rtu

Methods and apparatus for resource capacity evaluation in a system of virtual containers

Methods and apparatus are provided for evaluating potential resource capacity in a system where there is elasticity and competition between a plurality of containers. A dynamic potential capacity is determined for at least one container in a plurality of containers competing for a total capacity of a larger container. A current utilization by each of the plurality of competing containers is obtained, and an equilibrium capacity is determined for each of the competing containers. The equilibrium capacity indicates a capacity that the corresponding container is entitled to. The dynamic potential capacity is determined based on the total capacity, a comparison of one or more of the current utilizations to one or more of the corresponding equilibrium capacities and a relative resource weight of each of the plurality of competing containers. The dynamic potential capacity is optionally recalculated when the set of plurality of containers is changed or after the assignment of each work element.




rtu

Virtualization support for branch prediction logic enable / disable at hypervisor and guest operating system levels

A hypervisor and one or more guest operating systems resident in a data processing system and hosted by the hypervisor are configured to selectively enable or disable branch prediction logic through separate hypervisor-mode and guest-mode instructions. By doing so, different branch prediction strategies may be employed for different operating systems and user applications hosted thereby to provide finer grained optimization of the branch prediction logic for different operating scenarios.




rtu

Data accessing method for flash memory storage device having data perturbation module, and storage system and controller using the same

A data accessing method, and a storage system and a controller using the same are provided. The data accessing method is suitable for a flash memory storage system having a data perturbation module. The data accessing method includes receiving a read command from a host and obtaining a logical block to be read and a page to be read from the read command. The data accessing method also includes determining whether a physical block in a data area corresponding to the logical block to be read is a new block and transmitting a predetermined data to the host when the physical block corresponding to the logical block to be read is a new block. Thereby, the host is prevented from reading garbled code from the flash memory storage system having the data perturbation module.




rtu

Blueprint-driven environment template creation in a virtual infrastructure

A system for blueprint-driven environment template creation in a virtual infrastructure comprises a processor and a memory. The processor is configured to receive a blueprint, receive an environment template configuration, and build an environment template using the blueprint and the environment template configuration. The environment template is for provisioning an environment. The environment is for deploying an application. The memory is coupled to the processor and is configured to provide the processor with instructions.




rtu

System and method for applying a text prediction algorithm to a virtual keyboard

An electronic device for text prediction in a virtual keyboard. The device includes a memory including an input determination module for execution by the microprocessor, the input determination module being configured to: receive signals representing input at the virtual keyboard, the virtual keyboard being divided into a plurality of subregions, the plurality of subregions including at least one subregion being associated with two or more characters and/or symbols of the virtual keyboard; identify a subregion on the virtual keyboard corresponding to the input; determine any character or symbol associated with the identified subregion; and if there is at least one determined character or symbol, provide the at least one determined character or symbol to a text prediction algorithm.




rtu

Virtualizing embedded devices

A device virtualization system is described herein that separates common computer processing tasks of an embedded device from the application-specific peripherals of the embedded device to allow at least some functions of the device to be offloaded to servers or other computing devices. The device virtualization system greatly simplifies management, configuration, and control of virtual embedded devices. Because much of the software of the device runs on the virtualization server, information technology (IT) personnel can be assigned to manage the virtualization server and to apply any updates and diagnose any problems that occur. Moreover, a single server or group of servers can be used to provide virtualization services for a wide variety of virtualized embedded devices for a wide variety of users. Thus, the system enhances the usefulness of embedded devices and allows a longer lifetime and wider variety of uses than embedded devices today.




rtu

Virtualized data storage in a network computing environment

Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device.




rtu

Virtual machine trigger

A computing system includes a parent partition, child partitions, a hypervisor, shared memories each associated with one of the child partitions, and trigger pages each associated with one of the child partitions. The hypervisor receives a system event signal from one of the child partitions and, in response to receiving the system event signal, accesses the trigger page associated with that child partition. The hypervisor determines whether the trigger page indicates whether data is available to be read from the shared memory associated with the child partition. The hypervisor can send an indication to either the parent partition or the child partitions that data is available to be read from the shared memory associated with the child partition if the hypervisor determines that the trigger page indicates that data is available to be read from the shared memory associated with the child partition.




