Patent application number | Description | Published |
20110219371 | Managing and Reporting Conflicts Between Multiple Users Accessing A Logically Partitioned Computer System - A management system for managing computer resources assigned by a hypervisor to one or more logical partitions and/or one or more appliance partitions in a multi-user computer system receives login information from a new user logging into the computer system through a service interface (e.g. a hardware management console) or a non-service interface, builds a conflict list, and sends the conflict list for presentation to the new user. The new user is notified of any users that are logged into any part of the computer system that could conflict with the new user's actions. Such users may be logged into the computer system through service and/or non-service interfaces. In one embodiment, the new user can choose to continue logging in irrespective of any conflicts shown. After choosing to continue, the new user is preferably requested to input an end-time. This end-time may be displayed, in turn, to all subsequent users that log into any part of the computer system that could cause conflict. The management system is preferably a component of the hypervisor. | 09-08-2011 |
20120159510 | HANDLING AND REPORTING OF OBJECT STATE TRANSITIONS ON A MULTIPROCESS ARCHITECTURE - Techniques are described for managing states of an object using a finite-state machine. The states may be used to indicate whether an object has been added, removed, requested or updated. Embodiments of the invention generally include dividing a process into at least two threads where a first thread changes the state of the object while the second thread performs the processing of the data found in the object. While the second thread is processing the data, the first thread may receive additional updates and change the states of the objects to inform the second thread that it should process the additional updates when the second thread becomes idle. | 06-21-2012 |
20120266010 | CONVERSION OF TIMESTAMPS BETWEEN MULTIPLE ENTITIES WITHIN A COMPUTING SYSTEM - Method, apparatus and system are described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system. | 10-18-2012 |
20130074095 | HANDLING AND REPORTING OF OBJECT STATE TRANSITIONS ON A MULTIPROCESS ARCHITECTURE - Techniques are described for managing states of an object using a finite-state machine. The states may be used to indicate whether an object has been added, removed, requested or updated. Embodiments of the invention generally include dividing a process into at least two threads where a first thread changes the state of the object while the second thread performs the processing of the data found in the object. While the second thread is processing the data, the first thread may receive additional updates and change the states of the objects to inform the second thread that it should process the additional updates when the second thread becomes idle. | 03-21-2013 |
20130080818 | CONVERSION OF TIMESTAMPS BETWEEN MULTIPLE ENTITIES WITHIN A COMPUTING SYSTEM - Method is described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system. | 03-28-2013 |
20130332913 | Indirect Software Performance Analysis - Performance impact of a computing system component on a transient end-to-end system operation is estimated by profiling an overall characteristic for a transient end-to-end system operation, and simultaneously profiling a program code component for a second characteristic, thereby collecting a first pair of data points, repeating the operational period while introducing a known artificial delay into the program code component, and while profiling the overall performance characteristic for the system and for the program code component, thereby collecting pairs of data points for each repetition of the operational period for each of the artificial delays; curve fitting and analyzing intercepts of the collected data points to estimate the effect of the artificial delays in the program code component on the transient end-to-end system operation; and reporting the estimate correlated to potential optimal transient end-to-end system operation. | 12-12-2013 |
20140163945 | MEMORY FRAME PROXY ARCHITECTURE FOR SYNCHRONIZATION AND CHECK HANDLING IN A SIMULATOR - A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame. | 06-12-2014 |
20140163946 | MEMORY FRAME ARCHITECTURE FOR INSTRUCTION FETCHES IN SIMULATION - A simulation technique that handles accesses to a frame of instruction memory by inserting a command object between a frame proxy and a memory frame provides improved throughput in simulation environments. The instruction frame, if present, processes the access to the frame. If an instruction frame is not present for the accessed frame, the memory frame handles the request directly. The instruction frame caches fetched and decoded instructions and may be inserted at the first access to a corresponding instruction memory frame. The instruction frame can track write accesses to instruction memory so that changes to the instruction memory can be reflected in the state of the instruction frame. Additional check frames may be chained between the interface and the memory frame to handle breakpoints, instruction memory watches or other access checks on the instruction memory frame. | 06-12-2014 |
20140163947 | MEMORY FRAME ARCHITECTURE FOR INSTRUCTION FETCHES IN SIMULATION - A simulation technique that handles accesses to a frame of instruction memory by inserting a command object between a frame proxy and a memory frame provides improved throughput in simulation environments. The instruction frame, if present, processes the access to the frame. If an instruction frame is not present for the accessed frame, the memory frame handles the request directly. The instruction frame caches fetched and decoded instructions and may be inserted at the first access to a corresponding instruction memory frame. The instruction frame can track write accesses to instruction memory so that changes to the instruction memory can be reflected in the state of the instruction frame. Additional check frames may be chained between the interface and the memory frame to handle breakpoints, instruction memory watches or other access checks on the instruction memory frame. | 06-12-2014 |
