ed

Process for production of purified O-(2,6-dichloro-4-methyl-phenyl) O,O-dimethyl phosphorothioate

A process for producing a purified O-(2,6-dichloro-4-methylphenyl)-O,O-dimethyl phosphorothioate, the process comprising: the first step of bringing a crude O-(2,6-dichloro-4-methylphenyl)-O,O-dimethyl phosphorothioate into contact with an acid; andthe second step of recovering the purified O-(2,6-dichloro-4-methylphenyl)-O,O-dimethyl phosphorothioate from the mixture obtained in the first step.




ed

Synthesis of H-phosphonate intermediates and their use in preparing the herbicide glyphosate

The esterfication of hypophosphorous acid is followed by reaction with another molecule of alcohol under the action of a nickel catalyst to provide a green method for the preparation of H-phosphonate diesters. This method avoids the need for any stoichiometric chlorine unlike those based on phosphorous trichloride.




ed

Methods and apparatus for using a distributed message bus for ad hoc peer-to-peer connectivity

A method and apparatus for using an ad hoc peer-to-peer distributed message bus is provided. The method may include determining, by a local bus node, using a first power level communication protocol, that a remote bus node is available, obtaining, by the local bus node, connection information from the remote bus node using a second power level communication protocol, wherein the connection information comprises connection information for one or more remote endpoints associated with the remote bus node, and generating one or more local virtual endpoints, wherein each of the one or more local virtual endpoints corresponds to each of the one or more remote endpoints, and wherein the remote endpoint is described with reference to a well-known name, unique to the remote endpoint.




ed

Policy-based application management

Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.




ed

Managed access to media services

Methods, apparatuses and systems directed to account-based access to media services are described. A media access controller server validates a voucher for an offer of network content and issues a token permitting access to the content. A media access manager server validates the token and invokes a playlist-generation step at a publishing point, and returns the content to a user's media player. A custom plug-in on the media access manager may enforce terms of service imposed by the publisher, such as a maximum number of simultaneous streams permitted by a single voucher, or a time window for use of the voucher. Streams whose voucher's end time has expired are terminated by the plug-in.




ed

Router-based dispersed storage network method and apparatus

A method begins by a router receiving data for storage and interpreting the data to determine whether the data is to be forwarded or error encoded. The method continues with the router obtaining a routing table when the data is to be error encoded. Next, the method continues with the router selecting a routing option from the plurality of routing options and determining error coding dispersal storage function parameters based on the routing option. Next, the method continues with the router encoding the data based on the error coding dispersal storage function parameters to produce a plurality of sets of encoded data slices. Next, the method continues with the router outputting at least some of the encoded data slices of a set of the plurality of sets of encoded data slices to an entry point of the routing option.




ed

Interfaces for digital media processing

APIs discussed herein promote efficient and timely interoperability between hardware and software components within the media processing pipelines of media content players. A PhysMemDataStructure API facilitates a hardware component's direct access to information within a memory used by a software component, to enable the hardware component to use direct memory access techniques to obtain the contents of the memory, instead of using processor cycles to execute copy commands. The PhysMemDataStructure API exposes one or more fields of data structures associated with units of media content stored in a memory used by a software component, and the exposed fields store information about the physical properties of the memory locations of the units of media content. SyncHelper APIs are used for obtaining information from, and passing information to, hardware components, which information is used to adjust the hardware components' timing for preparing media samples of synchronously-presentable media content streams.




ed

Virtualizing embedded devices

A device virtualization system is described herein that separates common computer processing tasks of an embedded device from the application-specific peripherals of the embedded device to allow at least some functions of the device to be offloaded to servers or other computing devices. The device virtualization system greatly simplifies management, configuration, and control of virtual embedded devices. Because much of the software of the device runs on the virtualization server, information technology (IT) personnel can be assigned to manage the virtualization server and to apply any updates and diagnose any problems that occur. Moreover, a single server or group of servers can be used to provide virtualization services for a wide variety of virtualized embedded devices for a wide variety of users. Thus, the system enhances the usefulness of embedded devices and allows a longer lifetime and wider variety of uses than embedded devices today.




