Patent application number | Description | Published |
20100287735 | Light weight grip and method of making same - A light weight flexible hand grip and method of making with a single piece precursor grip member having a tubular sleeve portion connected with a tubular grip portion with a wall situated therebetween. An alternate embodiment includes the tubular grip portion attached proximate an open end of the tubular sleeve portion. A core portion is disposed on an outer surface of the tubular sleeve portion and the tubular grip portion is positioned back over the tubular sleeve portion securing the core portion within an annular cavity to form the light weight hand grip. | 11-18-2010 |
20120129623 | Thermally And Electrically Conductive Element - A heated element includes a thermally and electrically conductive polymer in a shaped or spaced arrangement. The spaced arrangement has at least one string of material with ends that are configured to be electrically connected to a power source. A first end is connected to a positive terminal of the power source while the other end is connected to a negative terminal of the power source. A hand grip includes the heating element disposed on an inner layer, and may include an outer layer. The spaced arrangement may be disposed between the inner and outer layer for indirect heating applications. Alternatively, portions of the spaced arrangement may protrude from either the inner layer or the outer layer for direct heating applications. The heated element may be used with a number of devices, including but not limited to, golf club grips, hand grips, heating pads, blankets, or other applications. | 05-24-2012 |
20120309557 | FLEXIBLE IMPLEMENT HANDLE GRIP AND METHOD OF MAKING SAME - A flexible implement grip is formed with an underlist of one rubber compound wrapped with a skin of a second rubber compound with multi-colored rubber based paint or ink air dried thereon and the assembled grip vulcanized in a mold. In one version, the skin pattern is cut from a sheet of cured rubber and curable adhesive employed with the wrapping. In another version, the multi-colored ink or paint is air dried on an uncured sheet prior to cutting the skin pattern; and, no adhesive is employed with the wrapping and bonding to the underlist occurs during final vulcanizing. | 12-06-2012 |
20130017900 | FLEXIBLE IMPLEMENT HANDLE GRIP AND METHOD OF MAKING SAME - A flexible implement grip is formed with an underlist of one rubber compound wrapped with a skin of a second rubber compound with multi-colored rubber based paint or ink air dried thereon and the assembled grip vulcanized in a mold. In one version, the skin pattern is cut from a sheet of cured rubber and curable adhesive employed with the wrapping. In another version, the multi-colored ink or paint is air dried on an uncured sheet prior to cutting the skin pattern; and, no adhesive is employed with the wrapping and bonding to the underlist occurs during final vulcanizing. | 01-17-2013 |
Patent application number | Description | Published |
20130067134 | PSEUDO MULTI-MASTER I2C OPERATION IN A BLADE SERVER CHASSIS - A system and method are directed towards a pseudo multi-master operation on a serial bus. The pseudo multi-master operation allows multiple devices without standard multi-master functionality to operate on the serial bus as masters. In a disclosed example, the serial bus is an Inter-Integrated Circuit (I2C) bus, which is isolated when an adapter card requires access to the I2C bus, such as to update vital product data (VPD) to a memory device, and to cache the updated VPD to a chassis management module. | 03-14-2013 |
20130159592 | Accessing A Logic Device Through A Serial Interface - Methods, apparatuses, and computer program products for accessing a logic device through a serial interface are provided. Embodiments include receiving, by the serial interface of the logic device, a first data access request indicating a non-linear address mode, wherein the first data access request includes: a non-linear address corresponding to a non-linear index specifying a plurality of non-linear addresses, the non-linear index associating each non-linear address with one of the plurality of registers; a data count indicating an amount of data to be accessed in the first data access request; and a page offset value indicating within a register, a starting page to perform the first data access request. Embodiments also include identifying in the non-linear address mode a location within the logic device based on the non-linear address and the starting page; and performing at the identified location, by the logic device, a serial transaction in accordance with the first data access request. | 06-20-2013 |
20130220423 | Responding To Moisture At One Or More Zones Around An Outer Surface Of A Liquid-carrying Pipe - Methods, apparatuses, and computer program products for responding to moisture at one or more zones around an outer surface of a liquid-carrying pipe are provided. Embodiments include monitoring, by a moisture correction controller, a plurality of moisture sensors, each moisture sensor configured to detect moisture at a separate zone around the outer surface of the liquid-carrying pipe; based on the monitoring of the plurality of moisture sensors, calculating and tracking, for each zone, a level of moisture detected by a moisture sensor; based on the tracked levels of moisture detected at the zones, selecting, between condensation or a leak from within the liquid-carrying pipe as a source of the moisture detected at the zones around the liquid-carrying pipe; and administering a corrective action based on the selection of the source of the moisture detected at the zones around the liquid-carrying pipe. | 08-29-2013 |