20150082324 | Efficient Interrupt Handling - A mechanism is provided for handling interrupt actions for inter-thread communication. In association with a first processor thread, a thread action data structure is provided that comprises a non-blocking synchronization data structure and an internal list data structure of pending interrupts having no form of synchronization. A post of an interrupt action is received from a second processor thread to the thread action data structure associated with the first processor thread, where the interrupt action is added to the non-blocking synchronization data structure of the thread action data structure. The interrupt action is moved from the non-blocking synchronization data structure to the internal list data structure of pending interrupts for handling by the first processor thread. The internal list data structure of pending interrupts is processed to thereby handle interrupt actions moved to the internal list data structure. | 03-19-2015 |
20150268988 | Efficient Interrupt Handling - A mechanism is provided for handling interrupt actions for inter-thread communication. In association with a first processor thread, a thread action data structure is provided that comprises a non-blocking synchronization data structure and an internal list data structure of pending interrupts having no form of synchronization. A post of an interrupt action is received from a second processor thread to the thread action data structure associated with the first processor thread, where the interrupt action is added to the non-blocking synchronization data structure of the thread action data structure. The interrupt action is moved from the non-blocking synchronization data structure to the internal list data structure of pending interrupts for handling by the first processor thread. The internal list data structure of pending interrupts is processed to thereby handle interrupt actions moved to the internal list data structure. | 09-24-2015 |
20150356221 | SIMULATION METHOD USING MEMORY FRAME PROXY ARCHITECTURE FOR SYNCHRONIZATION AND CHECK HANDLING - A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame. | 12-10-2015 |
Patent application number | Description | Published |
20090164847 | SYSTEM AND METHOD FOR TESTING A SOFTWARE ENGINE - A software engine has a base system in communication with service subsystems and test subsystems. The base system, the service subsystems, and the test subsystems are software applications that exchange data with one another while operating within the software engine. In one exemplary mode of operation, the base system receives outputs from the service subsystems. In another exemplary mode of operation, the base system receives outputs from the test subsystems that simulate the outputs generated by the service subsystems. An exemplary method of testing the software engine is also provided. Specifically, the illustrative method includes receiving an output during a service mode, switching from the service mode to a testing mode, and receiving the simulated output during the testing mode. The method steps may be performed by a computer executing instructions stored on a computer-readable medium. | 06-25-2009 |
20100070230 | INTEGRATED TESTING SYSTEMS AND METHODS - An exemplary method includes parsing data representative of an automated test case into at least one transaction defined in accordance with a global test language, translating the transaction into at least one command specific to an automated test tool, and providing the command to the automated test tool for execution. In certain examples, the method further includes parsing the data representative of the automated test case into at least one other transaction defined in accordance with the global test language, translating the other transaction into at least one other command specific to another automated test tool, and providing other command to the other automated test tool for execution. | 03-18-2010 |
20100251027 | METHODS AND SYSTEMS OF DETERMINING A QUALITY LEVEL OF A SOFTWARE INSTANCE - An exemplary method includes displaying a graphical user interface configured to facilitate identification of one or more defects in a software instance, receiving data representative of at least one instruction via the graphical user interface to associate one of a plurality of defect severity levels each having one of a plurality of weighted values with each of the one or more defects, and generating a product quality index corresponding to the software instance and that indicates a quality level of the software instance compared to a substantially defect-free software instance. In some examples, the generation of the product quality index is based on the defect severity levels and the weighted values associated with the one or more defects. | 09-30-2010 |
20100251215 | METHODS AND SYSTEMS OF DETERMINING RISK LEVELS OF ONE OR MORE SOFTWARE INSTANCE DEFECTS - An exemplary method includes displaying a graphical user interface configured to facilitate identification of one or more defects within a software instance, receiving data representative of at least one instruction via the graphical user interface to assign a severity risk value, an impact risk value, and a likelihood risk value to each of the one or more defects, and generating a defect risk factor corresponding to each of the one or more defects that indicates a risk level of each of the one or more defects, the generating based on a combination of the severity risk value, the impact risk value, and the likelihood risk value corresponding to each of the one or more defects. | 09-30-2010 |
20110289489 | CONCURRENT CROSS BROWSER TESTING - A system may include a plurality of test environments, each test environment being configured to simulate user actions according to a test configuration. The system may further include a test simulator device including a processor in selective communication with the plurality of test environments and configured to receive a user action; send the user action to a first of the plurality of test environments having a first test environment; and send the user action to a second of the plurality of test environments having a second test environment. | 11-24-2011 |
Patent application number | Description | Published |
20150096743 | PROTECTIVE COATING FOR A SUBSTRATE - A coating having a gradient composite structure, applied to a substrate, which may be a disposable tool. The gradient composite comprises a bonding component and an erosion and/or corrosion resistant component. When applied to a disposable tool, such as a ball and seat assembly in a downhole environment, the coating enhances the performance of disintegrable materials used in such tools. The coating may be configured to expire at the end of a selected duration, allowing the underlying material to disintegrate. | 04-09-2015 |
