Jarno
Jarno Hoffrén, Jarvenpaa FI
Patent application number | Description | Published |
---|---|---|
20110130863 | METHOD FOR CONTROLLING A CRANE - A method for controlling a crane includes controlling a rope part connected to a hook of the crane with a friction-operated driving wheel, extra rope being coiled into a plurality of layers onto a storage reel. In the method, two machineries are used, of which the first is intended for the driving wheel and the other for the storage reel, one machinery being controlled with a speed instruction and the other machinery with a torque instruction. | 06-02-2011 |
Jarno Huikko, Korpilahti FI
Patent application number | Description | Published |
---|---|---|
20130074629 | METHOD FOR CONTROLLING LUBRICATION OF A GEAR UNIT AND A GEAR UNIT - A method for controlling lubrication of a gear unit, in which method temperature of a lubrication fluid circulating in a lubrication channelling of a gear unit is measured, wherein the temperature of lubrication fluid is measured in at least two locations of the gear unit, and larger proportion of the lubrication fluid is directed to the warmer of the at least two locations and correspondingly smaller proportion of the lubrication fluid is directed to the colder of the at least two locations. The invention relates also to such a gear unit. | 03-28-2013 |
20130074630 | METHOD FOR CONTROLLING LUBRICATION OF A GEAR UNIT AND A GEAR UNIT - A method for controlling lubrication of a gear unit, where the lubrication method of the gear unit is changed between circulating lubrication and splash lubrication during operation of the gear unit, wherein the temperature of the lubrication fluid is measured, and the change between circulation lubrication and splash lubrication is based on the measured temperature of the lubrication fluid. The invention also relates to such a gear unit. | 03-28-2013 |
Jarno Kangastupa, Tampere FI
Patent application number | Description | Published |
---|---|---|
20120067858 | Method and apparatus for processing substrates using a laser - The invention relates to a method and apparatus for processing substrates, such as glass and semiconductor wafers. The method comprises directing to the substrate from a laser source a plurality of sequential focused laser pulses having a predetermined duration, pulsing frequency and focal spot diameter, the pulses being capable of locally melting the substrate, and moving the laser source and the substrate with respect to each other at a predetermined moving velocity so that a structurally modified zone is formed to the substrate. According to the invention, the pulse duration is in the range of 20-100 ps, pulsing frequency at least 1 MHz and moving velocity adjusted such that the distance between successive pulses is less than ⅕ of the diameter of the focal spot. The invention can be utilized, for example, for efficient dicing, scribing and welding of materials which are normally transparent. | 03-22-2012 |
20130070428 | METHOD OF SEALING AND CONTACTING SUBSTRATES USING LASER LIGHT AND ELECTRONICS MODULE - The invention concerns a method of fusing and electrically contacting a first insulating substrate ( | 03-21-2013 |
Jarno Kangastupa, Kangasala FI
Patent application number | Description | Published |
---|---|---|
20080269870 | Method for Preparing Medical Stents - A method for preparing stents, with a stent blank subjected to a work process, in which the desired pattern is cut through the stent blank by evaporating the stent material with a diode-pumped fibre laser. The used fibre laser is preferably a picosecond laser having a minimum power of 20 W and a repetition frequency above 1 MHz. | 10-30-2008 |
Jarno Kuittinen, Tampere FI
Patent application number | Description | Published |
---|---|---|
20130008716 | Rock Drilling Rig and Method for Positioning the Same - The invention relates to method for positioning a rock drilling rig and to a rock drilling rig. The rock drilling rig is moved using combustion-engine-free drive equipment with an electric drive motor. The torque is transmitted from the drive motor to the traction wheels over a mechanical anti-slip transmission connection. The ratio between the drive motor rotation rate and the traction wheel rotation rate is kept constantly the same during positioning. The drive motor is not only used for moving but also for stopping. | 01-10-2013 |
20130056271 | ROCK DRILLING RIG, METHOD FOR CONTROLLING THE TEMPERATURE OF ITS DRIVE EQUIPMENT, AND LIQUID COOLING SYSTEM - The invention relates to a rock drilling rig, a method for controlling the temperature of its drive equipment, and a liquid cooling system. The rock drilling rig includes combustion-engine-free drive equipment, which includes electric components for affecting transfer drive. The rock drilling rig is also provided with a liquid cooling system, to which one or more electric components affecting the transfer drive are connected to be cooled by the system. The cooling of the components is controlled by a control unit according to a strategy set therein. The cooling system may additionally be precooled before the transfer drive. | 03-07-2013 |
20130056279 | ROCK DRILLING RIG AND METHOD FOR DOWNHILL DRIVE - The invention relates to a rock drilling rig and a method for downhill driving of a rock drilling rig. The rock drilling rig comprises electric drive equipment, the drive motor of which serves as a primary brake in long-term downhill driving. The drive motor thus converts kinetic energy into electric energy, with which an energy storage is charged. To consume surplus electric energy, a hydraulic system or a compressed air system is turned on. A hydraulic pump and a compressor ( | 03-07-2013 |