rtu

System and method for virtual machine conversion

System and method for conversion of virtual machine files without requiring copying of the virtual machine payload (data) from one location to another location. By eliminating this step, applicant's invention significantly enhances the efficiency of the conversion process. In one embodiment, a file system or storage system provides indirections to locations of data elements stored on a persistent storage media. A source virtual machine file includes hypervisor metadata (HM) data elements in one hypervisor file format, and virtual machine payload (VMP) data elements. The source virtual machine file is converted by transforming the HM data elements of the source file to create destination HM data elements in a destination hypervisor format different from the source hypervisor format; maintaining the locations of the VMP data elements stored on the persistent storage media constant during the conversion from source to destination file formats without reading or writing the VMP data elements; and creating indirections to reference the destination HM data elements in the destination hypervisor format and the existing stored VMP data elements.




rtu

Dynamically expandable and contractible fault-tolerant storage system with virtual hot spare

A dynamically expandable and contractible fault-tolerant storage system employs a virtual hot spare that is created from unused storage capacity across a plurality of storage devices. This unused storage capacity is available if and when a storage device fails for storage of data recovered from the remaining storage device(s). On an ongoing basis, the storage system may determine the amount of unused storage capacity that would be required for the virtual hot spare (e.g., based on the number of storage devices, the capacities of the various storage devices, the amount of data stored, and the manner in which the data is stored) and generate a signal if additional storage capacity is needed for a virtual hot spare.




rtu

Dynamic consolidation of virtual machines

A method and apparatus are disclosed of monitoring a number of virtual machines operating in an enterprise network. One example method of operation may include identifying a number of virtual machines currently operating in an enterprise network and determining performance metrics for each of the virtual machines. The method may also include identifying at least one candidate virtual machine from the virtual machines to optimize its active application load and modifying the candidate virtual machine to change its active application load.




rtu

Method and apparatus for power-efficiency management in a virtualized cluster system

A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements.




rtu

Estimating virtual machine energy consumption

A method and apparatus for estimating virtual machine energy consumption, and in particular, a method and apparatus for estimating virtual machine energy consumption in a computer system. The method includes: obtaining system energy consumption of the system hardware resources; obtaining event information of a plurality of functional units into which the system hardware resources are divided, and mapping the event information to the respective virtual machines; and calculating energy consumption of the virtual machines according to a plurality of energy consumption coefficients corresponding to the plurality of functional units and according to the event information mapped to the functional units of the respective virtual machines.




rtu

Leveraging transactional memory hardware to accelerate virtualization and emulation

Various technologies and techniques are disclosed for using transactional memory hardware to accelerate virtualization or emulation. State isolation can be facilitated by providing isolated private state on transactional memory hardware and storing the stack of a host that is performing an emulation in the isolated private state. Memory accesses performed by a central processing unit can be monitored by software to detect that a guest being emulated has made a self modification to its own code sequence. Transactional memory hardware can be used to facilitate dispatch table updates in multithreaded environments by taking advantage of the atomic commit feature. An emulator is provided that uses a dispatch table stored in main memory to convert a guest program counter into a host program counter. The dispatch table is accessed to see if the dispatch table contains a particular host program counter for a particular guest program counter.




rtu

Method and apparatus for making an apertured web

A method for making apertures in a web comprising providing a precursor web material; providing a pair of counter-rotating, intermeshing rollers, wherein a first roller comprises circumferentially-extending ridges and grooves, and a second roller comprises teeth being tapered from a base and a tip, the teeth being joined to the second roller at the base, the base of the tooth having a cross-sectional length dimension greater than a cross-sectional width dimension; and moving the web material through a nip of the counter-rotating, intermeshing rollers; wherein apertures are formed in the precursor web material as the teeth on one of the rollers intermesh with grooves on the other of the rollers.