20150147495 | SCALE-INHIBITING COATING - Disclosed is a coating for inhibiting the formation of scales on one or more surfaces of a component used in the production of subsurface fluids. The coating comprises a diamond-like carbon structure doped with a dopant, such as silicon, titanium, fluorine, oxygen, or chromium. The dopant comprises between about 10% and about 40% of the coating by atom. | 05-28-2015 |
20150147523 | HYDROPHOBIC AND OLEOPHOBIC COATINGS - A hydrophobic surface comprises a surface texture and a coating disposed on the surface texture, wherein the coating comprises an amorphous diamond like carbon material doped with 10 to 35 atomic percent of Si, O, F, or a combination comprising at least one of the foregoing, or a low surface energy material selected from fluoropolymer, silicone, ceramic, fluoropolymer composite, or a combination comprising at least one of the foregoing; and wherein the surface texture comprises a micro texture, a micro-nano texture, or a combination of a micro texture and a micro-nano texture. | 05-28-2015 |
20150159475 | Downhole Apparatus Using Induction Motors with Magnetic Fluid in Rotor-Stator Gap - In one aspect, an apparatus for use in a wellbore is disclosed that in one non-limiting embodiment includes an AC motor having a rotor and a stator with a gap between the rotor and the stator and a magnetic fluid in the gap that contains an electrically nonconductive fluid and magnetic nanoparticles. | 06-11-2015 |
20160072342 | Systems and Methods for Constructing Laminations for Electric Motors - Systems and methods for the construction of components such as laminations for the stator core of an ESP motor wherein particles of different materials are mixed and pressed together at an elevated temperature to form a composite material in the desired lamination shape. The materials are selected to provide characteristics such as high magnetic permeability from one material and high thermal conductivity from the other material. The particles of the different materials are pressed together at a temperature that is sufficiently high to fuse the particles together and form a composite material, but is also sufficiently low that the materials are not sintered. The individual materials therefore retain their original characteristics, and the composite material benefits from the high magnetic permeability of the first material and the high thermal conductivity of the other material. | 03-10-2016 |
Patent application number | Description | Published |
20130178662 | Modified Catalyst Supports - The present invention relates to modified catalyst supports, to processes for making modified catalyst supports, and to chemical processes employing catalysts that comprise such modified catalyst supports. The modified catalyst support comprises a first metal, a second metal and a support modifier on a support, wherein the support modifier comprises a support modifier metal selected from the group consisting of tungsten, molybdenum, vanadium, niobium, and tantalum. | 07-11-2013 |
20130178663 | COBALT-CONTAINING HYDROGENATION CATALYSTS AND PROCESSES FOR MAKING SAME - The present invention relates to catalysts, to processes for making catalysts and to chemical processes employing such catalysts. The catalysts are preferably used for converting acetic acid to ethanol. The catalyst comprises cobalt, precious metal and one or more active metals on a modified support. | 07-11-2013 |
20130178664 | Hydrogenation Catalysts - The present invention relates to catalysts, to processes for making catalysts and to chemical processes employing such catalysts. The catalysts are preferably used for converting acetic acid to ethanol. The catalyst comprises a precious metal and one or more active metals on a modified support. The modified support may comprise cobalt tungstate. | 07-11-2013 |
20130211150 | Chemisorption of Ethyl Acetate During Hydrogenation of Acetic Acid to Ethanol - A hydrogenation catalyst and process using the catalyst for converting a mixture comprising acetic acid and ethyl acetate to ethanol at a first temperature, and the catalyst desorbs ethyl acetate, in the absence of hydrogen, at a second temperature that is greater than the first temperature. The catalyst has a suitable chemisorption of ethyl acetate at the first temperature in the absence of hydrogen. In one embodiment, the first temperature ranges from 125° C. to 350° C. and the second temperature ranges from 300° C. to 600° C. The catalyst comprises one or more active metals or oxide thereof on a support that comprises tungsten or an oxide thereof. The one or more active metals are selected from the group consisting of cobalt, copper, gold, iron, nickel, palladium, platinum, iridium, osmium, rhenium, rhodium, ruthenium, tin, zinc, lanthanum, cerium, manganese, chromium, vanadium, and molybdenum. | 08-15-2013 |
20130245333 | Ethanol Manufacturing Process Over Catalyst Having Improved Radial Crush Strength - Acetic acid is hydrogenation in the presence of a catalyst comprising one or more active metals on a silica support, wherein the catalyst has a radial crush strength of at least 4 N/mm. The one or more active metals may include cobalt, copper, gold, iron, nickel, palladium, platinum, iridium, osmium, rhenium, rhodium, ruthenium, tin, zinc, lanthanum, cerium, manganese, chromium, vanadium, molybdenum and mixtures thereof. Radial crush strength may be improved by steam treating the catalyst support prior to the loading of the one or more active metals. | 09-19-2013 |
20150024927 | CHEMISORPTION OF ETHYL ACETATE DURING HYDROGENATION OF ACETIC ACID TO ETHANOL - A hydrogenation catalyst and process using the catalyst for converting a mixture comprising acetic acid and ethyl acetate to ethanol at a first temperature, and the catalyst desorbs ethyl acetate, in the absence of hydrogen, at a second temperature that is greater than the first temperature. The catalyst has a suitable chemisorption of ethyl acetate at the first temperature in the absence of hydrogen. In one embodiment, the first temperature ranges from 125° C. to 350° C. and the second temperature ranges from 300° C. to 600° C. The catalyst comprises one or more active metals or oxide thereof on a support that comprises tungsten or an oxide thereof. The one or more active metals are selected from the group consisting of cobalt, copper, gold, iron, nickel, palladium, platinum, iridium, osmium, rhenium, rhodium, ruthenium, tin, zinc, lanthanum, cerium, manganese, chromium, vanadium, and molybdenum. | 01-22-2015 |
