Abstract:
A method for operating in a borehole comprises disposing in a downhole environment a system comprising a tubular having a passage and a first restriction positioned inside the tubular; engaging a restrictor with the first restriction to block the passage; injecting a treatment fluid into the tubular, the treatment fluid comprising an invert emulsion, a carboxylic acid ester, or a combination comprising at least one of the foregoing; and degrading and removing the first restriction.
Abstract:
A method of treating a subterranean formation penetrated by a wellbore comprises introducing into the subterranean formation a treatment fluid comprising encapsulated particles having a core of a crosslinking agent and a shell of a chitosan encapsulant disposed on the core; releasing the crosslinking agent from the encapsulated particles with an acid; reacting the released crosslinking agent with the chitosan encapsulant or a derivative thereof forming a polymerized chitosan; and consolidating a plurality of particles in the subterranean formation with the polymerized chitosan.
Abstract:
A method and system for converting source tables of a database of the application to target tables of a new version of the database while reducing the amount of time that the database needs to be open in single-user access mode is provided. A conversion system divides the conversion into a multi-user phase and a single-user phase. During the multi-user phase, the conversion system can perform most of the conversions while the database is opened in multi-user access mode. The conversion system stores the converted data in auxiliary tables, rather than updating the source tables. During the single-user phase, the conversion system performs the remaining conversions and copies data from the source tables and the converted data from the auxiliary tables to the target tables.
Abstract:
A method and system of Digital Rights Management (DRM) in a consumer environment where the DRM agent and the rendering application are implemented on separate devices is provided. A first control message is transmitted from the rendering application to notify the DRM agent about the details of a content consumption pattern. The DRM agent receives the first control message, and determines whether the consumption operation detailed in the first control message is a permitted operation. The DRM agent responds with a second control message that either indicates that the operation is permitted or indicates that the operation is not permitted. The rendering application in response to the second control message either halts the consumption operation or if the operation is allowed, performs the consumption operation.
Abstract:
A proxy computer of a network can receive incoming telephony messages from one or more computers outside of the network and proxy them to computers within the network. Similarly, the proxy computer can receive outgoing telephony messages from within the network and proxy them to computers outside of the network. To set up inbound calls, a proxy program on the proxy computer looks for the presence of an alias in the call signaling messages, references a data structure to determine which computer on the network is associated with the alias, and proxies the call signaling and control messages between the callee computer and the calling computer based on the association, thereby creating a logical connection between the calling computer and the callee computer.
Abstract:
A gene that is a modulator of tumor growth and metastasis in certain cancer types is provided. This gene and corresponding polypeptide have diagnostic and therapeutic application for detecting and treating cancers that involve expression of BRCC2 such as breast cancer and lung cancer.
Abstract:
A proxy computer of a network can receive incoming telephony messages from one or more computers outside of the network and proxy them to computers within the network. Similarly, the proxy computer can receive outgoing telephony messages from within the network and proxy them to computers outside of the network. To set up inbound calls, a proxy program on the proxy computer looks for the presence of an alias in the call signaling messages, references a data structure to determine which computer on the network is associated with the alias, and proxies the call signaling and control messages between the callee computer and the calling computer based on the association, thereby creating a logical connection between the calling computer and the callee computer.
Abstract:
A method of producing hydrocarbon from a subterranean formation comprises: disposing an article in a well penetrating a subterranean formation, the article having a surface coated with a hierarchical superhydrophobic coating or the article being a stand-alone hierarchical superhydrophobic membrane; contacting the article with a flow of a water-based fluid and an oil-based fluid; selectively impeding the flow of the water-based fluid; and allowing the production of the oil-based fluid.
Abstract:
A seal for an annular space includes a mandrel; and an element having a surface treatment to increase the coefficient of friction thereof at least on a surface of the element configured to interact with the mandrel. A material for use as an element to seal an annular space, the material including a surface treatment to increase lateral coefficient of friction. A method for producing a seal for an annular space.
Abstract:
A switching network includes an upper tier including a master switch and a lower tier including a plurality of lower tier entities. The master switch includes a plurality of ports each coupled to a respective one of the plurality of lower tier entities. Each of the plurality of ports includes a plurality of virtual ports each corresponding to a respective one of a plurality of remote physical interfaces (RPIs) at the lower tier entity coupled to that port. Each of the plurality of ports also includes a receive interface that, responsive to receipt of data traffic from a particular lower tier entity among the plurality of lower tier entities, queues the data traffic to the virtual port among the plurality of virtual ports that corresponds to the RPI on the particular lower tier entity that was the source of the data traffic. The master switch further includes a switch controller that switches data traffic from the virtual port to an egress port among the plurality of ports from which the data traffic is forwarded.