Patent application number | Description | Published |
20110108439 | OXIDE-ION SENSOR FOR USE IN A MOLTEN-SALT BASED ELECTROCHEMICAL REDUCTION PROCESS - An oxide-ion sensor includes an oxygen electrode, a sense electrode and a saturated (reference) electrode. The sense electrode is operated at a substantially constant current for determining an instantaneous value of a dissolved oxide-ion concentration in the molten salt electrolyte. The saturated electrode is used to determine a reference value of the dissolved oxide-ion concentration in the molten salt electrolyte. A dissolved oxide-ion concentration in the molten salt electrolyte is continuously monitored in-situ during the molten-salt based electrochemical reduction process by determining an equilibrium potential between the sense electrode and the saturated electrode with the sense electrode carrying a small current in a circuit that is completed using the oxygen electrode. In another embodiment, the dissolved oxide-ion concentration in the molten salt electrolyte is continuously monitored in-situ by determining an electrochemical impedance of the molten salt electrolyte using a pair of bare current-carrying conductors and a frequency response analyzer. | 05-12-2011 |
20110143203 | Energy Storage Device - An energy storage device comprising an anode, electrolyte, and cathode is provided. The cathode comprises a plurality of granules comprising a support material, an active electrode metal, and a salt material, such that the cathode has a granule packing density equal to or greater than about 2 g/cc. A cathode comprising greater than about 10 volume % total metallic content in a charged state of the cathode is also provided. | 06-16-2011 |
20130017446 | ENERGY STORAGE DEVICE - An energy storage device comprising an anode, electrolyte, and cathode is provided. The cathode comprises a plurality of granules comprising a support material, an active electrode metal, and a salt material, such that the cathode has a granule packing density equal to or greater than about 2 g/cc. A cathode comprising greater than about 10 volume % total metallic content in a charged state of the cathode is also provided. | 01-17-2013 |
20130108931 | POSITIVE ELECTRODE COMPOSITIONS USEFUL FOR ENERGY STORAGE AND OTHER APPLICATIONS; AND RELATED DEVICES | 05-02-2013 |
Patent application number | Description | Published |
20120158803 | PARTITION FILE SYSTEM FOR VIRTUAL MACHINE MEMORY MANAGEMENT - A virtual machine of an information handling system (IHS) initializes an operating system to provide partition file system memory management during application execution. The operating system employs multiple partitions that include one or more applications for execution within the virtual machine. A file system tool identifies write operations to a global file system and generates local and common file system information. The file system tool populates the local file systems that include delta local file systems and differential file systems with write operation data. The file system tool may generate stackable common delta file system information to store write operation data common to two or more partitions that employ executing applications. The file system tool may combine or separate stackable common delta file system information to provide improvements in virtual machine memory utilization. | 06-21-2012 |
20120209894 | PARTITION FILE SYSTEM FOR VIRTUAL MACHINE MEMORY MANAGEMENT - A virtual machine of an information handling system (IHS) initializes an operating system to provide partition file system memory management during application execution. The operating system employs multiple partitions that include one or more applications for execution within the virtual machine. A file system tool identifies write operations to a global file system and generates local and common file system information. The file system tool populates the local file systems that include delta local file systems and differential file systems with write operation data. The file system tool may generate stackable common delta file system information to store write operation data common to two or more partitions that employ executing applications. The file system tool may combine or separate stackable common delta file system information to provide improvements in virtual machine memory utilization. | 08-16-2012 |
20120284408 | WORKLOAD-AWARE PLACEMENT IN PRIVATE HETEROGENEOUS CLOUDS - Systems determine workload resource usage patterns of a computerized workload, using a computerized device. Such systems use the computerized device to place the computerized workload with a computer server cluster within a private cloud computing environment. Also, systems herein place the computerized workload on a selected computer server within the computer server cluster that has a resource usage pattern complementary to the workload resource usage profile, also using the computerized device. The complementary resource usage pattern peaks at different times from the workload resource usage patterns. | 11-08-2012 |