20150024928 | Ethanol Manufacturing Process Over Catalyst Having Improved Radial Crush Strength - Acetic acid is hydrogenation in the presence of a catalyst comprising one or more active metals on a silica support, wherein the catalyst has a radial crush strength of at least 4 N/mm. The one or more active metals may include cobalt, copper, gold, iron, nickel, palladium, platinum, iridium, osmium, rhenium, rhodium, ruthenium, tin, zinc, lanthanum, cerium, manganese, chromium, vanadium, molybdenum and mixtures thereof. Radial crush strength may be improved by steam treating the catalyst support prior to the loading of the one or more active metals. | 01-22-2015 |
20150025281 | Process for Producing Ethanol Using Hydrogenation Catalysts - The present invention relates to catalysts, to processes for making catalysts and to chemical processes employing such catalysts. The catalysts are preferably used for converting acetic acid to ethanol. The catalyst comprises a precious metal and one or more active metals on a modified support. The modified support may comprise cobalt tungstate. | 01-22-2015 |
Patent application number | Description | Published |
20100039687 | Apparatus for Performing Confocal Endoscopy - A method for manufacturing a microscanner having a micro mirror is disclosed. Initially, a two-axis self-aligned vertical comb-drive microscanner is fabricated from a bonded silicon-on-insulator-silicon (SOI) silicon wafer. By depositing a thin film of aluminum on the surface, a SOI silicon wafer can provide about 90% reflectivity at 633 nm. A 2.5 μm misalignment tolerance can be achieved for the critical backside alignment step. As a result, confocal images with 1 μm resolution can be acquired using a microscanner having SOI silicon wafer mirrors. | 02-18-2010 |
20110009701 | OCT USING SPECTRALLY RESOLVED BANDWIDTH - The embodiments disclosed herein is related to a system for optical coherence tomographic imaging of turbid (i.e., scattering) materials utilizing multiple channels of information. The multiple channels of information may be comprised and encompass spatial, angle, spectral and polarization domains. More specifically, the embodiments disclosed herein is related to methods and apparatus for utilizing optical sources, systems or receivers capable of providing (source), processing (system) or recording (receiver) a multiplicity of channels of spectral information for optical coherence tomographic imaging of turbid materials. In these methods and apparatus the multiplicity of channels of spectral information that can be provided by the source, processed by the system, or recorded by the receiver are used to convey simultaneously spatial, spectral or polarimetric information relating to the turbid material being imaged tomographically. The multichannel optical coherence tomographic methods can be incorporated into an endoscopic probe for imaging a patient. The endoscope comprises an optical fiber array and can comprise a plurality of optical fibers adapted to be disposed in the patient. The optical fiber array transmits the light from the light source into the patient, and transmits the light reflected by the patient out of the patient. The plurality of optical fibers in the array is in optical communication with the light source. The multichannel optical coherence tomography system comprises a detector for receiving the light from the array and analyzing the light. The methods and apparatus may be applied for imaging a vessel, biliary, GU and/or GI tract of a patient. | 01-13-2011 |
20110062110 | Method for Fabricating a Micromirror with Self-Aligned Actuators - A method of fabricating a micromirror is disclosed. Initially, a set of coarse features is formed in a low-temperature oxide (LTO) layer deposited on a front side of a wafer. A set of fine features is then formed in a photosensitive material layer deposited on top of the LTO layer, and the fine features are constrained laterally within the coarse features. Next, a portion of the LTO layer is removed to align the width of the coarse features with the width of the fine features. The first silicon dioxide layer and the first and second silicon device layers are subsequently etched to form stator comb fingers and rotor comb fingers. Finally, a rotatable mirror is formed by removing a portion of the substrate on a back side of the wafer, and the silicon dioxide layers from the front and back sides of the wafer. | 03-17-2011 |
20140083970 | FORWARD-IMAGING OPTICAL COHERENCE TOMOGRAPHY (OCT) SYSTEMS AND PROBES - Provided are forward-imaging optical coherence tomography (OCT) systems and probes. | 03-27-2014 |
20160045116 | FORWARD-IMAGING OPTICAL COHERENCE TOMOGRAPHY (OCT) SYSTEMS AND PROBES - Provided are forward-imaging optical coherence tomography (OCT) systems and probes. | 02-18-2016 |
Patent application number | Description | Published |
20100250493 | USING A SPARSE FILE AS A CLONE OF A FILE - One embodiment is for using a sparse file as a clone. The method includes creating, by an application associated with a computer system, a snapshot of a file, such as an individual file, a collection of files, file system, directories, and so forth. Further, the method includes requesting, by the application, a clone of that created snapshot. Further still, the method includes generating, by the application, an empty sparse having at least one inode identifying the empty sparse file as the clone and pointing to the snapshot associated with the clone. Thereby, the requested clone is created using the created sparse file, which begins as an empty sparse file. | 09-30-2010 |
20120066182 | INODE MANAGEMENT IN REDIRECT-ON-WRITE FILE SYSTEM - Some embodiments of the inventive subject matter allow a redirect-on-write file system to continue processing file transactions while writing a snapshot to persistent storage. Thus, embodiments do not block file transactions while flushing snapshots to persistent storage. To avoid blocking, some embodiments the file system can maintain two snapshot generations. The first snapshot generation is the snapshot being written to persistent storage. The second snapshot generation may reside in main memory, and store data for file transactions occurring after the file system began writing the first snapshot generation. | 03-15-2012 |
