Patent application number | Description | Published |
20100332583 | DATABASE ACCESS SYSTEM - An improved human user computer interface system, wherein a user characteristic or set of characteristics, such as demographic profile or societal “role”, is employed to define a scope or domain of operation. The operation itself may be a database search, to interactively define a taxonomic context for the operation, a business negotiation, or other activity. After retrieval of results, a scoring or ranking may be applied according to user define criteria, which are, for example, commensurate with the relevance to the context, but may be, for example, by date, source, or other secondary criteria. A user profile is preferably stored in a computer accessible form, and may be used to provide a history of use, persistent customization, collaborative filtering and demographic information for the user. Advantageously, user privacy and anonymity is maintained by physical and algorithmic controls over access to the personal profiles, and releasing only aggregate data without personally identifying information or of small groups. | 12-30-2010 |
Patent application number | Description | Published |
20120255990 | WELDING PROCESS FOR LARGE STRUCTURES - A welding method that utilizes a friction stir welding (FSW) technique to weld large structures, for example, very large cylindrical tower sections of wind turbines. The method involves welding at least two workpieces together by metallurgically joining faying surfaces of the workpieces. The workpieces are placed together so that their faying surfaces face each other and a joint region is defined by and between the faying surfaces. The workpieces are then friction stir welded together by forcing a tool into the joint region, rotating the tool about an axis thereof to cause the tool to penetrate the joint region, and causing the tool to travel along the joint region to form a weld joint that metallurgically joins the faying surfaces and produces a welded assembly comprising the workpieces. | 10-11-2012 |
20120294729 | COLD METAL TRANSFER HARDFACING OF BUCKETS - In one embodiment, the invention provides a method of hardfacing a portion of a bucket subject to mechanical stress, the method comprising: contacting a surface of a bucket with a hardfacing filler metal connected to a welding nozzle to establish an arc between the surface and the filler metal and form a molten weld pool comprising the filler metal and a material of the surface; extending the filler metal into the molten weld pool to short circuit the arc; withdrawing the filler metal from the molten weld pool to re-establish the arc; moving the welding nozzle along the surface; and re-extending the filler metal into the molten weld pool to short circuit the arc, deposit additional filler metal into the molten weld pool, and liquify additional material of the surface into the molten weld pool. | 11-22-2012 |
20140008415 | WELDING SYSTEM AND METHOD FOR AUTOMATIC WELDING - A welding system for automatically welding a welding seam includes a welding arm, a sensor and a controller. The controller includes a welding seam contour detection component, a welding seam contour calculation component, a welding trajectory point calculation component, and a welding parameter setting component. The welding seam contour detection component is used for detecting an initial welding seam contour and detecting remaining welding seam contours after welding each layer of the welding seam. The welding seam contour calculation component is used for calculating the detected welding seam contours. The welding trajectory point calculation component is used for calculating welding trajectory points based on the calculated welding seam contours. The welding parameter setting component is used for setting welding parameters based on the calculated welding seam contours and the calculated welding trajectory points. | 01-09-2014 |
20140361447 | TURBOMACHINE FUEL-AIR MIXER COMPONENT INCLUDING AN ADDITIVELY MANUFACTURED PORTION JOINED TO A NON-ADDITIVELY MANUFACTURED PORTION AND METHOD - A turbomachine fuel-air mixer component includes a first component portion formed from a non-additive manufacturing process. The first component portion includes a plurality of tube elements each having an end portion. A second, additively manufactured component portion is additively joined to the first component portion. The second, additively manufactured component portion includes a plurality of additively manufactured tube sections constructed at, and fluidically connected with, respective ones of each end portion of the plurality of tube elements. The first and second component portions collectively defining at least a portion of the turbomachine fuel-air mixer component. | 12-11-2014 |
20150158273 | POWDER METALLURGICAL ARTICLE - A powder metallurgical article and process are disclosed. The article is a repaired or enlarged powder metallurgical article. The repaired or enlarged powder metallurgical article includes a formed article including a first alloy and a material including a second alloy. The material is welded to the formed article to form the repaired or enlarged powder metallurgical article. The repaired or enlarged powder metallurgical article includes a substantially uniform grain structure. | 06-11-2015 |
