Patent application number | Description | Published |
20110047882 | DOOR TRIM MOVING APPLIQUE - A sliding door panel for covering an opening in a trim panel of a sliding door includes a bracket having a first guiding member. The sliding door panel includes is a sliding appliqué having a second guiding member capable of associating with the first guiding member, and wherein the sliding appliqué includes a first end having a protruding configuration extending away from the trim panel. | 03-03-2011 |
20130057012 | PANEL END CAP STORAGE - The present invention provides a panel end cap storage unit that is disposed on an instrument panel end cap adjacent a vehicle door and is configured such that the unit is not accessible when the vehicle door is closed. In this way, the present invention provides a nonvisible secure storage unit that is only accessible when the adjacent vehicle door is open. | 03-07-2013 |
20130175821 | DEPLOYABLE LOAD FLOOR - A vehicle load floor assembly having a load floor coupled with a handle. The handle is operable between first and second positions. At least one support leg is coupled to the load floor. The at least one support leg is retracted when the handle is in the first position and deployed when the handle is in the second position. A base wall supports the at least one support leg, when deployed, to maintain the load floor in a substantially lateral position. The base wall supports an underside of the load floor when the at least one support leg is retracted. | 07-11-2013 |
20140192429 | SLIDING CONVERSATION MIRROR ASSEMBLY WITH MAGNETIC ASSIST FOR VEHICLE OVERHEAD CONSOLE - A vehicle overhead console is provided which includes a conversation mirror assembly having a housing defining a storage space for storing a conversation mirror. The conversation mirror may travel between a stowed and a use position. The conversation mirror is releasably secured to the stored and use positions by way of magnetic, tab, and spring arrangements. | 07-10-2014 |
20140192430 | SLIDING CONVERSATION MIRROR ASSEMBLY WITH FRICTION TABS FOR VEHICLE OVERHEAD CONSOLE - A vehicle overhead console is provided which includes a conversation mirror assembly having a housing capable of storing a conversation mirror. The conversation mirror may travel between a stored and a use position. The conversation mirror is releasably secured to the stored and use positions by way of magnetic, tab, and spring arrangements. | 07-10-2014 |
20140265411 | VEHICLE LOAD FLOOR ASSEMBLY - A load floor assembly for a vehicle includes a seatback that pivots between an upright position and a stowed position. A cargo floor extends rearward of the seatback, and a load panel is coupled with the cargo floor. The load panel moves between a rearward position and a forward position. In the forward position, the load panel extends over at least a lower portion of the seatback in the stowed position. | 09-18-2014 |
20140265417 | VEHICLE LOAD FLOOR ASSEMBLY - A vehicle load floor includes a seatback pivotal to a stowed position. A cargo floor is rearward the seatback. A foldable panel assembly is movable between stored and deployed positions. The foldable panel assembly includes a first panel pivotally coupled with the seatback and a second panel coupled with the first panel. A hinge coupled between bottom surfaces of the first and second panels. The deployed position includes the seatback in the stowed position and top surfaces of the first and second panels defining a planar support surface spanning to the cargo floor. | 09-18-2014 |
20140265418 | VEHICLE LOAD FLOOR ASSEMBLY FOR A SEATBACK - A vehicle load floor assembly includes a vehicle seat that has a seatback that pivots between upright and stowed positions. A cargo floor extends rearward from the seat. A first panel pivotally couples with a rear portion of the seatback and pivots to a raised position away from the seatback in the stowed position. A second panel couples with the first panel and is deployable rearward to engage the cargo floor with the first panel in the raised position to define a support surface. | 09-18-2014 |
20150084377 | VEHICLE LOAD FLOOR ASSEMBLY FOR A SEATBACK - A vehicle load floor assembly includes a vehicle seat that has a seatback that pivots between upright and stowed positions. A cargo floor extends rearward from the seat. A first panel pivotally couples with an upper portion of the seatback and pivots to a raised position away from the seatback in a forward stowed position. A second panel pivotally couples with the first panel and is pivotally deployable rearward to define a support surface together with the first panel that engages the cargo floor. | 03-26-2015 |
20160046240 | SEAT ASSEMBLY WITH EMBEDDED AND HIDDEN STORAGE - A seat assembly is provided including a seat back and a seat cushion. The seat cushion includes a seating surface, a first side bolster, a second side bolster and a face extending around the first and second side bolsters and across the front of the seat between those side bolsters. In addition a first storage compartment is provided in the seat cushion. That storage compartment has an access opening in the face. | 02-18-2016 |
