Patent application number | Description | Published |
20080202914 | De-entrainment tray for high capacity operation - A de-entrainment device separates entrained liquid from vapor in a fluid stream that flows through a chimney tray in a distillation tower. The separated liquid is collected and shielded from the fluid stream to prevent re-entrainment of the liquid in the vapor flowing upward into the tower. The chimney tray includes risers with hats that have gutters to guide liquid toward the tray deck, channels to collect and drain liquid from the top of the hats to the tray deck, and baffles extending from the risers to shield the liquid collected on the tray deck from the vapor flow. | 08-28-2008 |
20080314729 | Core de-entrainment device for vessels with tangential inlets - A distillation tower for use in a petrochemical or petroleum operation effects liquid and vapor separation by using centrifugal force applied to the feed introduced into a ring from a tangential inlet. The feed is separated into a liquid component that flows into the bottoms section of the tower and a vapor component that flows upwardly through the core of the ring to a wash zone in the tower. De-entrainment devices are provided in the core so that the vapor swirling upwardly impacts the devices and any remaining entrained liquid is separated from the vapor. As a result, overflash with decreased resid can be collected from the wash zone and used as feed suitable for a fluid catalytic cracking operation, for example. | 12-25-2008 |
20090101546 | Distillation tower construction and operation - A combination of differently sized structured packings in the wash zone of distillation towers is provides advantages at high vapor rates. The use of a large crimp structured packing below a smaller crimp size structured packing is advantageous for vacuum crude unit service where fouling resistance is desirable and liquid entrainment into the wash zone is a problem at high vapor rates. The tower may be operated at high vapor flux rates or C 0.4 ft/sec or higher (0.12 m/sec). An unexpected characteristic of the combinations is that the entrainment increases only slowly with increasing vapor flux rate up to Cs values of at least 0.55 ft/sec (0.17 m.sec), as compared to other packings such as random packing, grid packing and combinations of grid packing with structured packing which allow entrainment to increase sharply at high vapor rates. | 04-23-2009 |
20090321322 | OPTIMIZING FEED MIXER PERFORMANCE IN A PARAFFINIC FROTH TREATMENT PROCESS - The invention relates to improved bitumen recovery processes and systems. One process provides for operation of a bitumen froth treatment plant at optimum shear rates in the feed pipe carrying the bitumen froth to the froth settling unit. Another process provides for optimizing the design of a bitumen froth treatment plant by optimizing the diameter of the feed pipe to impart an optimum shear rate to the bitumen froth mixture and further optimizing the volume of the feed pipe to impart an optimum residence time for the bitumen froth stream in the feed pipe. An optimal plant design is also disclosed, the plant including optimal diameter and volume of the feed pipe. | 12-31-2009 |
20090321323 | Optimizing Heavy Oil Recovery Processes Using Electrostatic Desalters - The invention relates to improved bitumen recovery processes and systems. The process may include providing a bitumen froth feed stream, separating the stream in a froth separation unit to produce a diluted bitumen stream, treating the diluted bitumen stream in an electrostatic desalter to produce a treated bitumen stream, and separating the treated bitumen stream into a solvent recycle stream and a bitumen product stream. The system may include a combined AC/DC desalter with a control unit for optimizing the treatment process to produce a product bitumen stream using less solvent and smaller separators than conventional bitumen froth treatment plants and processes. | 12-31-2009 |
20090321324 | Fouling Reduction In A Paraffinic Froth Treatment Process By Solubility Control - The disclosure relates to improved bitumen recovery processes and systems. In particular, the disclosure teaches processes and systems for recovering heavy crude oil while avoiding fouling of equipment by recycling at least a portion of a product bitumen from a solvent recovery unit for mixing with an overhead bitumen stream that may be a diluted bitumen stream containing solvent and bitumen. The overhead bitumen stream is a near-incompatible stream and the stream of mixed overhead bitumen stream and the treated bitumen stream is a compatible stream that will not foul equipment upon heating. | 12-31-2009 |
20120217187 | Optimizing Heavy Oil Recovery Processes Using Electrostatic Desalters - The invention relates to improved bitumen recovery processes and systems. The process may include providing a bitumen froth feed stream, separating the stream in a froth separation unit to produce a diluted bitumen stream, treating the diluted bitumen stream in an electrostatic desalter to produce a treated bitumen stream, and separating the treated bitumen stream into a solvent recycle stream and a bitumen product stream. The system may include a combined AC/DC desalter with a control unit for optimizing the treatment process to produce a product bitumen stream using less solvent and smaller separators than conventional bitumen froth treatment plants and processes. | 08-30-2012 |
20120279824 | Optimizing Feed Mixer Performance In A Paraffinic Froth Treatment Process - The invention relates to improved bitumen recovery processes and systems. One process provides for operation of a bitumen froth treatment plant at optimum shear rates in the feed pipe carrying the bitumen froth to the froth settling unit. Another process provides for optimizing the design of a bitumen froth treatment plant by optimizing the diameter of the feed pipe to impart an optimum shear rate to the bitumen froth mixture and further optimizing the volume of the feed pipe to impart an optimum residence time for the bitumen froth stream in the feed pipe. An optimal plant design is also disclosed, the plant including optimal diameter and volume of the feed pipe. | 11-08-2012 |
20140048380 | OPTIMIZING FEED MIXER PERFORMANCE IN A PARAFFINIC FROTH TREATMENT PROCESS - The invention relates to improved bitumen recovery processes and systems. One process provides for operation of a bitumen froth treatment plant at optimum shear rates in the feed pipe carrying the bitumen froth to the froth settling unit. Another process provides for optimizing the design of a bitumen froth treatment plant by optimizing the diameter of the feed pipe to impart an optimum shear rate to the bitumen froth mixture and further optimizing the volume of the feed pipe to impart an optimum residence time for the bitumen froth stream in the feed pipe. An optimal plant design is also disclosed, the plant including optimal diameter and volume of the feed pipe. | 02-20-2014 |
Patent application number | Description | Published |
20090062155 | USE OF FLUOROCARBON SURFACTANTS TO IMPROVE THE PRODUCTIVITY OF GAS AND GAS CONDENSATE WELLS - The present invention includes composition having a nonionic, fluorinated polymeric surfactant, water and solvent. Embodiments of compositions according to the present invention are useful, for example, for recovering hydrocarbons from subterranean elastic formations. | 03-05-2009 |
