to

Wristwatch with atomic oscillator

A wristwatch, which comprises an atomic oscillator comprising a system for detecting the beat frequencies obtained by the Raman effect.




to

Writing of new data of a first block size in a raid array that stores both parity and data in a second block size

A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size.




to

Writing of new data of a first block size in a raid array that stores both parity and data in a second block size

A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size.




to

Distributing capacity slices across storage system nodes

Various systems and methods are described for configuring a data storage system. In one embodiment, a plurality of actual capacities of a plurality of storage devices of the data storage system are identified and divided into a plurality of capacity slices. The plurality of capacity slices are combined into a plurality of chunks of capacity slices, each having a combination of characteristics of the underlying physical storage devices. The chunks of capacity slices are then mapped to a plurality of logical storage devices. A group of the plurality of logical storage devices is then organized into a redundant array of logical storage devices.




to

Virtualized data storage in a network computing environment

Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device.




to

Streaming content storage

A computing system includes a plurality of dispersed storage (DS) processing units operable to receive a continuous data stream, simultaneously disperse storage error encode the continuous data stream to produce a plurality of encoded data slices and store the plurality of encoded data slices in a DS memory.




to

Memory storage apparatus, memory controller, and method for transmitting and identifying data stream

A memory storage apparatus, a memory controller and method for transmitting and identifying data streams are provided. The memory controller passes at least a portion of a data stream received from a host system to a smart card chip of the memory storage apparatus. Then, the host system accurately receives a response message from the smart card chip by executing a plurality of read commands. The memory controller is capable of adding a first verification code to a response data stream sent to the host system, and is capable of adding a write token to each of data segments of the response data stream. The host system confirms the accuracy of the response data stream by verifying the first verification code or by verifying the write token of each of the data segments.




to

Distributed cache coherency protocol

Systems, methods, and other embodiments associated with a distributed cache coherency protocol are described. According to one embodiment, a method includes receiving a request from a requester for access to one or more memory blocks in a block storage device that is shared by at least two physical computing machines and determining if a caching right to any of the one or more memory blocks has been granted to a different requester. If the caching right has not been granted to the different requester, access is granted to the one or more memory blocks to the requester.




to

Storage device

To provide a storage device with low power consumption. The storage device includes a plurality of cache lines. Each of the cache lines includes a data field which stores cache data; a tag which stores address data corresponding the cache data; and a valid bit which stores valid data indicating whether the cache data stored in the data field is valid or invalid. Whether power is supplied to the tag and the data field in each of the cache lines is determined based on the valid data stored in the valid bit.




to

Storage device and method for controlling data invalidation

A storage device according to an embodiment includes: a host interface connected to a host; a memory including a first buffer that stores a logical address range designated by an invalidation instruction received from the host via the host interface and a second buffer that stores an internal logical address range which is an area combination with the logical address range; a nonvolatile memory; and a controller. The controller includes: an invalidation instruction processor that stores the logical address range designated by the invalidation instruction in the first buffer; an area combination executor that generates the internal logical address range by the area combination with the logical address range and stores the internal logical address range in the second buffer; and an invalidation executor that executes invalidation processing on the nonvolatile memory based on the internal logical address range.




to

Methods and systems for replicating an expandable storage volume

Machine implemented method and system for generating a disaster recovery copy of an expandable storage volume having a namespace for storing information for accessing data objects stored at a data constituent volume is provided. A transfer operation for transferring a point in time copy of the expandable storage volume from a first location to a second location is generated. Information regarding the expandable storage volume from the first location is retrieved and a destination expandable storage volume is resized to match components of the expandable storage volume at the first location. Thereafter, the point in time copy of the expandable storage volume is transferred from the first location to the second location and configuration information regarding the point in time copy is copied from the first location to the second location.




to

Moving blocks of data between main memory and storage class memory

An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory.




to

Automatically preventing large block writes from starving small block writes in a storage device