ed

Simulated network

Systems, methods, and computer-readable and executable instructions are provided for providing a simulated network. Providing a simulated network can include collecting a number of network parameters for a plurality of locations and determining an application frequency of an application for the plurality of locations. Furthermore, providing a simulated network can include providing a simulated network with the number of network parameters to a number of testers of the application, wherein the number of network parameters are provided proportionally to the application frequency.




ed

Policy control for encapsulated data flows

Systems and methodologies are described that facilitate communicating encapsulation information for a related mobility protocol type utilized in communicating over a data flow with reduced specific implementation on the policy server to support different mobility protocol types. In this regard, encapsulation information can be transmitted to the policy server from a network gateway such that the policy server can forward the encapsulation information to a serving gateway along with policy rules related to a data flow type. The serving gateway can utilize the encapsulation information to detect and interpret the encapsulated data flow according to the policy rules. In this regard, the serving gateway can provide support (e.g., quality of service support) for the flow. The encapsulation information can relate to a mobility protocol type, an encapsulation header, an indication that encapsulation is required, parameters regarding locating an encapsulation header in a message, and/or the like.




ed

Printing device, mobile terminal, and computer readable recording medium for the same

A printing device includes a printing device side wireless communication unit configured to execute wireless communication with a mobile terminal, an operation acquisition unit configured to acquire user operation thereof, and a processor. The processor is configured to acquire operation data which is generated as the operation acquisition unit acquires a user operation, acquire establishment data which is generated as the printing device side wireless communication unit establishes a wireless communication with the mobile terminal, and issue a request control to control the printing device side wireless communication unit to transmit request data requesting the mobile terminal to transmit print data necessary for printing, via the wireless communication, when the establishment data is acquired, the request control being issued in accordance with the operation data as acquired.




ed

User initiated rule-based restrictions on messaging applications

A method, system and computer program product are disclosed for user initiated rule based restrictions on sending messages from a sender to a receiver in a communications network. The receiver establishes a set of rules for the sender that allows the sender a limited number of defined messages events with the receiver. The defined message events may be messages or message sessions. When the sender attempts to send a message to the receiver, it is determined whether a message session currently exists between the sender and the receiver. If a current session exists, the rules set by the receiver are used to determine if the message is allowed to be sent to the receiver. If a session does not currently exist, the rules are used to determine whether a new session is allowed. If a new message session is allowed, a new session is established, and the message is sent to the receiver during the new session.




ed

Trivial file transfer protocol (TFTP) accelerated file retry option

A method of transferring data using a Trivial File Transport Protocol (TFTP) includes sending first request packet from client to server, first request packet requesting that first file be transferred; transferring first file according to first request packet if first acknowledgement packet is received at client from server indicating that server can accommodate request of first request packet; sending second request packet from client to the server if transfer of first file does not complete successfully, the second request packet including TFTP option indicating that transfer of first file be retried beginning at first block after final block that was successfully transferred in response to first request packet; and retrying transfer of first file according to second request packet if second acknowledgement packet is received at client from server indicating that server can accommodate request of second request packet.




ed

Inferring causal paths in a distributed computing environment

According to one embodiment, a method comprises evaluating messages between nodes of a distributed computing environment. Based on timing relationships of the messages, probability of causal links between pairs of messages determined. Based on the determined probability, at least one causal path comprising a plurality of causal links is inferred. Further, an overall probability that the inferred causal path is accurate is determined. In certain embodiments, the overall probability is output for the corresponding causal path to provide an indication of the confidence of the accuracy of such inferred causal path.




ed

Software-based aliasing for accessing multiple shared resources on a single remote host

In order to allow a single user registered on a single local host or other machine to access multiple shared resources on a remote host, an aliasing mechanism is employed so that multiple concurrent connections can be established by the user to a single remote host, with each connection using a different identity. Each connection can therefore be used to access a different shared resource on the remote host. In some illustrative examples, a user's identifier such as his or her machine log-in identification may be associated with two or more resource sharing aliases. As a result, two or more resource sharing sessions can be established by the user with a single remote host, with each of the sessions using a different one of the aliases. The resource sharing sessions are usually established in accordance with a resource sharing protocol such as the Server Block Message (SBM) protocol.




ed

Methods and apparatus to determine impressions using distributed demographic information

