Patent application number | Description | Published |
20150344622 | POLYESTER POLYOLS FROM THERMOPLASTIC POLYESTERS AND DIMER FATTY ACIDS - Polyester polyols made from thermoplastic polyesters are disclosed. The polyols can be made by heating a thermoplastic polyester such as virgin PET, recycled PET, or mixtures thereof, with a glycol to give a digested intermediate, which is then condensed with a dimer fatty acid to give the polyol. The invention includes a polyester polyol comprising recurring units of a glycol-digested thermoplastic polyester and a dimer fatty acid. The polyester polyol can also be made in a single step by reacting the thermoplastic polyester, glycol, and dimer acid under conditions effective to produce the polyol. High-recycle-content polyols having desirable properties and attributes for formulating polyurethane products, including aqueous polyurethane dispersions, can be made. The polyols provide a sustainable alternative to bio- or petrochemical-based polyols. | 12-03-2015 |
20160053050 | HIGH RECYCLE CONTENT POLYESTER POLYOLS - Polyester polyols made from thermoplastic polyesters are disclosed. The polyols are reaction products of a thermoplastic polyester, a glycol, and a hydrophobe selected from ricinoleic acid, ethoxylated castor oil, saturated or unsaturated C | 02-25-2016 |
Patent application number | Description | Published |
20140101421 | DYNAMIC PROTECTION OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of future deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the master OS image. | 04-10-2014 |
20140101429 | DYNAMIC PROTECTION OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of future deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the master OS image. | 04-10-2014 |
20140136679 | EFFICIENT NETWORK BANDWIDTH UTILIZATION IN A DISTRIBUTED PROCESSING SYSTEM - Methods, apparatuses, and computer program product for of efficient network bandwidth utilization in a distributed processing system are provided. Embodiments include monitoring, by a network monitor, network usage of a distributed processing system containing a plurality of endpoint devices; creating, by the network monitor, a historical network usage pattern based on the monitoring of the network usage; based on the historical network usage pattern, identifying, by the network monitor, a first set of future time periods predicted to correspond with low network usage; and selecting from the first set of future time periods, by the network monitor, a particular time period to perform a network administrative task on an endpoint device in the distributed processing system. | 05-15-2014 |
20140136687 | EFFICIENT NETWORK BANDWIDTH UTILIZATION IN A DISTRIBUTED PROCESSING SYSTEM - Methods, apparatuses, and computer program product for of efficient network bandwidth utilization in a distributed processing system are provided. Embodiments include monitoring, by a network monitor, network usage of a distributed processing system containing a plurality of endpoint devices; creating, by the network monitor, a historical network usage pattern based on the monitoring of the network usage; based on the historical network usage pattern, identifying, by the network monitor, a first set of future time periods predicted to correspond with low network usage; and selecting from the first set of future time periods, by the network monitor, a particular time period to perform a network administrative task on an endpoint device in the distributed processing system. | 05-15-2014 |