20120066183 | FILE CLONING ACROSS DIFFERENT FILESETS - After a clone file is created from a file, a write request targeting the clone file can be handled. It is determined that the write request indicates the clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. It is then determined that the data block at a current location cannot be modified. The write request is implemented with respect to the data block at a different location. It is indicated that the data block at the different location can be modified for subsequent write requests that indicate the clone file | 03-15-2012 |
20120066189 | CONTROLLING AND RECOVERING LONG-LIVED TRANSACTIONS - Some embodiments of the inventive subject matter are directed to performing sub-transactions of a long-lived transaction (LLT) in a sequence (e.g., according to an LLT flow) and writing a log entry at the performance of each of the sub-transactions that specifies results of the sub-transaction. Some embodiments do not require generating any compensating transactions during performance of the sub-transactions. Some embodiments are further directed to detecting that an interruption occurs to the LLT and repeating, or initiating re-performance of the LLT from the beginning of the sequence following the flow of the LLT from its beginning. During the re-performance of the LLT, some embodiments are further directed to checking the log entry at each sub-transaction to determine whether the sub-transaction was performed successfully before the interruption. If the log indicates that the long-lived transaction completed successfully, some embodiments are further directed to skipping performance of the sub-transaction until reaching a sub-transaction that does not have a valid log entry, then returning an error and recovering the LLT using instructions for compensating transactions that are already written into the LLT flow. | 03-15-2012 |
20120066190 | HANDLING FILE OPERATIONS WITH LOW PERSISTENT STORAGE SPACE - In some embodiments, a file management unit located in the operating system detects a write operation that writes the data blocks within the consistency snapshot (in main memory) to the persistent storage. The file management unit can then determine that all transactions have been completed before the write operation begins. In some instances, the file management unit then attempts to write the data blocks within the consistency snapshot to the persistent storage. The file management unit can then receive a notification that the write operation did not successfully write the data blocks from the consistency snapshot to the persistent storage. In some embodiments, the write operation is not successful because there are fewer free data blocks in the persistent storage than needed for writing the data blocks within the consistency snapshot to persistent storage. The file management can then wait a period of time. After the file management unit has waited for a period of time, it can make another attempt to write the data blocks within the consistency snapshot to the persistent storage. | 03-15-2012 |
20120066278 | DISTRIBUTED FILE HIERARCHY MANAGEMENT IN A CLUSTERED REDIRECT-ON-WRITE FILE SYSTEM - Management of a file hierarchy for a clustered file system can be distributed across nodes of the cluster. A cluster file hierarchy is accessed to determine location of a file in response to a request to write to a file. A first node maintains the cluster file hierarchy. It is determined that management of a fileset object, which represents a fileset that includes the file, has been delegated to a second node based, at least in part, on said accessing the cluster file hierarchy. A node file hierarchy maintained by the second node is accessed responsive to determining the delegation. The cluster file hierarchy represents filesets of the clustered file system and the node hierarchy represents a subset of one or more of the filesets. Location of the file is determined based, at least in part, on said accessing the node file hierarchy. | 03-15-2012 |
20120066431 | RECOVERABILITY WHILE ADDING STORAGE TO A REDIRECT-ON-WRITE STORAGE POOL - Embodiments include a method comprising detecting addition of a new nonvolatile machine-readable medium to a data storage pool of nonvolatile machine-readable media. The method includes preventing from being performed a first operation of a file system that requires a first parameter that identifies a logical indication of a location within the nonvolatile machine-readable media for the file system, until logical indications of locations within the new nonvolatile machine-readable medium for the file system have been stored in the data storage pool. The method includes allowing to be performed, prior to logical indications of locations within the new nonvolatile machine-readable medium being stored in the data storage pool, a second operation of the file system that does not require a second parameter that identifies a logical indication of a location within the nonvolatile machine-readable media, wherein the second operation causes data to be written into the new nonvolatile machine-readable medium. | 03-15-2012 |
20120150800 | INDEPENDENT FILESET GENERATIONS IN A CLUSTERED REDIRECT-ON-WRITE FILESYSTEM - Maintaining a generation value for each fileset that is distinct from a corresponding fileset manager preserves the independence of nodes while also allowing distributed fileset management. A fileset manager can maintain a value that reflects consistency snapshots for that node (“node generation”) separately from a value that reflects consistency snapshots for a particular fileset (“fileset generation”). | 06-14-2012 |
20120150804 | MULTIPLE CONTEXTS IN A REDIRECT ON WRITE FILE SYSTEM - A method includes initiating committing to persistent storage of a current consistency snapshot of a plurality of data objects in a redirect-on-write file system. Each of the plurality of data objects has a first copy of at least two copies of the data having a first context of at least two contexts. The method includes receiving, during committing to storage of the current consistency snapshot, an update to a data object of the plurality of data objects. The method also includes responsive to receipt of the update to the data object, creating a second copy of data of the data object from the first copy. The second copy of the data has a second context of the at least two contexts. The method includes responsive to receipt of the update to the data object, updating, based on the update, the second copy of the data of the data object. | 06-14-2012 |