20120324114 | WORKLOAD-AWARE PLACEMENT IN PRIVATE HETEROGENEOUS CLOUDS - Methods determine workload resource usage patterns of a computerized workload, using a computerized device. Such methods use the computerized device to place the computerized workload with a computer server cluster within a private cloud computing environment. Also, methods herein place the computerized workload on a selected computer server within the computer server cluster that has a resource usage pattern complementary to the workload resource usage profile, also using the computerized device. The complementary resource usage pattern peaks at different times from the workload resource usage patterns. | 12-20-2012 |
20130174146 | DYNAMICALLY SCALING MULTI-TIER APPLICATIONS IN A CLOUD ENVIRONMENT - A predicted workload of a multi-tier application is determined for a defined period of time. A change in application capacity is determined for the predicted workload. A scaling strategy is dynamically selected for the change in application capacity, in which the scaling strategy including vertical scaling and horizontal scaling. | 07-04-2013 |
20130174149 | DYNAMICALLY SCALING MULTI-TIER APPLICATIONS IN A CLOUD ENVIRONMENT - A predicted workload of a multi-tier application is determined for a defined period of time. A change in application capacity is determined for the predicted workload. A scaling strategy is dynamically selected for the change in application capacity, in which the scaling strategy including vertical scaling and horizontal scaling. | 07-04-2013 |
20140149492 | ADJUSTMENT TO MANAGED-INFRASTRUCTURE-AS-A-SERVICE CLOUD STANDARD - An arbitrary customer instance is transferred from a customer environment to a target managed-infrastructure-as-a-service cloud environment as a transferred image. An image adjustment plan, capturing at least one adjustment required to render the transferred image compliant with standards of the target managed-infrastructure-as-a-service cloud environment, is formulated. The image adjustment plan is executed to adjust the transferred image to obtain an adjusted image compliant with standards of the target managed-infrastructure-as-a-service cloud environment. The adjusted image is on-boarded into the managed-infrastructure-as-a-service cloud environment as a standard image thereof. | 05-29-2014 |
20150058054 | Modularly Managed Service Platform - A service method and associated system is provided. The method includes generating event types for events and services associated with the events. Virtual or physical machines associated with the services are provisioned and a message associated with a first event is published. The message is routed to a queue of a second service and the second service is notified of the message. The services are enabled and a selection for a sub-set of the services is received. The selection is enabled. | 02-26-2015 |
20160077947 | UPDATING OF TROUBLESHOOTING ASSISTANTS - Methods and arrangements for providing assistance with troubleshooting for system updates. There is sent, to a first database, a feature log associated with an update event at a first location. The feature log is pooled in the first database with feature logs associated with update events at other locations. A signature is created of at least one update from the first database, and the signature is added to a signature database. The signature database is employed to identify one or more deviations, when the at least one update fails in at least one location. The one or more deviations are ranked with respect to at least one other deviation. Other variants and embodiments are broadly contemplated herein. | 03-17-2016 |
Patent application number | Description | Published |
20090091487 | Spurious Free Dynamic Range Of An Analog To Digital Converter - Removing an Nth harmonic (of a fundamental frequency) generated due to non-ideal ADC operation from the output of the ADC. In an embodiment, digital values containing in-phase and quadrature phase components of the Nth harmonic are generated using mathematical operations, scaled using scaling factors, and then subtracted from the (non-ideal) output of the ADC. A continuous-time derivative of the input signal used to generate the quadrature phase component, enabling a same set of scaling factors to be used for the same input irrespective of the sampling frequency. Spurious Free Dynamic Range of the ADC is thus improved. | 04-09-2009 |
20130294295 | TRANSMIT SIGNAL CANCELATION APPARATUS AND METHODS - Apparatus and methods disclosed herein implement an RF receive-band filter at a receive chain input of a wireless base station with a co-located transmitter and receiver. The RF receive-band filter includes an adaptive filter component to perform filtering operations on samples of a digital baseband or intermediate frequency signal x(n) from a transmit chain associated with the wireless base station. An adaptive filter transfer function is determined in real time such that samples of the baseband transmit signal x(n) are transformed into a cancellation baseband signal z(n). The digital cancelation baseband signal z(n) is then digital-to-analog converted and the resulting analog baseband signal z(t) is up-converted to obtain a subtractive RF cancelation signal c(t). C(t) is summed with a desirable received signal RF component r(t) and an undesirable transmitter leakage RF signal component l(t) appearing at the input to the base station receiver. C(t) cancels l(t), leaving r(t) to be processed by the receiver section of the base station. | 11-07-2013 |
20140029700 | MULTI-TAP IQ IMBALANCE ESTIMATION AND CORRECTION CIRCUIT AND METHOD | 01-30-2014 |
