administrator can set a configuration parameter identifying a time period for maintaining a version in the archive cluster, as well as a parameter for a time period for maintaining a version of the data object on a replica associated with the archive cluster. A current version of the data object is freely accessible in the archive, and a prior version may be browsed via an API. Preferably, versioning is disabled for a data object under retention. | 05-05-2011 |
20140108346 | Fixed content storage within a partitioned content platform, with replication - A content platform cluster that comprises an array of nodes is logically partitioned. Using a web-based interface, an administrator defines “tenants” within the cluster, wherein a tenant has a set of attributes: namespaces, administrative accounts, data access accounts, and a permission mask. A namespace is a logical partition of the cluster that serves as a collection of objects typically associated with at least one defined application. Each namespace has a private file system with respect to other namespaces. This approach enables a user to segregate cluster data into logical partitions. Tenant information, including all associated namespaces, in the cluster (the “source cluster”) is replicated to at least one target cluster over a replication link. Preferably, replication is available for multiple tenants in the source cluster, and a replication algorithm ensures that a particular tenant can be added to the replication link without stalling the progress of other tenants. | 04-17-2014 |
Patent application number | Description | Published |
20110077400 | PROCESSES FOR PREPARING TETRAHYDROISOQUINOLINES - Disclosed are processes for preparing tetrahydroisoquinolines, intermediates useful in the preparation of tetrahydroisoquinolines, processes for preparing such intermediates, and a crystalline form of 6-[(4S)-2-methyl-4-(naphthyl)-1,2,3,4-tetrahydroisoquinolin-7-yl]pyridazin-3-amine. Also disclosed are pharmaceutical compositions comprising tetrahydroisoquinolines, methods of using tetrahydroisoquinolines in the treatment of depression and other conditions and methods for obtaining the crystalline form. | 03-31-2011 |
20120184531 | BENZOFURO[3,2-c] PYRIDINES AND RELATED ANALOGS AS SEROTONIN SUB-TYPE 6 (5-HT6) MODULATORS FOR THE TREATMENT OF OBESITY, METABOLIC SYNDROME, COGNITION AND SCHIZOPHRENIA - The present invention relates to benzofuro[3,2-c]pyridine and azepine analogs as serotonin sub-type 6 (5-HT | 07-19-2012 |
20130060027 | TETRAHYDROISOQUINOLINES AND INTERMEDIATES THEREFOR - Disclosed are processes for preparing tetrahydroisoquinolines, intermediates useful in the preparation of tetrahydroisoquinolines, processes for preparing such intermediates, and a crystalline form of 6-[(4S)-2-methyl-4-(naphthyl)-1,2,3,4-tetrahydroisoquinolin-7-yl]pyridazin-3-amine. Also disclosed are pharmaceutical compositions comprising tetrahydroisoquinolines, methods of using tetrahydroisoquinolines in the treatment of depression and other conditions and methods for obtaining the crystalline form. | 03-07-2013 |
20150191494 | TETRAHYDROISOQUINOLINES AND INTERMEDIATES THEREFOR - Disclosed are processes for preparing tetrahydroisoquinolines, intermediates useful in the preparation of tetrahydroisoquinolines, processes for preparing such intermediates, and a crystalline form of 6-[(4S)-2-methyl-4-(naphthyl)-1,2,3,4-tetrahydroisoquinolin-7-yl]pyridazin-3-amine. Also disclosed are pharmaceutical compositions comprising tetrahydroisoquinolines, methods of using tetrahydroisoquinolines in the treatment of depression and other conditions and methods for obtaining the crystalline form. | 07-09-2015 |
Patent application number | Description | Published |
20110160220 | CRYSTALLINE FORM OF 6-[(4S)-2-METHYL-4-(2-NAPHTHYL)-1,2,3,4-TETRAHYDROISOQUINOLIN-7-YL]PYRIDA- ZIN-3-AMINE - The present disclosure generally relates to a crystalline form of 6-[(4S)-2-methyl-4-(naphthyl)-1,2,3,4-tetrahydroisoquinolin-7-yl]pyridazin-3-amine. The present disclosure also generally relates to pharmaceutical compositions comprising the crystalline form, as well of methods of using a crystalline form in the treatment of depression and other conditions and methods for obtaining such crystalline form. | 06-30-2011 |
20140275101 | CRYSTALLINE FORM OF 6-[(4S)-2-METHYL-4-(2-NAPHTHYL)-1,2,3,4-TETRAHYDROISOQUINOLIN-7-YL]PYRIDA- ZIN-3-AMINE - The present disclosure generally relates to a crystalline form of 6-[(4S)-2-methyl-4-(naphthyl)-1,2,3,4-tetrahydroisoquinolin-7-yl]pyridazin-3-amine. The present disclosure also generally relates to pharmaceutical compositions comprising the crystalline form, as well of methods of using a crystalline form in the treatment of depression and other conditions and methods for obtaining such crystalline form. | 09-18-2014 |
20150366864 | CRYSTALLINE FORM OF 6-[(4S)-2-METHYL-4-(2-NAPHTHYL)-1,2,3,4-TETRAHYDROISOQUINOLIN-7-YL]PYRIDA- ZIN-3-AMINE - The present disclosure generally relates to a crystalline form of 6-[(4S)-2-methyl-4-(naphthyl)-1,2,3,4-tetrahydroisoquinolin-7-yl]pyridazin-3-amine. The present disclosure also generally relates to pharmaceutical compositions comprising the crystalline form, as well of methods of using a crystalline form in the treatment of depression and other conditions and methods for obtaining such crystalline form. | 12-24-2015 |
Patent application number | Description | Published |
20090287907 | System for providing trace data in a data processor having a pipelined architecture - The invention is a method and system for providing trace data in a pipelined data processor. Aspects of the invention include providing a trace pipeline in parallel to the execution pipeline, providing trace information on whether conditional instructions complete or not, providing trace information on the interrupt status of the processor, replacing instructions in the processor with functionally equivalent instructions that also produce trace information and modifying the scheduling of instructions in the processor based on the occupancy of a trace output buffer. | 11-19-2009 |
20140068232 | GLOBAL REGISTER PROTECTION IN A MULTI-THREADED PROCESSOR - Global register protection in a multi-threaded processor is described. In an embodiment, global resources within a multi-threaded processor are protected by performing checks, before allowing a thread to write to a global resource, to determine whether the thread has write access to the particular global resource. The check involves accessing one or more local control registers or a global control field within the multi-threaded processor and in an example, a local register associated with each other thread in the multi-threaded processor is accessed and checked to see whether it contains an identifier for the particular global resource. Only if none of the accessed local resources contain such an identifier, is the instruction issued and the thread allowed to write to the global resource. Otherwise, the instruction is blocked and an exception may be raised to alert the program that issued the instruction that the write failed. | 03-06-2014 |