20130214928 | ROCK DRILLING RIG, METHOD FOR TRANSFER DRIVE OF THE SAME, AND SPEED CONTROLLER - The invention relates to a rock drilling rig, a method for transfer drive of the rock drilling rig, and a speed controller. The rock drilling rig includes combustion-engine-free drive equipment which includes a plurality of electric components for implementation of the transfer drive. The control unit of the rock drilling rig includes load monitoring which monitors the load of the components during the transfer drive. Load monitoring allows the electric driving system to be intentionally overloaded for a period of time limited in advance. A user interface of the control unit comprises a speed controller whose control element has a first control range, where operation takes place in the rated load range, and a second control range, where operation takes place in the overload range. | 08-22-2013 |
20130228377 | ROCK DRILLING RIG AND METHOD FOR TRANSMISSION OF ROCK DRILLING RIG - A rock drilling rig and to a method for transmission thereof is provided. The rock drilling rig includes a carriage that is movable by drive equipment in a mine. The rock drilling rig includes a hydraulic drilling system for which pressure energy is generated by a hydraulic pump. The rock drilling rig is electrically driven and includes an electric motor that is connected to drive both the drive equipment and the hydraulic drilling system. The mechanical drive transmission included in the drive equipment and the hydraulic pump of the hydraulic drilling system may be connected and disconnected independently of one another by means of clutches. | 09-05-2013 |
Jarno Kuittinen, Lempaala FI
Patent application number | Description | Published |
---|---|---|
20110224859 | METHOD FOR USING MINING VEHICLE, ARRANGEMENT IN MINE, ROCK DRILLING RIG, AND MINING VEHICLE - A method for using a mining vehicle, arrangement in a mine, rock drilling rig, and mining vehicle. Tasks according to a work cycle are performed at work sites with a mining work device in a mining vehicle. At the work site, the vehicle is connected to an external electrical network. An energy storage of the vehicle is charged during the work cycle defined by a excavation plan, when the vehicle is at a work site. After the work cycle is done, electricity obtained from the energy storage is used in a transfer drive. | 09-15-2011 |
Jarno Marchetto, Genestrario CH
Patent application number | Description | Published |
---|---|---|
20090262755 | METHOD AND SYSTEM OF DATA PACKET TRANSMISSION TIMING FOR CONTROLLING BANDWIDTH - A method and system for determining a wait time (t | 10-22-2009 |
Jarno Niemalä, Espoo FI
Patent application number | Description | Published |
---|---|---|
20130040603 | Wireless access point detection - According to aspects of the present invention there are provided methods and apparatus for detecting a suspect wireless access point in a communication network including a plurality of wireless access points providing access services to client devices. Identity information associated with the wireless access points is collected from a multiplicity of client devices. A reputation request is received from a client device, the request including identity information of an available wireless access point. The received identity information is compared with the collected identity information for determining an indication of trust of the available wireless access point. The indication of trust of the available wireless access point is transmitted to the client device. The wireless access points may include a cellular wireless access point or base station, wireless access point, a Wi-Fi access point, or a femto-cell access point. | 02-14-2013 |
Jarno Niemalä, Espoo FI
Patent application number | Description | Published |
---|---|---|
20130040603 | Wireless access point detection - According to aspects of the present invention there are provided methods and apparatus for detecting a suspect wireless access point in a communication network including a plurality of wireless access points providing access services to client devices. Identity information associated with the wireless access points is collected from a multiplicity of client devices. A reputation request is received from a client device, the request including identity information of an available wireless access point. The received identity information is compared with the collected identity information for determining an indication of trust of the available wireless access point. The indication of trust of the available wireless access point is transmitted to the client device. The wireless access points may include a cellular wireless access point or base station, wireless access point, a Wi-Fi access point, or a femto-cell access point. | 02-14-2013 |
Jarno Niemelä, Helsinki FI
Patent application number | Description | Published |
---|---|---|
20110225655 | Malware protection - According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file whilst providing indications to the executable file that it is being executed within an emulated computer system. | 09-15-2011 |
20130095751 | Near Field Communication Security - In accordance with an example embodiment of the present invention, there is provided a computing device, including at least one processor; and at least one memory including computer program code the at least one memory and the computer program code configured to, with the at least one processor, cause the device to perform at least the following: receive near field communication device data related to a specific NFC device; generate a reputation query on the basis of the received NFC device data; send the generated reputation query to a service provider; receive reputation data, retrieved from a reputation database of NFC device reputation information, related to the specific NFC device from the service provider; and take further action on the basis of the received reputation relating to the specific NFC device. | 04-18-2013 |