20150188626 | OPTICAL FIBER DEFECT DETECTION - An optical data transmitter is operable to transmit data other than test data on an optical fiber at a first wavelength and an optical time domain reflectometer is operable to receive data from the optical fiber at the first wavelength and to use the received data at the first wavelength to determine whether a defect exists in the optical fiber. | 07-02-2015 |
20150263753 | MISMATCH PROFILE - A system can include a signal image correlator receives a discrete frequency domain representation of a signal tone in an interleaved analog-to-digital (IADC) signal and an image of the signal tone in the discrete frequency domain representation of the IADC signal and determines a correlation between the signal tone and the image of the signal tone, a power of the signal tone and a power of the image of the signal tone. The system can also include a frequency domain estimator that determines an instantaneous frequency domain mismatch profile estimate based on the correlation between the signal tone and the image of the signal tone. The system can further include an averaging filter that averages the instantaneous frequency domain mismatch profile estimate over time to provide a frequency domain mismatch profile estimate. | 09-17-2015 |
20160109327 | METHOD AND OTDR APPARATUS FOR OPTICAL CABLE DEFECT LOCATION WITH REDUCED MEMORY REQUIREMENT - Optical time domain reflectometer (OTDR) systems, methods and integrated circuits are presented for locating defects in an optical cable or other optical cable, in which a first optical signal is transmitted to the cable and reflections are sampled over a first time range at a first sample rate to identify one or more suspected defect locations, and a second optical signal is transmitted and corresponding reflections are sampled over a second smaller time range at a higher second sample rate to identify at least one defect location of the optical cable for relaxed memory requirements in the OTDR system. | 04-21-2016 |
Patent application number | Description | Published |
20130286951 | FACILITATING COMMUNICATION BETWEEN RESOURCE-CONSTRAINED DEVICES AND WIRELESS COMMUNICATION TERMINALS - A link device facilitating communication between a wireless communication terminal and a resource-constrained device. According to an aspect, the link device receives messages from the wireless communication terminal on a wireless path according to a first protocol, converts the messages into a second protocol, and forwards the converted messages in the second protocols to the resource-constrained device on a wired path connecting the link device to the resource-constrained device. In an embodiment, the first protocol corresponds to HTTP protocol and the second protocol corresponds to a simpler protocol which requires relatively lesser processing and memory resources. | 10-31-2013 |
20130308493 | CONVENIENT PROVISIONING OF EMBEDDED DEVICES WITH WIFI CAPABILITY - A WiFi-enabled embedded device boots as a first access point. The WiFi-enabled embedded device communicates with a first wireless station to receive configuration parameters while continuing to operate as an access point. The WiFi-enabled embedded device then applies the configuration parameters internally to cause the WiFi-enabled embedded device to operate as a second wireless station. In an embodiment, the first wireless station discovers a configuration service advertized by the WiFi-enabled embedded device using mDN/DNS-SD, and automatically provides the configuration parameters to the WiFi-enabled embedded device. Convenient provisioning of the WiFi-enabled embedded device is thus made possible. | 11-21-2013 |
20140328334 | PROVISIONING A WIRELESS DEVICE FOR SECURE COMMUNICATION USING AN ACCESS POINT DESIGNED WITH PUSH-BUTTON MODE OF WPS (WI-FI PROTECTED SETUP) - A wireless device is provisioned according to WPS (WiFi Protected Setup) push button mode. The wireless device receives an electronic signal from a provisioning agent external to the wireless device, the electronic signal indicating to the wireless device that the wireless device is to start WPS provisioning procedures. A user presses a push button on an AP to which the wireless device is to be connected. On receipt of the electronic signal, the wireless device enrolls in a wireless network, of which the AP is a part, by communicating with the access point in accordance with push button mode of WPS. The technique enables a wireless device to be provisioned without a user requiring to press any button on the wireless device. | 11-06-2014 |
20140355579 | CONVENIENT USE OF PUSH BUTTON MODE OF WPS (WI-FI PROTECTED SETUP) FOR PROVISIONING WIRELESS DEVICES - An access point (AP) in accordance with an aspect of the present disclosure provides a convenient approach to provision wireless devices. In an embodiment, the AP initiates push button mode of WPS procedures with a wireless device, in response to receiving of a provisioning request from the wireless device, without requiring a WPS push button signal locally. The AP thereafter operates to complete provisioning of the wireless device. According to yet another aspect of the present disclosure, a wireless device may also participate in push button mode of WPS, without requiring a push button signal locally. In an embodiment, a wireless device automatically transmits a request for provisioning. An AP within the transmission range, responds back with a command to initiate push button mode of WPS procedures. The wireless device communicates with the AP to complete provisioning. | 12-04-2014 |