20150070257 | LIQUID CRYSTAL DISPLAY USING BACKLIGHT INTENSITY TO COMPENSATE FOR PIXEL DAMAGE - A computer program product (CPP) for controlling a liquid crystal display (LCD) includes code for applying a test voltage to each liquid crystal element (LCE) disposed in an addressable array forming the LCD, and code for detecting an amount of light received by photosensors while applying the test voltage applied to the LCEs, wherein each photosensor is aligned behind and logically associated with one of the LCEs. The CPP further includes code for applying selected voltage levels to each LCE to display an image, and code for controlling an amount of backlight produced by backlighting elements in an addressable array while the image is displayed. Each backlighting element is aligned behind and logically associated with one LCE, and at least one backlighting element is controlled to compensate for a difference between the amount of light detected by the photosensor logically associated with at least one LCE and the other photosensors. | 03-12-2015 |
20150070401 | LIQUID CRYSTAL DISPLAY USING BACKLIGHT INTENSITY TO COMPENSATE FOR PIXEL DAMAGE - A method of controlling a liquid crystal display (LCD) includes applying a test voltage to the LCD, and detecting an amount of light received by a plurality of photosensors while the test voltage is being applied, wherein the photosensors are each aligned behind one of the liquid crystal elements of the LCD. An image is then displayed on the LCD by applying selected voltage levels to the LCD elements. An amount of backlight produced by backlighting elements is controlled to compensate for differences in the light transmittance of the individual LCD elements. | 03-12-2015 |
20150095928 | Delivering Content Via A Content Delivery Device That Includes Audio Delivery Capabilities And Video Delivery Capabilities - Delivering content via a content delivery device that includes audio delivery capabilities and video delivery capabilities, including: detecting, by a summarization module, that the audio delivery capabilities of the content delivery device have been disabled; identifying, by the summarization module, the content currently being delivered by the content delivery device; and displaying, by the summarization module, visual summary content associated with the content currently being delivered by the content delivery device. | 04-02-2015 |
20150138728 | CONTROLLING ACCESS TO COMPONENTS IN A SERVER HOUSING TO ENFORCE USE OF A GROUNDING STRAP - A method includes sensing ambient conditions in a datacenter containing a server, and determining whether the ambient conditions exceed predetermined threshold conditions representing risk of electrostatic discharge. A lid to the server is locked in a closed position in response to the ambient conditions exceeding the predetermined threshold conditions. However, the lid to the server is unlocked in response to a grounding strap being connected to the server. Optionally, the grounding strap may be identified and the server lid will only unlock if the identified grounding strap is associated with authorization to unlock the server lid. | 05-21-2015 |
20150222593 | NETWORK ADDRESS ALLOCATION - A method, system, and/or computer program product allocates network addresses to network devices. A network address providing server designates a particular network address as a designated network address for use with a specific non-network device, where the specific non-network device has a Unique Device Capability Identifier (UDCI), and where the non-network device is not connected to a network. The designated network address is stored in a lookup table containing the UDCI, such that the lookup table associates the designated network address with the UDCI. In response to a request from a network device for a network address including the UDCI, the network address providing server retrieves the designated network address from the lookup table based on the UDCI found in the request for a network address. The designated network address is then sent to the network device for use as a network address of the network device. | 08-06-2015 |
20150271647 | SYSTEMS AND METHODS FOR ALTERING MOVEMENT OF MOBILE COMMUNICATION DEVICES BASED ON DETERMINED MOVEMENTS - Systems and methods for altering movement of mobile communication devices based on determined movements are disclosed. According to an aspect, a method may include determining movement of a mobile communication device. The method may also include determining whether the movement of the mobile communication device meets a predetermined criterion. Further, the method may include controlling a mechanism of the mobile communication device for altering movement of the mobile communication device in response to determining that the movement meets the predetermined criterion. | 09-24-2015 |