Jarno Niemelä, Espoo FI
Patent application number | Description | Published |
---|---|---|
20100011029 | Malware detection - According to a first aspect of the present invention there is provided a method of detecting malware in a mobile telecommunications device | 01-14-2010 |
20100262584 | Disinfecting a file system - A method and apparatus for disinfecting an infected electronic file in a file system. A file system is scanned using an anti-virus application to identify the infected electronic file. Once the infected file has been identified, information identifying the infected electronic file is sent to a remote node, which queries a database storing a plurality commonly used electronic files to determine whether a clean version of the electronic file is stored at the database. If so, then all or part of the clean version of the infected electronic file is sent from the remote node, and used to replace all or part of the electronic file stored in the file system. | 10-14-2010 |
20110082838 | Computer security method and apparatus - A method of controlling a process on a computer system for backing-up files stored in a primary storage medium, to a secondary storage medium. The method comprises monitoring a file system implemented on the computer system in order to detect write operations made by the file system to said primary storage medium. Upon detection of a write operation, the integrity of a file being written is verified and/or changes in the file identified with respect to a version of the file currently stored in the primary storage medium and which is being replaced. In the event that the integrity of a file being written by the file system is compromised, and/or any identified changes in the file are suspicious, then the file is identified to the back-up process such that automatic back-up of the file is inhibited. | 04-07-2011 |
20110167275 | MALWARE DETECTION METHOD AND APPARATUS - According to a first aspect of the present invention there is provided a malware detection method implemented within a computer. The method includes, for a given electronic file, determining if the file is associated with a valid digital signature. If the file is associated with a valid digital signature, then verifying that the signature belongs to a trusted source. If the signature does belong to a trusted source then not performing a malware scan of said file, and if the signature cannot be verified as belonging to a trusted source then performing said scan. | 07-07-2011 |
20120117648 | Malware Determination - A method and apparatus for a determining whether an electronic file stored at a client device is malware. A server receives from the client device a request message that signature information of the electronic file. The server queries a database of signature information of a multiplicity of electronic files. If the signature information of the electronic file corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information of the electronic file does not correspond to signature information stored on the database, a determination is made as to whether a predetermined number of further request messages for the electronic file are received from further client devices within a predetermined time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware. | 05-10-2012 |
20120151578 | Detecting a suspicious entity in a communication network - A method and apparatus for detecting a suspicious entity in a communication network. A receiving device receives a message from a sender. A processor obtains domain information or a user identity, and further contact information from data contained in the message. A reputation query message is sent to a Network Reputation Server (NRS), the reputation query message including the domain information or user identity. A reply is received from the NRS that indicates that the domain information or user identity is related to a suspicious entity. The receiving device then associates the contact information with the suspicious entity. In this way, if a user of the receiving device attempts to use the contact information, they can be prevented from doing this or informed that it relates to a suspicious entity. | 06-14-2012 |
20120173699 | Controlling access to web content - A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer. | 07-05-2012 |
20120183130 | Managing Communications in a Communication Network - A method and apparatus for managing communications in a communication network. A telephony device determines that a software application is attempting to contact an E.164 number. It then determines that the E.164 number matches at least one predetermined criterion, such as the E.164 number being a premium rate number or having a different country code to that of the device. The device then sends a query to a reputation server. The query includes information identifying the software application. The device receives a response from the reputation server, the response including a reputation relating to the software application. On the basis of the received reputation relating to the software application, the device can take further action such as preventing contact from being established. | 07-19-2012 |
20120203904 | Controlling Internet Access Using DNS Root Server Reputation - A method of controlling internet access on a client computer. The method comprises identifying a DNS request generated on the client computer and which is addressed to a specific DNS root server, and sending an information request to a central server identifying said DNS root server. Then, at the central server, reputation information for said DNS root server is determined, and said reputation information is provided from the central server to the client computer. The reputation information is then used at the client computer to handle the DNS request or a response to that request. | 08-09-2012 |
