Abstract:
A method for operating in a borehole comprises disposing in a downhole environment a system comprising a tubular having a passage and a first restriction positioned inside the tubular; engaging a restrictor with the first restriction to block the passage; injecting a treatment fluid into the tubular, the treatment fluid comprising an invert emulsion, a carboxylic acid ester, or a combination comprising at least one of the foregoing; and degrading and removing the first restriction.
Abstract:
A method of treating a subterranean formation penetrated by a wellbore comprises introducing into the subterranean formation a treatment fluid comprising encapsulated particles having a core of a crosslinking agent and a shell of a chitosan encapsulant disposed on the core; releasing the crosslinking agent from the encapsulated particles with an acid; reacting the released crosslinking agent with the chitosan encapsulant or a derivative thereof forming a polymerized chitosan; and consolidating a plurality of particles in the subterranean formation with the polymerized chitosan.
Abstract:
A subterranean screen assembly comprises a base pipe with end connections to attach to a pipe string and a portion that is perforated or slotted; and a coated screen radially outwardly disposed of the base pipe. The coated screen comprises a screen substrate and a coating disposed on a surface of the screen substrate; the coating comprising an amorphous diamond like carbon doped with about 10 to about 30 atomic percent of silicon, about 10 to about 20 atomic percent of oxygen, or a combination comprising at least one of the foregoing dopants, or a polymer comprising a fluoropolymer, a silicone, or a combination comprising at least one of the foregoing.
Abstract:
A method and system for converting source tables of a database of the application to target tables of a new version of the database while reducing the amount of time that the database needs to be open in single-user access mode is provided. A conversion system divides the conversion into a multi-user phase and a single-user phase. During the multi-user phase, the conversion system can perform most of the conversions while the database is opened in multi-user access mode. The conversion system stores the converted data in auxiliary tables, rather than updating the source tables. During the single-user phase, the conversion system performs the remaining conversions and copies data from the source tables and the converted data from the auxiliary tables to the target tables.
Abstract:
A method and system of Digital Rights Management (DRM) in a consumer environment where the DRM agent and the rendering application are implemented on separate devices is provided. A first control message is transmitted from the rendering application to notify the DRM agent about the details of a content consumption pattern. The DRM agent receives the first control message, and determines whether the consumption operation detailed in the first control message is a permitted operation. The DRM agent responds with a second control message that either indicates that the operation is permitted or indicates that the operation is not permitted. The rendering application in response to the second control message either halts the consumption operation or if the operation is allowed, performs the consumption operation.
Abstract:
A proxy computer of a network can receive incoming telephony messages from one or more computers outside of the network and proxy them to computers within the network. Similarly, the proxy computer can receive outgoing telephony messages from within the network and proxy them to computers outside of the network. To set up inbound calls, a proxy program on the proxy computer looks for the presence of an alias in the call signaling messages, references a data structure to determine which computer on the network is associated with the alias, and proxies the call signaling and control messages between the callee computer and the calling computer based on the association, thereby creating a logical connection between the calling computer and the callee computer.
Abstract:
A gene that is a modulator of tumor growth and metastasis in certain cancer types is provided. This gene and corresponding polypeptide have diagnostic and therapeutic application for detecting and treating cancers that involve expression of BRCC2 such as breast cancer and lung cancer.
Abstract:
A proxy computer of a network can receive incoming telephony messages from one or more computers outside of the network and proxy them to computers within the network. Similarly, the proxy computer can receive outgoing telephony messages from within the network and proxy them to computers outside of the network. To set up inbound calls, a proxy program on the proxy computer looks for the presence of an alias in the call signaling messages, references a data structure to determine which computer on the network is associated with the alias, and proxies the call signaling and control messages between the callee computer and the calling computer based on the association, thereby creating a logical connection between the calling computer and the callee computer.
Abstract:
A method of producing hydrocarbon from a subterranean formation comprises: disposing an article in a well penetrating a subterranean formation, the article having a surface coated with a hierarchical superhydrophobic coating or the article being a stand-alone hierarchical superhydrophobic membrane; contacting the article with a flow of a water-based fluid and an oil-based fluid; selectively impeding the flow of the water-based fluid; and allowing the production of the oil-based fluid.
Abstract:
A coating having a gradient composite structure, applied to a substrate, which may be a disposable tool. The gradient composite comprises a bonding component and an erosion and/or corrosion resistant component. When applied to a disposable tool, such as a ball and seat assembly in a downhole environment, the coating enhances the performance of disintegrable materials used in such tools. The coating may be configured to expire at the end of a selected duration, allowing the underlying material to disintegrate.