A mechanism is provided in a storage device for performing a write operation. The mechanism configures a write buffer memory with a plurality of write buffer portions. Each write buffer portion is dedicated to a predetermined block size category within a plurality of block size categories. For each write operation from an initiator, the mechanism determines a block size category of the write operation. The mechanism performs each write operation by writing to a write buffer portion within the plurality of write buffer portions corresponding to the block size category of the write operation.




to

System and method for determining a level of success of operations on an abstraction of multiple logical data storage containers

Various systems and methods are described for configuring a logical data storage container. In one embodiment, an instruction to perform an operation to modify an attribute of the logical data storage container that is an abstraction of a plurality of pertinent storage containers is received. A translated instruction to perform a sub-operation associated with the operation is transmitted to each of a number of the plurality of pertinent storage containers. A level of success of the performing of the operation on the logical data storage container is detected based on a comparison of a threshold value to a level of success of the performing of the sub-operation on each of the number of the plurality of pertinent storage containers. A report of the detected level of success is communicated.




to

Dispersed storage unit and method for configuration thereof

A dispersed storage (DS) unit for use within a dispersed storage network is capable of self-configuring using registry information provided to the DS unit. The registry information includes a slice name assignment indicating a range of slice names corresponding to a plurality of potential data slices of potential data objects to be stored in the DS unit. Based on the registry information, the DS unit allocates a portion of physical memory to store the potential data slices.




to

Dynamically expandable and contractible fault-tolerant storage system with virtual hot spare

A dynamically expandable and contractible fault-tolerant storage system employs a virtual hot spare that is created from unused storage capacity across a plurality of storage devices. This unused storage capacity is available if and when a storage device fails for storage of data recovered from the remaining storage device(s). On an ongoing basis, the storage system may determine the amount of unused storage capacity that would be required for the virtual hot spare (e.g., based on the number of storage devices, the capacities of the various storage devices, the amount of data stored, and the manner in which the data is stored) and generate a signal if additional storage capacity is needed for a virtual hot spare.




to

α-keto alkylperacids and methods for producing and using the same

The present invention provides α-keto alkylperacids and methods for producing and using the same. In particular, α-keto alkylperacids are useful as antimicrobial agents.




to

Deep-ultraviolet chemically-amplified positive photoresist

The invention discloses a deep-ultraviolet chemically-amplified positive photoresist. The deep-ultraviolet chemically-amplified positive photoresist according to one embodiment of the invention includes a cyclopentenyl pimaric acid, a divinyl ether, a photoacid generator and an organic solvent. The deep-ultraviolet chemically-amplified positive photoresist according to the invention has a good sensitivity and a good transparency.




to

Reactor and process for propane oxidation

The amount of propionic acid produced in the process of oxidizing propane to acrylic acid is reduced by using a reactor with a length/diameter ratio >10 and/or maintaining the difference between the target reaction temperature and the peak temperature within the reactor to less than 20° C.




to

Sorafenib derivatives as sEH inhibitors

The present invention provides compounds for the inhibition of soluble epoxide hydrolase and associated disease conditions.




to

Method for the conversion of methylmercaptopropionaldehyde formed from crude acrolein and crude methyl mercaptan

A reactive rectification column suitable for the production of 2-hydroxy-4-methylmercaptobutyric acid and/or methionine contains a weir having a height of 100 mm or more.




to

Hydrocarboxylation of aqueous formaldehyde using a dehydrating recycle stream to decrease water concentration

Disclosed is a process for the production and purification of glycolic acid or glycolic acid derivatives by the carbonylation of aqueous formaldehyde. The water in the hydrocarboxylation zone is reduced via reaction with the ester bonds in a recycle stream comprising glycolic acid oligomers and/or methyl glycolate oligomers.




to

Functional ligands to target molecules

The present invention relates functional ligands to target molecules, particularly to functional nucleic acids and modifications thereof, and to methods for simultaneously generating, for example, numerous different functional biomolecules, particularly to methods for generating numerous different functional nucleic acids against multiple target molecules simultaneously. The present invention further relates to functional ligands which bind with affinity to target molecules. The present invention further relates to methods for generating, for example, functional biomolecules, particularly to functional nucleic acids, that bind with functional activity to another biomolecule, such as a receptor molecule. More than one or multiple targets as used herein may generally include different types of targets, and/or may also include a multitude of a singular type of targets at different conditions, such as, for example, temperature, pH, chemical environment, and/or any other appropriate conditions.