20150058574 | Increasing The Efficiency of Memory Resources In a Processor - Methods of increasing the efficiency of memory resources within a processor are described. In an embodiment, instead of including dedicated DSP indirect register resource for storing data associated with DSP instructions, this data is stored in an allocated and locked region within the cache. The state of any cache lines which are used to store DSP data is then set to prevent the data from being written to memory. The size of the allocated region within the cache may vary according to the amount of DSP data that needs to be stored and when no DSP instructions are being run, no cache resources are allocated for storage of DSP data. | 02-26-2015 |
20150160981 | Global Register Protection In A Multi-Threaded Processor - Global register protection in a multi-threaded processor is described. In an embodiment, global resources within a multi-threaded processor are protected by performing checks, before allowing a thread to write to a global resource, to determine whether the thread has write access to the particular global resource. The check involves accessing one or more local control registers or a global control field within the multi-threaded processor and in an example, a local register associated with each other thread in the multi-threaded processor is accessed and checked to see whether it contains an identifier for the particular global resource. Only if none of the accessed local resources contain such an identifier, is the instruction issued and the thread allowed to write to the global resource. Otherwise, the instruction is blocked and an exception may be raised to alert the program that issued the instruction that the write failed. | 06-11-2015 |
20150264391 | Error Tracking and Mitigation for Motion Compensation-Based Video Compression - Methods and encoders for tracing an error in a frame of a video to a subsequent frame of the video. In response to receiving an error notification message indicating an error has occurred in an encoded frame during decode, an encoder obtains: (a) the minimum and maximum horizontal motion vector components for each column of blocks of the frame immediately following the error frame; and (b) the minimum and maximum vertical motion vector components for each row of blocks of the frame immediately following the error frame. A rectangular region of blocks of the frame immediately following the error frame that the error is likely to have propagated to is identified using the minimum and maximum horizontal and vertical motion vector components. | 09-17-2015 |
Patent application number | Description | Published |
20080231976 | Security Device Based on Customized Microprism Film - A security device comprises at least two regions, each region comprising a prismatic surface structure defining an array of substantially planar facets. Each region forms a reflector due to total internal reflection when viewed at least one first viewing angle and is transparent when viewed at least one second viewing angle. The said at least one first viewing angle of one region is different from the at least one first viewing angle of the other region. Furthermore, a security device comprising an asymmetrical or truncated prismatic surface structure is located in a transparent area of an article. | 09-25-2008 |
20080311317 | Substrates - The invention relates to improvements in substrates and in particular to new substrates having magnetic and visual security features, which provide security against imitation. A security substrate comprising a transparent polymer carrier layer bearing indicia formed from a plurality of opaque and non-opaque regions and a transparent magnetic layer supported by the carrier layer containing a distribution of particles of a hard magnetic material of a size and distributed in a concentration at which the magnetic layer remains transparent. | 12-18-2008 |
20090029123 | Substrates - The invention relates to improvements in substrates and in particular to new substrates having magnetic and visual security features, which provide security against imitation. A security substrate comprising a transparent polymer carrier layer bearing indicia formed from a plurality of opaque and non-opaque regions and a clear and transparent magnetic layer supported by the carrier layer containing a distribution of particles of a soft magnetic material of a size and distributed in a concentration at which the magnetic layer remains clear and transparent. | 01-29-2009 |
20090034082 | Optically Variable Devices - A security device comprises a substrate ( | 02-05-2009 |
20090250920 | Security device for security substrates - The invention relates to a security device for security substrates, such as paper, used for making security documents, such as bank notes, having anti-counterfeitable features. The security device comprises a carrier of an at least partially light transmitting polymeric material, said carrier being provided with indicia. The indicia comprise a first component being at least one non-alphanumeric pattern which repeats along the length of the device and is formed from at least one fine line, and a second component being alphanumeric characters, the two components being registered to and interlinked with each other. | 10-08-2009 |
20110122499 | Optically variable devices - A security device comprises a substrate having an array of microlenses on one side and one or more corresponding arrays of microimages on the other side. The microimages are located at a distance from the microlenses substantially equal to the focal length of the microlenses. The substrate is sufficiently transparent to enable light to pass through the microlenses so as to reach the microimages. Each microimage is defined by an anti-reflection structure on the substrate formed by a periodic array of identical structural elements, light passing through a substrate and impinging on the microimages being reflected to a different extent than light which does not impinge on the microimages thereby rendering the microimages visible. | 05-26-2011 |