k

Multilevel network for distributing trusted time and delegating levels of trust regarding timekeeping

A network is described for providing estimates of the current time. The network includes multiple computer systems each configured to provide an estimate of the current time in response to a received request. The computer systems are logically arranged to form a hierarchical structure, wherein the hierarchical structure includes multiple levels ranked with respect to one another. Each of the computer systems is assigned one of multiple levels of trust, and occupies one of the levels of the hierarchical structure dependent upon the assigned level of trust. The level of trust assigned to a given computer system is dependent upon a timekeeping dependability of the given computer system. The assigned level of trust may also be dependent upon a timekeeping security of the given computer system, where the timekeeping security is dependent upon a tamper resistance of the time clock of the given computer system. Methods for delegating a level of trust to a new computer system (i.e., a computer system not part of the network) and for adding a new computer system to the network are also described.




k

Moon phase menstrual tracking and educational system

A system and method for tracking and informing about a physical, emotional, or physiological cycle, such as a menstrual cycle, includes at least one definition entry and at least one date indicator. Each definition entry defines indicia such as color to represent a stage of a physical, emotional, or physiological cycle. Each date indicator includes a date section and a tracking section corresponding to each date section. The date section of the date indicator indicates at least one date, wherein the tracking section is capable of being marked so as to indicate indicia corresponding to a definition entry to signify the stage of the physical, emotional, or physiological cycle for each date. According to one embodiment, the date indicators are arranged according to phases of the moon to allow correlation of a user's cycle to the lunar cycle.




k

Lighter and method for eliminating smoking that includes interactive self-learning software

Smoking cessation lighter is configured for lighting cigarettes for a smoker, and learning software is provided for monitoring smoking behavior of a smoker during a first data collection period and guiding a smoker's smoking cessation by directing the smoker when the smoker is to smoke a cigarette based on data collected during the first data collection period. The learning software monitors user behavior and collects data during use of the lighter by the smoker after the initial data collection period in order to analyze and further guide the smoker based on the smoker's cheating behavior, the smoker's behavior of lighting a cigarette for a friend, and the smoker's behavior of skipping use of the lighter at a time when the smoker has been directed to light a cigarette by the lighter.




k

Writing of new data of a first block size in a raid array that stores both parity and data in a second block size

A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size.




k

Writing of new data of a first block size in a raid array that stores both parity and data in a second block size

A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size.




k

Virtualized data storage in a network computing environment

Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device.




k

Adjustment of the number of task control blocks allocated for discard scans

A controller receives a request to perform a release space operation. A determination is made that a new discard scan has to be performed on a cache, in response to the received request to perform the release space operation. A determination is made as to how many task control blocks are to be allocated to the perform the new discard scan, based on how many task control blocks have already been allocated for performing one or more discard scans that are already in progress.




k

Optimizing a cache back invalidation policy

A method, a system and a computer program product for enhancing a cache back invalidation policy by utilizing least recently used (LRU) bits and presence bits in selecting cache-lines for eviction. A cache back invalidation (CBI) utility evicts cache-lines by using presence bits to avoid replacing a cache-line in a lower level cache that is also present in a higher level cache. Furthermore, the CBI utility selects the cache-line for eviction from an LRU group. The CBI utility ensures that dormant cache-lines in the higher level caches do not retain corresponding presence bits set in the lower level caches by unsetting the presence bits in the lower level cache when a line is replaced in the higher level cache. Additionally, when a processor core becomes idle, the CBI utility invalidates the corresponding higher level cache by unsetting the corresponding presence bits in the lower level cache.




k

Block memory engine with memory corruption detection

Techniques for handling version information using a copy engine. In one embodiment, an apparatus comprises a copy engine configured to perform one or more operations associated with a block memory operation in response to a command. Examples of block memory operations may include copy, clear, move, and/or compress operations. In one embodiment, the copy engine is configured to handle version information associated with the block memory operation based on the command. The one or more operations may include operating on data in a cache and/or modifying entries in a memory. In one embodiment, the copy engine is configured to compare version information in the command with stored version information. The copy engine may overwrite or preserve version information based on the command. The copy engine may be a coprocessing element. The copy engine may be configured to maintain coherency with other copy engines and/or processing elements.




k

Method and apparatus for optically backing up data

An optical backup apparatus is provided and includes an optical storage device, an interface module to connect with at least one type of external storage medium, and a control unit to back up data from the external storage medium to the optical storage device in response to an external remote control operation.