rtu

Scrolling virtual music keyboard

Disclosed are systems, methods, and non-transitory computer-readable storage media for scrolling a virtual keyboard on a touch screen device including a display. A first aspect allows detecting a user contact swipe motion in a predetermined direction along said keyboard, scrolling said keyboard across said display in accordance with said motion, and stopping said scrolling upon termination of user contact swipe motion. A second aspect allows scrolling of a virtual keyboard to snap to an intelligent position based on a song key or relative minor of the song key. A third aspect allows a note to be held when a user's finger remains in contact with the display even though the finger is no longer in contact with a key linked to the note on the keyboard as a result of scrolling. A fourth aspect displays a second musical instrument keyboard adjacent to a first musical instrument keyboard, wherein said second musical instrument keyboard is linked to said first musical instrument keyboard such that scrolling of one keyboard causes automatic scrolling of the other keyboard.




rtu

Uplink grouping and aperture apparatus

A method includes selecting a subset k of N accessible antennas to use to process a transmission received at the N antennas and sent by a user equipment, and processing the transmission from the user equipment at least by using baseband information from the k antennas. An apparatus includes one or more processors and one or more memories including computer program code. The one or more memories and the computer program code are configured to, with the one or more processors, cause the apparatus to perform at least the following: selecting a subset k of N accessible antennas to use to process a transmission received at the N antennas and sent by a user equipment; and processing the transmission from the user equipment at least by using baseband information from the k antennas. Additional apparatus, computer programs, and computer program products are disclosed.




rtu

Virtual local area network (vlan) coordinator providing access to vlans

A virtual computer system includes virtualization software, and one or more physical network interfaces for connecting to one or more computer networks. The virtualization software supports one or more virtual machines (VMs), and exports one or more virtual network interfaces to the VM(s) to enable the VM(s) to access the computer network(s) through the physical network interface(s). The virtualization software modifies and filters network data frames from the VM(s) and from the physical network interface(s) to restrict one or more VMs to one or more virtual local area networks (VLANs) that are implemented within a VLAN topology. Restricting a VM to a VLAN limits the broadcast domain to which the VM belongs, which may reduce security risks facing the VM. Implementing the VLAN functionality within the virtualization software provides the functionality to every VM in the computer system, without requiring every VM to provide the functionality.




rtu

Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same

A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel.




rtu

Method for virtual channel management, method for retrieving digital contents, and network-based multimedia reproduction system with virtual channels

A method for virtual channel management is provided. The method includes the following steps. In response to a command, a control unit of a network-based multimedia reproduction system determines whether the command is associated with virtual channel switching. When the command is associated with virtual channel switching, the control unit checks whether a channel value corresponding to the command exists in an application virtual channel table. When the channel value exists in the application virtual channel table, the control unit determines an application corresponding to the channel number from the application virtual channel table, and executes the application. According to a first operation parameter set corresponding to the application, the control unit sets the executed application to retrieve digital contents through a network unit of the network-based multimedia reproduction system.




rtu

Virtual Aggregation Processor for incorporating reverse path feedback into content delivered on a forward path

The Virtual Aggregation Processor enables end user devices to share a common wireless forward path of a multicast communication architecture in which the forward path delivered content is dynamically changed or modified based on a real-time, near-real-time, or delay-time basis via aggregated reverse path feedback from at least one of a plurality of end user devices. The Virtual Aggregation Processor periodically or continuously aggregates the feedback input received via the reverse path (having wired and/or wireless connectivity), modifies the forward path multi-media content, and delivers this dynamically modified multi-media content to the then connected population of end user devices via a wireless forward path multicast in a repetitive closed loop fashion.




rtu

Virtual machine migration with direct physical access control

A data processing system facilitates virtual machine migration with direct physical access control. The illustrative data processing system comprises a software-programmable trap control associated with hardware registers of a computer that selectively vectors execution control of a virtual machine (VM) between a host and a guest. The data processing system further comprises a logic which is configured for execution on the computer that programs the trap control to enable the virtual machine to directly access the hardware registers when the virtual machine is not migrated and to revoke direct access of the hardware registers in preparation for virtual machine migration.




rtu

Virtual machine communication

Two or more virtual machines may be co-located on a same physical machine, and the virtual machines may communicate with each other. To establish efficient communication, memory mapping information for respective virtual machines can be exchanged between the respective virtual machines. An instance of a virtualized network interface can be established, and a direct communications channel can be mapped between respective virtualized network interfaces. Data packet routing information can be updated, such that data packets transferred between two of more co-located virtual machines can be transferred using the virtualized network interface communications channel.




rtu

Mobile host using a virtual single account client and server system for network access and management

A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.