20090314549 | MAINTAINING SHALE STABILITY BY PORE PLUGGING - The present invention includes compositions and methods for improving wellbores stability of a hydrocarbon bearing shale formation using nanoparticles to decrease swelling and plug pore throats. | 12-24-2009 |
20100137169 | Method for Treating a Fractured Formation - The present invention includes compositions and methods of treating a hydrocarbon-bearing formation, the formation having at least one fracture, by contacting the fracture with a composition that includes a solvent and a nonionic fluorinated polymeric surfactant, wherein the composition interacts with at least a portion of the proppants in the fracture. | 06-03-2010 |
20100167964 | Compositions and Methods for Treating a Water Blocked Well - The present invention includes a method of treating a hydrocarbon-bearing clastic formation having non-connate water by contacting the hydrocarbon-bearing clastic formation with a composition that includes a solvent and a nonionic fluorinated polymeric surfactant wherein the solvent at least partially displaces or solubilizes the water in the formation. | 07-01-2010 |
20100224361 | Compositions and Methods for Treating a Water Blocked Well - The present invention includes a method of treating a hydrocarbon-bearing clastic formation having non-connate water, the method includes contacting the hydrocarbon-bearing clastic formation with a composition that includes a solvent and a surfactant wherein the solvent at least partially displaces or solubilizes the water in the formation. | 09-09-2010 |
20100292110 | USE OF FLUOROCARBON SURFACTANTS TO IMPROVE THE PRODUCTIVITY OF GAS AND GAS CONDENSATE WELLS - The present invention includes composition having a nonionic, fluorinated polymeric surfactant, water and solvent. Embodiments of compositions according to the present invention are useful, for example, for recovering hydrocarbons from subterranean clastic formations. | 11-18-2010 |
20100319920 | METHODS FOR IMPROVING THE PRODUCTIVITY OF OIL PRODUCING WELLS - Methods for treating formations bearing brine and at least one of black oil or volatile oil using a composition containing a nonionic polymer and solvent. The solvent at least one of solubilizes or displaces at least one of brine or oil in the formation. Methods for making a composition for treating a formation bearing brine an at least one of black oil or volatile oil are also disclosed. | 12-23-2010 |
20110136704 | Methods of Treating a Hydrocarbon-Bearing Formation, a Well Bore, and Particles - Methods of treating articles using a compound represented by formula: (I) wherein each of X and Y is independently a thiol, a halogen, a hydrogen, a hydroxyl, a hydroalkyl, a carboxylic acid, an aldehyde, a carboxylic ester, or a carboxamide; R′ is hydrogen, alkyl, or aryl; and x and y are each independently 0 to 10, wherein x+y is at least 1 and articles treated by such methods. In some embodiments, the article is a hydrocarbon-bearing formation. In some embodiments, the article is a particle, and the method further comprises treating the article with a fluorochemical comprising at least one fluoroaliphatic segment and at least one hydrophilic segment. In some embodiments, the method is used to treat a well bore. | 06-09-2011 |
20110201531 | Method for Treating Hydrocarbon-Bearing Formations with Fluorinated Epoxides - A method of treating a hydrocarbon-bearing formation with a fluorinated epoxide and a treated hydrocarbon-bearing formation. A method of making proppants is also disclosed, which includes combining a plurality of particles with a fluorinated epoxide. The particles comprise at least one of sand, resin-coated sand, ceramic, thermoplastic, clay, bauxite, nut or seed shells, fruit pits, or wood. A particle treated with a ring-opened product of a fluorinated epoxide is also disclosed, wherein the particle comprises one of sand, resin-coated sand, ceramic, thermoplastic, clay, bauxite, nut or seed shells, fruit pits, or wood. | 08-18-2011 |
20120325462 | Method for Determining Spacing of Hydraulic Fractures in a Rock Formation - Methods of the present disclosure include determining an expected trajectory of induced fractures in a rock formation, analyzing net pressure associated with the induced fractures, and determining at least one of spacing of induced fractures and a property of the induced fractures based on the net pressure. Computer-readable medium containing the method are also disclosed. Other related methods are also disclosed. | 12-27-2012 |
20140096967 | SALT-TOLERANT ANIONIC SURFACTANT COMPOSITIONS FOR ENHANCED OIL RECOVERY (EOR) APPLICATIONS - The present invention includes compositions and methods for using an anionic surfactant composition for treating a hydrocarbon-bearing formation or a reservoir, of formula (I): | 04-10-2014 |
20140291025 | MAINTAINING SHALE STABILITY BY PORE PLUGGING - Compositions and methods for improving wellbores stability of a hydrocarbon bearing shale formation using nanoparticles to decrease swelling and plug pore throats. | 10-02-2014 |
20160003020 | METHODS FOR TIME-DELAYED FRACTURING IN HYDROCARBON FORMATIONS - Methods of fracturing a hydrocarbon formation are described herein. A method may include propagating one or more first fractures from a first wellbore in the hydrocarbon formation, allowing a selected period of time to elapse so that at least a portion of the first fractures close, and propagating at least one second fracture in the wellbore or a second wellbore after the elapsed selected period of time. | 01-07-2016 |
Patent application number | Description | Published |
20080256221 | Method and Apparatus for a Secure Network Install - A method, an apparatus, and computer instructions are provided for a secure network install. One aspect of the present invention provides a proxy server within the same subnet of the client for performing a lookup of the boot image file and downloading the boot image file from a boot file server in a secure manner. The client in turn downloads the file from the proxy TFTP server. Another aspect of the present invention modifies the client remote boot code to include a secure boot file download discovery (SBDD) mode. The client starts the SBDD mode by sending a request for a boot image file to a subnet broadcast address and port, which is listened by a proxy TFTP server. The proxy TFTP server receives the client request and downloads the boot image file. The client in turn downloads the boot image file from the proxy TFTP server. | 10-16-2008 |
20080259917 | System and Method for Improved Ethernet Load Balancing - A method for Ethernet packet load balancing includes receiving a transmit package for transmission on an Ethernet network. An offload adapter identifies a least busy port from a plurality of ports indicated in a port list, based on a byte count associated with each of the plurality of ports. The offload adapter determines whether the identified least busy port is in a working status. In the event the identified least busy port is in a working status, the offload adapter assigns the transmit packet to the identified least busy port and increments the byte count associated with the identified least busy port. In the event the identified least busy port is not in a working status, the offload adapter updates the port list and, based on a determination that there are additional working ports, assigns the transmit packet to one of the additional working ports. | 10-23-2008 |