to

Method to determine responsiveness of cancer to epidermal growth factor receptor targeting treatments

Disclosed herein are methods and reagents for determining the responsiveness of cancer to an epidermal growth factor receptor (EGFR) targeting treatment. The detection of these mutations will allow for the administration of gefitinib, erlotinib and other tyrosine kinase inhibitors to those patients most likely to respond to the drug.




to

Cytosine analogue, a method of preparation of a cytosine analogue, a DNA methyltransferase 1 inhibitor, a method for DNA methylation inhibition, the use of the analogue in the treatment of diseases associated with deviations from normal DNA methylation

A cytosine analog, a method of preparation of a cytosine analog, a DNA methyltransferase 1 inhibitor, and a method for DNA methylation inhibition, is provided for the treatment of diseases associated with deviations from normal DNA methylation. The analog of cytosine may be comprised of 1, N4, 5 and 6-substituted derivatives of cytosine or 5,6-dihydrocytosine, wherein the analog can be described by the chemical formula where R1 is H, R3, R4, 2'-deoxyribosyl, R4 is alkyl or aryl, X is N or C, wherein if X in the analog of formula I is N, then R5 is no substituent and if X in the analog of formula I and/or II is C or if X in the analog of formula II is N, then R5 and R6 are independently alkyl, aryl, hydroxyalkyl, aminoalkyl, hydroxyl, carboxyl, amino group, alkoxyl, aryloxyl, aminoalkyl, aminoaryl, thio group, sulfonyl, sulfinyl or halogen.




to

Reduction of ALMS1 gene expression or inhibition of altröm protein to induce cardiomyocyte proliferation

The present invention relates to the field of cardiology. More specifically, the present invention provides methods and compositions for inducing proliferation of cardiomyocytes. In a specific embodiment, a method for inducing proliferation of cardiomyocytes comprises the step of administering an effective amount of an ALMS1 inhibitor.




to

Synthesis and identification of novel RSK-specific inhibitors

A composition comprising an SL0101 [kaempferol 3-O-(3″,4″-di-O-acetyl-α-L-rhamnopyranoside)] derivative compound that has enhanced ability to inhibit RSK activity, relative to the parent compound is provided. The compounds have utility for treating any disease or conditions characterized or associated with excess or undesirable RSK activity. For example the RSK inhibitors of the present invention can be used to reduce the proliferation of neoplastic cells or for inhibiting the establishment or maintenance of an intracellular pathogenic infection by pathogens whose pathogenicity derives in part from the pathogen's ability to impede endosomal/phagosomal maturation in the host cell.




to

Methods and compositions for extraction and storage of nucleic acids

A solid matrix for the extraction, stabilization, and storage of nucleic acids is provided. At least one protein denaturant, and at least one acid or acid-titrated buffer reagent are impregnated in a dry state therein the matrix; and the matrix is configured to provide an acidic pH on hydration. The matrix is configured to extract nucleic acids from a sample and stabilize the extracted nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for collecting and recovering the nucleic acids stored in the dry solid matrix are also described.




to

Methods and compositions for extraction and storage of nucleic acids

The present disclosure generally relates to solid matrices for the extraction, stabilization, and storage of nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for extracting, collecting, and recovering nucleic acids from the solid compositions are also described.




to

Electronic device provided with cryptographic circuit and method of establishing the same

The present invention provides for an electronic device having cryptographic computation means arranged to generate cryptographic data within the device for enhancing security of communications therewith, the device including an onboard power supplying means arranged to provide for the driving of the said cryptographic computational means, and so as to provide a device by way of a manufacturing phase and a post manufacturing phase arranged for distribution and/or marketing of the device, and wherein the step of generating the cryptographic data occurs during the post manufacturing phase.




to

Implementing security measures for authorized tokens used in mobile transactions

Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user.




to

Multiple volume encryption of storage devices using self encrypting drive (SED)