An example method to monitor media exposure involves receiving, at a first internet domain, a first request from a client computer, the first request indicative of access to the media at the client computer. The example method also involves determining if the client computer is known. If the client computer is not known, a response is sent from the first internet domain to the client computer, the response to instruct the client computer to send a second request to a second internet domain, the second request to be indicative of access to the media at the client computer. If the client computer is known, an impression of the media is logged.




ed

Watch case including a sintered caseband

The watch case of this invention includes a caseband (2) made from sintered material and a back cover (10) secured to the caseband by means of at least two pins (12). Each pin passes through a first hole (14) provided in a first projection (16) formed in the caseband and two second holes (13, 15) provided respectively in two second projections (17, 18) formed in the back cover, said second projections being arranged respectively on either side of said first projection. Each pin being axially retained in its holes by the elastic effect provided by the seal when the caseband lies on the back cover.




ed

Calendar watch having a centrally pivoted date indicator

A calendar watch includes a central date indicator (4). The indicator is united with a crown wheel (9) comprising teeth (11) forming a circular crown (12) arranged to be perpendicular to a face (13) of said wheel. The teeth (12) are driven by a finger (14) rotating in a plane intersecting said crown in its height. The finger is united with a date driving wheel (15). The invention permits easy transformation of a watch having its date display in a dial aperture to a watch having a date indicator rotating about the center of the movement.




ed

System and process for VCR scheduling

A VCR schedule controller receives broadcast data over antenna (1) or cable (2) by a programmable tuner (3), which is connected to a teletext receiver (4). The teletext receiver (4) is connected to a microprocessor (5). Microprocessor output (11) is connected to a video display generator (10), used to create text for television receiver (60) to display a message from the microprocessor (5). After processing embedded data in a broadcast, the microprocessor (5) generates a cue for display on TV receiver (60). Remote control receiver (20) receives a command from a remote controller (22) from a viewer input in response to the cue. Remote control receiver (20) supplies a control signal to cause the microprocessor to store the embedded data in memory (9). The microprocessor then issues a message to the display generator (10) as an acknowledgement of the viewer input. The microprocessor (5) monitors the system clock (6) and compares it with stored schedules from the embedded supplemental data. When the system time corresponds to one of the scheduled times, the microprocessor (5) sets the programmable tuner (3) to the stored channel and initiates recording on VCR (30).




ed

Watch case provided with a cap of hard material

A cap (2) is made of sintered hard metal and has on the inside a cylindrical surface (20) and a frusto-conical surface (21) that are true ground. The cap's cylindrical surface (20) is fitted with radial play around an outer cylindrical surface (9) of an underlying middle (1) and the cap's frusto-conical surface (21) has the same inclination as a subjacent frusto-conical surface (14) on the outside of the middle. The cap (2) and the middle (1) are secured to one another by a ring of deformable material sandwiched between their cylindrical surfaces (9, 20). On the outside the cap (2) is formed over its thicker main portion (18) with a trued and polished surface (22) having the same inclination as its inside frusto-conical surface (21) such as to provide the thicker portion (18) with a parallelogrammatic cross-section.




ed

Time-locked cigarette case

A time-locked cigarette case has time-controlled locking mechanism which is manually adjustable by the user and also has a first latch rod which normally retains the case in a closed condition and a second latch rod which moves to retain the case in a closed condition if the first latch rod is jolted to an open position so as to prevent the case from being opened by jolting before the manually set time delay has expired.




ed

Radio paging selective receiver with display for notifying presence of unread message based on time of receipt

A radio paging selective receiver determines that a received message is unread based on the time difference between the message reception time and the current time being larger that some predetermined value of time, and the paging selective receiver provides an indication of the unread message by displaying the reception time of the unread message in a second fashion which is visibly different from a first fashion normally used to display the current time.




ed

Electronic postage meter system having plural clock system providing enhanced security

A system includes a system time counter associated with a micro controller and a secure clock module having a real time clock and an elapsed time counter. The system synchronizes operation between the secure clock module and the system time counter. The synchronized time entered into the system time counter is utilized in the operation of the system. The real time clock time can be caused to be entered into the elapsed time counter at certain point in the operation of the system. The relationship of the time provide enhanced systems security.