20160034386 | CONTROLLING WEAR AMONG FLASH MEMORY DEVICES BASED ON REMAINING WARRANTY - A computer readable storage medium embodies program instructions executable by a processor to perform a method including identifying a product warranty for each of a plurality of flash memory devices within a system, wherein the product warranty includes a maximum number of writes and a maximum age, and tracking the number of writes and the age of each flash memory device. The method further includes determining, for each flash memory device, a number of pro rata writes remaining in the product warranty, which is determined as a number of writes remaining until the flash memory device reaches the maximum number of writes divided by an amount of time remaining until the flash memory reaches the maximum age. The method then causes data to be written to the flash memory device having the greatest number of pro rata writes remaining in the product warranty. | 02-04-2016 |
20160034387 | CONTROLLING WEAR AMONG FLASH MEMORY DEVICES BASED ON REMAINING WARRANTY - A method includes identifying a product warranty for each of a plurality of flash memory devices within a system, wherein the product warranty includes a maximum number of writes and a maximum age, and tracking the number of writes made to each flash memory device and the age of each flash memory device. The method further includes determining, for each flash memory device, a number of pro rata writes remaining in the product warranty, which is determined as a number of writes remaining until the flash memory device reaches the maximum number of writes identified in the product warranty divided by an amount of time remaining until the flash memory reaches the maximum age identified in the product warranty. The method then causes data to be written to the flash memory device having the greatest number of pro rata writes remaining in the product warranty. | 02-04-2016 |
20160062676 | THERMALLY SENSITIVE WEAR LEVELING FOR A FLASH MEMORY DEVICE THAT INCLUDES A PLURALITY OF FLASH MEMORY MODULES - Thermally sensitive wear leveling for a flash memory device that includes a plurality of flash memory modules, the flash memory device included in a computing system that includes a plurality of additional computing components, including: identifying a thermal sensitivity coefficient for each flash memory module in dependence upon a physical topology of the flash memory device and one or more of the additional computing components; identifying wear leveling information for each flash memory module; receiving a request to write data to the flash memory device; selecting, in dependence upon the thermal sensitivity coefficient for each flash memory module and the wear leveling information for each flash memory module, a target flash memory module for servicing the request to write data to the flash memory device; and writing the data to the target flash memory module. | 03-03-2016 |
Patent application number | Description | Published |
20150242774 | Identification Of Risk Management Actions - Determining actions associated with managing risk may comprise accessing an action mappings database that maintains information for managing a plurality of risk elements associated with supplying a product to an entity. That the action mappings database indicates that a first risk element of the plurality of risk elements should be identified in an identification phase of a vendor management process is determined. That the action mappings database indicates that the first risk element of the plurality of risk elements should be identified using a specified identification tool is determined. That the action mapping database indicates that at least one management action for reducing risk associated with the first risk element should be performed in a performance phase of the vendor management process is determined. | 08-27-2015 |
20150242775 | Designation Of A Vendor Manager - Determining vendor management requirements comprises identifying a plurality of risk elements associated with a vendor that supplies one or more products to an entity. Any completed management actions for the vendor that mitigate risk associated with any of the identified risk elements are identified. A residual risk is determined for at least one of the identified risk elements according to a completed management action that reduces risk associated with the at least one of the identified risk elements. A determination is made as to whether to assign a vendor manager to the vendor according to the residual risk for the at least one of the identified risk elements. | 08-27-2015 |
20150242776 | Vendor Risk And Performance Profile - Establishing a vendor profile may comprise identifying a plurality of risk elements associated with a vendor that supplies one or more products to an entity. Any completed management actions for the vendor that mitigate risk associated with any of the identified risk elements are identified. A performance requirement for the vendor associated with at least one of the products supplied by the vendor to the entity is identified. A performance measurement for the identified performance requirement for the vendor is identified. A residual risk for at least one of the identified risk elements is determined according to a completed management action that reduces risk associated with the at least one of the identified risk elements. A performance level is determined according to the performance requirement and the performance measurement. A vendor profile is created according to the identified risk elements, completed management actions, identified performance requirements, and performance measurement. | 08-27-2015 |