Patent application number | Description | Published |
20140316722 | Method and Apparatus for Characterizing Interfacial Tension between Two Immiscible or Partially Miscible Fluids - An apparatus (and method) for characterizing interfacial tension between a non-wetting phase fluid and a wetting phase fluid of a slug flow employs a capillary structure that is configured to contain a slug of the non-wetting phase fluid of the slug flow. The slug has a leading edge meniscus and a trailing edge meniscus, and the capillary structure has a venturi-like section. A pressure sensor is configured to measure differential pressure between first and second locations of the capillary structure. The first location is disposed upstream of the leading edge meniscus of the slug with the leading edge meniscus of the slug contained within the venturi-like section. The second location is disposed downstream of the trailing edge meniscus of the slug. Data processing means is configured to derive a measure of interfacial tension based upon the differential pressure measured by the pressure sensor and, optionally, geometry of the capillary structure. | 10-23-2014 |
20150072902 | Fluids and Methods Including Nanocellulose - Treatment fluids and methods for treating a subterranean formation include introducing a treatment fluid into a subterranean formation, the treatment fluid containing a nanocrystalline cellulose. The treatment fluid may be a fracturing fluid, well control fluid, well kill fluid, well cementing fluid, acid fracturing fluid, acid diverting fluid, a stimulation fluid, a sand control fluid, a completion fluid, a wellbore consolidation fluid, a remediation treatment fluid, a spacer fluid, a drilling fluid, a frac-packing fluid, water conformance fluid or a gravel packing fluid. | 03-12-2015 |
20150114837 | Capillary Electrophoresis for Reservoir Fluid Analysis at Wellsite and Laboratory - A method improves the capability for testing a fluid sample, e.g. testing a reservoir sample of hydrocarbon fluid. The methodology comprises positioning a capillary electrophoresis system within an enclosed chamber system. The enclosed chamber system preserves the desired downhole reservoir conditions during testing of the reservoir sample. In some applications, the reservoir sample is divided into a plurality of capillaries of the capillary electrophoresis system to enable testing of the reservoir sample with different types of detectors in one capillary electrophoresis system. The method can also be applied to depressurized reservoir samples. | 04-30-2015 |
20150129213 | METHODS OF TREATING SUBTERRANEAN FORMATIONS WITH FLUIDS COMPRISING PROPPANT CONTAINING PARTICLE - A method is provided for treating at least a portion of a subterranean formation. The method includes introducing a treatment fluid including a composite particle, which includes proppant incorporated into or attached to a swellable material and/or swellable materials, into a subterranean formation via a wellbore; and increasing the buoyancy of the composite particle including proppant by either mixing it with a treatment fluid or mixing it with a treatment fluid and triggering the swellable material and/or swellable materials to swell. | 05-14-2015 |
20150144339 | CONTROLLED INHOMOGENEOUS PROPPANT AGGREGATE FORMATION - A method to improve fluid flow in a hydraulic fracture from a subterranean formation which includes the steps of (1) formulating a slurry which comprises (a) proppant particles, (b) a carrier fluid, and (c) low density particles, wherein the fluid is capable of undergoing a transformation to cause an agglomeration of two or more proppant particles and/or low density particles; and (2) injecting the slurry into the formation; and (3) the agglomeration of the proppant particles and/or low density particles, is provided. | 05-28-2015 |
20150204177 | DOWNHOLE HETEROGENEOUS PROPPANT - A technique facilitates treatment of a subterranean formation. A proppant and a proppant carrier fluid are delivered to a subterranean location for treatment of the formation. At the subterranean location, heterogeneities of proppant structures are generated with the proppant and the proppant carrier fluid. The heterogeneous proppant structures are then transported into the subterranean formation to improve conductivity. | 07-23-2015 |
Patent application number | Description | Published |
20090245853 | Universal Cartridge Seal - A toner hopper seal assembly is disclosed. The toner hopper seal assembly has a gasket which has a gasket opening, a pull strip having a first and second end, the pull strip attached to a first side of the gasket and covering the gasket opening. The first end of the pull strip is positioned near the gasket opening. The toner hopper seal assembly also having an integrated pull tab disposed at an end of the gasket, the integrated pull tab has a first side and a second side, the integrated pull tab is formed from a same material as the gasket and separated from the gasket by a cut in the material. The toner hopper seal assembly also has an adhesive layer covering a second side of the gasket and the second side of the integrated pull tab as well as a release liner covering the adhesive layer on the second side of the gasket and the second side of the integrated pull tab. The release liner secures the integrated pull tab in place adjacent to the end of the gasket. | 10-01-2009 |