rtu

Method for making an elastomeric apertured web

A method for making an elastomeric apertured web comprises providing a precursor web comprising a laminate which is subjected to incremental stretching to form an elastomeric precursor web. A forming apparatus is provided comprising a first member and a second member, wherein the first member comprises a mating member, and the second member comprises teeth which are joined to the second member. The elastomeric precursor web is moved through the forming apparatus, wherein apertures are formed in the elastomeric precursor web material as the teeth on the second member penetrate the mating member forming an elastomeric apertured web. The elastomeric apertured web exhibits a WVTR of at least about 1000 g/m2/day.




rtu

Managing virtual content based on information associated with toy objects

The system described in this disclosure may be configured to read information stored on toy objects that indicates whether the toy objects have been used and/or are being used with other toy objects, gaming systems, and/or other devices. The system described in this disclosure may be configured to facilitate an association of the information stored on the toy objects with virtual entities in a virtual space, update virtual content associated with the virtual entities, determine relationships between users, and/or other perform other functions based on the information stored on the toy objects. The information stored on the toy objects may be updated responsive to the toy objects being used by users with other toy objects, gaming systems, and/or other devices. The use of the toy objects by users may include two or more users playing together with toy objects and/or playing with gaming systems associated with the toy objects.




rtu

Semiconductor integrated circuit having a switch, an electrically-conductive electrode line and an electrically-conductive virtual line

A semiconductor integrated circuit including: a circuit block having an internal voltage line; an annular rail line forming a closed annular line around the circuit block and supplied with one of a power supply voltage and a reference voltage; and a plurality of switch blocks arranged around the circuit block along the annular rail line, the plurality of switch blocks each including a voltage line segment forming a part of the annular rail line and a switch for controlling connection and disconnection between the voltage line segment and the internal voltage line.




rtu

Security using EPCIS data and a virtual private database

An RFID event tracking and management system provides a standardized approach that can be utilized by various industry verticals. Loss of captured event data, such as RFID generated through an RFID event, can be prevented through a series of guarantee semantics. Approaches also provide for role-based data visibility. Queries received from a user or entity can be dynamically modified based on the role of the user/entity using a virtual private database (VPD). The modified query can result in a virtual private database automatically hiding or restricting access to event data at row, column, and/or cell levels, so that an authorized user/entity is only able to access data to which that user/entity should have access.




rtu

Anti-theft security device to increase marketing opportunities

The present invention relates to a security device for improving the marketing impact of an article of commerce. The device generally includes a housing having a base and a cover with the cover having at least one opening to allow for the insertion of an attachment mechanism. The housing element of the present invention in one embodiment is in a shape representing a particular theme such as a particular trademark, trade dress, special events, commemorative events, historical events and combinations thereof. The housing may contain an RFID device and/or an electronic article security device. The present invention also provides a method of attaching a security device described herein to an article of commerce.




rtu

Virtual RF sensor

A radio frequency (RF) generation system includes an impedance determination module that receives an RF voltage and an RF current. The impedance determination module further determines an RF generator impedance based on the RF voltage and the RF current. The RF generation system also includes a control module that determines a plurality of electrical values based on the RF generator impedance. The matching module further matches an impedance of a load based on the RF generator impedance and the plurality of electrical components. The matching module also determines a 2 port transfer function based on the plurality of electrical values. The RF generation system also includes a virtual sensor module that estimates a load voltage, a load current, and a load impedance based on the RF voltage, the RF generator, the RF generator impedance, and the 2 port transfer function.




rtu

Method to facilitate opportunity charging of an electric vehicle

A method for electrically charging a high-voltage battery of a subject vehicle includes resolving a geographic location of the subject vehicle at a remote charging site, electrically charging the high-voltage battery through a connection of the subject vehicle to an electric power outlet at the remote charging site, monitoring cumulative electric power flow to the high-voltage battery of the subject vehicle, communicating the cumulative electric power flow to a central server, and reconciling billing for the cumulative electric power flow between an owner of the subject vehicle and an owner of the remote charging site.