ed

Combined table lamp and clock assembly

A combined table lamp and clock assembly includes a lamp unit and a clock unit. The lamp unit includes a lamp stand base, a lamp stand, and a lamp bulb holder. The lamp stand base has a top side formed with a cavity, and a bottom side adapted to be placed on a table top. The lamp stand extends uprightly from the lamp stand base, and has an upper end portion and a lower end portion that is mounted on the top side of the lamp stand base. The lamp bulb holder is mounted on the upper end portion of the lamp stand, and is adapted for mounting a lamp bulb thereon. The clock unit includes a clock base, an upright clock panel, and a clock mechanism. The clock base is received in the cavity in the top side of the lamp stand base, and is formed with an insert slot therethrough. The upright clock panel has a lower end formed with an insert portion that is inserted removably into the insert slot. The clock mechanism is mounted on the clock panel.




ed

Apparatus for measuring intervals between signal edges

An apparatus for measuring a time interval between a start signal edge and a stop signal edge provides a stable clock signal as input to a delay line formed by a series of similar logic gates. The output signal of the last gate of the series is phase locked to the clock signal by adjusting a bias signal controlling the switching speed of all gates. The clock signal and the output signal of each gate form a set of phase distributed periodic timing signals applied to a start time measurement unit (TMU) and a similar stop TMU. The start TMU counts edges of one of the timing signals occurring between an edge of an arming signal and the start signal edge and generates output data representing a time delay between the arming signal and the start signal edge. The data represents the start delay as a whole and fractional number of clock signal periods by conveying the counter output and by indicating which of the timing signals had an edge most closely following the start signal edge. The stop TMU similarly produces output data indicating a whole an fractional number of clock cycles occurring between the arming signal and the stop signal edge. The delay represented by the start TMU output data is subtracted from the delay represented by the stop TMU output data to determine the interval between the start and stop signal edges.




ed

Multilevel network for distributing trusted time and delegating levels of trust regarding timekeeping

A network is described for providing estimates of the current time. The network includes multiple computer systems each configured to provide an estimate of the current time in response to a received request. The computer systems are logically arranged to form a hierarchical structure, wherein the hierarchical structure includes multiple levels ranked with respect to one another. Each of the computer systems is assigned one of multiple levels of trust, and occupies one of the levels of the hierarchical structure dependent upon the assigned level of trust. The level of trust assigned to a given computer system is dependent upon a timekeeping dependability of the given computer system. The assigned level of trust may also be dependent upon a timekeeping security of the given computer system, where the timekeeping security is dependent upon a tamper resistance of the time clock of the given computer system. Methods for delegating a level of trust to a new computer system (i.e., a computer system not part of the network) and for adding a new computer system to the network are also described.




ed

Method and device for synchronizing integrated circuits

A method and device for synchronizing the time between at least two integrated circuits (201, 202), which receive the same pulse signal. In the integrated circuits (201, 202) a counter (204, 206) is used to count the number of pulses in the received pulse signal to synchronize the common time between said integrated circuits.




ed

Portable self contained light generating device powered by a flow of falling granular material

A portable self contained light generating device which is powered by a flow of granular material falling under the influence of gravity to impinge upon and cause a paddle wheel to rotate thereby turning a small generator producing electricity to power one or more light emitting diodes for illumination. The device equipped with a multi-position power/illumination control switch and in some embodiments also provided with a battery providing supplemental power.




ed

Moon phase menstrual tracking and educational system

A system and method for tracking and informing about a physical, emotional, or physiological cycle, such as a menstrual cycle, includes at least one definition entry and at least one date indicator. Each definition entry defines indicia such as color to represent a stage of a physical, emotional, or physiological cycle. Each date indicator includes a date section and a tracking section corresponding to each date section. The date section of the date indicator indicates at least one date, wherein the tracking section is capable of being marked so as to indicate indicia corresponding to a definition entry to signify the stage of the physical, emotional, or physiological cycle for each date. According to one embodiment, the date indicators are arranged according to phases of the moon to allow correlation of a user's cycle to the lunar cycle.