A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating the encrypted data chunks with encryption key indexes of the computing device. Moreover, the method further includes receiving the encryption key indexes for given logical block addresses of the data chunks. The method further includes determining the encryption keys to be used to encrypt the data chunks based on the encryption key indexes of the data chunks to the disk drive.




to

Efficient storage of encrypted data in a dispersed storage network

A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored.




to

Method and apparatus for power management according to a situation mode

The disclosure discloses a power management method, for setting a power supply arrangement of an electronic device intelligently, comprising providing at least two sensors, corresponding to at least one threshold respectively; detecting a state of the electronic device for generating a detecting signal respectively; comparing the at least two detecting signals with the at least one threshold corresponding to the at least two sensors respectively; generating at least two situation signals when the at least two detecting signals meet the at least one threshold corresponding to the at least two sensors respectively; looking up a look-up table according to the at least two detecting signals for generating a control command; and writing in at least one independent bit of a register according to the control command for changing or maintaining a power supply arrangement of at least one peripheral component.




to

Memory controller with transaction-queue-monitoring power mode circuitry

An integrated-circuit memory controller outputs to a memory device a first signal in a first state to enable operation of synchronous data transmission and reception circuits within the memory device. A transaction queue within the memory controller stores memory read and write requests that, to be serviced, require operation of the synchronous data transmission and reception circuits, respectively, within the memory device. Power control circuitry within the memory controller determines that the transaction queue has reached a predetermined state and, in response, outputs the first signal to the memory device in a second state to disable operation of the synchronous data transmission and reception circuits within the memory device.




to

Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal

Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component.




to

Method of processing data to enable external storage thereof with minimized risk of information leakage

A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk.




to

System, method, and device for delivering communications and storing and delivering data

A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server.




to

Techniques to transmit commands to a target device to reduce power consumption

Techniques are described to transmit commands to a display device. The commands can be transmitted in header byte fields of secondary data packets. The commands can be used to cause a target device to capture a frame, enter or exit self refresh mode, or reduce power use of a connection. In addition, a request to exit main link standby mode can cause the target enter training mode without explicit command to exit main link standby mode.




to

Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method

A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers.




to

Monitoring or feedback systems and methods

The present invention generally relates to systems and methods for monitoring and/or providing feedback for drugs or other pharmaceuticals taken by a subject. In one aspect, the present invention is directed to devices and methods for determining a species within the skin of a subject; and producing feedback to a subject based on the determination of the species. The feedback may be, for example, visual, audible, tactile, a change in temperature, etc. In some cases, information regarding the determination of the species may be transmitted to another entity, e.g., a health care provider, a computer, a relative, etc., which may then provide feedback to the subject in some fashion. In some cases, the feedback may be directly indicative of the species, e.g., whether the species is present, the concentration of the species, whether a by-product of a reaction involving the species is present, whether a compound affected by the species is present, etc. However, the feedback may also be indirect in some embodiments. For example, the subject may be presented with an external reward, e.g., based on the determination of the species within the skin. For instance, a reward such as cash, coupons, songs, discounts, personal items, etc., may be offered based on the level of compliance of the subject. Still other aspects of the invention are generally directed to kits involving such devices (with or without the drug to be monitored), methods of promoting such systems, or the like.




to

Automatic detection and correction of magnetic resonance imaging data

Systems and methods for processing magnetic resonance imaging (MRI) data are provided. A method includes receiving MRI data comprising a plurality of k-space points and deriving a plurality of image data sets based on the MRI data, each of the plurality of MRI image sets obtained by zeroing a different one of the plurality of k-space points. The method further includes computing image space metric values for each of the plurality of image data sets and adjusting a portion of the MRI data associated with ones of the image space metric values that fail to meet a threshold value to yield adjusted MRI data.




to

System and method for automatic detection of a plurality of SPO2 time series pattern types

The disclosed embodiments relate to pulse oximetry. An exemplary pulse oximeter comprises a probe that is adapted to be attached to a body part of a patient to create a signal indicative of an oxygen saturation of blood of the patient, and a processor that is adapted to receive the signal produced by the probe, to calculate an SPO2 value based on the signal, to detect a plurality of pattern types of SPO2 indicative of pathophysiologic events, and to produce an output indicative of a detected one of the plurality of pattern types.