20080288598 | METHOD TO MANAGE DISK USAGE BASED ON USER SPECIFIED CONDITIONS - A method, system, and computer program product are provided for managing email disk usage based on user specified conditions. An incoming email for a user is scanned for email expressions. A determination is made as to whether one of the email expressions matches one of a number of listed expressions forming a matched expression. Responsive to a presence of a matched expression, a determination is made as to whether a first threshold associated with the matched expression is met or exceeded. Responsive to the first threshold being met or exceeded, a notification is sent to the user of the first threshold being met. | 11-20-2008 |
20090094352 | Method and Apparatus for a Secure Network Install - A method, an apparatus, and computer instructions are provided for a secure network install. One aspect of the present invention provides a proxy server within the same subnet of the client for performing a lookup of the boot image file and downloading the boot image file from a boot file server in a secure manner. The client in turn downloads the file from the proxy TFTP server. Another aspect of the present invention modifies the client remote boot code to include a secure boot file download discovery (SBDD) mode. The client starts the SBDD mode by sending a request for a boot image file to a subnet broadcast address and port, which is listened by a proxy TFTP server. The proxy TFTP server receives the client request and downloads the boot image file. The client in turn downloads the boot image file from the proxy TFTP server. | 04-09-2009 |
20110093870 | High Performance and Resource Efficient Communications Between Partitions in a Logically Partitioned System - A mechanism is provided for communicating between a plurality of applications. An application programming interface (API) associated with an originating application running on a first logical partition in a plurality of logical partitions of a logically partitioned data processing system receives a request to send data to a destination application. The API sends a request to identify a location of the destination application to a virtualization management mechanism. Responsive to receiving a response from the virtualization management mechanism, the API determines whether the location of the destination application is a second logical partition in the plurality of logical partitions of the logically partitioned data processing system. Responsive to the location being the second logical partition, the API uses a bypass protocol to send the request from the originating application to the destination application. | 04-21-2011 |
20110265095 | Resource Affinity via Dynamic Reconfiguration for Multi-Queue Network Adapters - A mechanism is provided for providing resource affinity for multi-queue network adapters via dynamic reconfiguration. A device driver allocates an initial queue pair within a memory. The device driver determines whether workload of the data processing system has risen above a predetermined high threshold. Responsive to the workload rising above the predetermined high threshold, the device driver allocates and initializes an additional queue pair in the memory. The device driver programs a receive side scaling (RSS) mechanism in a network adapter to allow for dynamic insertion of an additional processing engine associated with the additional queue pair. The device driver enables transmit tuple hashing to the additional queue pair. | 10-27-2011 |
20120102217 | Multi-Adapter Link Aggregation for Adapters with Hardware Based Virtual Bridges - Mechanisms for providing a network adapter and functionality for performing link aggregation within a network adapter are provided. With these mechanisms, a network adapter is provided that includes a plurality of physical network ports for coupling to one or more switches of a data network and a link aggregation module, within the network adapter, and coupled to the plurality of physical network ports. The link aggregation module comprises logic for aggregating links associated with the plurality of physical network ports into a single virtual link. The link aggregation module interfaces with a virtual Ethernet bridge (VEB) of the network adapter to send data to the VEB and receive data from the VEB. | 04-26-2012 |
20120102562 | SECURING NETWORK COMMUNICATIONS WITH LOGICAL PARTITIONS - Embodiments of the present invention provide methods, systems, and computer program products that enable secure network communications with logical partitions. A gateway between a physical network adapter and at least one virtual network trunk adapter receives a packet. The gateway tags the packet with an indication of an origin of the packet. The gateway delivers the tagged packet to an intrusion prevention system for intrusion analysis. When the gateway receives the tagged packet from the intrusion prevention system, the gateway forwards the tagged packet according to the indication of origin of the tagged packet. | 04-26-2012 |
20120185846 | NETWORK COMMUNICATIONS OVER SHARED LINKS IN A VIRTUALIZED ENVIRONMENT - A method of data processing includes a physical host executing a virtual machine monitor (VMM) that instantiates a plurality of virtual machines (VMs). The VMM supports processing of a virtual link manager (VLM) that deploys and configures a plurality of Layer 2 virtual links sharing bandwidth of a Layer 2 physical link between the physical host and an access switch. The VMM communicates parameters of the plurality of virtual links with the access switch. | 07-19-2012 |
20120201253 | Multi-Adapter Link Aggregation for Adapters with Hardware Based Virtual Bridges - Mechanisms for providing a network adapter and functionality for performing link aggregation within a network adapter are provided. With these mechanisms, a network adapter is provided that includes a plurality of physical network ports for coupling to one or more switches of a data network and a link aggregation module, within the network adapter, and coupled to the plurality of physical network ports. The link aggregation module comprises logic for aggregating links associated with the plurality of physical network ports into a single virtual link. The link aggregation module interfaces with a virtual Ethernet bridge (VEB) of the network adapter to send data to the VEB and receive data from the VEB. | 08-09-2012 |
20120210319 | NETWORK COMMUNICATIONS OVER SHARED LINKS IN A VIRTUALIZED ENVIRONMENT - A method of data processing includes a physical host executing a virtual machine monitor (VMM) that instantiates a plurality of virtual machines (VMs). The VMM supports processing of a virtual link manager (VLM) that deploys and configures a plurality of Layer 2 virtual links sharing bandwidth of a Layer 2 physical link between the physical host and an access switch. The VMM communicates parameters of the plurality of virtual links with the access switch. | 08-16-2012 |