20150242777 | Category-Driven Risk Identification - Determining risk associated with a product may comprise identifying a product to be supplied to an entity. A product category associated with the product that is one of a plurality of predetermined product categories is determined. A plurality of risk element associated with the product according to the product category is retrieved from a category standards database. A risk level associated with the product category for each of the plurality of risk elements is determined. An inherent risk associated with the product is calculated according to the risk level determined for each of the plurality of risk elements from the category standards database and independent of any vendor selected to supply product. | 08-27-2015 |
20150242778 | Vendor Management System - Managing a vendor may comprise identifying a product to be supplied to an entity. Risk elements associated with the product may be determined by performing a product category-driven risk assessment. A transaction level risk assessment is performed for one or more vendors proposed to supply the product to the entity. At least one management action is determined for reducing risk for a risk element of the plurality of risk elements associated with supplying the product to the entity by a selected vendor from a group comprising the one or more vendors proposed to the supply the product to the entity, wherein the at least one management action is determined according to results of the product category-driven risk assessment and the transaction level risk assessment for the selected entity. A vendor level quality plan for the selected vendor is created that comprises the at least one management action. | 08-27-2015 |
Patent application number | Description | Published |
20080301479 | METHOD AND SYSTEM FOR MANAGING DATA CENTER POWER USAGE BASED ON SERVICE COMMITMENTS - A method of managing data center power usage based on service commitments. A power and capacity management utility measures performance characteristics of applications hosted by a data center that include power consumption and transaction processing time. When the performance characteristics are above (or below) a first pre-defined target range, the utility decreases (or increases, respectively) a clock rate and processor voltage of one or more active servers. When the performance characteristics are within the first target range and the clock speed is above (or below) a second pre-defined target range, the utility activates (or deactivates, respectively) one or more inactive (or active, respectively) servers. When the size of an inactive server pool is above a third pre-defined target range, the utility moves inactive servers to an unallocated server pool. When the size of the inactive server pool is below the third target range, the utility allocates additional servers. | 12-04-2008 |
20100005222 | OPTIMIZING VIRTUAL MEMORY ALLOCATION IN A VIRTUAL MACHINE BASED UPON A PREVIOUS USAGE OF THE VIRTUAL MEMORY BLOCKS - The allocation of virtual memory within a virtual machine based upon the previous mapping of virtual memory blocks to physical memory blocks is optimized. Virtual memory blocks that have been mapped to a corresponding physical memory block over virtual memory blocks that are unmapped when fulfilling an allocation request can be reallocated preferentially. | 01-07-2010 |
20100042600 | ROLE-BASED CONTACT LIST MANAGER - A system and method for managing a contact list within a business process automation tool. The method includes identifying an active task of a user within the business process automation tool. The method also includes identifying a plurality of roles associated with the active task. Each of the roles is associated with corresponding contact information. The method also includes generating a contact list of the roles and the corresponding contact information. | 02-18-2010 |
20100077401 | AUTOMATED IDENTIFICATION OF COMPUTING SYSTEM RESOURCES BASED ON COMPUTING RESOURCE DNA - Computing resource DNA associated with a computing resource of a computing system can be received. The computing resource DNA can include one or more computing resource DNA elements representing identifying characteristics of the computing resource. A set of one or more potential matches for the received computing resource DNA can be ascertained from a set of reference data. When one or more potential matches exist, a confidence factor can be calculated for each potential match. The set of potential matches can then be refined. An optimum match for the computing resource DNA can be determined from the set of refined potential matches. The computing resource DNA can then be identified as a representation of the computing resource associated with the optimum match. | 03-25-2010 |
20160140591 | TEMPORARY WORKSPACE ASSIGNMENT - There are provided a system, a method and a computer program product for assigning a workspace. The system receives one or more reservation request for the workspace, associated with one or more facilities including one or more workspace areas. Each workspace area includes one or more workspaces. The system receives inputs including one or more of: weather condition data, occupancy rates data, and date data, associated with the one or more facilities. The system predicts an energy cost for each workspace area. The system determines a user desirability value for the each workspace area. The system determines a minimum cost for operating the one or more facilities, which satisfies the received reservation request. The system selects one or more workspace area in the one or more facilities according to the determined minimum cost and the received reservation request. The selected workspace area has maximum user desirability values. | 05-19-2016 |