k

Moving blocks of data between main memory and storage class memory

An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory.




k

Automatically preventing large block writes from starving small block writes in a storage device

A mechanism is provided in a storage device for performing a write operation. The mechanism configures a write buffer memory with a plurality of write buffer portions. Each write buffer portion is dedicated to a predetermined block size category within a plurality of block size categories. For each write operation from an initiator, the mechanism determines a block size category of the write operation. The mechanism performs each write operation by writing to a write buffer portion within the plurality of write buffer portions corresponding to the block size category of the write operation.




k

Management of multiple software images with shared memory blocks

A data processing entity that includes a mass memory with a plurality of memory locations for storing memory blocks. Each of a plurality of software images includes a plurality of memory blocks with corresponding image addresses within the software image. The memory blocks of software images stored in boot locations of a current software image are relocated. The boot blocks of the current software image are stored into the corresponding boot locations. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations, thereby loading the access function. Each request to access a selected memory block of the current software image is served by the access function, with the access function accessing the selected memory block in the associated memory location provided by the control structure.




k

Chaining move specification blocks

An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory.




k

Chaining move specification blocks

An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory.




k

Substituted 1-benzylcycloalkylcarboxylic acids and the use thereof

The present application relates to novel substituted 1-benzylcycloalkylcarboxylic acid derivatives, to processes for their preparation, to their use for the treatment and/or prevention of diseases, and to their use for producing medicaments for the treatment and/or prevention of diseases, especially for the treatment and/or prevention of cardiovascular disorders.




k

α-keto alkylperacids and methods for producing and using the same

The present invention provides α-keto alkylperacids and methods for producing and using the same. In particular, α-keto alkylperacids are useful as antimicrobial agents.




k

Ammonium fluoroalkanesulfonates and a synthesis method therefor

An ammonium hydroxyfluoroalkanesulfinate is obtained by using an organic base while sulfinating a bromofluoroalcohol with a sulfinating agent. An ammonium hydroxyfluoroalkanesulfonate is obtained by oxidizing the ammonium hydroxyfluoroalkanesulfinate. An onium fluoroalkanesulfonate is obtained by converting the ammonium hydroxyfluoroalkanesulfonate into an onium salt through esterification. This onium fluoroalkanesulfonate is useful as a photoacid generator in chemically amplified resists and the like.




k

L-ornithine phenyl acetate and methods of making thereof

Disclosed herein are forms of L-ornithine phenyl acetate and methods of making the same. A crystalline form may, in some embodiments, be Forms I, II, III and V, or mixtures thereof. The crystalline forms may be formulated for treating subjects with liver disorders, such as hepatic encephalopathy. Accordingly, some embodiments include formulations and methods of administering L-ornithine phenyl acetate.




k

Modified carbon material and process of making and using the same

A method of making modified carbon materials for use in fabricating fuel cell components. The modified carbon may comprise pendant fluorocarbon groups bonded covalently bonded thereto. In one embodiment, a mixture is formed and comprises carbon material suitable for use in a fuel cell component, an organic solvent, a compound having the general formula I—R wherein R is a fluorocarbon, and a reductant.




k

Process for the (AMM)oxidation of lower molecular weight alkanes and alkenes

A process for producing unsaturated carboxylic acids or unsaturated nitriles by vapor phase oxidation reaction of their corresponding C3 to C5 alkanes, C3 to C5 alkenes, and mixtures thereof, as a hydrocarbon starting material, wherein the process performance is monitored and the path of gasses through catalyst beds is altered. Improved catalyst lifetimes may be achieved.




k

Antisense oligonucleotides for inducing exon skipping and methods of use thereof

An antisense molecule capable of binding to a selected target site to induce exon skipping in the dystrophin gene, as set forth in SEQ ID NO: 1 to 202.




k

Process for manufacturing partially cross-linked alginate solution

Described is a microfluidic process for manufacturing partially cross-linked alginate solution, wherein the alginate solution is a homogenous liquid which exhibits an elastic response (G') which is equal to or greater than its viscous response (G″). In particular, the process may comprise microfluidic mixing of sodium alginate and calcium gluconate solutions to provide an injectable partially cross-linked alginate solution.




k

RNA antagonists targeting GLI2 for the treatment of leukemia

The present invention relates to oligomer compounds (oligomers) for the treatment and prevention of acute myeloid leukemia, which target GLI2 mRNA in a cell, leading to reduced expression of GLI2.