20120210337 | Resource Affinity Via Dynamic Reconfiguration for Multi-Queue Network Adapters - A mechanism is provided for providing resource affinity for multi-queue network adapters via dynamic reconfiguration. A device driver allocates an initial queue pair within a memory. The device driver determines whether workload of the data processing system has risen above a predetermined high threshold. Responsive to the workload rising above the predetermined high threshold, the device driver allocates and initializes an additional queue pair in the memory. The device driver programs a receive side scaling (RSS) mechanism in a network adapter to allow for dynamic insertion of an additional processing engine associated with the additional queue pair. The device driver enables transmit tuple hashing to the additional queue pair. | 08-16-2012 |
20120265833 | Managing Email Disk Usage Based on User Specified Conditions - A method, system, and computer program product are provided for managing email disk usage based on user specified conditions. An incoming email for a user is scanned for email expressions. A determination is made as to whether one of the email expressions matches one of a number of listed expressions forming a matched expression. Responsive to a presence of a matched expression, a determination is made as to whether a first threshold associated with the matched expression is met or exceeded. Responsive to the first threshold being met or exceeded, a notification is sent to the user of the first threshold being met. | 10-18-2012 |
20130033993 | Distributed Overlay Network Data Traffic Management by a Virtual Server - An approach is provided in which a data traffic module executing on a network interface card receives a data packet initiated by a first virtual machine with a destination at a second virtual machine. The data traffic module identifies one or more physical path translations corresponding to a logical connectivity that is independent of physical topology constraints of a physical network. In turn, the data traffic module encapsulates the data packet with the one or more physical path translations and sends the encapsulated data packet to the second virtual machine over the physical network. | 02-07-2013 |
20130034094 | Virtual Switch Data Control In A Distributed Overlay Network - An approach is provided in which a hypervisor provisions switch resources on a network interface card, which includes a virtual switch and a physical port. The hypervisor invokes a switch control module on a virtual machine, which provides control information to one or more of the switch resources. In turn, one or more of the switch resources utilize the control information to direct data packets between a source virtual machine and a destination virtual machine over one or more virtual networks that are independent of physical topology constraints of a physical network. | 02-07-2013 |
20130034109 | Distributed Overlay Network Data Traffic Management by a Virtual Server - An approach is provided in which a data traffic module executing on a network interface card receives a data packet initiated by a first virtual machine with a destination at a second virtual machine. The data traffic module identifies one or more physical path translations corresponding to a logical connectivity that is independent of physical topology constraints of a physical network. In turn, the data traffic module encapsulates the data packet with the one or more physical path translations and sends the encapsulated data packet to the second virtual machine over the physical network. | 02-07-2013 |
20130047024 | VIRTUAL I/O SERVER BANDWIDTH VIA SHARED ETHERNET ADAPTER (SEA) LOAD SHARING IN SEA FAIL-OVER CONFIGURATION - Provided are techniques for configuring a primary shared Ethernet adapter (SEA) and a backup SEA into a failover (F/O) protocol; providing a user interface (UI) for enabling a user to request a SEA load sharing protocol; in response to a user request for a SEA load sharing protocol, verifying that criteria for load sharing are satisfied; setting, by the UI a load sharing mode, comprising: requesting, by the backup SEA to the primary SEA, implementation of the SEA load sharing protocol; responsive to the requesting by the backup SEA, the primary SEA transmit an acknowledgment to the backup SEA and transitions into a sharing state; and responsive to the acknowledgment from the primary SEA, the backup SEA transitions to the sharing state. | 02-21-2013 |
20130083690 | Network Adapter Hardware State Migration Discovery in a Stateful Environment - An approach is provided in which a discovery system receives a migration request to move a virtual machine that executes on a first system. The discovery system identifies a first network adapter corresponding to the first system, and identifies hardware state data used by the first network adapter to process data packets generated by the virtual machine. In turn, the discovery system identifies a second network adapter that is compatible with a native format of the hardware state data, and migrates the virtual machine to a second system corresponding to the identified second network adapter. | 04-04-2013 |
20130086582 | Network Adapter Hardware State Migration Discovery in a Stateful Environment - An approach is provided in which a discovery system receives a migration request to move a virtual machine that executes on a first system. The discovery system identifies a first network adapter corresponding to the first system, and identifies hardware state data used by the first network adapter to process data packets generated by the virtual machine. In turn, the discovery system identifies a second network adapter that is compatible with a native format of the hardware state data, and migrates the virtual machine to a second system corresponding to the identified second network adapter. | 04-04-2013 |
20130097600 | Global Queue Pair Management in a Point-to-Point Computer Network - An approach is provided in which a local module receives a data frame initiated by a first virtual machine and has a target destination at a second virtual machine, which executes on a destination host system. The local module identifies a destination local port ID and a destination global queue pair number corresponding to the second virtual machine. In one embodiment, the destination local port ID corresponds to the destination host, but the destination global queue pair number is independent of the destination host. The local module includes the destination global queue pair number and the destination local port ID in an overlay header and encapsulates the data frame with the overlay header, which results in an encapsulated frame. In turn, the local module sends the encapsulated frame through a computer network to the second virtual machine. | 04-18-2013 |
20130152075 | Acceleration for Virtual Bridged Hosts - An approach is provided in which a hardware accelerated bridge executing on a network adapter receives an ingress data packet. The data packet includes a destination MAC address that corresponds to a virtual machine, which interfaces to a software bridge executing on a hypervisor. The hardware accelerated bridge identifies a software bridge table entry that includes the destination MAC address and a virtual function identifier, which identifies a virtual function corresponding to the software bridge. In turn, the hardware accelerated bridge sends the data packet from the hardware accelerated bridge to the software bridge through the identified virtual function. | 06-13-2013 |
