age

Managed access to media services

Methods, apparatuses and systems directed to account-based access to media services are described. A media access controller server validates a voucher for an offer of network content and issues a token permitting access to the content. A media access manager server validates the token and invokes a playlist-generation step at a publishing point, and returns the content to a user's media player. A custom plug-in on the media access manager may enforce terms of service imposed by the publisher, such as a maximum number of simultaneous streams permitted by a single voucher, or a time window for use of the voucher. Streams whose voucher's end time has expired are terminated by the plug-in.




age

Router-based dispersed storage network method and apparatus

A method begins by a router receiving data for storage and interpreting the data to determine whether the data is to be forwarded or error encoded. The method continues with the router obtaining a routing table when the data is to be error encoded. Next, the method continues with the router selecting a routing option from the plurality of routing options and determining error coding dispersal storage function parameters based on the routing option. Next, the method continues with the router encoding the data based on the error coding dispersal storage function parameters to produce a plurality of sets of encoded data slices. Next, the method continues with the router outputting at least some of the encoded data slices of a set of the plurality of sets of encoded data slices to an entry point of the routing option.




age

Method to publish remote management services over link local network for zero-touch discovery, provisioning and management

A system, method, and computer-readable medium are disclosed for realizing server management functionalities in the absence of a routable Internet Protocol (IP) network address of a remote access controller (RAC). A first device, which is operatively coupled to a link-local network, generates a Multicast Domain Name System (mDNS) IP multicast query message, which it then sends to a second device on the link-local network. In response, the second device, which comprises a RAC, returns its link-local IP address to the first device.




age

System and method for supporting video processing load balancing for user account management in a computing environment

A system and method can support user account management in a computing environment. The computing environment can include a video encoding pool to support load balancing and a managing server, such as a privileged account manager server. The video encoding pool includes a set of nodes that are able to perform one or more video processing tasks for another node. Furthermore, the managing server can receive a request from a managed node in the computing environment for delegating a video processing task, and can select one or more nodes from the video encoding pool to load babalance and to perform the video processing task.




age

Method for detecting the time messages in the faulty signal of a time-signal transmitter

A method is described for detecting the time messages in the faulty signal of a time-signal transmitter comprising the steps below. Probabilities are assigned to the received information/bits as they are received and whose sign specifies the value of the bit and whose numerical value indicates the certainty of reception. Except for the bits designating the minute information, the probabilities of successive time messages are totaled with time correctness in a one-dimensional memory field. From the totaled probabilities, a reduced time message is reconstructed that initially contains no information on the minutes. If the reconstructed time message does not change over two successive time intervals, and if preset minimum values for the number of probabilities are exceeded for all bits, then the reduced time message is recognized as being correct. The minutes are determined separately and added to the time message recognized as being correct.




age

Radio paging selective receiver with display for notifying presence of unread message based on time of receipt

A radio paging selective receiver determines that a received message is unread based on the time difference between the message reception time and the current time being larger that some predetermined value of time, and the paging selective receiver provides an indication of the unread message by displaying the reception time of the unread message in a second fashion which is visibly different from a first fashion normally used to display the current time.




age

Analog wrist watch and pager providing message display on cover glass

An LCD is integrated with the cover glass of a wrist watch radio paging receiver which indicates the time data with a dial plate and hands, and a message is displayed on the cover glass by controlling this LCD. In this message display, the parts of the characters indicating the message are made transparent and the remaining parts intercept light. In this manner, message display is made possible by the difference in light transmissivity.




age

Electronic postage meter system having plural clock system providing enhanced security

A system includes a system time counter associated with a micro controller and a secure clock module having a real time clock and an elapsed time counter. The system synchronizes operation between the secure clock module and the system time counter. The synchronized time entered into the system time counter is utilized in the operation of the system. The real time clock time can be caused to be entered into the elapsed time counter at certain point in the operation of the system. The relationship of the time provide enhanced systems security.