Patent application number | Description | Published |
20130075125 | UTILITY POWER-LINE-JUMPER APPARATUS WITH EXTERNAL VENTING - A line-jumper apparatus typically includes a first connector, a second connector, and a housing attached to the first connector and the second connector. In a closed position, the housing provides a low-resistance current path and a high-resistance current path between the first connector and the second connector. In an open position, the housing inhibits current from flowing between the first connector and the second connector. The housing is configured so that, when the housing is transitioned from the closed position to the open position, the low-resistance current path is opened before the high-resistance current path. The housing typically includes a safety mechanism that prevents the low-resistance current path from being opened unless the high-resistance current path is closed. | 03-28-2013 |
20140202836 | PORTABLE LOAD-BREAKING AND PICKUP JUMPER APPARATUS - A portable load-breaking and pickup apparatus for handling a load associated with a power distribution system is disclosed. The apparatus includes first and second spaced-apart connectors electrically connected by a load break assembly. The load break assembly includes first and second outer contacts configured for mating engagement and configured to provide a low-resistance path between the first and second connectors, and first and second inner contacts configured for mating engagement and configured to provide a high-resistance path between the first and second connectors. The load break assembly transitions from an open position to a closed position in two stages. The two stages include closing the high-resistance path prior to closing the low-resistance path, and closing the low-resistance path after the high-resistance path has been closed. | 07-24-2014 |
20140299346 | UTILITY POWER-LINE-JUMPER APPARATUS WITH EXTERNAL VENTING - A line-jumper apparatus typically includes a first connector, a second connector, and a housing attached to the first connector and the second connector. In a closed position, the housing provides a low-resistance current path and a high-resistance current path between the first connector and the second connector. In an open position, the housing inhibits current from flowing between the first connector and the second connector. The housing is configured so that, when the housing is transitioned from the closed position to the open position, the low-resistance current path is opened before the high-resistance current path. The housing typically includes a safety mechanism that prevents the low-resistance current path from being opened unless the high-resistance current path is closed. | 10-09-2014 |
Patent application number | Description | Published |
20090114234 | Methods for Sculpting Cigarettes, and Associated Apparatuses - A cigarette-making method is provided, comprising forming an elongate tobacco rod having a non-circular cross-sectional shape and opposed ends, by circumscribing a tobacco charge with a wrapping material. A filter element is formed having opposed ends and a non-circular cross-sectional shape corresponding to the cross-sectional shape of the tobacco rod, by circumscribing a filter material with a plug wrap material. One end of the tobacco rod is axially aligned and abutted with one end of the filter element, and a tipping material is applied about the tobacco rod and the filter element, wherein the tipping material extends across the abutting ends thereof, so as to join the tobacco rod with the filter element and form a cigarette having a non-circular cross-sectional shape along a length thereof. Associated apparatuses and methods are also provided. | 05-07-2009 |
20140131579 | System for Analyzing a Smoking Article Filter Associated with a Smoking Article, and Associated Method - A system and associated method for analyzing a smoking article filter is provided. An emitter emits an initial signal toward a smoking article filter. The initial signal may have a frequency between about 0.1 teraHertz and about 10 teraHertz. A sensor may detect a resultant signal resulting from interaction of the initial signal with the smoking article filter. An analysis unit may receive the resultant signal from the sensor, determine a filter status based on the resultant signal, and output an indicium indicative of the filter status. The filter status may include a capsule presence within the smoking article filter, a capsule absence from the smoking article filter, a proper insertion of a capsule into the smoking article filter, a defective insertion of a capsule into the smoking article filter, a proper capsule within the smoking article filter, and a defective capsule within the smoking article filter. | 05-15-2014 |
20150257437 | Smoking Article Inspection System and Associated Method - Smoking article inspection systems configured to inspect smoking articles are provided. The systems may include imaging devices configured to capture images of an exterior of the smoking article and an analysis unit configured to analyze the images captured by the imaging devices. The analysis unit may execute an edge detection tool configured to determine a position of the smoking article based on an edge location of the smoking article and a defect detection tool configured to determine whether the smoking article is defective after the position of the smoking article is determined. The imaging devices may be configured to capture images of the smoking articles during the assembly thereof. Thereby, the analysis unit may determine any operations during assembly causing damage to the smoking article from analysis of the images of the smoking article captured during assembly. Related methods are also provided. | 09-17-2015 |