20140019572 | Remote Direct Memory Access Socket Aggregation - Byte utilization is improved in Remote Direct Memory Access (RDMA) communications by detecting a plurality of concurrent messages on a plurality of application sockets which are destined for the same application, client or computer, intercepting those messages and consolidating their payloads into larger payloads, and then transmitting those consolidated messages to the destination, thereby increasing the payload-to-overhead byte utilization of the RDMA transmissions. At the receiving end, multiplexing information is used to unpack the consolidated messages, and to put the original payloads into a plurality of messages which are then fed into the receiving sockets to the destination application, client or computer, thereby making the consolidation process transparent between the initiator and the target. | 01-16-2014 |
20140019574 | Remote Direct Memory Access Socket Aggregation - Byte utilization is improved in Remote Direct Memory Access (RDMA) communications by detecting a plurality of concurrent messages on a plurality of application sockets which are destined for the same application, client or computer, intercepting those messages and consolidating their payloads into larger payloads, and then transmitting those consolidated messages to the destination, thereby increasing the payload-to-overhead byte utilization of the RDMA transmissions. At the receiving end, multiplexing information is used to unpack the consolidated messages, and to put the original payloads into a plurality of messages which are then fed into the receiving sockets to the destination application, client or computer, thereby making the consolidation process transparent between the initiator and the target. | 01-16-2014 |
20150095472 | Resource Affinity Via Dynamic Reconfiguration for Multi-Queue Network Adapters - A mechanism is provided for providing resource affinity for multi-queue network adapters via dynamic reconfiguration. A device driver allocates an initial queue pair within a memory. The device driver determines whether workload of the data processing system has risen above a predetermined high threshold. Responsive to the workload rising above the predetermined high threshold, the device driver allocates and initializes an additional queue pair in the memory. The device driver programs a receive side scaling (RSS) mechanism in a network adapter to allow for dynamic insertion of an additional processing engine associated with the additional queue pair. The device driver enables transmit tuple hashing to the additional queue pair. | 04-02-2015 |
20150365493 | Optimizing Network Communications - A mechanism is provided for optimizing network communications. A first data transfer request is received via a first application level socket connection in an originating computing device. Prior to opening a kernel level socket connection to a destination computing device, a determination is made as to whether a second data transfer request has been received via a second application level socket connection in the originating computing device, the second data transfer request identifying a destination computing device that is the same as the destination computing device as the first data transfer request. Responsive to identifying the second data transfer request, the first data transfer request and the second data transfer request are coalesced into a third data transfer request stored in a single kernel level socket buffer of the originating computing device. The third data transfer request is then sent to the destination computing device via a single TCP/IP stack. | 12-17-2015 |
20150365494 | Optimizing Network Communications - A mechanism is provided for optimizing network communications. A first data transfer request is received via a first application level socket connection in an originating computing device. Prior to opening a kernel level socket connection to a destination computing device, a determination is made as to whether a second data transfer request has been received via a second application level socket connection in the originating computing device, the second data transfer request identifying a destination computing device that is the same as the destination computing device as the first data transfer request. Responsive to identifying the second data transfer request, the first data transfer request and the second data transfer request are coalesced into a third data transfer request stored in a single kernel level socket buffer of the originating computing device. The third data transfer request is then sent to the destination computing device via a single TCP/IP stack. | 12-17-2015 |
Patent application number | Description | Published |
20090049278 | EFFICIENT MEMORY UPDATE PROCESS FOR ON-THE-FLY INSTRUCTION TRANSLATION FOR WELL BEHAVED APPLICATIONS EXECUTING ON A WEAKLY-ORDERED PROCESSOR - A multiprocessor data processing system (MDPS) with a weakly-ordered architecture providing processing logic for substantially eliminating issuing sync instructions after every store instruction of a well-behaved application. Instructions of a well-behaved application are translated and executed by a weakly-ordered processor. The processing logic includes a lock address tracking utility (LATU), which provides an algorithm and a table of lock addresses, within which each lock address is stored when the lock is acquired by the weakly-ordered processor. When a store instruction is encountered in the instruction stream, the LATU compares the target address of the store instruction against the table of lock addresses. If the target address matches one of the lock addresses, indicating that the store instruction is the corresponding unlock instruction (or lock release instruction), a sync instruction is issued ahead of the store operation. The sync causes all values updated by the intermediate store operations to be flushed out to the point of coherency and be visible to all processors. | 02-19-2009 |
20090077661 | Method and Apparatus for the Reliability of Host Data Stored on Fibre Channel Attached Storage Subsystems - A method for improving the reliability of host data stored on Fibre Channel attached storage subsystems by performing end-to-end data integrity checks. When a read or write operation is initiated, an initial checksum for data in the read/write operation is generated and associated with the data, wherein the association exists through a plurality of layers of software and attached storage subsystems. The initial checksum is passed with the data in the read/write path. When a layer of software in the read/write path receives the initial checksum and data, the layer performs an integrity check of the data, which includes generating another checksum and comparing it to the initial checksum. If the checksums do not match, the read/write operation fails and the error is logged. If the checksums match, the integrity check is repeated through each layer in the read/write path to enable detecting data corruption at the point of source. | 03-19-2009 |
20110107054 | EXPANDING MEMORY SIZE - A method, system, and computer usable program product for expanding memory size are provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory. | 05-05-2011 |
