ALLEN; LEON A (Total 80 Patents Found)

A motoring system for a gas turbine engine having: a reduction gear train having an input and an output; an electric motor operably connected to the input; a clutch operably connected to the output, the clutch in operation engages and disengages the reduction gear train; and a mechanical shaft fuse operably connecting ...
Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources ...
Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a...
Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a...
Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role ass...
Techniques for workload coordination are provided. An automated discovery service identifies resources with hardware and software specific dependencies for a workload. The dependencies are made generic and the workload and its configuration with the generic dependencies are packaged. At a target location, the packaged ...
An integrated circuit is disclosed. The integrated circuit includes an insulating material layer. The integrated circuit also includes a metal structure. Furthermore, the integrated circuit includes a via through the insulating material layer that is coupled to the metal structure for testing insulating material by app...
Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a...
Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported....
A networked control system includes graphical representations of actual devices coupled to a network. The graphical representations include symbols that provide an actual picture of the devices and means for displaying values and status of the devices. A controller uses a system database to create an application databa...
According to an aspect, a system for a gas turbine engine includes a reduction gear train operable to drive rotation of a starter gear train that interfaces to an accessory gearbox of the gas turbine engine. The reduction gear train includes a starter interface gear that engages the starter gear train and a core-turnin...
The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mec...
Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing a...
A crucible in which a semiconductor material is melted and held during a crystal growing process. The crucible includes a body of vitreous silica having a bottom wall and a sidewall formation extending up from the bottom wall and defining a cavity for holding the molten semiconductor material. The sidewall formation ha...
L'invention concerne des intercalaires pour boîtiers à semi-conducteurs, dotés d'interconnexions encapsulées à forte densité et à grand facteur de forme, et des ensembles de boîtiers à semi-conducteurs incorporant de tels intercalaires. Dans un exemple, un intercalaire pour boîtier à semi-conducteur ...
Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role ass...
A motoring system (100) for a gas turbine engine (54) having: a reduction gear train (122) having an input (122a) and output (122b); a motor (110) operably connected to the input (122a); a clutch (124) operably connected to the output (122b), the clutch (124) in operation engages and disengages the reduction gear train...
The system and method for providing load balancer visibility in an intelligent workload management system described herein may expand a role or function associated with a load balancer beyond handling incoming and outgoing data center traffic into supporting governance, risk, and compliance concerns that may be managed...
Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role ass...
A user interface for a control structure comprising a controller, and physical devices coupled to the controller is disclosed. The controller is adapted to control and monitor the physical devices. The user interface is coupled to the controller for displaying representations of status conditions of the physical device...
Ultraviolet curable compositions useful for coating electrical devices are formed from an epoxy functional compound, a silanol functional compound, and a cationic photoinitiator. Ultraviolet radiation curable composition formed from an epoxy resin, a silanol functional compound, a carbonol functional polyether polysilo...
A motoring system (100) for a gas turbine engine (54) having: a reduction gear train (122) having an input (122a) and an output (122b); an electric motor (110) operably connected to the input (122a); a clutch (124) operably connected to the output (122b), the clutch (124) in operation engages and disengages the reducti...
A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet fro...
File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file...
A networked control system includes graphical representations of actual devices coupled to a network. The graphical representations include symbols that provide an actual picture of the devices and means for displaying values and status of the devices. A controller uses a system database to create an application databa...
Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a...
The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mec...
A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet fro...
Semiconductor package interposers having high-density and high-aspect ratio encapsulated interconnects, and semiconductor package assemblies incorporating such interposers, are described. In an example, a semiconductor package interposer includes several conductive interconnects encapsulated in a polymer substrate and ...
Among other things, a wireless device is disclosed for enabling communication with a gateway device within a user premises. The wireless device includes a wireless local area network transceiver for bidirectional wireless data communication at the premises, an interface for wired communication, a processor for converti...
The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mec...
Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing a...
Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported....
Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing a...
Techniques for federated credential reset are presented. A principal requests a credential reset with a first service. The first service provides a link to a third party service previously selected by the principal. The principal separately authenticates to the third party service and cause the third party service to s...
A method of reinforcing a crucible for the containment of molten semiconductor material in a Czochralski process, and of inhibiting formation of dislocations within a single crystal grown by the process. The crucible includes a body of vitreous silica having a bottom wall and a sidewall formation extending up from the ...
A system for a gas turbine engine (54) includes a reduction gear train (122) operable to drive rotation of a starter gear train (132) that interfaces to an accessory gearbox (70) of the gas turbine engine. The reduction gear train includes a starter interface gear (G41) that engages the starter gear train and a core-tu...
Techniques for workload coordination are provided. An automated discovery service identifies resources with hardware and software specific dependencies for a workload. The dependencies are made generic and the workload and its configuration with the generic dependencies are packaged. At a target location, the packaged ...
Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources ...
A process for preparing a molten silicon melt from polycrystalline silicon for use in producing single crystal silicon by the Czochralski method is disclosed. Granular and chunk polycrystalline silicon are loaded into a Czochralski crucible as a mixed charge. Preferably, the granular polycrystalline silicon is loaded o...
A process for preparing a molten silicon melt from polycrystalline silicon for use in producing single crystal silicon by the Czochralski method is disclosed. Granular and chunk polycrystalline silicon are loaded into a Czochralski crucible as a mixed charge. Preferably, the granular polycrystalline silicon is loaded o...
A process for preparing a molten silicon melt from polycrystalline silicon for use in producing single crystal silicon by the Czochralski method is disclosed. Granular and chunk polycrystalline silicon are loaded into a Czochralski crucible as a mixed charge. Preferably, the granular polycrystalline silicon is loaded o...