age

Distributing capacity slices across storage system nodes

Various systems and methods are described for configuring a data storage system. In one embodiment, a plurality of actual capacities of a plurality of storage devices of the data storage system are identified and divided into a plurality of capacity slices. The plurality of capacity slices are combined into a plurality of chunks of capacity slices, each having a combination of characteristics of the underlying physical storage devices. The chunks of capacity slices are then mapped to a plurality of logical storage devices. A group of the plurality of logical storage devices is then organized into a redundant array of logical storage devices.




age

Virtualized data storage in a network computing environment

Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device.




age

Streaming content storage

A computing system includes a plurality of dispersed storage (DS) processing units operable to receive a continuous data stream, simultaneously disperse storage error encode the continuous data stream to produce a plurality of encoded data slices and store the plurality of encoded data slices in a DS memory.




age

Memory storage apparatus, memory controller, and method for transmitting and identifying data stream

A memory storage apparatus, a memory controller and method for transmitting and identifying data streams are provided. The memory controller passes at least a portion of a data stream received from a host system to a smart card chip of the memory storage apparatus. Then, the host system accurately receives a response message from the smart card chip by executing a plurality of read commands. The memory controller is capable of adding a first verification code to a response data stream sent to the host system, and is capable of adding a write token to each of data segments of the response data stream. The host system confirms the accuracy of the response data stream by verifying the first verification code or by verifying the write token of each of the data segments.




age

Storage device

To provide a storage device with low power consumption. The storage device includes a plurality of cache lines. Each of the cache lines includes a data field which stores cache data; a tag which stores address data corresponding the cache data; and a valid bit which stores valid data indicating whether the cache data stored in the data field is valid or invalid. Whether power is supplied to the tag and the data field in each of the cache lines is determined based on the valid data stored in the valid bit.




age

Storage device and method for controlling data invalidation

A storage device according to an embodiment includes: a host interface connected to a host; a memory including a first buffer that stores a logical address range designated by an invalidation instruction received from the host via the host interface and a second buffer that stores an internal logical address range which is an area combination with the logical address range; a nonvolatile memory; and a controller. The controller includes: an invalidation instruction processor that stores the logical address range designated by the invalidation instruction in the first buffer; an area combination executor that generates the internal logical address range by the area combination with the logical address range and stores the internal logical address range in the second buffer; and an invalidation executor that executes invalidation processing on the nonvolatile memory based on the internal logical address range.




age

Methods and systems for replicating an expandable storage volume

Machine implemented method and system for generating a disaster recovery copy of an expandable storage volume having a namespace for storing information for accessing data objects stored at a data constituent volume is provided. A transfer operation for transferring a point in time copy of the expandable storage volume from a first location to a second location is generated. Information regarding the expandable storage volume from the first location is retrieved and a destination expandable storage volume is resized to match components of the expandable storage volume at the first location. Thereafter, the point in time copy of the expandable storage volume is transferred from the first location to the second location and configuration information regarding the point in time copy is copied from the first location to the second location.




age

Moving blocks of data between main memory and storage class memory

An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory.




age

Memory data management

A method and computer-readable storage media are provided for rearranging data in physical memory units. In one embodiment, a method may include monitoring utilization counters. The method may further include, comparing the utilization counters for a match with an instance in a first table containing one or more instances when data may be rearranged in the physical memory units. The table may further include where the data should be relocated by a rearrangement. The method may also include, continuing to monitor the utilization counters if a match is not found with an instance in the first table. The method may further include, rearranging the data in the physical memory units if a match between the utilization counters and an instance in the first table is found.




age

Management apparatus and management method

Proposed are a management apparatus and a management method capable of improving the stability of the overall computer system. In a computer system which manages a storage area provided by each of a plurality of mutually connected storage apparatuses as a logical pool, provides to a host computer a virtual volume associated with the logical pool, and assigns a real storage area from the logical pool to the virtual volume when the host computer writes into the virtual volume, when a storage apparatus is added to the plurality of storage apparatuses, the host computer is controlled to switch the access path to the added storage apparatus.