20110161979 | MIXED OPERATING PERFORMANCE MODE LPAR CONFIGURATION - Functionality is implemented to determine that a plurality of multi-core processing units of a system are configured in accordance with a plurality of operating performance modes. It is determined that a first of the plurality of operating performance modes satisfies a first performance criterion that corresponds to a first workload of a first logical partition of the system. Accordingly, the first logical partition is associated with a first set of the plurality of multi-core processing units that are configured in accordance with the first operating performance mode. It is determined that a second of the plurality of operating performance modes satisfies a second performance criterion that corresponds to a second workload of a second logical partition of the system. Accordingly, the second logical partition is associated with a second set of the plurality of multi-core processing units that are configured in accordance with the second operating performance mode. | 06-30-2011 |
20120210090 | EXPANDING MEMORY SIZE - A method for expanding memory size is provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory. | 08-16-2012 |
20120216214 | MIXED OPERATING PERFORMANCE MODE LPAR CONFIGURATION - Functionality is implemented to determine that a plurality of multi-core processing units of a system are configured in accordance with a plurality of operating performance modes. It is determined that a first of the plurality of operating performance modes satisfies a first performance criterion that corresponds to a first workload of a first logical partition of the system. Accordingly, the first logical partition is associated with a first set of the plurality of multi-core processing units that are configured in accordance with the first operating performance mode. It is determined that a second of the plurality of operating performance modes satisfies a second performance criterion that corresponds to a second workload of a second logical partition of the system. Accordingly, the second logical partition is associated with a second set of the plurality of multi-core processing units that are configured in accordance with the second operating performance mode. | 08-23-2012 |
20140195768 | EXPANDING MEMORY SIZE - A system, and computer usable program product for expanding memory size are provided in the illustrative embodiments. A desired size of an expanded memory and a first information about a workload in the data processing system are received. A size of a compressed memory pool to use with the memory to make the desired size of the expanded memory available is computed. A representation of the memory is configured, the representation of the memory appearing to be of a size larger than the size of the memory, the representation of the memory being the expanded memory, and the size of the representation being the size of the expanded memory. The expanded memory is made available such that the memory in the data processing system is usable by addressing the expanded memory. | 07-10-2014 |
Patent application number | Description | Published |
20110113450 | ENHANCED TELEVISION EXTENSION - A method may include receiving an enhanced television (ETV) application in a video client over a first data path and executing the ETV application in the video client. In one embodiment, the ETV application may include an enhanced television binary interchange format (EBIF) resource. The method may also include extracting, from the EBIF resource, an identifier of an extension application and requesting the identified extension application. The method may include receiving the extension application, over a second data path different than the first data path and executing the extension application. | 05-12-2011 |
20110293251 | Methods and Systems for Dynamically Balancing Storage of Recorded Media Content Data Between a Local Storage Device and a Network Storage Device - An exemplary method includes receiving a command input by a user to record media content, recording media content data representative of the media content in response to the command, automatically selecting at least one storage device from a local storage device and a network storage device for storage of the recorded media content data in accordance with at least one of a plurality of storage balancing factors, and storing the recorded media content data in the at least one selected storage device. Corresponding methods and systems are also disclosed. | 12-01-2011 |
20110304778 | TWO-WAY REMOTE WITH ADAPTIVE CHARACTER ENTRY - A media client receives, from a remote control device, a signal to launch a selected interactive television application and sends, to the remote control device, a client program for reprogramming buttons on the remote control device. The media client sends, to the remote control device, a script, for button functions of the remote control device, which are based on the selected interactive television application. The remote control device executes the script on the client program to reprogram the buttons functions. The media client presents, on a display device, a button map that corresponds to the script, and receives, from the remote control device, a signal based on the scripting. | 12-15-2011 |
20110307924 | Methods and Systems for Generating a Personalized Version of a Media Content Program for a User - An exemplary method includes receiving a plurality of data chunks each representative of a distinct portion of a media content program, generating a personalized version of the media content program based on at least a subset of the data chunks and in accordance with one or more of a plurality of personalization factors associated with a user, and providing the personalized version of the media content program for presentation to the user. Corresponding methods and systems are also described. | 12-15-2011 |
20120084825 | PROVISIONING AN ENHANCED TELEVISION (ETV) APPLICATION - A method includes detecting, from an Enhanced Television (ETV) Integrated Signaling Stream (EISS), an indication that an ETV application is available to be downloaded; downloading, in response to the indication, the ETV application from a video stream identified by the indication, where the ETV application does not conform to an ETV Binary Interchange Format (EBIF) standard; detecting, from the EISS, another indication that the ETV application is to be started; executing, in response to the other indication, the ETV application to generate an ETV page, where the ETV page includes information that is not permitted by the EBIF standard; and displaying the ETV page on a video display device to enables a user to interact with the ETV page. | 04-05-2012 |
20120272263 | METHOD AND APPARATUS FOR PROVIDING AN INTERACTIVE APPLICATION WITHIN A MEDIA STREAM - An approach provides interactive application and advertisement within media streams. A program map table of a media stream is retrieved, wherein the program map table includes a plurality of private descriptor fields that permit user specified tag values. One of the descriptor fields is configured to indicate whether the media stream is associated with an interactive application or advertisement information. | 10-25-2012 |