20150257176 | Group Provisioning of Wireless Stations of a Wireless Local Area Network (WLAN) - An aspect of the present disclosure enables convenient provisioning of multiple wireless devices. In an embodiment, a provisioning agent (e.g., a smart phone) identifies wireless devices requiring provisioning to operate as wireless stations and communicates with each wireless device to provide provisioning parameters for joining a first basic service set (BSS). However, during such communication, the provisioning agent operates as a wireless station and each wireless device operates as an access point (AP) outside of the first BSS. Each wireless device is enabled to be configured according to the received provisioning parameters to thereafter operate as a corresponding wireless station of the first BSS. | 09-10-2015 |
20160080889 | PROVISIONING OF MULTIPLE WIRELESS DEVICES BY AN ACCESS POINT - An aspect of the present disclosure enables an access point (AP) to conveniently provision multiple wireless devices. In an embodiment, the AP may normally operate in a secure mode to disregard non-secure provisioning requests from wireless devices. However, upon receipt of a request to accept provisioning requests from multiple wireless devices, the AP permits multiple wireless devices to be provisioned via the AP, in response to corresponding provisioning requests received from the respective wireless devices. The request to accept may be generated upon pressing of a push button provided on the AP, which may be referred to as a group provisioning button since multiple wireless devices are provisioned in response to pressing of that button. | 03-17-2016 |
Patent application number | Description | Published |
20090168695 | DEFINING A BOUNDARY FOR WIRELESS NETWORK USING PHYSICAL ACCESS CONTROL SYSTEMS - A system and method for defining a boundary within a wireless coverage area using a physical access control system (PACS) and limiting access to the wireless network to devices located within the boundary area is provided. The system includes a PACS for controlling access to a secured area defined by the boundary to authorized personnel and a wireless network generating system for generating a wireless network. Access to the wireless network is limited to devices associated with an authorized personnel when the authorized personnel is determined to be within the secured area and denied to devices associated to personnel determined to be outside the secured area. | 07-02-2009 |
20090303040 | SYSTEM AND METHOD FOR DYNAMIC ASSOCIATION OF SECURITY LEVELS AND ENFORCEMENT OF PHYSICAL SECURITY PROCEDURES - A method and system for dynamic association of security levels and enforcement of security procedures. A secure object can be tracked across a building or complex, and security levels may be dynamically updated to reflect the new security requirement. In response to the security level adjustment, security measures and protocols may be implemented dynamically. The system comprises a sensitivity index assigned to each of a plurality of secure objects, a scanner for detecting the sensitivity index, and a logic unit in communication with the scanner for determining a security level for the secure area based on the sensitivity indices of the plurality of secure objects within the secure area. The method comprises detecting a plurality of secure objects within a secure area, each secure object having a sensitivity index, and determining a security level for the secure area based on the sensitivity indices of the plurality of secure objects within the secure area. | 12-10-2009 |
20100175127 | METHOD AND APPARATUS FOR MAXIMIZING CAPACITY OF ACCESS CONTROLLERS - A method and apparatus are provided for controlling access to a secure area. The method includes the steps of providing a plurality of user credentials, generating a Boolean equation based upon the plurality of user credentials where the generated Boolean equation provides a predetermined response to each user credential of the plurality of credentials, saving the generated Boolean equation in a memory in place of the user credentials and recognizing a user credential of the plurality of user credentials by reference to the Boolean equation. | 07-08-2010 |
20130080120 | Method for Optimal and Efficient Guard Tour Configuration Utilizing Building Information Model and Adjacency Information - A route planning system is provided. The system includes a mapping processor that extracts geometric information about a building from a building model of the building and generates an adjacency map of adjacent areas from the extracted information, a triangulation processor that translates each adjacent area of the adjacency map into a closed polygon representation and splits the closed polygon representation into a minimal group of triangles that covers the area where each triangle of the minimal group of triangles includes adjacency information derived from the adjacency map, a user interface that receives first and second locations within the building and a route processor that defines a route between the first and second locations by identifying a minimum set of triangles from the triangles that together form a continuous path between the first and second locations based at least upon the triangle adjacency information. | 03-28-2013 |