20120210431 | Detecting a trojan horse - A method and apparatus for detected a Trojan in a suspicious software application in the form of at least one electronic file. A computer device determines the source from which the suspicious software application was obtained. A comparison is then made between the source from which the suspicious software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious application is more likely to contain a Trojan horse than if the sources were the same. | 08-16-2012 |
20120210435 | Web content ratings - A method of performing a security check at a user computer on web page content downloaded to the user computer over the Internet. The method includes retrieving rating information for the web page from a web service over the Internet, the rating information including one or more content ratings and a first signature generated from the content, using a specified algorithm, at substantially the same time as the or each content rating was determined. The downloaded web page content is then processed using said specified algorithm to generate a second signature, and said first and second signatures are compared and the differences therebetween quantified. It is then determined if the quantified difference exceeds a threshold value. If not, then the received content rating(s) is(are) trusted. If yes, then the result is reported to said web service. | 08-16-2012 |
20130067576 | Restoration of file damage caused by malware - In accordance with an example embodiment of the present invention, there is provided a method including: detecting a malware in a computer system and in response to the detection of the malware in the computer system initiating a deactivation of malware; detecting a file altered by the malware in response to a successful deactivation of the malware; and initiating a restoration of the altered file in response to the detection of the file altered by the malware. | 03-14-2013 |
20130081129 | Outbound Connection Detection and Blocking at a Client Computer - A method of detecting and blocking a malicious SSL connection at a client computer. The method includes identifying, at a network firewall level, an outbound SSL connection being set up at the client computer; detecting an SSL certificate associated with the SSL connection; sending a request to a central server for reputation information on the SSL certificate; at the central server, determining reputation information in dependence upon the SSL certificate; providing said reputation information from the central server to the client computer; and using the reputation information at the client computer to determine whether or not to block the connection. | 03-28-2013 |
20130262706 | Data Syncronisation - The present invention relates to a method for synchronising files between devices between two devices. The method includes creating a rule to control the synchronisation of the file. The rule includes at least one condition for synchronisation which is dependent upon a property of a device. | 10-03-2013 |
Jarno Nikkanen, Tampere FI
Patent application number | Description | Published |
---|---|---|
20080297816 | Method and system for black-level correction on digital image data - The black level in raw image data captured from an image sensor does not always stay fixed at a constant level, but may change as a function of the analog gain and exposure time and may vary from one spatial location of the pixels to another. To carry out black-level correction on the raw image data, the black level of each of the color components is measured at one or more sampling locations. A look-up table is generated based on the measured black levels and a computation module is used to carry out black-level correction based on the information stored in the look-up table. The look up table may have information indicative of the analog gain level and the exposure time and the variations of black-levels in different spatial locations. | 12-04-2008 |
20090295938 | IMAGE PROCESSING DEVICE WITH AUTOMATIC WHITE BALANCE - The purpose of the present invention is to provide sophisticated AWB technologies. According to one aspect of the present invention, there is provided a technology for adjusting a white balance of a frame of image data including a plurality of color elements. This technology is characterized by comprising: dividing the frame into a plurality of blocks including a plurality of pixel data; judging, for each of all of or a part of the blocks, whether the block is likely to be grey or not, and; deciding gains for adjusting a white balance using the blocks judged as being likely to be grey. | 12-03-2009 |
20120194708 | Digital Camera Devices and Methods for Implementing Digital Zoom in Digital Camera Devices and Corresponding Program Products - A device having a digital zoom function to form an output image, including a sensor and optics to produce a primary image, a display in which the primary image is arranged to be cropped in connection with the digital zoom function to form said output image, user interface means to set one or more settings relating to the digital zoom function and a image processor arranged to put a size for said output image based on the cropping of the primary image. The user interface arranged to be set as said setting one or more size limit for said output image and based on the one or more size limit and the size of the cropped primary image, the image processor arranged to perform scaling operations for the cropped primary image at least in part of the digital zoom range defined by said one or more size limit. | 08-02-2012 |