Patent application number | Description | Published |
20080228719 | People and business search result optimization - A method, apparatus, and system of people and business search result optimization are disclosed. In one embodiment, a method includes providing a query prompt to a user to enter a search data, referencing a request of the user of a particular listing with a database and automatically creating a profile having seeded data determined through the request when the request does not have a matching record in the database. The method may further include geo-spatially mapping a location associated with the request when the request includes a location information that is in the database, simultaneously rendering a map with the profile having seeded data based on the geo-spatial mapping of the location associated with the request, creating a marker, visually representing the profile in the map and generating the marker with other markers indicating profiles of an adjacent business and residential listings to the location associated with the profile. | 09-18-2008 |
20080229424 | Dispute resolution in a geo-spatial environment - A method, apparatus and system of dispute resolution in a geo-spatial environment are disclosed. In one embodiment, a method includes providing a wiki interface such that users modify and add profiles of others prior to the profiles being claimed, permitting an initial claimant to control editability of a wiki portion of a selected profile when the initial claimant claims the selected profile, capturing what personally identifiable information the initial claimant is willing to submit if the selected profile is disputed, placing the selected profile in dispute when a disputing claimant challenges an ownership of the selected profile by the initial claimant, electing a dispute resolution process that communication a code through a direct mail mechanism to a physical address associated with the selected profile, and allocating the selected profile to one of the initial claimant and the disputing claimant based on entry of the code in the selected profile. | 09-18-2008 |
20080238941 | Adding custom content to mapping applications - Digital maps can be composed of a series of image tiles that are selected based on the context of the map to be presented. Independently hosted tiles can comprise additional details that can be added to the map. A manifest can be created that describes the layers of map details composed of such independently hosted tiles. Externally referable mechanisms can, based on the manifest and map context, select tiles, from among the independently hosted tiles, that correspond to map tiles being displayed to a user. Subsequently, the mechanisms can instruct a browser, as specified in the manifest, to combine the map tiles and the independently hosted tiles to generate a more detailed map. Alternatively, customized mechanisms can generate map detail tiles in real-time, based on an exported map context. Also, controls instantiated by the browser can render three-dimensional images based on the combined map tiles. | 10-02-2008 |
20150371439 | Addiing Custom Content To Mapping Applications - Digital maps can be composed of a series of image tiles that are selected based on the context of the map to be presented. Independently hosted tiles can comprise additional details that can be added to the map. A manifest can be created that describes the layers of map details composed of such independently hosted tiles. Externally referable mechanisms can, based on the manifest and map context, select tiles, from among the independently hosted tiles, that correspond to map tiles being displayed to a user. Subsequently, the mechanisms can instruct a browser, as specified in the manifest, to combine the map tiles and the independently hosted tiles to generate a more detailed map. Alternatively, customized mechanisms can generate map detail tiles in real-time, based on an exported map context. Also, controls instantiated by the browser can render three-dimensional images based on the combined map tiles. | 12-24-2015 |
Patent application number | Description | Published |
20150317326 | INLINE GARBAGE COLLECTION FOR LOG-STRUCTURED FILE SYSTEMS - Exemplary methods, apparatuses, and systems receive a command to overwrite or delete data stored within an allocated portion of a file system. In response to the command, an entry is added to a first data structure. A write command is received. The portion of the file system added to the first data structure is formatted for reallocation. In performance of the write command, the portion of the file system is reallocated. Portions of the file system are allocated from a second data structure when the second data structure includes a sufficient amount of space to satisfy the write command and from the first data structure when the second data structure does not include a sufficient amount of space. The second data structure includes free portions of the file system that have been formatted for allocation. The first data structure includes free portions that have yet to be formatted. | 11-05-2015 |