rtu

Startup circuit

A startup circuit to ensure a bandgap reference circuit reliably starts up or recovers from a noise disturbance is provided. The startup circuit incorporates a pull down resistor to detect the bandgap reference circuit being in a disabled state. The startup circuit creates a positive feedback loop to force the bandgap reference circuit out of a disabled state. Consequently, whenever the power supply for the bandgap reference circuit sags or if bandgap output collapses, the output of the bandgap circuit reliably ramps back up to the expected level.




rtu

Bootstrap startup and assist circuit

A bootstrap assist circuit and a startup circuit comprising a voltage controlled switch and a startup ramp voltage generator connected to the voltage controlled switch that will control a high side switch, a dimming interface or an enable/disable input function. Said system is used to provide a bootstrap technique to continuously switch a floating high side switch (MOSFET) by continuously charging a capacitor and then “level shifting” said capacitor voltage across the gate and source of the said high side switch to turn the switch on.




rtu

System and method for automated locomotive startup and shutdown recommendations

Data representative of a train consist (the train consist comprising a plurality of locomotives and a plurality of cars) and data representative of a route for the train consist can be processed by a processor to automatically determine which locomotives in the train consist should be powered on and which locomotives in the train consist should be shut down for each segment of the route. The processor can make these determinations based on an analysis of the train consist data and the route data with respect to a plurality of considerations that affect train efficiency. Recommendations for locomotive startups and shutdowns in accordance with such automated determinations can then be presented to the train crew for the crew to use during train operations. It is believed that when train crews are in compliance with such recommendations, significant improvements in efficiency, particularly with respect to fuel consumption, can be achieved.




rtu

Virtual omnimover

A ride control system for controlling a plurality of vehicles on a path includes a path processor and a bi-directional voting circuit in circuit with the path processor. Each vehicle of the plurality of vehicles may include a vehicle processor supported by the at least one vehicle and shunt relays in circuit with the at least one vehicle processor. Each vehicle processor may be configured to close a respective shunt relay upon a predetermined condition of the vehicle whereby the bi-directional voting circuit is activated to notify all other vehicles.




rtu

Overtufting station

An overtufting machine/method provides additional yarn per area in an area of design than in areas lacking the overtufted design. Specifically, for many embodiments, a carpet is first tufted, and then run past an overtufting station which preferably moves in a lateral direction relative to the direction of feed to direct at least one needle through the carpet in at least one selectable height option. Rails are preferably used to shuttle the needle supported by a head on at least one carriage to shuttle along the rail(s).




rtu

EMULATING VIRTUAL PORT CONTROL OF AIRTIME FAIRNESS USING PER STATION ENHANCED DISTRIBUTED CHANNEL ACCESS (EDCA) PARAMETERS

A technique for emulating virtual port control of airtime fairness for wireless stations using per station Enhanced Distributed Channel Access (EDCA) parameters. Specific parameters are received for each of a plurality of stations connected to the access point. An EDCA field of a beacon that stores a general EDCA parameter is set to an empty state. The beacon is broadcast to a plurality stations on the wireless communication network and within range of an access point. The beacon comprises a BSSID (Basic Service Set Identifier) for use by the plurality of stations to connect with the access point for access to the wireless communication network. The beacon also comprises an empty EDCA field. In response to broadcasting the empty EDCA parameter, receiving a direct inquiry from each of the plurality of stations for the general EDCA parameter. Each of the plurality of stations is responded to with a direct communication of a specific parameter corresponding to each station. A transmission is received from at least one of the stations complying with the specific parameter.




rtu

Network context triggers for activating virtualized computer applications

A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the vulnerability profiles, and to cause the remedial action.




rtu

INTERPRETING RELATIONAL DATABASE STATEMENTS USING A VIRTUAL MULTIDIMENSIONAL DATA MODEL

The present disclosure provides improved systems, methods, and computer program products suited to address the issues with legacy approaches. Specifically, the present disclosure provides a detailed description of techniques used in systems, methods, and in computer program products for interpreting relational database statements using a virtual multidimensional data model. Certain embodiments are directed to technological solutions for receiving a relational database statement comprising relational metadata mapped to a virtual multidimensional representation of a subject database, and generating a subject database statement based at least in part on the relational database statement and the virtual multidimensional representation, and configurable to operate on the subject database to produce a visualization result set, which embodiments advance the technical fields for addressing the problem of projecting a multidimensional data view of a subject database on to a relational data analysis environment to enable real time data analyses, as well as advancing peripheral technical fields.