20090251514 | Universal ink cartridge seal - A universal ink cartridge seal is disclosed. The seal is used to seal an exit port on an ink jet cartridge. The seal has a top and a surrounding wall. The surrounding wall extends perpendicularly away from the circumference of the top. The surrounding wall has an inside surface. The seal further has a rib positioned on the inside surface of the surrounding wall, the rib providing a securing force when the seal is installed on the exit port of the ink jet cartridge. | 10-08-2009 |
20100026767 | Methods and Devices For Remanufacturing An Imaging Cartridge - The present application is directed to methods and devices for remanufacturing imaging cartridges. An installation handle for positioning an electronic circuit on the imaging cartridge includes a first end, and an adhesive is releasably attached to the first end. The installation handle is adapted for positioning an electronic circuit on a surface of the imaging cartridge while the electronic circuit is releasably secured to the installation handle by the adhesive. | 02-04-2010 |
20120033990 | Method of Joining Multiple Parts of a Mag Section - Imaging devices, such as laser printers, often use a toner cartridge to print images on a recording medium. For both environmental and economical reasons, it is often desirable to reuse an exhausted toner cartridge. Some imaging devices use toner cartridges comprised of two sections that are fixed together with some limited movement. This limited movement is necessary to compensate for any misalignment in the cartridge and to reduce printer defects. Disclosed is a method and device for remanufacturing this type of toner cartridge. | 02-09-2012 |
Patent application number | Description | Published |
20100241525 | IMMERSIVE VIRTUAL COMMERCE - An immersive virtual store can be presented to a user that allows the user to navigate through the store in a manner similar to a physical store. The presented virtual store can allow the user to travel along aisles, stop and browse items at a table of a vendor, as well as perform searches for different items. Items of the store can be arranged in a manner that facilitates purchase and feedback of the arrangement can be collected and used in other arrangements. | 09-23-2010 |
20120310967 | GEO-TARGETED DATA COLLECTION OR OTHER ACTION - Information may be associated with geographic locations, and requests for this information may be used to determine future actions. In one example, a search engine returns results that refer to places having physical geographic locations. If imagery of the geographic locations is available, the imagery may be shown to the person who requests the information. If imagery is not available, this unavailability may be treated as a failure. If a number of failures occurs in a geographic area, then resources (e.g., a car with a camera) may be deployed to collect imagery of that area. In another example, knowledge about a geographic concentration of requests might be used to disambiguate a request relating to a larger area (e.g., requests relating to “Minneapolis” might be focused on the area near the I-35 bridge, if data show that many requests in Minneapolis are for the area around that bridge). | 12-06-2012 |
Patent application number | Description | Published |
20120191800 | METHODS AND SYSTEMS FOR PROVIDING DIRECT DMA - A method and system for efficient direct DMA for processing connection state information or other expediting data packets. One example is the use of a network interface controller to buffer TCP type data packets that may contain connection state information. The connection state information is extracted from a received packet. The connection state information is stored in a special DMA descriptor that is stored in a ring buffer area of a buffer memory that is accessible by a host processor when an interrupt signal is received. The packet is then discarded. The host processor accesses the ring buffer memory only to retrieve the stored connection state information from the DMA descriptor without having to access a packet buffer area in the memory. | 07-26-2012 |
20140025823 | METHODS FOR MANAGING CONTENDED RESOURCE UTILIZATION IN A MULTIPROCESSOR ARCHITECTURE AND DEVICES THEREOF - A method, computer readable medium, and network traffic management apparatus that manages contended resource utilization includes obtaining at least one value for at least one utilization parameter for at least one contended resource and determining when the obtained value of the utilization parameter for the at least one contended resource exceeds a threshold value. When the obtained value of the utilization parameter is determined to exceed the threshold value, a work rate for one or more of a plurality of processing units is reduced or the at least one contended resource is reallocated among the plurality of processing units. | 01-23-2014 |