age

Automatically preventing large block writes from starving small block writes in a storage device

A mechanism is provided in a storage device for performing a write operation. The mechanism configures a write buffer memory with a plurality of write buffer portions. Each write buffer portion is dedicated to a predetermined block size category within a plurality of block size categories. For each write operation from an initiator, the mechanism determines a block size category of the write operation. The mechanism performs each write operation by writing to a write buffer portion within the plurality of write buffer portions corresponding to the block size category of the write operation.




age

System and method for determining a level of success of operations on an abstraction of multiple logical data storage containers

Various systems and methods are described for configuring a logical data storage container. In one embodiment, an instruction to perform an operation to modify an attribute of the logical data storage container that is an abstraction of a plurality of pertinent storage containers is received. A translated instruction to perform a sub-operation associated with the operation is transmitted to each of a number of the plurality of pertinent storage containers. A level of success of the performing of the operation on the logical data storage container is detected based on a comparison of a threshold value to a level of success of the performing of the sub-operation on each of the number of the plurality of pertinent storage containers. A report of the detected level of success is communicated.




age

Dispersed storage unit and method for configuration thereof

A dispersed storage (DS) unit for use within a dispersed storage network is capable of self-configuring using registry information provided to the DS unit. The registry information includes a slice name assignment indicating a range of slice names corresponding to a plurality of potential data slices of potential data objects to be stored in the DS unit. Based on the registry information, the DS unit allocates a portion of physical memory to store the potential data slices.




age

Memory management unit for a microprocessor system, microprocessor system and method for managing memory

The invention pertains to a memory management unit for a microprocessor system, the memory management unit being connected or connectable to at least one processor core of the microprocessor system and being connected or connectable to a physical memory of the microprocessor system. The memory management unit is adapted to selectively operate in a hypervisor mode or in a supervisor mode, the hypervisor mode and the supervisor mode having different privilege levels of access to hardware The memory management unit comprises a first register table indicating physical address information for mapping at least one logical physical address and at least one actual physical address onto each other; a second register table indicating an allowed address range of physical addresses accessible to a process running in or under supervisor mode; wherein the memory management unit is adapted to prevent write access to the second register table by a process not in hypervisor mode. The memory management unit is further adapted to allow write access to the first register table of a process running in or under supervisor mode to reconfigure the physical address information indicated in the first register table with memory mapping information relating to at least one physical address, if the at least one physical address is in the allowed address range, and to prevent write access to the first register table of the process running in or under supervisor mode if the at least one physical address is not in the allowed address range. The invention also pertains to a microprocessor system and a method for managing memory.




age

Dynamically expandable and contractible fault-tolerant storage system with virtual hot spare

A dynamically expandable and contractible fault-tolerant storage system employs a virtual hot spare that is created from unused storage capacity across a plurality of storage devices. This unused storage capacity is available if and when a storage device fails for storage of data recovered from the remaining storage device(s). On an ongoing basis, the storage system may determine the amount of unused storage capacity that would be required for the virtual hot spare (e.g., based on the number of storage devices, the capacities of the various storage devices, the amount of data stored, and the manner in which the data is stored) and generate a signal if additional storage capacity is needed for a virtual hot spare.




age

Management of multiple software images with shared memory blocks

A data processing entity that includes a mass memory with a plurality of memory locations for storing memory blocks. Each of a plurality of software images includes a plurality of memory blocks with corresponding image addresses within the software image. The memory blocks of software images stored in boot locations of a current software image are relocated. The boot blocks of the current software image are stored into the corresponding boot locations. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations, thereby loading the access function. Each request to access a selected memory block of the current software image is served by the access function, with the access function accessing the selected memory block in the associated memory location provided by the control structure.