20120150926 | DISTRIBUTED FREE BLOCK MAP FOR A CLUSTERED REDIRECT-ON-WRITE FILE SYSTEM - In a cluster that distributes fileset management, fileset managers will maintain a free block map and an in-flight block map to allocate blocks to clients writing to a relevant fileset. A fileset manager managing free block allocation for cluster clients that write to a fileset managed by the fileset manager. Since a clustered file system manager manages an initial free block map for the cluster (“cluster free block map”), the clustered file system manager provisions free blocks to fileset managers from the cluster free block map. The fileset manager then allocates free blocks from the provisioned free blocks to cluster clients that write to the fileset managed by the fileset manager. | 06-14-2012 |
20120209810 | Using a Sparse File as a Clone of a File - One embodiment is for using a sparse file as a clone. The method includes creating, by an application associated with a computer system, a snapshot of a file, such as an individual file, a collection of files, file system, directories, and so forth. Further, the method includes requesting, by the application, a clone of that created snapshot. Further still, the method includes generating, by the application, an empty sparse having at least one inode identifying the empty sparse file as the clone and pointing to the snapshot associated with the clone. Thereby, the requested clone is created using the created sparse file, which begins as an empty sparse file. | 08-16-2012 |
20120209813 | FILE CLONING ACROSS DIFFERENT FILESETS - After a clone file is created from a file, a write request targeting the clone file can be handled. It is determined that the write request indicates the clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. It is then determined that the data block at a current location cannot be modified. The write request is implemented with respect to the data block at a different location. It is indicated that the data block at the different location can be modified for subsequent write requests that indicate the clone file | 08-16-2012 |
20120259818 | System And Method For Hierarchical Recovery Of A Cluster File System - Hierarchical recovery of failed computing nodes to operative computing nodes within a cluster of computing nodes is managed by initiating a recovery leader at an operative node that retrieves management information from the operative nodes and applies the management information to recover filesets of a meta-fileset in a hierarchical filesystem. The use of hierarchical filesets throughout the cluster provides more rapid failover by distributing recovery load across computing nodes and supporting recovery of nodes in parallel. | 10-11-2012 |
20130031068 | CONTROLLING AND RECOVERING LONG-LIVED TRANSACTIONS - Some embodiments of the inventive subject matter are directed to performing sub-transactions from a long-lived transaction using an identifier, wherein the sub-transactions are required to be completed in a sequence for the long-lived transaction. In some embodiments, the method is further directed to determining that the sub-transactions require a write of a data value to a database, writing in a log, using the identifier, an entry that indicates the data value, detecting an interruption in performing of the write of the data value to the database, and initiating re-performance of the sub-transactions in order of the sequence. Some embodiments are further directed to, during re-performance of the sub-transactions, detecting the data value in the entry of the log using the identifier, and using the data value indicated in the entry of the log to write the data value to the database. | 01-31-2013 |
20130047043 | MERGING MULTIPLE CONTEXTS TO MANAGE CONSISTENCY SNAPSHOT ERRORS - A method including creating a commit-in-progress context from a copy of a data object in a redirect-on-write file system; and begin storing the commit-in-progress context in a persistent storage device. The method further includes, while storing the commit-in-progress context in the persistent storage device: receiving a notification of a pending modification to the first data object, creating an update-in-progress context from a copy of the commit-in-progress context, and begin applying the modification to the update-in-progress context. The method further includes detecting that a connectivity error has occurred between the commit-in-progress context and the storage device, and in response, identifying whether the commit-in-progress context is successfully stored in the storage device. In response to identifying that the commit-in-progress context is not successfully stored: aborting the storing of the commit-in-progress context, assigning a new commit-in-progress context, and begin storing the new commit-in-progress context. | 02-21-2013 |
20130318086 | DISTRIBUTED FILE HIERARCHY MANAGEMENT IN A CLUSTERED REDIRECT-ON-WRITE FILE SYSTEM - Management of a file hierarchy for a clustered file system can be distributed across nodes of the cluster. A cluster file hierarchy is accessed to determine location of a file in response to a request to write to a file. A first node maintains the cluster file hierarchy. It is determined that management of a fileset object, which represents a fileset that includes the file, has been delegated to a second node based, at least in part, on said accessing the cluster file hierarchy. A node file hierarchy maintained by the second node is accessed responsive to determining the delegation. The cluster file hierarchy represents filesets of the clustered file system and the node hierarchy represents a subset of one or more of the filesets. Location of the file is determined based, at least in part, on said accessing the node file hierarchy. | 11-28-2013 |
20140156602 | FILE CLONING ACROSS DIFFERENT FILESETS - A method includes determining, by a processor, that a write request indicates a clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. The method includes determining that the data block at a current location cannot be modified. In response to a determination that the data block at the current location cannot be modified, the method includes implementing the write request with respect to the data block at a different location and indicating that the data block at the different location can be modified for subsequent write requests that indicate the clone file. | 06-05-2014 |