20150049763 | HANDLING HIGH THROUGHPUT AND LOW LATENCY NETWORK DATA PACKETS IN A TRAFFIC MANAGEMENT DEVICE - Handling network data packets classified as being high throughput and low latency with a network traffic management device is disclosed. Packets are received from a network and classified as high throughput or low latency based on packet characteristics or other factors. Low latency classified packets are generally processed immediately, such as upon receipt, while the low latency packet processing is strategically interrupted to enable processing coalesced high throughput classified packets in an optimized manner. The determination to cease processing low latency packets in favor of high throughput packets may be based on a number of factors, including whether a threshold number of high throughput classified packets are received or based on periodically polling a high throughput packet memory storage location. | 02-19-2015 |
20150142948 | EXTENDING POLICY RULESETS WITH SCRIPTING - Embodiments are directed towards using policy rules that may be extended by scripting operative on a traffic management device. Each policy rule may have a condition and a corresponding action. If the condition is a script, a script engine separate from the policy engine may be employed to execute the script to determine if the condition is met. Otherwise, the policy engine may determine if the condition is met based on declarative expressions that comprise the condition. If the condition is met the action corresponding to the policy rule may be executed. Scripts may be used to compute the values of operands that may be used in one or more of the expression that comprise a condition for a policy rule. Also, the action corresponding to a policy rule may be implemented using a script that is executed by a script engine. | 05-21-2015 |
20150207815 | SYSTEMS AND METHODS FOR NETWORK DESTINATION BASED FLOOD ATTACK MITIGATION - Embodiments are directed towards network address based flood attack mitigation methods. A PTMD disposed between one or more computers may monitor several network flows and generate metrics associated with malicious network activity, such as, flood attacks. If flood attacks are determined to be occurring, the PTMD may determine the network addresses targeted by the flood attack. Further, the PTMD may activate flood attack mitigation procedures for the targeted network addresses such that other network addresses associated with the monitored network flows are excluded from the flood attack mitigation procedure. The PTMD may monitor the network traffic subsequently communicated to the targeted network addresses. Accordingly, the PTMD may determine if the flood attack has ceased based on characteristics of the monitored network traffic. If the flood attack has ceased, the flood attack mitigation procedures for the targeted network addresses may be deactivated. | 07-23-2015 |
20150236959 | AUTONOMOUSLY ADAPTIVE FLOW ACCELERATION BASED ON LOAD FEEDBACK - Embodiments are directed towards improving the performance of network traffic management devices by optimizing the management of hot connection flows. A packet traffic management device (“PTMD”) employs a data flow segment (“DFS”) and control segment (“CS”). The CS performs high-level control functions and per-flow policy enforcement for connection flows maintained at the DFS, while the DFS performs statistics gathering, and per-packet policy enforcement, on connection flows maintained at the DFS. The DFS may include high-speed flow caches and other high-speed components. Making efficient use of the high speed flow cache capacity may be improved by maximizing the number of hot connection flows based on unique service and network traffic characteristics through adaptive feedback pattern learning together with administrator configurable service preferences that may have flow control data for most bandwidth hungry and desired hot services offloaded to the high-speed flow cache, at appropriate time. | 08-20-2015 |
Patent application number | Description | Published |
20100042869 | UPGRADING NETWORK TRAFFIC MANAGEMENT DEVICES WHILE MAINTAINING AVAILABILITY - A method, system, machine-readable storage medium, and apparatus are directed towards upgrading a cluster by bifurcating the cluster into two virtual clusters, an “old” virtual cluster (old active cluster) and a “new” virtual cluster (new standby cluster), and iteratively upgrading members of the old cluster while moving them into the new cluster. While members are added to the new cluster, existing connections and new connections are seamlessly processed by the old cluster. Optionally, state mirroring occurs between the old cluster and the new cluster once the number of members of the old and new clusters are approximately equal. Once a threshold number of members have been transferred to the new cluster, control and processing may be taken over by the new cluster. Transfer of control from the old cluster to the new cluster may be performed by failing over connectivity from the old cluster to the new cluster. | 02-18-2010 |