k

Synthesis and identification of novel RSK-specific inhibitors

A composition comprising an SL0101 [kaempferol 3-O-(3″,4″-di-O-acetyl-α-L-rhamnopyranoside)] derivative compound that has enhanced ability to inhibit RSK activity, relative to the parent compound is provided. The compounds have utility for treating any disease or conditions characterized or associated with excess or undesirable RSK activity. For example the RSK inhibitors of the present invention can be used to reduce the proliferation of neoplastic cells or for inhibiting the establishment or maintenance of an intracellular pathogenic infection by pathogens whose pathogenicity derives in part from the pathogen's ability to impede endosomal/phagosomal maturation in the host cell.




k

Method for producing cationized cellulose and method for producing cationized hydroxyalkyl cellulose

A production method of a cationized cellulose or a cationized hydroxyalkylcellulose, including step 1 for adding a cationizing agent to cellulose and mechanically decrystallizing the cellulose and step 2 for adding a basic compound to the mixture obtained in step 1 and mechanically decrystallizing the cellulose, or a production method of a cationized cellulose or a cationized hydroxyalkylcellulose, including a step 3 for adding a basic compound to cellulose and mechanically decrystallizing the cellulose and step 4 for adding a cationizing agent to the mixture obtained in step 3 and mechanically decrystallizing the cellulose. The cellulose and the cationizing agent are allowed to react with each other in step 2 or step 4.




k

Coating agent comprising hydroxyalkyl cellulose

A coating agent containing a hydroxyalkyl cellulose in which a content of hydroxyalkoxy groups within the hydroxyalkyl cellulose is within a range of 40 to 50% by mass, preferably a coating agent containing a hydroxyalkyl cellulose in which the content of hydroxyalkoxy groups is within a range of 40 to 50% by mass and also a viscosity of 2% aqueous solution at 20° C. is within a range of 3.0 to 5.9 mPa·s; and a solid preparation coated with the coating agent.




k

Implementing security measures for authorized tokens used in mobile transactions

Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user.




k

Efficient storage of encrypted data in a dispersed storage network

A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored.




k

Drawing power over network cable

A source device to provide power through a network cable and a user device is to draw power from the network cable. A database is to store a parameter associated with the user device. The source device is to access the stored parameter based on receipt of information related to the user device and is to compare at least one of a current power drawn and an additional power requested by the user device to a power limit of the user device based on the accessed parameters. The source device is to send a power message to the user device based on the comparison, the power message to relate to an amount of the power the user device is to draw.




k

Resolution programmable dynamic IR-drop sensor with peak IR-drop tracking abilities

A data processing system on an integrated circuit includes a core that performs switching operations responsive to a system clock that draws current from the power supply network. An IR-drop detector includes a resistor ladder having outputs representative of an IR-drop caused by the core during the switching operations. The system further includes a plurality of amplifiers coupled to the outputs indicative of the IR-drop, a plurality of flip-flops coupled to the amplifiers, and a variable clock generator. The variable clock generator outputs a sampling clock comprising a group consisting of a variable phase or a variable frequency to the plurality of flip-flops. The flip-flops are triggered by the sampling clock so that the IR-drop at a time during a clock cycle of the system clock can be detected, and the peak IR-drop value for can be tracked.




k

Power-saving network management server, network system, and method of determining supply of power

A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result.




k

Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal

Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component.




k

Network security appliance

Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server connected to a data network, from packets addressed to a networked device. The method further includes managing, by the security device, packets between the networked device and other devices accessible through a network based upon the configuration data. The method further includes sending, by the security device, a plurality of encrypted heartbeat messages to the management server utilizing an address associated with the networked device as the originating address for packets in which the encrypted heartbeat messages are transmitted.




k

Method and apparatus for rejecting untrusted network

A method of accessing a communication system and a communication device for performing the same are disclosed. The method includes transmitting, by a communication device to a node of a communication system through a communication link between the communication device and the node, a request to negotiate basic capabilities for communicating with the node, receiving, by the communication device from the node, a response to the request to negotiate basic capabilities, and, transmitting, by the communication device to the node, a request to disconnect the communication link, when the response to the request to negotiate basic capabilities indicates that the node does not support authentication.