20120284742 | METHOD AND APPARATUS FOR PROVIDING INTERACTIVE CONTENT WITHIN MEDIA STREAMS USING VERTICAL BLANKING INTERVALS - An approach provides interactive application and advertisement within media streams. An identifier is generated according to an interactive content specified within an extended data services field of an advertisement video. The identifier is inserted into a media stream to indicate to a set-top box presence of the interactive content, wherein the media stream represents the advertisement video. | 11-08-2012 |
20120291060 | Methods and Systems for Managing Media Content Sessions - Exemplary methods and systems for managing media content sessions are disclosed herein. As described in more detail below, a media content access device may detect a media content session associated with the media content access device, communicate with one or more other media content access devices by way of a local area network to detect one or more other media content sessions associated with the one or more other media content access devices, and present a graphical user interface configured to facilitate user management of the media content session and the one or more other media content sessions. Corresponding methods and systems are also disclosed. | 11-15-2012 |
Patent application number | Description | Published |
20100183195 | Method and Apparatus for Object Detection in an Image - A method and apparatus for detecting at least one of a location and a scale of an object in an image. The method comprising distinguishing the trailing and leading edges of a moving object in at least one portion of the image, applying a symmetry detection filter to at least a portion of the image to produce symmetry scores relating to the at least one portion of the image, and identifying at least one location corresponding to locally maximal symmetry scores of the symmetry scores relating to the at least one portion of the image, and utilizing the at least one location of the locally maximal symmetry scores to detect at least one of a location and a scale of the object in the image, wherein the scale relates to the size of the symmetry detection filter. | 07-22-2010 |
20110064315 | METHOD AND APPARATUS FOR IMAGE CAPTURING TAMPERING DETECTION - A method and apparatus for detecting tampering with an image capturing device. The method includes determining a change has occurred in average intensity if an image, determining a percentage area of a foreground mask, detecting related at least one edge and determining at least one edge weight, utilizing the average intensity, the percentage area of the foreground mask, and the at least one edge weight to determining offset of edge blocks of an image, and utilizing the determining offset of edge blocks to detect tampering with an image capturing device. | 03-17-2011 |
20110135150 | METHOD AND APPARATUS FOR TRACKING OBJECTS ACROSS IMAGES - A method and apparatus for tracking objects across images. The method includes retrieving object location in a current frame, determining the appearance and motion signatures of the object in the current frame, predicting the new location of the object based on object dynamics, searching for a location with similar appearance and motion signatures in a next frame, and utilizing the location with similar appearance and motion signatures to determine the final location of the object in the next frame. | 06-09-2011 |
20110221895 | Detection of Movement of a Stationary Video Camera - A method of detecting movement of a video camera is provided that includes computing a reference spatial derivative image from a reference frame, computing a temporal derivative image based on two frames of a video sequence captured by the video camera, and determining whether the video camera has moved based on the number of pixels in the temporal derivative image that match pixels in the reference spatial derivative image. | 09-15-2011 |
20110222727 | Object Localization Using Tracked Object Trajectories - A method of processing a video sequence is provided that includes tracking a first object and a second object for a specified number of frames, determining similarity between a trajectory of the first object and a trajectory of the second object over the specified number of frames, and merging the first object and the second object into a single object when the trajectory of the first object and the trajectory of the second object are sufficiently similar, whereby an accurate location and size for the single object is obtained. | 09-15-2011 |
20120086780 | Utilizing Depth Information to Create 3D Tripwires in Video - A method of processing a digital video sequence is provided that includes detecting a foreground object in an image captured by a depth camera, determining three-dimensional (3D) coordinates of the foreground object, and comparing the 3D coordinates to a 3D video tripwire to determine if the foreground object has crossed the 3D video tripwire. A method of defining a 3D video tripwire is also provided. | 04-12-2012 |
20120087572 | Use of Three-Dimensional Top-Down Views for Business Analytics - A method of analyzing a depth image in a digital system is provided that includes detecting a foreground object in a depth image, wherein the depth image is a top-down perspective of a scene, and performing data extraction and classification on the foreground object using depth information in the depth image. | 04-12-2012 |
20120087573 | Eliminating Clutter in Video Using Depth Information - A method of clutter elimination in digital images is provided that includes identifying a foreground blob in an image, determining a depth of the foreground blob, and indicating that the foreground blob is clutter when the depth indicates that the foreground blob is too close to be an object of interest. Methods for obstruction detection in depth images such as those captured by stereoscopic cameras and structured light cameras are also provided. | 04-12-2012 |
20120092458 | Method and Apparatus for Depth-Fill Algorithm for Low-Complexity Stereo Vision - A method and apparatus for depth-fill algorithm for low-complexity stereo vision. The method includes utilizing right and left images of a stereo camera to estimate depth of the scene, wherein the estimated depth relates to each pixel of the image, and updating a depth model with the current depth utilizing the estimated depth of the scene. | 04-19-2012 |
20120148093 | Blob Representation in Video Processing - A method of processing a video sequence is provided that includes receiving a frame of the video sequence, identifying a plurality of blobs in the frame, computing at least one interior point of each blob of the plurality of blobs, and using the interior points in further processing of the video sequence. The interior points may be used, for example, in object tracking. | 06-14-2012 |
20130100281 | Method, System and Computer Program Product for Detecting an Obstacle with a Camera - For detecting an obstacle with a camera, a first image is viewed by the camera at a first location during a first time. Points on a surface would project onto first pixels of the first image. A second image is viewed by the camera at a second location during a second time. The points on the surface would project onto second pixels of the second image. Coordinates of the second pixels are identified in response to coordinates of the first pixels, in response to a displacement between the first and second locations, and in response to a distance between the camera and the surface. The obstacle is detected in response to whether the first pixels substantially match the second pixels. | 04-25-2013 |