20130047026 | UPGRADING NETWORK TRAFFIC MANAGEMENT DEVICES WHILE MAINTAINING AVAILABILITY - A method, system, machine-readable storage medium, and apparatus are directed towards upgrading a cluster by bifurcating the cluster into two virtual clusters, an “old” virtual cluster (old active cluster) and a “new” virtual cluster (new standby cluster), and iteratively upgrading members of the old cluster while moving them into the new cluster. While members are added to the new cluster, existing connections and new connections are seamlessly processed by the old cluster. Optionally, state mirroring occurs between the old cluster and the new cluster once the number of members of the old and new clusters are approximately equal. Once a threshold number of members have been transferred to the new cluster, control and processing may be taken over by the new cluster. Transfer of control from the old cluster to the new cluster may be performed by failing over connectivity from the old cluster to the new cluster. | 02-21-2013 |
20140040477 | CONNECTION MESH IN MIRRORING ASYMMETRIC CLUSTERED MULTIPROCESSOR SYSTEMS - Embodiments are directed towards establishing a plurality of connections between each of a plurality of first computing devices in a primary chassis with each of a plurality of second computing devices in a failover chassis. A first computing device uses the plurality of connections as mesh connections to select a second computing device in which to route information about received packets. Routing of information about the packets to the selected second computing device includes modifying a source port number in the packets to include an identifier of the first computing device and an identifier of the second computing device. The information may indicate that the failover chassis is to perform specialized routing of the modified packets. | 02-06-2014 |
Patent application number | Description | Published |
20130294239 | DATA FLOW SEGMENT OPTIMIZED FOR HOT FLOWS - Embodiments are directed towards improving the performance of network traffic management devices by optimizing the management of hot connection flows. A packet traffic management device (“PTMD”) may employ a data flow segment (“DFS”) and control segment (“CS”). The CS may perform high-level control functions and per-flow policy enforcement for connection flows maintained at the DFS, while the DFS may perform statistics gathering, per-packet policy enforcement (e.g., packet address translations), or the like, on connection flows maintained at the DFS. The DFS may include high-speed flow caches and other high-speed components that may be comprised of high-performance computer memory. Making efficient use of the high speed flow cache capacity may be improved by maximizing the number of hot connection flows and minimizing the number of malicious and/or in-operative connections flows (e.g., non-genuine flows) that may have flow control data stored in the high-speed flow cache. | 11-07-2013 |
20140189686 | ELASTIC OFFLOAD OF PREBUILT TRAFFIC MANAGEMENT SYSTEM COMPONENT VIRTUAL MACHINES - Embodiments are directed towards employing a traffic management system (TMS) that is enabled to deploy component virtual machines (CVM) to the cloud to perform tasks of the TMS. In some embodiments, a TMS may be employed with one or more CVMs. In at least one embodiment, the TMS may maintain an image of each CVM. Each CVM may be configured to perform one or more tasks, to operate in specific cloud infrastructures, or the like. The TMS may deploy one or more CVMs locally and/or to one or more public and/or private clouds. In some embodiments, deployment of the CVMs may be based on a type of task to be performed, anticipated resource utilization, customer policies, or the like. The deployment of the CVMs may be dynamically updated based on monitored usage patterns, task completions, customer policies, or the like. | 07-03-2014 |
Patent application number | Description | Published |
20090132462 | DISTRIBUTED METADATA EXTRACTION - Particular embodiments generally relate to distributed metadata extraction. In one embodiment, metadata may be extracted for content. A plurality of engines may be provided that include different capabilities for extracting metadata. These engines may be distributed in one or more devices. Distributed metadata extraction may be performed using the engines in the one or more devices. To perform the distributed extraction, coordination may be needed. Different engines may extract different types of metadata. Thus, a list of capabilities for the engines may be provided to a coordinator. The coordinator may then determine a graph that describes and organizes different capabilities for different engines. When content is received, the coordinator may determine if metadata should be extracted for the content. Then, the coordinator uses the graph to determine an interconnection flow to extract the metadata. | 05-21-2009 |