Patent application number | Description | Published |
20130078725 | ENGINE CATALYST DIAGNOSTICS - Embodiments for predicting catalyst function are disclosed. One example embodiment includes applying a set of parameter readings for a given sample to a support vector machine to generate a classification output, recording a plurality of classification outputs for a plurality of successive samples over a first duration, and indicating catalyst degradation if a threshold percentage of the classification outputs indicates degraded catalyst performance. In this way, catalyst degradation may be indicated using a simplified model that does not require extensive calibration. | 03-28-2013 |
20130180509 | NON-INTRUSIVE EXHAUST GAS SENSOR MONITORING - A method for monitoring an exhaust gas sensor coupled in an engine exhaust is provided. In one embodiment, the method comprises indicating exhaust gas sensor degradation based on characteristics of a distribution of extreme values of a plurality of sets of lambda differentials collected during selected operating conditions. In this way, the exhaust gas sensor may be monitored in a non-intrusive manner. | 07-18-2013 |
20140283589 | INTEGRATED FUEL CATALYST MONITOR - A method of monitoring catalyst performance may comprise applying a set of parameter readings for a given sample to a support vector machine to generate a classification output, clustering the set of parameter readings to reduce a number of support vectors, computing a total fuel mass following a deceleration fuel shut-off event and an exhaust gas oxygen sensor switch and indicating catalyst degradation based on the total fuel mass. | 09-25-2014 |
20140298880 | HUMIDITY SENSOR DIAGNOSTIC METHOD USING CONDENSATION CLEARING HEATER - A diagnostic method for a capacitive humidity sensor comprising a heater, and a capacitance-sensing element that individually indentifies heater, temperature-sensing element, or capacitance-sensing element degradation. By this method, individual elements of the sensor may be replaced or compensated for to allow for further operation. | 10-09-2014 |
20140316676 | HUMIDITY SENSOR AND ENGINE SYSTEM - Methods and systems are provided for an engine coupled capacitance-based humidity sensor. Degradation of the humidity sensor may be determined based on humidity readings while flowing gasses into an engine intake air downstream of the humidity sensor and upstream of a compressor change by less than a first threshold while pressure at the sensor changes greater then a second threshold. The variation in pressure can be changed by adjusting a throttle upstream and downstream of the compressor based on whether the humidity sensor is degraded or functional. | 10-23-2014 |
20140336899 | INTEGRATED FUEL CATALYST MONITOR - A method is provided for monitoring an emission device coupled to an engine. In one example approach, the method comprises: following a deceleration fuel shut-off duration, indicating degradation of the emission device based on an amount of rich products required to cause a sensor to become richer than a threshold. The amount of rich products required may be correlated to an amount of oxygen stored in the emission device. | 11-13-2014 |
Patent application number | Description | Published |
20140316898 | OBSERVATION PLATFORM FOR PERFORMING STRUCTURED COMMUNICATIONS - Methods and systems are disclosed for sending information in an observation platform. A determination is made, at an observation platform, that a first communication device associated with a first user is located in an environment. A determination is made, at the observation platform, that the first communication device is located in proximity to a second communication device associated with a second user. Speech information is sent to the first communication device for the first user to use in communicating with the second user. | 10-23-2014 |
20150065149 | OBSERVATION PLATFORM FOR USING STRUCTURED COMMUNICATIONS WITH DISTRIBUTED TRAFFIC FLOW - Systems and methods are disclosed for using structured communications in an observation platform with distributed traffic flow. A signal from a first mobile device is received at a second mobile device wherein the first mobile device and the second mobile devices act as a nodes in a first environment which comprises a plurality of nodes, wherein a first characteristic of the signal corresponds to an audible source and a second characteristic of the signal corresponds to information indicative of a geographic position of the first mobile device. Context information is derived, via the second mobile device, from the signal based on the first characteristic and/or the second characteristic. A third mobile device is determined, via the second mobile device, as a destination for the signal. The signal is relayed from the second mobile device to the third mobile device without relaying the signal to a central server computer system. | 03-05-2015 |
20150113098 | CONTENT DISTRIBUTION AND DATA AGGREGATION FOR SCALABILITY OF OBSERVATION PLATFORMS - Methods and systems for managing and distributing content and aggregation of data in a plurality of observation platforms are disclosed. A message is generated with content at a content distribution manager. A delivery of the message is scheduled and a plurality of specified devices are specified for delivery in a plurality of observation platforms at a designated time and/or location(s) via the content distribution manager, wherein the plurality of observation platforms are capable of receiving a signal from a first mobile device with a first characteristic that corresponds to an audible source and a second characteristic that corresponds to information indicative of a geographic position of the first mobile device and relaying the signal to a destination based on the first characteristic and/or the second characteristic. The message is delivered to the plurality of observation platforms which relays the message to the plurality of specified devices at the designated time. | 04-23-2015 |