20150379277 | Encryption Architecture - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379278 | Method and Apparatus for Differently Encrypting Different Flows - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379279 | Method and Apparatus for Encrypting Data Messages after Detecting Infected VM - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379280 | Method and Apparatus for Dynamically Creating Encryption Rules - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379281 | Method and Apparatus for Encrypting Messages based on Encryption Group Association - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150379282 | Encryption System in a Virtualized Environment - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150381362 | Encryption System in a Virtualized Environment - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
20150381578 | Method and Apparatus for Differently Encrypting Data Messages for Different Logical Networks - For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections. | 12-31-2015 |
Patent application number | Description | Published |
20100152218 | COMPOSITIONS AND METHODS FOR INHIBITION OF THE JAK PATHWAY - The invention encompasses compounds having formula I and the compositions and methods using these compounds in the treatment of conditions in which modulation of the JAK pathway or inhibition of JAK kinases, particularly JAK3, are therapeutically useful. | 06-17-2010 |
20100179134 | PYRIMIDINEDIAMINE KINASE INHIBITORS - The present invention provides pyrimidinediamine compounds useful for inhibiting kinase activity, including the activity of polo-like kinase 1 (PLK1). Also provided are pharmaceutical compositions comprising these compounds and methods of treating diseases associated with kinase activity, in particular enhanced PLK1 catalytic activity, such as diseases associated with abnormal cell proliferation, including neoplastic disorders. | 07-15-2010 |
20100190770 | COMPOSITIONS AND METHODS FOR INHIBITION OF THE JAK PATHWAY - Disclosed are compounds of formula I, compositions containing them, and methods of use for the compounds and compositions in the treatment of conditions in which modulation of the JAK pathway or inhibition of JAK kinases, particularly JAK 2 and JAK3, are therapeutically useful. | 07-29-2010 |
20130012501 | PYRIMIDINEDIAMINE KINASE INHIBITORS - Disclosed embodiments provide pyrimidinediamine compounds useful for inhibiting kinase activity, including the activity of polo-like kinase 1 (PLK1). Also disclosed are pharmaceutical compositions comprising these compounds and methods of treating diseases associated with kinase activity, in particular enhanced PLK1 catalytic activity, such as diseases associated with abnormal cell proliferation, including neoplastic disorders. | 01-10-2013 |
20130142807 | COMPOSITIONS AND METHODS FOR INHIBITION OF THE JAK PATHWAY - The invention encompasses compounds having formula I-V and the compositions and methods using these compounds in the treatment of conditions in which modulation of the JAK pathway or inhibition of JAK kinases, particularly JAK3, may be therapeutically useful. | 06-06-2013 |
20130309228 | PYRIMIDINEDIAMINE KINASE INHIBITORS - Disclosed embodiments provide pyrimidinediamine compounds useful for inhibiting kinase activity, including the activity of polo-like kinase 1 (PLK1). Also disclosed are pharmaceutical compositions comprising these compounds and methods of treating diseases associated with kinase activity, in particular enhanced PLK1 catalytic activity, such as diseases associated with abnormal cell proliferation, including neoplastic disorders. | 11-21-2013 |
Patent application number | Description | Published |
20120084407 | REAL-LOAD TUNING OF DATABASE APPLICATIONS - A database environment that includes one or more database production servers, one or more database test servers, and a virtualization connection that provides incoming service request traffic to both the database production server and the database test server. However, the database production server responds to the database service requests, while the database test server does not. The database test server may be tested for a variety of different configurations in an attempt to find a better performing configuration. The testing is in real-time as the database test server is subjected to the same incoming service request traffic as the database production server. | 04-05-2012 |