20140204221 | Imaging Unit, Apparatus Comprising an Imaging Unit, a System, and Methods for Calibrating an Imaging Apparatus Optimization - Improved systems and techniques for calibrating an electronic imaging module are described. An electronic imaging module is subjected to a stimulus and properties of the stimulus are measured. Calibration data associated with the electronic imaging module is stored. The calibration data comprises calibration data indicative of a response of the electronic imaging module to the stimulus, as well as calibration data indicative of the measured properties of the stimulus. | 07-24-2014 |
Jarno Piironen, Espoo FI
Patent application number | Description | Published |
---|---|---|
20080256087 | APPARATUSES AND METHODS FOR MANAGING CONTENT STORED IN DEVICES - Apparatuses, methods, and computer program products for managing content are provided. The apparatus includes a processor that can communicate with a number of devices, identify content files stored by the devices, and provide a visible indicia of each device in which each content file is stored. The processor may also detect devices configured to store various types of content files and may receive user input selecting a particular content file for downloading, such as from a content provider's website. A list of the downloaded content files, along with information regarding each file, the devices capable of storing each file, and the devices actually used to store each file, may be displayed to the user. In this way, the user may be able to see a list of the various content files that have been downloaded as well as a visible indicia of where each file is stored. | 10-16-2008 |
Jarno Rajahalme, Belmont, CA US
Patent application number | Description | Published |
---|---|---|
20150078384 | Tracking Prefixes of Values Associated with Different Rules to Generate Flows - Some embodiments provide a method for a forwarding element that forwards packets. The method receives a packet and consults a tree structure to identity a prefix length associated with an IP address in the packet header. The method skips lookup of each subtable with a set of IP addresses that have a different prefix length than the identified prefix length. The method identifies a matching rule from a particular subtable. The method generates a flow based on the matching rule. The flow is used to process packets that have the same prefix. | 03-19-2015 |
20150078386 | Performing a Multi-Stage Lookup to Classify Packets - Some embodiments provide a method for a forwarding element that forwards packets. The method receives a packet. The method performs a first stage lookup of a hash table for a first hash of a first set of header fields and un-wildcards bits of a wildcard mask that corresponds to the first set of header fields. If a matching hash is found in the first stage lookup, the method performs a second stage lookup of the hash table for a second hash of a second set of header fields and un-wildcards bits of the wildcard mask that corresponds to the second set of header fields. The method identifies a matching rule for the packet. The method generates a flow based on the matching rule and the wildcard mask, wherein the flow is used to process each other packets that match each bit which is un-wildcarded. | 03-19-2015 |
20150092778 | Tracking Prefixes of Values Associated with Different Rules to Generate Flows - Some embodiments provide a method for a forwarding element that forwards packets. The method receives a packet. The method consults a tree structure to generate a wildcard mask. The consulting includes traversing the tree structure by tracing a set of bits from the packet header and un-wildcarding the corresponding set of bits from the wildcard mask. The method identifies a matching rule for the packet. The method generates a flow based on the matching rule and the wildcard mask. The flow is used to process each other packet that matches each un-wildcarded bit of the flow. | 04-02-2015 |
Jarno Rajahalme, Kirkkonummi FI
Patent application number | Description | Published |
---|---|---|
20080200188 | Base-Station-Controlled Paging in Mobile Radio Systems - This invention relates to a method for paging a mobile station ( | 08-21-2008 |
Jarno Rajahalme, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20150281081 | HASHING TECHNIQUES FOR USE IN A NETWORK ENVIRONMENT - Some embodiments provide a physical forwarding element that hashes portions of packet headers using several novel hashing techniques. The techniques include a novel set of finishing operations that improve the quality of resulting hashes by increasing their distribution and improving their apparent-randomness. In addition, the finishing operations virtually guarantee that different length inputs will hash to different results, even when padded to be the same initial values. The techniques also include efficient handling of remainder sections when distributing sections of a hash input across multiple processing units. The remainders are hashed into various previously generated hashes based on how many remainders result. These hashing techniques are useful for many network applications. | 10-01-2015 |
20150281082 | PERFORMING A FINISHING OPERATION TO IMPROVE THE QUALITY OF A RESULTING HASH - Some embodiments provide a physical forwarding element that hashes portions of packet headers using several novel hashing techniques. The techniques include a novel set of finishing operations that improve the quality of resulting hashes by increasing their distribution and improving their apparent-randomness. In some embodiments, the finishing operation includes at least one of multiplying the hash by a prime number to increase distribution of the bits of the hash, accumulating a length of the portion into the hash, and combining higher bits of the hash with lower bits of the hash in order to increase the entropy of the lower bits of the hash. | 10-01-2015 |