age

Methods and compositions for the synthesis of multimerizing agents

The invention features methods and compositions for the synthesis of multimerizing agents. An exemplary method for producing AP20187 may comprise: (a) coupling 2-N,Ndimethylaminomethyl-1,3-diaminopropane with AP20792 to produce the dimeric alcohol, AP20793; and (b) coupling the AP20793 so produced with API7362 to yield AP20187. In particular embodiments, the method further includes the step of producing API7362 by coupling API7360 with methyl-L-pipecolic acid, or a salt thereof.




age

Reagents useful for synthesizing rhodamine-labeled oligonucleotides

The present disclosure provides reagents that can be used to label synthetic oligonucleotides with rhodamine dyes or dye networks that contain rhodamine dyes.




age

Methods and compositions for extraction and storage of nucleic acids

A solid matrix for the extraction, stabilization, and storage of nucleic acids is provided. At least one protein denaturant, and at least one acid or acid-titrated buffer reagent are impregnated in a dry state therein the matrix; and the matrix is configured to provide an acidic pH on hydration. The matrix is configured to extract nucleic acids from a sample and stabilize the extracted nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for collecting and recovering the nucleic acids stored in the dry solid matrix are also described.




age

Coating agent comprising hydroxyalkyl cellulose

A coating agent containing a hydroxyalkyl cellulose in which a content of hydroxyalkoxy groups within the hydroxyalkyl cellulose is within a range of 40 to 50% by mass, preferably a coating agent containing a hydroxyalkyl cellulose in which the content of hydroxyalkoxy groups is within a range of 40 to 50% by mass and also a viscosity of 2% aqueous solution at 20° C. is within a range of 3.0 to 5.9 mPa·s; and a solid preparation coated with the coating agent.




age

Methods and compositions for extraction and storage of nucleic acids

The present disclosure generally relates to solid matrices for the extraction, stabilization, and storage of nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for extracting, collecting, and recovering nucleic acids from the solid compositions are also described.




age

Multiple volume encryption of storage devices using self encrypting drive (SED)

A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating the encrypted data chunks with encryption key indexes of the computing device. Moreover, the method further includes receiving the encryption key indexes for given logical block addresses of the data chunks. The method further includes determining the encryption keys to be used to encrypt the data chunks based on the encryption key indexes of the data chunks to the disk drive.




age

Discarding sensitive data from persistent point-in-time image

A network storage server implements a method to discard sensitive data from a Persistent Point-In-Time Image (PPI). The server first efficiently identifies a dataset containing the sensitive data from a plurality of datasets managed by the PPI. Each of the plurality of datasets is read-only and encrypted with a first encryption key. The server then decrypts each of the plurality of datasets, except the dataset containing the sensitive data, with the first encryption key. The decrypted datasets are re-encrypted with a second encryption key, and copied to a storage structure. Afterward, the first encryption key is shredded.




age

Efficient storage of encrypted data in a dispersed storage network

A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored.




age

Method and apparatus for power management according to a situation mode

The disclosure discloses a power management method, for setting a power supply arrangement of an electronic device intelligently, comprising providing at least two sensors, corresponding to at least one threshold respectively; detecting a state of the electronic device for generating a detecting signal respectively; comparing the at least two detecting signals with the at least one threshold corresponding to the at least two sensors respectively; generating at least two situation signals when the at least two detecting signals meet the at least one threshold corresponding to the at least two sensors respectively; looking up a look-up table according to the at least two detecting signals for generating a control command; and writing in at least one independent bit of a register according to the control command for changing or maintaining a power supply arrangement of at least one peripheral component.




age

Power-saving network management server, network system, and method of determining supply of power

A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result.