k

Contactless authentication of optical disk drives

An optical disc drive (ODD) includes a radio-frequency identification (RFID) reader. The reader includes a circuit and a coil antenna which has a rotational symmetry with respect to a rotation axis of a motor, shaft and turntable of the ODD. The coil antenna can be secured to a wall of a housing of the ODD or around the motor and/or shaft. The reader can read an RFID tag on an optical disc. The RFID tag includes a circuit and a coil antenna which has a rotational symmetry with respect to the disc. As a result, the RFID tag can be read while the disc is rotating. A magnetic insulating material such as a ferrite polymer composite film is used to magnetically insulate the coil antenna. An authentication code can be read from the RFID tag to control access to content of the optical disc.




k

Enabling web page tracking

Methods are provided for tracking data corresponding to a mobile device that accesses a web page. Once a mobile device is registered with a network, the mobile device is instructed to request permission before accessing a web page. An access request is received, and based on a user profile, the access request is approved such that the mobile device may access the web page. Access data that corresponds to the mobile device accessing the web page is collected so that it can be added to and stored in a database.




k

Method of processing data to enable external storage thereof with minimized risk of information leakage

A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk.




k

Monitoring or feedback systems and methods

The present invention generally relates to systems and methods for monitoring and/or providing feedback for drugs or other pharmaceuticals taken by a subject. In one aspect, the present invention is directed to devices and methods for determining a species within the skin of a subject; and producing feedback to a subject based on the determination of the species. The feedback may be, for example, visual, audible, tactile, a change in temperature, etc. In some cases, information regarding the determination of the species may be transmitted to another entity, e.g., a health care provider, a computer, a relative, etc., which may then provide feedback to the subject in some fashion. In some cases, the feedback may be directly indicative of the species, e.g., whether the species is present, the concentration of the species, whether a by-product of a reaction involving the species is present, whether a compound affected by the species is present, etc. However, the feedback may also be indirect in some embodiments. For example, the subject may be presented with an external reward, e.g., based on the determination of the species within the skin. For instance, a reward such as cash, coupons, songs, discounts, personal items, etc., may be offered based on the level of compliance of the subject. Still other aspects of the invention are generally directed to kits involving such devices (with or without the drug to be monitored), methods of promoting such systems, or the like.




k

Biopsy marker with in situ-generated imaging properties

An intracorporeal marker, for marking a site within living tissue of a host, includes an outer body portion of biodegradable material. An inner body portion is located in the outer body portion. The inner body portion includes biological material that becomes calcified in the living tissue of the host over time. An agent interacts with the biological material to promote calcification of the biological material of the inner body portion in the living tissue of the host.




k

Pain judging device to judge pain based on a frequency component of a peak-relevant value

A peak-relevant value device acquires a peak-relevant value (for example, the peak value of an R wave (R peak value)) every cycle from an electrocardiogram acquired. The frequencies of the peak-relevant value acquired as time-series data and the magnitudes for the respective frequencies are analyzed. A peak-relevant value LF calculating device calculates an LF component (peak-relevant value LF component) from the frequency component of the peak-relevant value. An interval acquiring device acquires the interval between characteristic points of the electrocardiographic complex from the electrocardiogram acquired and the frequencies of the feature point interval acquired as time-series data to acquire the magnitudes of the respective frequency component are analyzed. An interval HF calculating device calculates the HF component from the frequency components of the feature point interval acquired and pain is judged on the basis of the variations of the peak-relevant value LF components and the interval HF components.




k

3D ultrasound system for intuitive displaying to check abnormality of object and method for operating 3D ultrasound system

Provided are a three-dimensional (3D) ultrasound system and a method for operating the 3D ultrasound system, which are capable of intuitively displaying the abnormality of an object by determining a grade by comparing measurement data obtained by measuring ultrasound data relating to the object and displaying the measurement data in a different way based on the determined grade.




k

Phenyl alkyl carbamate derivative compound and pharmaceutical composition containing the same

A phenyl alkyl carbamate derivative compound and a pharmaceutical composition containing the compound are provided. More specifically, the phenyl alkyl carbamate derivative compound and a pharmaceutically acceptable salt thereof, a composition for muscle relaxation containing the phenyl alkyl carbamate derivative compounds and/or pharmaceutically acceptable salt thereof as an active ingredient, and a method of muscle relaxation comprising administering a pharmaceutically effective amount of the phenyl alkyl carbamate derivative compound and/or a pharmaceutically acceptable salt thereof to a subject in need of to a subject in need of, are provided.