rtu

SYSTEMS AND METHODS FOR ESTABLISHING AND MAINTAINING VIRTUAL COMPUTING CLOUDS

Networking systems and methods for establishing and maintaining virtual computing clouds are disclosed. A networking system can comprise a server and various instances of a software agent, each agent being installed on a computing device participating in a virtual computing cloud. The server can maintain account setting for a user, wherein the settings can indicate which files on indicated computing devices are included in the virtual computing cloud. The networking system can selectively synchronize data between the computing devices automatically and in a secure manner, and can transmit data in real time to simulate local storage when synchronization of certain files is inappropriate in light of file incompatibility. As a result, the networking system can provide the user with a seamless, automatic system and method for accessing a total computing environment.




rtu

VIRTUAL IMPACTOR FILTER ASSEMBLY AND METHOD

A filter system and method use a filter housing that defines an interior chamber and that includes an inlet opening extending into the interior chamber. The outer air flow housing has an outlet conduit through which a flow of air having particles is directed toward the inlet opening of the filter housing along a flow direction toward the interior chamber of the filter housing. The outer air flow housing engages the filter housing such that the filter housing is separated from the outer air flow housing along the flow direction to permit at least some of the air to pass around an exterior of the filter housing and exit the outer air flow housing while the particles in the at least some of the air pass into the interior chamber of the filter housing through the inlet opening.




rtu

APERTURE CODING FOR A SINGLE APERTURE TRANSMIT RECEIVE SYSTEM

An integrated circuit (IC) of a frequency-modulated continuous wave (FMCW) coded aperture radar (CAR) configured to step through a range of frequencies in each sweep and a method of assembling the FMCW CAR are described. The IC includes an antenna element to transmit and receive at a given time duration, a transmit channel to process a signal for transmission, the transmit channel including a transmit switch to change a state of a transmit phase shifter between two states based on a first code, and a receive channel to process a received signal, the receive channel including a receive switch to change a state of a receive phase shifter between two states based on a second code. The IC also includes a switch controller to control the first code and the second code, wherein the switch controller controls the first code to remain constant within the sweep.




rtu

Progressive Opportunities Conference: AUDIO

The 2012 Progressive Opportunities Conference showcased the best work of nonprofits, companies, unions, activists, and government leaders, looking to shed light on some of our most pressing economic issues. The Conference sought to create an opportunity to network and exchange ideas, arming attendees with new tools to make positive economic change.…



  • Marketing/Marketing Blog

rtu

Chris Clark to receive a British Citizens Award for nurturing new talent

A FORMER world champion angler from Hampshire has won a national award after inspiring hundreds of youngsters to aim for glory.




rtu

City orchestra attracts music lovers from around the world as it goes virtual

A SOUTHAMPTON orchestra is going virtual - and global.




rtu

Reader's letter: Why we've gone virtual for Christian Aid Week in Chandler's Ford

CHRISTIAN AID Week, known for its red envelopes, collections and Big Brekkies, faced a big challenge this year, with all its traditional fund-raising events out of reach.




rtu

Hampshire wine school goes virtual

A HAMPSHIRE wine tutor has taken her popular tasting sessions online.





rtu

Friday Feature: Virtual Dinner Concert Series - Helping Boone, NC Musicians & Restaurants

Thanks to Michael Greene of Boone, NC - a virtual dinner concert series, online, was organized as a way to help raise money for local restaurants, servers, and musicians in the Boone area that have been unable to work due to the mandatory closures of businesses because of the Coronavirus. This includes a Go Fund Me page set up to donate a little extra in the case someone can. Maybe this virtual idea spreads all over as a way to say thank you to someone for serving and entertaining all of us in the past. You can find them on Facebook @BooneRelief Posted by Host and Producer of The Friday Feature Interview of the Week, Paul Foster- WNCW Senior Producer, News Director, and Morning Edition Regional Host




rtu

Voting Rights Group Wants More Opportunities For Early Voting This Year

Ohio’s secretary of state says an election day with in-person voting is still the plan for this fall, but he’s suggesting some changes in case concerns about coronavirus keep voters away. A key voting rights group agrees, but wants to go further.