20100058433 | MODULAR DATA SYNCHRONIZATION METHOD - In one embodiment, policies and sources may be used to synchronize data. Sources, which contain knowledge about files and metadata, can pass events to policies when changes in data are detected. The policies may then manage the data synchronization with other sources. The sources are agnostic as to how the data is synchronized between sources. Also, the policies are agnostic of the data that is being managed by sources. Accordingly, a modular infrastructure is provided that allows sources and policies to be configured to interact modularly. | 03-04-2010 |
20110010505 | RESOURCE MANAGEMENT CACHE TO MANAGE RENDITIONS - A resource management cache of a computing device receives a request for an item. The item may include any type of content, such as an image or a video. A rendition for the item is determined. The item may be stored in a plurality of renditions for retrieval. The resource management cache can send one or more requests to one or more sources for the rendition. The sources may include remote sources and also a local source. If a source responds with an indication the rendition is available, the rendition is sent to and received at the computing device. If no sources respond with an indication the rendition is available, the resource management cache may send a message asking if a source can generate the rendition from another rendition of the item. The rendition may be generated and it is sent to and received at the resource management cache. | 01-13-2011 |
Patent application number | Description | Published |
20080300384 | T-bet compositions and methods of use thereof - Isolated nucleic acid molecules encoding T-bet, and isolated T-bet proteins, are provided. The invention further provides antisense nucleic acid molecules, recombinant expression vectors containing a nucleic acid molecule of the invention, host cells into which the expression vectors have been introduced and non-human transgenic animals carrying a T-bet transgene. The invention further provides T-bet fusion proteins and anti-T-bet antibodies. Methods of using the T-bet compositions of the invention are also disclosed, including methods for detecting T-bet activity in a biological sample, methods of modulating T-bet activity in a cell, and methods for identifying agents that modulate the activity of T-bet. | 12-04-2008 |
20120159661 | T-Bet Compositions and Methods of Use Thereof - Isolated nucleic acid molecules encoding T-bet, and isolated T-bet polypeptides, are provided. The invention further provides antisense nucleic acid molecules, recombinant expression vectors containing a nucleic acid molecule of the invention, host cells into which the expression vectors have been introduced and non-human transgenic animals carrying a T-bet transgene. The invention further provides T-bet fusion proteins and anti-T-bet antibodies. Methods of using the T-bet compositions of the invention are also disclosed, including methods for detecting T-bet expression and/or activity in a biological sample, methods of modulating T-bet expression and/or activity in a cell, and methods for identifying agents that modulate the expression and/or activity of T-bet. | 06-21-2012 |
Patent application number | Description | Published |
20080238203 | Battery charging and power managerment circuit - Traditionally, system loads are placed in parallel with the battery. This simple topology wastes the available power if the USB power and/or wall adapter is present. Recent topologies have made some improvements by powering the load by the maximum available voltage. Thus, if a USB power source or wall adapter is present, the load is powered by them rather than the battery, thus improving the system efficiency. However, since the USB power and wall adapter power are current limited, if the load requires higher current than the current limited USB or adapter, then the entire system is powered at voltage of the battery. The present invention further improves the system efficiency by distinguishing the load and powering the constant power loads by the maximum voltage and placing the constant current loads in parallel with the battery. | 10-02-2008 |
20110018451 | Single Inductor Serial-Parallel LED Driver - An LED driver circuit is disclosed that can drive a plurality of LED strings that are arranged in parallel, each LED string having a plurality of component LEDs that are series-connected. The LED strings can be the same type of LEDs in each string, or have different types of LEDs from one string to another. The LED driver includes a voltage control loop that dynamically regulates the output voltage across the parallel arrangement of LED strings. The output voltage is dynamically adjusted to accommodate the LED string with the largest operational voltage drop. This enables LED displays to constructed using different types of LEDs strings, but still supply the LED strings in a power efficient manner. Further, each LED string also includes its own individual current regulation loop so that the current, and therefore brightness, of each LED string can be individually adjusted. | 01-27-2011 |