20130241822 | Enabling Physical Controls on an Illuminated Surface - A method for enabling physical controls in a digital system is provided that includes receiving an image of an illuminated surface in the digital system, wherein the image is captured by a camera in the digital system, determining a state of a physical control mounted on the illuminated surface by analyzing the image; and outputting an indication of the state of the physical control. | 09-19-2013 |
20130241887 | Detecting and Tracking Touch on an Illuminated Surface - A method for touch detection is provided that includes receiving an image of an illuminated surface of an optical touch detection system, wherein the image is captured by a camera in the optical touch detection system, identifying highly saturated pixels in the image, identifying a set of candidate touch locations in the image, classifying the candidate touch locations in the set of candidate touch locations to generate a set of validated candidate touch locations, pruning the set of validated candidate touch locations based on the identified highly saturated pixels to generate a set of final touch locations, wherein a validated candidate touch location is not included in the set of final touch locations if the validated candidate touch location corresponds to a highly saturated pixel, and outputting the set of final touch locations. | 09-19-2013 |
20130241888 | Detecting Wave Gestures Near an Illuminated Surface - A method for wave gesture detection performed by a touch processor in an optical touch detection system is provided. The method includes receiving a sequence of images of an illuminated surface comprised in the optical touch detection system, wherein the images are captured by a camera comprised in the optical touch detection system, detecting a wave gesture performed in front of the illuminated surface by analyzing the sequence of images, and outputting an indication that a wave gesture has been detected. | 09-19-2013 |
20130241889 | Detecting and Tracking Touch on an Illuminated Surface Using a Mean-Subtracted Image - A method for touch detection performed by a touch processor in an optical touch detection system is provided that includes receiving an image of an illuminated surface included in the optical touch detection system, wherein the image is captured by a camera included in the optical touch detection system, subtracting a background model from the image to generate a mean-subtracted image, identifying a set of candidate touch locations in the mean-subtracted image, classifying the candidate touch locations in the set of candidate touch locations to generate a set of validated candidate touch locations, and outputting a set of final touch locations determined from the set of validated candidate touch locations. | 09-19-2013 |
20130241890 | Detecting and Tracking Touch on an Illuminated Surface Using a Machine Learning Classifier - A method for touch detection that is performed by a touch processor in an optical touch detection system is provided. The method includes receiving an image of an illuminated surface in the optical touch detection system, wherein the image is captured by a camera in the optical touch detection system, identifying a set of candidate touch locations in the image, classifying the candidate touch locations in the set of candidate touch locations to generate a set of validated candidate touch locations, wherein classifying the candidate touch locations includes using a machine learning classifier to classify each candidate touch location as valid or invalid, wherein the machine learning classifier is trained to classify a candidate touch location based on a combination of features of the candidate touch location, and outputting a set of final touch locations. | 09-19-2013 |
20140043326 | METHOD AND SYSTEM FOR PROJECTING CONTENT TO HAVE A FIXED POSE - A camera points in a first direction for capturing images of views. Visual features are detected and tracked in the images. A pose is estimated of the camera in response to the tracked visual features. A projector points in a second direction for projecting content to have a fixed pose in response to the estimated pose of the camera. | 02-13-2014 |
20140043327 | METHOD AND SYSTEM FOR SUPERIMPOSING CONTENT TO HAVE A FIXED POSE - A first camera captures first images of first views. A display device displays the first images on a screen of the display device. A second camera captures second images of second views. Visual features are detected and tracked in the second images. A pose is estimated of the second camera in response to the tracked visual features. On the first images on the screen, content is superimposed to have a fixed pose in response to the estimated pose of the second camera. | 02-13-2014 |
20140043443 | METHOD AND SYSTEM FOR DISPLAYING CONTENT TO HAVE A FIXED POSE - A first camera captures first images of first views. A second camera captures second images of second views. First visual features are detected and tracked in the first images. Second visual features are detected and tracked in the second images. A pose is estimated of the second camera in response to the second visual features. In response to determining that the second visual features have better sufficiency than the first visual features, content is displayed to have a fixed pose in response to the estimated pose of the second camera. | 02-13-2014 |
20140098242 | Camera Pose Estimation - A method of camera pose estimation is provided that includes capturing a model image of a scene at a canonical camera pose, generating an image library from warped images of the model image and the model image, wherein each warped image is a transformation of the model image at a different pre-determined camera pose, capturing an image of the scene as a user moves the camera, reporting the current camera pose as a camera pose of the image when the image is acceptable, conditionally adding the first image to the image library when the first image is acceptable, and re-initializing the current camera pose to a camera pose selected from the image library when the first image is not acceptable. | 04-10-2014 |
20140098998 | METHOD AND SYSTEM FOR CONTROLLING OPERATION OF A VEHICLE IN RESPONSE TO AN IMAGE - For controlling operation of a vehicle, at least one camera captures an image of a screen on which a user places an object having features distinguishing the user. A controller detects the features in the image and analyzes the features to distinguish the user. In response to distinguishing the user, the controller outputs signals for controlling operation of the vehicle. A projector receives information from the controller and projects the information onto the screen, so that the information is displayed on the screen for viewing by the user. | 04-10-2014 |
20150086107 | USE OF THREE-DIMENSIONAL TOP-DOWN VIEWS FOR BUSINESS ANALYTICS - A method of analyzing a depth image in a digital system is provided that includes detecting a foreground object in a depth image, wherein the depth image is a top-down perspective of a scene, and performing data extraction and classification on the foreground object using depth information in the depth image. | 03-26-2015 |