Jarno Rautakorpi, Helsinki FI
Patent application number | Description | Published |
---|---|---|
20120297480 | Application revocation - In accordance with an example embodiment of the present invention, there is provided apparatus, including: at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: receiving an application revocation request; confirming whether initiating an application revocation process is allowed; generating application revocation data once initiating the application revocation process has been allowed; storing the generated application revocation data to a reputation service network; and provide one or more revocation clients the generated application revocation data from the reputation service network in order to enable the one or more revocation clients revoking the application. | 11-22-2012 |
Jarno Tyybakinoja, Helsinki FI
Patent application number | Description | Published |
---|---|---|
20130240582 | HOLSTER - A holster for a pistol, in which pistol there is a grip, a barrel, a trigger, and a trigger guard, includes a rigid case partly surrounding at least the barrel and the trigger guard, and a belt clip for carrying the case on the belt of the user at the side of their hip, and a locking mechanism integrated in the case for locking the pistol into it, which locking mechanism further includes an arm and a catch for securing the trigger guard to the case. The arm is pivoted to the outer surface of the case with the aid of a shaft perpendicular to the side of the case, in order to release the locking mechanism, and the holster further includes a catch-opening formed in the surface of the case, in order to lock the locking mechanism. | 09-19-2013 |
20140239023 | BATON HOLSTER AND AN ARRANGEMENT IN A BATON HOLSTER - A baton holster includes a cylindrical body part for keeping a baton, an attachment attached to the body part, and locking means for locking the baton into the body part. The baton holster further includes a frame arranged to be locked at least partly on top of the baton. In an arrangement in the baton holster a lower end of the baton includes locking stops and the body part of the baton holster includes a catch for locking the baton into the body part. | 08-28-2014 |
Jarno Tyybakinoja, Lahela FI
Patent application number | Description | Published |
---|---|---|
20120187163 | GAS SPRAY HOLSTER - The invention relates to a gas spray holster including a holster part having belt fasteners, an inner frame for holding a standard gas spray, and mutual connectors. These comprise quick couplers with a release handle and a lifting spring for improving the lifting of the inner frame. | 07-26-2012 |
Jarno Tyybakinoja, Hyvinkaa FI
Patent application number | Description | Published |
---|---|---|
20110163138 | HOLSTER FOR KEEPING A PISTOL - The invention relates to a holster for keeping a pistol. The holster includes a grip guard and locking mechanism for the pistol, as well as a lifting mechanism to raise the pistol out of the grip guard in the release situation. The locking mechanism includes a catch and its release device. | 07-07-2011 |
Jarno Vayrynen, Kempele FI
Patent application number | Description | Published |
---|---|---|
20110161883 | METHOD AND APPARATUS FOR DYNAMICALLY GROUPING ITEMS IN APPLICATIONS - Techniques for dynamically grouping items include determining context associated with each group comprising one or more items; and determining current context at a device. In response to determining that prompted prompt is presented for input to indicate an item, a suggested group is determined based on the current context at the device and relevance of a context associated with the suggested group. The suggested group is presented. In some embodiments, prompted prompt is presented to name a suggested group; and, in response, data indicating the suggested group is stored as a permanent group associated with the name. In some embodiments, relevance is determined for each item of a group. A group avatar is generated based on M images associated with the items that have the most relevance. | 06-30-2011 |
Jarno Viitaniemi, Tampere FI
Patent application number | Description | Published |
---|---|---|
20120097449 | Method And Apparatus For Controlling Rock Drilling - Method and apparatus for controlling rock drilling with a percussion device belonging to a rock drill to deliver stress waves to rock through a tool by pushing the tool against the rock by means of a feed motor and rotating simultaneously the tool by means of a rotation motor, whereby the maximum feed force is determined, pressure medium is supplied to the feed motor and to the rotation motor and the feed force is controlled according to the drilling conditions. The feed force is controlled on the basis of the feed speed and the rotation torque. The apparatus has a load control valve which controls the feed. | 04-26-2012 |
Jarno Waetzig, Buergel DE
Patent application number | Description | Published |
---|---|---|
20140146326 | OPTICAL POSITION-MEASURING DEVICE - An optical position-measuring device includes a measuring standard having a first grating in a form of a periodic incremental graduation and an absolute mark. A scanning unit is displaceable relative to the measuring standard in a measuring direction. The scanning unit has at least one second grating disposed at a scanning distance from the first grating. A first detector array is configured to obtain a first scanning signal for purposes of position determination in which the gratings are illuminated with light of a first wavelength. A second detector array is configured to obtain a second scanning signal for purposes of position determination in which the absolute mark is illuminated with light of a second wavelength. The first wavelength is shorter than the second wavelength. | 05-29-2014 |