20150264319 | Smoking Article Package Inspection System and Associated Method - A smoking article package inspection system configured to inspect a smoking article package is provided. The system includes imaging devices configured to capture images of the smoking article package and an analysis unit configured to analyze the images captured by the imaging devices and determine whether the smoking article package is defective. The imaging devices may be positioned and configured to capture images of the smoking article package at least one of: before and after enclosing a plurality of smoking articles in the smoking article package, before and after printing an identifier on the smoking article package, and before and after wrapping the smoking article package with an outer wrapper. A related method is also provided. | 09-17-2015 |
Patent application number | Description | Published |
20100307647 | Metastable Beta-Titanium Alloys and Methods of Processing the Same by Direct Aging - Metastable beta titanium alloys and methods of processing metastable β-titanium alloys are disclosed. For example, certain non-limiting embodiments relate to metastable β-titanium alloys, such as binary β-titanium alloys comprising greater than 10 weight percent molybdenum, having tensile strengths of at least 150 ksi and elongations of at least 12 percent. Other non-limiting embodiments relate to methods of processing metastable β-titanium alloys, and more specifically, methods of processing binary β-titanium alloys comprising greater than 10 weight percent molybdenum, wherein the method comprises hot working and direct aging the metastable β-titanium alloy at a temperature below the β-transus temperature of the metastable β-titanium alloy for a time sufficient to form α-phase precipitates in the metastable β-titanium alloy. Articles of manufacture comprising binary β-titanium alloys according to various non-limiting embodiments disclosed herein are also disclosed. | 12-09-2010 |
20110038751 | METASTABLE BETA-TITANIUM ALLOYS AND METHODS OF PROCESSING THE SAME BY DIRECT AGING - Metastable beta titanium alloys and methods of processing metastable β-titanium alloys are disclosed. For example, certain non-limiting embodiments relate to metastable β-titanium alloys, such as binary β-titanium alloys comprising greater than 10 weight percent molybdenum, having tensile strengths of at least 150 ksi and elongations of at least 12 percent. Other non-limiting embodiments relate to methods of processing metastable β-titanium alloys, and more specifically, methods of processing binary β-titanium alloys comprising greater than 10 weight percent molybdenum, wherein the method comprises hot working and direct aging the metastable β-titanium alloy at a temperature below the β-transus temperature of the metastable β-titanium alloy for a time sufficient to form α-phase precipitates in the metastable β-titanium alloy. Articles of manufacture comprising binary β-titanium alloys according to various non-limiting embodiments disclosed herein are also disclosed. | 02-17-2011 |
20140076468 | METASTABLE BETA-TITANIUM ALLOYS AND METHODS OF PROCESSING THE SAME BY DIRECT AGING - Metastable beta titanium alloys and methods of processing metastable (β-titanium alloys are disclosed. For example, certain non-limiting embodiments relate to metastable (β-titanium alloys, such as binary β-titanium alloys comprising greater than 10 weight percent molybdenum, having tensile strengths of at least 150 ksi and elongations of at least 12 percent. Other non-limiting embodiments relate to methods of processing metastable β-titanium alloys, and more specifically, methods of processing binary (β-titanium alloys comprising greater than 10 weight percent molybdenum, wherein the method comprises hot working and aging the metastable β-titanium alloy at a temperature below the (β-transus temperature of the metastable (β-titanium alloy for a time sufficient to form α-phase precipitates in the metastable β-titanium alloy. The metastable β-titanium alloys are not solution heat treated after hot working and prior to aging. Articles of manufacture comprising binary β-titanium alloys according to various non-limiting embodiments disclosed herein are also disclosed. | 03-20-2014 |
Patent application number | Description | Published |
20090115849 | Controlling A Point Of Sale ('POS') Terminal Using Surveillance Video - Methods, apparatus, and products are disclosed for controlling a Point Of Sale (‘POS’) terminal using surveillance video that include: receiving, by a surveillance module, a digital surveillance video of a region adjacent to a POS terminal, the digital surveillance video captured by a digital surveillance camera; identifying, by the surveillance module in dependence upon the digital surveillance video, operator characteristics for an operator captured on the digital surveillance video in the region adjacent to a POS terminal; and administering, by the surveillance module, the POS terminal in dependence upon the operator characteristics. | 05-07-2009 |