age

Energy management device and power management system

An energy management system has an application storage, an application executing unit, a plurality of network interfaces, a policy setting unit configured to set whether each application should be permitted to access each of the network interfaces, a policy storage configured to store identification information for each application set by the policy setting unit, and access permit/inhibit information showing whether the application is permitted to access each of the network interfaces, an I/F management unit managing a correspondence relationship between a network address and each of the network interfaces, and to specify a network interface used by the application executed by the application executing unit, and an access controller configured to judge whether the application executed by the application executing unit is permitted to access the network interface to be used thereby, based on the access permit/inhibit information stored in the policy storage.




age

Method and apparatus for power-efficiency management in a virtualized cluster system

A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements.




age

Processor bridge power management

A power controller can set the power state of a processor bridge based on which processor modules are in a communicative state. In addition, for a power state where selected processor modules are expected to be non-communicative, the power controller can set the supplied voltage to have a reduced voltage guard band as compared to other power states. These power management techniques can reduce the power consumed by the processor.




age

Power management of multiple compute units sharing a cache

We report methods, integrated circuit devices, and fabrication processes relating to power management transitions of multiple compute units sharing a cache. One method includes indicating that a first compute unit of a plurality of compute units of an integrated circuit device is attempting to enter a low power state, determining if the first compute unit is the only compute unit of the plurality in a normal power state, and in response to determining the first compute unit is the only compute unit in the normal power state: saving a state of a shared cache unit of the integrated circuit device, flushing at least a portion of a cache of the shared cache unit, repeating the flushing until either a second compute unit exits the low power state or the cache is completely flushed, and permitting the first compute unit to enter the low power state.




age

Image forming apparatus, system-on-chip (SoC) unit, and driving method thereof

An image forming apparatus is connected to a host device including first and second power domains which are separately supplied with power and includes first and second memories to be disposed in the second power domain, a main controller disposed in the first power domain and to perform a control operation using the first memory in a normal mode, and a sub-controller disposed in the second power domain and perform a control operation using the second memory in a power-saving mode, where when the normal mode is changed to the power-saving mode a power supply to the first power domain is shut off, the first memory operates in a self-refresh mode, and the main controller copies central processing unit (CPU) context information into a context storage unit, and when the power-saving mode is changed to the normal mode, the main controller is booted using the CPU context information stored in the context storage unit.




age

Identification and management of unsafe optimizations

Techniques for implementing identification and management of unsafe optimizations are disclosed. A method of the disclosure includes receiving, by a managed runtime environment (MRE) executed by a processing device, a notice of misprediction of optimized code, the misprediction occurring during a runtime of the optimized code, determining, by the MRE, whether a local misprediction counter (LMC) associated with a code region of the optimized code causing the misprediction exceeds a local misprediction threshold (LMT) value, and when the LMC exceeds the LMT value, compiling, by the MRE, native code of the optimized code to generate a new version of the optimized code, wherein the code region in the new version of the optimized code is not optimized.




age

Experiment manager for manycore systems

An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing workloads. A monitoring or instrumentation system may collect operational and performance data from hardware and software components within the system. A modeling system may create an operational model of the execution environment, then may determine different sets of parameters for the execution environment. A feedback loop may change various operational characteristics of the execution environment. The monitoring, analysis, and feedback loop may optimize the performance of a computer system for various metrics, including throughput, performance, energy conservation, or other metrics based on the applications that are currently executing. The performance model of the execution environment may be persisted and applied to new applications to optimize the performance of applications that have not been executed on the system.




age

Enabling web page tracking

Methods are provided for tracking data corresponding to a mobile device that accesses a web page. Once a mobile device is registered with a network, the mobile device is instructed to request permission before accessing a web page. An access request is received, and based on a user profile, the access request is approved such that the mobile device may access the web page. Access data that corresponds to the mobile device accessing the web page is collected so that it can be added to and stored in a database.




age

Method of processing data to enable external storage thereof with minimized risk of information leakage

A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk.