20120272225 | INCREMENTAL UPGRADE OF ENTITY-RELATIONSHIP SYSTEMS - Embodiments are directed to incrementally upgrading an entity-relationship system. In an embodiment, a computer system receives an indication that one instance including its own specified set of entities is to be upgraded to a second instance including a different specified set of entities. The computer system accesses the two instances to determine the differences between the entities of each instance. The computer system then discovers, based on the determined differences between the two instances, a set of actions that, when executed, change the entities of the first instance to the entities of the second instance. The set of actions is ordered such that processing order constraints are respected. The computer system then incrementally upgrades the entities of the first instance to the entities of the second instance by processing the determined set of actions in the appropriate, constraint-aware order. | 10-25-2012 |
20140101298 | SERVICE LEVEL AGREEMENTS FOR A CONFIGURABLE DISTRIBUTED STORAGE SYSTEM - A service level agreement can be generated based on a data store configuration. In one instance, the configuration can be specified in terms of a data value such as high, medium, and low value, for example. In another instance, a workload configuration can be specified comprising a replica set and consistency level, among other things. More particularly, the service level agreement can include guarantees regarding one or more of consistency, availability, latency, or fault tolerance, among others, as a function of a data value or workload configuration. Further, operation of a service associated with a service level agreement can be monitored to determine satisfaction or violation of guarantees, and provide real time feedback. | 04-10-2014 |
Patent application number | Description | Published |
20140280047 | SCALABLE, SCHEMALESS DOCUMENT QUERY MODEL - Query models for document sets (such as XML documents or records in a relational database) typically involve a schema defining the structure of the documents. However, rigidly defined schemas often raise difficulties with document validation with even inconsequential structural variations. Additionally, queries developed against schema-constrained documents are often sensitive to structural details and variations that are not inconsequential to the query, resulting in inaccurate results and development complications, and that may break upon schema changes. Instead, query models for hierarchically structured documents that enable “twig” queries specifying only the structural details of document nodes that are relevant to the query (e.g., students in a student database having a sibling named “Lee” and a teacher named “Smith,” irrespective of unrelated structural details of the document). Such “twig” query models may enable a more natural query development, and continued accuracy of queries in the event of unrelated schema variations and changes. | 09-18-2014 |
20140280707 | ELASTICALLY SCALABLE DOCUMENT-ORIENTED STORAGE SERVICES - A server set may provide a document service to one or more clients, and may be configured to do so in view of various considerations such as availability, fault tolerance, flexibility, and performance. Presented herein are document service architectures that involve partitioning the document set into at least two document ranges, and configuring respective servers of the server set to host one or more agents to which are respectively assigned one or more document ranges. A request for an operation involving at least one document may be routed to a server hosting an agent managing the document ranges of the documents involved in the operation. Moreover, respective servers may retain detailed information about neighboring servers (e.g., according to a logical or physical proximity) and scant information about distant servers, thereby avoiding both the extensive information exchange of highly informed network architectures and the inefficiency of uninformed routing algorithms. | 09-18-2014 |
20160117320 | SCALABLE, SCHEMALESS DOCUMENT QUERY MODEL - Query models for document sets (such as XML documents or records in a relational database) typically involve a schema defining the structure of the documents. However, rigidly defined schemas often raise difficulties with document validation with even inconsequential structural variations. Additionally, queries developed against schema-constrained documents are often sensitive to structural details and variations that are not inconsequential to the query, resulting in inaccurate results and development complications, and that may break upon schema changes. Instead, query models for hierarchically structured documents that enable “twig” queries specifying only the structural details of document nodes that are relevant to the query (e.g., students in a student database having a sibling named “Lee” and a teacher named “Smith,” irrespective of unrelated structural details of the document). Such “twig” query models may enable a more natural query development, and continued accuracy of queries in the event of unrelated schema variations and changes. | 04-28-2016 |