20100002902 | Graphical Retail Item Identification With Point-Of-Sale Terminals - Graphical retail item identification including receiving, from a digital camera, an image of a retail item to be identified; decoding, by an image decoding module, the image into one or more image processing tasks; assigning, by a task assignment engine, the one or more image processing tasks to one or more of the POS terminals, the one or more POS terminals characterized as image processing terminals; executing the image processing tasks by the image processing terminals, including reporting results of the image processing tasks to an item identification engine; and identifying, by the item identification engine upon completion of the image processing tasks by the image processing terminals, the retail item. | 01-07-2010 |
20100235652 | POWER SUPPLY IDENTIFICATION USING A MODIFIED POWER GOOD SIGNAL - Method, system and apparatus enabling a computing system to automatically identify the capabilities of a power supply coupled to the computing system. The power supply includes a controller that sends an identification code to a computing system prior to sending a power good signal to the computing system. The identification code and the power good signal are preferably sent over a single conductor, such as a power supply connector pin. The computing system receives the identification code for cross-referencing against a list of power supply identification codes and associated capabilities. Optionally, instructions from the computer system to an output device may be controlled as a function of the identified power supply capabilities. | 09-16-2010 |
20120166297 | POWERING A POINT OF SALE PRINTER AND COUPON PRINTER FROM A SHARED POWER SUPPLY - A point of sale (POS) system includes primary and auxiliary printers powered by a shared power supply. A POS terminal includes the shared power supply, a user interface, and a host including a printer driver for dynamically generating primary print commands. A printer connection card connected to the POS terminal includes a Universal Serial Bus (USB) hub in communication with the host and having at least one USB connector powered by the shared power supply. The primary printer is connected to the USB hub for receiving power and the primary print commands through the USB hub from the POS terminal. An auxiliary printer has a power-only connection to the printer connection card, receiving independently generated auxiliary print commands from a separate host computer. A controller includes control logic for selectively blocking the primary print commands to the primary printer in response to the signal drawn by the auxiliary printer exceeding a threshold. | 06-28-2012 |
Patent application number | Description | Published |
20080315392 | RF POWER TRANSISTOR PACKAGES WITH INTERNAL HARMONIC FREQUENCY REDUCTION AND METHODS OF FORMING RF POWER TRANSISTOR PACKAGES WITH INTERNAL HARMONIC FREQUENCY REDUCTION - A packaged RE power device includes a transistor having a control terminal and an output terminal and configured to operate at a fundamental operating frequency, an RF signal input lead coupled to the control terminal, and an RF signal output lead coupled to the output terminal. A harmonic reducer is coupled to the control terminal and/or the output terminal of the transistor and is configured to provide a short circuit or low impedance path from the control terminal and/or the output terminal to ground for signals at an Nth harmonic frequency of the fundamental operating frequency, where N>1. The device further includes a package that houses the transistor and the harmonic reducer, with the input lead and the output lead extending from the package. Multi-chip packages are also disclosed. | 12-25-2008 |
20080315393 | RF TRANSISTOR PACKAGES WITH INTERNAL STABILITY NETWORK AND METHODS OF FORMING RF TRANSISTOR PACKAGES WITH INTERNAL STABILITY NETWORKS - A packaged RF transistor device includes an RF transistor die including a plurality of RF transistor cells. Each of the plurality of RF transistor cells includes a control terminal and an output terminal. The RF transistor device further includes an RF input lead, and an input matching network coupled between the RF input lead and the RF transistor die. The input matching network includes a plurality of capacitors having respective input terminals. The input terminals of the capacitors are coupled to the control terminals of respective ones of the RF transistor cells. | 12-25-2008 |
20110074006 | RF TRANSISTOR PACKAGES WITH INTERNAL STABILITY NETWORK INCLUDING INTRA-CAPACITOR RESISTORS AND METHODS OF FORMING RF TRANSISTOR PACKAGES WITH INTERNAL STABILITY NETWORKS INCLUDING INTRA-CAPACITOR RESISTORS - A packaged RF transistor device includes an RF transistor die including a plurality of RF transistor cells. Each of the plurality of RF transistor cells includes a control terminal and an output terminal. The RF transistor device further includes an RF input lead, and an input matching network coupled between the RF input lead and the RF transistor die. The input matching network includes a plurality of capacitors having respective input terminals. The input terminals of the capacitors are coupled to the control terminals of respective ones of the RF transistor cells. The input matching network further includes a plurality of resistors coupled respectively between adjacent input terminals of the capacitors | 03-31-2011 |