20150213382 | USING STRUCTURED COMMUNICATIONS TO QUANTIFY SOCIAL SKILLS - Embodiments for using structured communications to quantify social skills and social behavioral factors. Communications between at least two devices are intercepted and/or relayed by a computer system wherein a portion of the communications correspond to an audible source and wherein the forwarding or processing of communications is based on a combination of historical, contextual and/or commanded information derived from current and past communications by the computer system. Primary statistics are measured based on the communications and contextual information. Secondary statistics are derived related to a user wherein the secondary statistics quantify social skills and behavioral factors of the user in one or more dimensions against one or more profiles or roles. | 07-30-2015 |
20150269869 | USING STRUCTURED COMMUNICATIONS TO QUANTIFY SOCIAL SKILLS - Embodiments for using an observation platform to measure and assess social skills are disclosed. Communications between at least two devices are intercepted and/or relayed by a computer system wherein a portion of the communications correspond to an audible source and wherein the forwarding or processing of communications is based on a combination of historical, contextual and/or commanded information derived from current and past communications by the computer system. Primary statistics are measured based on the communications and contextual information. Secondary statistics are derived related to a user wherein the secondary statistics quantify social skills and behavioral factors of the user in one or more dimensions against one or more profiles or roles. | 09-24-2015 |
20150281170 | WiFi INTERWORKING SOLUTIONS FOR PUSH-TO-TALK-OVER-CELLULAR (PoC) - WiFi interworking solutions for Push-To-Talk over Cellular (PoC) in the Open Mobile Alliance (OMA) Standard. | 10-01-2015 |
Patent application number | Description | Published |
20090149167 | CONNECTED PORTFOLIO SERVICES FOR A WIRELESS COMMUNICATIONS NETWORK - Connected Portfolio Services for use in a mobile phone network include new mobile phone services: Scheduled Conference with Dial-Out and Dial-In modes of operation; Reservationless Conference; Instant Conferencing; Group Short Message Service with Reply All; Voice Short Message Service with Reply All; Family Connect; Buddy Connect; Quick Reach; and Email2Conference. Connected Portfolio Services also include a new handset client application, management of a limited pool of network routable numbers, and a prepaid billing solution. | 06-11-2009 |
20100234018 | CONVERGED MOBILE-WEB COMMUNICATIONS SOLUTION - A converged mobile-Web communications solution interfaces to both a mobile phone network and an Internet or Intranet network, so that services that are provided to mobile phones in the mobile phone network are also provided to web clients or web widgets in the Internet or Intranet network. | 09-16-2010 |
20100304724 | ENHANCED GROUP CALLING FEATURES FOR CONNECTED PORTFOLIO SERVICES IN A WIRELESS COMMUNICATIONS NETWORK - Enhanced Group Calling Features for Connected Portfolio Services in wireless communications networks, such as a mobile or cellular phone communications networks. The Connected Portfolio Services include Mobile Conferencing (Scheduled/Instant/Reservationless Conference), Family Connect, Buddy Connect, and Quick Reach, while the Enhanced Group Calling Features include Voicemail Diversion (the recognition of a diversion to voicemail and dropping the leg), Reverse Quick Reach (where a terminating subscriber defines how a call dialed to his/her mobile number should be handled and directed), and Single Number Group Calling (an optimal design implementation of single number based group calling). | 12-02-2010 |
20110217949 | PREPAID BILLING SOLUTIONS FOR PUSH-TO-TALK IN A WIRELESS COMMUNICATIONS NETWORK - Advanced group services for use in a mobile phone network include a prepaid billing solution. In the mobile phone network, a real-time exchange interfaces to at least one mobile switching center to provide the advanced group services therein. Both the real-time exchange and the mobile phones that use the advanced group services communicate with each other using call setup and in-band signaling within the mobile phone network, wherein the real-time exchange switches the voice frames for the advanced group services between the mobile phones across bearer paths and through at least one mobile switching center in the mobile phone network. A real-time billing mechanism is provided for a prepaid subscriber of the advanced group services. The real-time billing mechanism may use a prefix-based billing solution or a charging number based billing solution. | 09-08-2011 |
20110294494 | PREDICTIVE WAKEUP FOR PUSH-TO-TALK-OVER-CELLULAR (POC) CALL SETUP OPTIMIZATIONS - A predictive wakeup function for Push-to-Talk-over Cellular (PoC) call setup optimizations in a cellular mobile phone network. In performing the predictive wakeup for call setup optimizations, an originating mobile transmits an event trigger to a real-time exchange that interfaces to a mobile switching center in the cellular mobile phone network. The real-time exchange transmits a wakeup message to one or more terminating mobiles of predicted participants, in order to transition the terminating mobiles of the predicted participants from a dormant state to an active state prior to a call being setup with the terminating mobiles of the predicted participants. The terminating mobiles of the predicted participants are identified by a predictive wakeup mechanism before the originating mobile sends a list of one or more terminating mobiles of actual participants to the real-time exchange. The predicted participants may be determined based on static or dynamic information, including heuristics involving calling patterns. | 12-01-2011 |
20130155875 | PUSH-TO-TALK-OVER-CELLULAR (POC) - A Push-to-Talk-over Cellular (PoC) implementation for use in a wireless communications network, wherein one or more servers interface to the wireless communications network to perform the PoC call sessions. Both the servers and the mobile units that use the PoC call sessions communicate with each other using SIP/IP (Session Initiation Protocol/Internet Protocol) control messages within the wireless communications network, and one or more of the servers switches RTP/IP (Realtime Transport Protocol/Internet Protocol), RTCP/IP (Realtime Transport Control Protocol/Internet Protocol), or MBCP/IP (Media Burst Control Protocol/Internet Protocol) voice packets for the PoC call sessions between the mobile units across the wireless communications network. | 06-20-2013 |
20130196706 | WiFi INTERWORKING SOLUTIONS FOR PUSH-TO-TALK-OVER-CELLULAR (PoC) - WiFi interworking solutions for Push-To-Talk over Cellular (PoC) in the Open Mobile Alliance (OMA) Standard. | 08-01-2013 |