age

Velocity measurement of MR-imaged fluid flows

Velocity of MR-imaged fluid flows is measured. Data representing a measure of distance traveled by flowing fluid appearing in at least two MR images of a subject's tissue taken at different respective imaging times is generated. Data representing at least one fluid velocity measurement of the flowing fluid is generated by calculating at least one instance of distance traveled by the fluid divided by elapsed time during travel based on different respective imaging times. Data representing at least one fluid velocity measurement is then output to at least one of: (a) a display screen, (b) a non-transitory data storage medium, and (c) a remotely located site.




age

System and method for acquiring images from within a tissue

Systems and methods for imaging within depth layers of a tissue include illuminating light rays at different changing wavelengths (frequencies), collimating illuminated light rays using a collimator, and splitting light rays using a beam splitter, such that some of the light rays are directed towards a reference mirror and some of the rays are directed towards the tissue. The systems and methods further include reflecting light rays from the reference mirror towards the imager, filtering out non-collimated light rays reflected off the tissue by using a telecentric optical system, and reflecting collimated light rays reflected off the tissue towards the imager, thus creating an image of an interference pattern based on collimated light rays reflected off the tissue and off the reference mirror. The method may further include creating full 2D images from the interference pattern for each depth layer of the tissue using Fast Fourier transform.




age

Apparatus and methods for determining a plurality of local calibration factors for an image

Apparatus and methods are described including acquiring a first set of extraluminal images of a lumen, using an extraluminal imaging device. At least one of the first set of images is designated as a roadmap image. While an endoluminal device is being moved through the lumen, a second set of extraluminal images is acquired. A plurality of features that are visible within images belonging to the second set of extraluminal images are identified. In response to the identified features in the images belonging to the second set of extraluminal images, a plurality of local calibration factors associated with respective portions of the roadmap image are determined. Other applications are also described.




age

Aryl ketone compounds and compositions for delivering active agents

The present invention provides aryl ketone compounds and compositions containing them which facilitate the delivery of active agents. The aryl ketone compounds have the formula or a salt thereof, where n=1 to 9, and R1 to R5 are independently hydrogen, C1 to C4 alkyl, C1 to C4 alkoxy, C2 to C4 alkenyl, halogen, hydroxyl, —NH—C(O)—CH3, or —O—C6H5.




age

Method of synthesising polycarbonates in the presence of a bimetallic catalyst and a chain transfer agent

The invention provides a process for the synthesis of a polycarbonate, the process comprising the step of reacting carbon dioxide with at least one epoxide in the presence of a catalyst of formula (I) and a chain transfer agent. The invention also provides a polymerization system for the copolymerization of carbon dioxide and at least one epoxide comprising a catalyst of formula (I) and a chain transfer agent, polycarbonates produced by the inventive process, a block copolymer comprising a polycarbonate produced by the inventive process, and a method of producing the block copolymer. The invention also relates to novel catalysts of formula (III).




age

Efficient processes for large scale preparation of phosphaplatins antitumor agents

An efficient process for synthesizing phosphaplatins in large quantities is disclosed by adding platinum complex to a concentrated pyrophosphate solution at pH from between about 6.0 to 8.5. After stirring, the temperature and pH are lowered to precipitate out desired phosphaplatins. Particularly, the disclosed processes reduce the need to use large volumes of starting materials, and shorten the reaction time. In addition, disclosed is a process for recycling un-reacted materials from a first phosphaplatins synthesis.




age

Coating composition for low refractive layer including fluorine-containing compound, anti-reflection film using the same, polarizer and image display device including the same

Provided are a coating composition for low refractive layer including fluorine-containing compound of the following Chemical Formula 1, an anti-reflection film using the same, and a polarizer and an image display device including the same, wherein the fluorine-containing compound of the following Chemical Formula 1 has a low refractive index of 1.28 to 1.40, thereby making it possible to easily adjust a refractive index of the anti-reflection film and be usefully used as a coating material of the anti-reflection film having an excellent mechanical property such as durability, or the like.