k

Method for working up distillation residues from isocyanate production

The present invention relates to a method for working up distillation, residues from isocyanate production in which monomeric isocyanate present in distillation residues is recovered by means of a spray-dry method and the overall yield of monomeric isocyanate is thus significantly increased.




k

Aryl ketone compounds and compositions for delivering active agents

The present invention provides aryl ketone compounds and compositions containing them which facilitate the delivery of active agents. The aryl ketone compounds have the formula or a salt thereof, where n=1 to 9, and R1 to R5 are independently hydrogen, C1 to C4 alkyl, C1 to C4 alkoxy, C2 to C4 alkenyl, halogen, hydroxyl, —NH—C(O)—CH3, or —O—C6H5.




k

Method for preparing alkyl lactate and a method for preparing lactamide using the same

This disclosure relates to a method for preparing alkyl lactate with high yield and high selectivity, comprising the step of reacting glycerol with water or alcohol in the presence of a catalyst. In addition, the present invention provides a method for efficiently preparing lactamide using the alkyl lactate.




k

Interpenetrating polymer networks derived from silylated triglyceride oils and polysiloxanes

A composition of matter comprising an interpenetrating polymer network of a combination of a silanol-containing polysiloxane phase and a silylated triglyceride oil phase. The two phases are mixed and covalently bound to each other via siloxane crosslinks. A method for producing interpenetrating polymer networks. The method comprises providing triglycerides from oils or fats and reacting the triglycerides with a reactive silane to form a silylated triglyceride oil. The silylated triglyceride oil and a silanol terminated polysiloxane are emulsified with water in a predetermined ratio. Thereafter, crosslinking agents are added and the water is removed from the emulsions providing siloxane crosslinks between the two intimately mixed immiscible phases.




k

Gaseous compositions comprising hydrogen fluoride and an alkylated ammonia derivative

A method of removing at least a portion of a silicon oxide material is disclosed. The silicon oxide is removed by exposing a semiconductor structure comprising a substrate and the silicon oxide to an ammonium fluoride chemical treatment and a subsequent plasma treatment, both of which may be effected in the same vacuum chamber of a processing apparatus. The ammonium fluoride chemical treatment converts the silicon oxide to a solid reaction product in a self-limiting reaction, the solid reaction product then being volatilized by the plasma treatment. The plasma treatment includes a plasma having an ion bombardment energy of less than or equal to approximately 20 eV. An ammonium fluoride chemical treatment including an alkylated ammonia derivative and hydrogen fluoride is also disclosed.




k

Method for the production of alkylphosphonic acids, esters, and salts by oxidizing alkylphosphonous acids, and use thereof

The invention relates to a method for producing monocarboxy-functionalized dialkylphosphinic acids, esters, and salts, characterized in that a) a phosphinic acid source (I) is reacted with olefins (IV) in the presence of a catalyst A to obtain an alkylphosphonous acid, the salt or ester (II) thereof, and b) the obtained alkylphosphonous acid, the salt or ester (II) thereof is reacted with an oxidizing agent or with an oxidizing agent and water or with oxygen and water in the presence of a catalyst B to obtain the alkylphosphonic acid derivative (III), wherein R1, R2, R3, R4 are identical or different from each other and independently represent, inter alia, H, C1-C18-alkyl, C6-C18-aryl, C6-C18-aralkyl, C6-C18-alkylaryl, X and Y are identical or different from each other and independently represent H, C1-C18-alkyl, C6-C18-aryl, C6-C18-aralkyl, C6-C18-alkylaryl, Mg, Ca, Al, Sb, Sn, Ge, Ti, Fe, Zr, Zn, Ce, Bi, Sr, Mn, Cu, Ni, Li, Na, K and/or a protonated nitrogenous base, and catalysts A and B are transition metals and/or transition metal compounds and/or catalyst systems composed of a transition metal and/or a transition metal compound and at least one ligand.




k

Nickel compositions for preparing nickel metal and nickel complexes

Nickel(II) compositions for use in manufacturing nickel metal (Ni(0)) compositions, and specifically to methods of making basic nickel carbonates used to produce nickel metal compositions are disclosed. By varying the molar ratios of carbonates and bicarbonates to nickel salts, the methods provide basic nickel carbonates that produce superior nickel metal-containing solids that are well-suited to forming nickel-ligand complexes with phosphorus-containing ligands. The phosphorus-containing ligands can be monodentate or bidentate phosphorus-containing ligands.