ed

Coupled resonator for regulating system

The coupled resonator comprises a first low frequency resonator, such as a balance spring (1) and a second higher frequency resonator, such as a tuning fork (2), the two resonators (1 and 2) including permanent mechanical coupling means. Application to the regulating system of a timepiece.




ed

Microelectronic machine-based ariable

A tunable resonator is provided that has a high Q for each resonate frequency. The tunable resonator is a MEMs tunable resonator wherein the tuner is affected by moving a moveable mass, associated with the resonating portion of the resonator, form a first position to a second position such that the moveable mass is held in the first position or second position by a detent rather than a constant electromagnet magnetic or electrostatic force applied thereon.




ed

Virtualized data storage in a network computing environment

Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device.




ed

Adjustment of the number of task control blocks allocated for discard scans

A controller receives a request to perform a release space operation. A determination is made that a new discard scan has to be performed on a cache, in response to the received request to perform the release space operation. A determination is made as to how many task control blocks are to be allocated to the perform the new discard scan, based on how many task control blocks have already been allocated for performing one or more discard scans that are already in progress.




ed

Distributed cache coherency protocol

Systems, methods, and other embodiments associated with a distributed cache coherency protocol are described. According to one embodiment, a method includes receiving a request from a requester for access to one or more memory blocks in a block storage device that is shared by at least two physical computing machines and determining if a caching right to any of the one or more memory blocks has been granted to a different requester. If the caching right has not been granted to the different requester, access is granted to the one or more memory blocks to the requester.




ed

Memory system with fixed and variable pointers

A memory system includes a volatile first storing unit, a nonvolatile second storing unit, and a controller. The controller performs data transfer, stores management information including a storage position of the data stored in the second storing unit into the first storing unit, and performs data management while updating the management information. The second storing unit has a management information storage area for storing management information storage information including management information in a latest state and a storage position of the management information. The storage position information is read by the controller during a startup operation of the memory system and includes a second pointer indicating a storage position of management information in a latest state in the management information storage area and a first pointer indicating a storage position of the second pointer. The first pointer is stored in a fixed area in the second storing unit and the second pointer is stored in an area excluding the fixed area in the second storing unit.




ed

System cache with quota-based control

Methods and apparatuses for implementing a system cache with quota-based control. Quotas may be assigned on a group ID basis to each group ID that is assigned to use the system cache. The quota does not reserve space in the system cache, but rather the quota may be used within any way within the system cache. The quota may prevent a given group ID from consuming more than a desired amount of the system cache. Once a group ID's quota has been reached, no additional allocation will be permitted for that group ID. The total amount of allocated quota for all group IDs can exceed the size of system cache, such that the system cache can be oversubscribed. The sticky state can be used to prioritize data retention within the system cache when oversubscription is being used.




ed

Dispersed storage unit and method for configuration thereof

A dispersed storage (DS) unit for use within a dispersed storage network is capable of self-configuring using registry information provided to the DS unit. The registry information includes a slice name assignment indicating a range of slice names corresponding to a plurality of potential data slices of potential data objects to be stored in the DS unit. Based on the registry information, the DS unit allocates a portion of physical memory to store the potential data slices.




ed

Management of multiple software images with shared memory blocks

A data processing entity that includes a mass memory with a plurality of memory locations for storing memory blocks. Each of a plurality of software images includes a plurality of memory blocks with corresponding image addresses within the software image. The memory blocks of software images stored in boot locations of a current software image are relocated. The boot blocks of the current software image are stored into the corresponding boot locations. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations, thereby loading the access function. Each request to access a selected memory block of the current software image is served by the access function, with the access function accessing the selected memory block in the associated memory location provided by the control structure.




ed

Decentralized caching system

In a satellite communication system comprising at least a hub and a plurality of terminals, at least one terminal may include a cache for storing data objects. The cache may be based on a detachable memory device that may be inserted to or removed from the terminal at any given time, including after the terminal is deployed. Aspects are directed to preventing a prefetching of objects already stored in a cache of a remote terminal. In some embodiments, an efficient multicasting of content to terminals over an adaptive link may occur in a manner which may benefit terminals comprising a cache while not affecting or minimally affecting the performance of terminals that may not include a cache.