20150296461 | GAN AMPLIFIER FOR WIFI APPLICATIONS - A gallium nitride (GaN) radio frequency integrated circuit (RFIC) is configured to receive and amplify a low-level WiFi signal to generate a WiFi transmit signal. By using a GaN RFIC, the performance of the RFIC is significantly improved when compared to conventional RFICs for WiFi signals. In one exemplary embodiment, the RFIC has an error vector magnitude less than 29 dBc, an average power output around 29 dBm, and an average power added efficiency of greater than 25%. In additional embodiments, the RFIC has a gain greater than about 32 dB and a peak output power around −37 dB. | 10-15-2015 |
20150348885 | OVER-MOLD PACKAGING FOR WIDE BAND-GAP SEMICONDUCTOR DEVICES - A transistor package includes a lead frame and a gallium nitride (GaN) transistor attached to the lead frame. The lead frame and the GaN transistor are surrounded by an over-mold with a glass transition temperature greater than about 135° C. and a flexural modulus less than about 20 GPa. Using an over-mold with a glass transition temperature greater than about 135° C. and a flexural modulus less than about 20 GPa allows the over-mold to handle the heat produced by the GaN transistor while preventing damage to the GaN transistor due to thermal expansion and/or contraction of the over-mold. | 12-03-2015 |
20150348886 | OVER-MOLD PLASTIC PACKAGED WIDE BAND-GAP POWER TRANSISTORS AND MMICS - A transistor package includes a lead frame, a wide band-gap transistor attached to the lead frame, and an over-mold surrounding the lead frame and the wide band-gap transistor. The wide band-gap transistor has a peak output power greater than 150 W when operated at a frequency up to 3.8 GHz. Using an over-mold along with a wide band-gap transistor in the transistor package allows the transistor package to achieve an exceptionally high efficiency, gain, and bandwidth, while keeping the manufacturing cost of the transistor package low. | 12-03-2015 |
20150349727 | BANDWIDTH LIMITING METHODS FOR GAN POWER TRANSISTORS - A transistor package includes a transistor and one or more bandwidth limiting matching networks. The one or more bandwidth limiting matching networks are coupled to one of a control contact and an output contact of the transistor in order to limit the gain response of the transistor outside of a predetermined frequency band. Specifically, the transistor package has a gain roll-off greater than 0.5 dB within 200 MHz of the predetermined frequency band, while providing signal losses less than 1.0 dB inside the predetermined frequency band at a power level greater than 240 W. By providing the bandwidth limiting matching networks in the transistor package, the gain response of the transistor may be appropriately limited in order to comply with the spectral masking requirements of one or more wireless communications standards, for example, Long Term Evolution (LTE) standards. | 12-03-2015 |
Patent application number | Description | Published |
20120227095 | SYSTEMS AND METHODS FOR GENERATING MODULAR SECURITY DELEGATES FOR APPLICATIONS - Embodiments of the present teachings relate to systems and methods for generating modular security delegates for applications. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured. Each machine can include a plurality of application instances and an authentication delegate. In addition, each network environment can include a communication interface to security services. The applications can include logic that indicates what security delegate to use for a given set of user authentication credentials. The logic can be configured to determine the appropriate authentication delegate using various methods. The authentication delegates can receive a set of user authentication credentials from application instances and determine whether the set of user authentication credentials are valid. Each authentication delegate corresponds to one and only one type of authentication mechanism. | 09-06-2012 |
20120240212 | SYSTEMS AND METHODS FOR GENERATING MODULAR SECURITY DELEGATES FOR APPLICATIONS - Embodiments of the present teachings relate to systems and methods for generating modular security delegates for application instances, including, for example, applications usable on physical machines, virtualized environments, in the cloud, etc. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured, each having a defined security level. Each machine can include a plurality of application instances and corresponding security delegates for various defined security levels. For example, the defined security levels can be based on various authentication mechanisms, including, Kerberos, NT Lan Manager (NTLM) authentication protocol, secure sockets layer/transport security layer (SSL/TSL), token authentication, virtual private network (VPN), remote access security (RAS), digest authentication, etc. | 09-20-2012 |
20120311671 | SYSTEMS AND METHODS FOR A SECURITY DELEGATE MODULE TO SELECT APPROPRIATE SECURITY SERVICES FOR WEB APPLICATIONS - In accordance with some aspects of the present disclosure, a method is disclosed that can include receiving, by a security delegate module, a set of user authentication credentials by an application running a first instance in a network for a user; determining, by the security delegate module, a type of the application; and selecting, by the security delegate module, a security service based on the set of user authentication credentials and the type of application. | 12-06-2012 |