to

Analyte monitoring device and methods of use

An analyte monitor includes a sensor, a sensor control unit, and a display unit. The sensor has, for example, a substrate, a recessed channel formed in the substrate, and conductive material disposed in the recessed channel to form a working electrode. The sensor control unit typically has a housing adapted for placement on skin and is adapted to receive a portion of an electrochemical sensor. The sensor control unit also includes two or more conductive contacts disposed on the housing and configured for coupling to two or more contact pads on the sensor. A transmitter is disposed in the housing and coupled to the plurality of conductive contacts for transmitting data obtained using the sensor. The display unit has a receiver for receiving data transmitted by the transmitter of the sensor control unit and a display coupled to the receiver for displaying an indication of a level of an analyte. The analyte monitor may also be part of a drug delivery system to alter the level of the analyte based on the data obtained using the sensor.




to

Device and method for electroimpedance tomography

A device for electroimpedance tomography with an electrode belt (2), which has electrodes (E1 . . . E16), wherein at least two groups (5, 6) of electrodes located next to each other are formed and the electrodes of one group are contacted with at least one, multiwire feed cable (7, 8). For a reduced noise level during data acquisition, provisions are made for at least one electrode (E9) of two mutually adjacently located electrodes (E8, E9) of two different groups (5, 6) to have an additional electrode feed line (15), which is led over the feed cable (7) of the adjacent group (5).




to

Device and method for wound imaging and monitoring

A device for fluorescence-based imaging and monitoring of a target comprising: a light source emitting light for illuminating the target, the emitted light including at least one wavelength or wavelength band causing at least one biomarker associated with the target to fluoresce; and a light detector for detecting the fluorescence.




to

Biometric monitoring device with heart rate measurement activated by a single user-gesture

A biometric monitoring device measuring various biometric information is provided that allows the person to take and/or display a heart rate reading by a simple user interaction with the device, e.g., by simply touching a heart rate sensor surface area or moving the device in a defined motion pattern. Some embodiments of this disclosure provide biometric monitoring devices that allow a person to get a quick heart rate reading without removing the device or interrupting their other activities. Some embodiments provide heart rate monitoring with other desirable features such as feedback on data acquisition status.




to

Pain judging device to judge pain based on a frequency component of a peak-relevant value

A peak-relevant value device acquires a peak-relevant value (for example, the peak value of an R wave (R peak value)) every cycle from an electrocardiogram acquired. The frequencies of the peak-relevant value acquired as time-series data and the magnitudes for the respective frequencies are analyzed. A peak-relevant value LF calculating device calculates an LF component (peak-relevant value LF component) from the frequency component of the peak-relevant value. An interval acquiring device acquires the interval between characteristic points of the electrocardiographic complex from the electrocardiogram acquired and the frequencies of the feature point interval acquired as time-series data to acquire the magnitudes of the respective frequency component are analyzed. An interval HF calculating device calculates the HF component from the frequency components of the feature point interval acquired and pain is judged on the basis of the variations of the peak-relevant value LF components and the interval HF components.




to

Apparatus and method for monitoring and treatment of brain disorders

A method and system for treating brain disorders comprises detecting activity of a first target area of the brain via a first implanted sensor and determining the presence of target brain activity by analyzing the detected brain activity in combination with treating the user based upon the determined presence of target brain activity by supplying a first therapeutic agent to the first target area via a first implanted fluid delivery member including at least one distal opening adjacent to the first target area. In addition, the system may be used as well for testing the effectiveness of drugs.




to

3D ultrasound system for intuitive displaying to check abnormality of object and method for operating 3D ultrasound system

Provided are a three-dimensional (3D) ultrasound system and a method for operating the 3D ultrasound system, which are capable of intuitively displaying the abnormality of an object by determining a grade by comparing measurement data obtained by measuring ultrasound data relating to the object and displaying the measurement data in a different way based on the determined grade.