ed

Using extended asynchronous data mover indirect data address words

An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory.




ed

Using extended asynchronous data mover indirect data address words

An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory.




ed

Method and system for dynamic distributed data caching

A method and system for dynamic distributed data caching is presented. The system includes one or more peer members and a master member. The master member and the one or more peer members form cache community for data storage. The master member is operable to select one of the one or more peer members to become a new master member. The master member is operable to update a peer list for the cache community by removing itself from the peer list. The master member is operable to send a nominate master message and an updated peer list to a peer member selected by the master member to become the new master member.




ed

Substituted 1-benzylcycloalkylcarboxylic acids and the use thereof

The present application relates to novel substituted 1-benzylcycloalkylcarboxylic acid derivatives, to processes for their preparation, to their use for the treatment and/or prevention of diseases, and to their use for producing medicaments for the treatment and/or prevention of diseases, especially for the treatment and/or prevention of cardiovascular disorders.




ed

Substituted 3-phenylpropionic acids and the use thereof

The present application relates to novel 3-phenylpropionic acid derivatives, to processes for their preparation, to their use for the treatment and/or prevention of diseases and to their use for preparing medicaments for the treatment and/or prevention of diseases, in particular for the treatment and/or prevention of cardiovascular disorders.




ed

Deep-ultraviolet chemically-amplified positive photoresist

The invention discloses a deep-ultraviolet chemically-amplified positive photoresist. The deep-ultraviolet chemically-amplified positive photoresist according to one embodiment of the invention includes a cyclopentenyl pimaric acid, a divinyl ether, a photoacid generator and an organic solvent. The deep-ultraviolet chemically-amplified positive photoresist according to the invention has a good sensitivity and a good transparency.




ed

Bio-based terephthalate polyesters

Bio-based terephthalic acid (bio-TPA), bio-based dimethyl terephthalate (bio-DMT), and bio-based polyesters, which are produced from a biomass containing a terpene or terpenoid, such as limonene are described, as well as the process of making these products. The bio-based polyesters include poly(alkylene terephthalate)s such as bio-based poly(ethylene terephthalate) (bio-PET), bio-based poly(trimethylene terephthalate) (bio-PTT), bio-based poly(butylene terephthalate) (bio-PBT), and bio-based poly(cyclohexylene dimethyl terephthalate) (bio-PCT).




ed

Methanol carbonylation process with rhodium catalyst and a metallic co-catalyst selected from transition metals, zinc, beryllium, indium, tin, strontium and barium

A carbonylation process for making acetic acid using a metallic co-catalyst composition, effective as a rhodium stabilizer and/or rate promoter, at molar ratios of metal/rhodium of about 0.5 to 40. The process includes reacting methanol with carbon monoxide in the presence of a rhodium-based catalytic metal complex with about 1 to 20 weight percent methyl iodide, less than about 8 weight % water and about 0.5 to about 30 weight percent methyl acetate. The crude acetic acid is flashed and further purified.




ed

Method for the conversion of methylmercaptopropionaldehyde formed from crude acrolein and crude methyl mercaptan

A reactive rectification column suitable for the production of 2-hydroxy-4-methylmercaptobutyric acid and/or methionine contains a weir having a height of 100 mm or more.




ed

Method for preparing high purity mono-hydrolyzed acyl halide compound

A method for preparing a high purity (e.g. greater than 70 wt. %) mono-hydrolyzed acyl halide compound as a precipitate from solution comprising the steps of preparing a solution comprising: i) at least 80 v/v % of a hydrocarbon solvent, ii) water at a molar concentration greater than its solubility limit within the solvent but less that its solubility limit in solution, iii) a tri-hydrocarbyl phosphate compound, and iv) a polyfunctional acyl halide compound at molar ratio to both water and the tri-hydrocarbyl phosphate compound of at least 1:1.




ed

Modified carbon material and process of making and using the same

A method of making modified carbon materials for use in fabricating fuel cell components. The modified carbon may comprise pendant fluorocarbon groups bonded covalently bonded thereto. In one embodiment, a mixture is formed and comprises carbon material suitable for use in a fuel cell component, an organic solvent, a compound having the general formula I—R wherein R is a fluorocarbon, and a reductant.