Patent application number | Description | Published |
20140361671 | COMPUTER INTERNAL ARCHITECTURE - An internal component and external interface arrangement for a cylindrical compact computing system is described that includes at least a structural heat sink having triangular shape disposed within a cylindrical volume defined by a cylindrical housing. A computing engine having a generally triangular shape is described having internal components that include a graphics processing unit (GPU) board, a central processing unit (CPU) board, an input/output (I/O) interface board, an interconnect board, and a power supply unit (PSU). | 12-11-2014 |
20140361893 | COMPUTER INPUT/OUTPUT INTERFACE - An internal component and external interface arrangement for a cylindrical compact computing system is described that includes at least a structural heat sink having triangular shape disposed within a cylindrical volume defined by a cylindrical housing. A computing engine having a generally triangular shape is described having internal components that include a graphics processing unit (GPU) board, a central processing unit (CPU) board, an input/output (I/O) interface board, an interconnect board, and a power supply unit (PSU). | 12-11-2014 |
20140362576 | COMPUTER ARCHITECTURE - An internal component and external interface arrangement for a cylindrical compact computing system is described that includes at least a structural heat sink having triangular shape disposed within a cylindrical volume defined by a cylindrical housing. A computing engine having a generally triangular shape is described having internal components that include a graphics processing unit (GPU) board, a central processing unit (CPU) board, an input/output (I/O) interface board, an interconnect board, and a power supply unit (PSU). | 12-11-2014 |
20150106638 | REDUCED ENERGY CONSUMPTION IN A COMPUTER SYSTEM THROUGH SOFTWARE AND HARDWARE COORDINATED CONTROL OF MULTIPLE POWER SUPPLIES - The embodiments discussed herein relate to systems, methods, and apparatus for controlling power consumption of a computing device in a standby or sleep mode. During the standby or sleep mode an external device can be plugged into the computing device. The external device can be provided power from a standby power supply until a determination is made as to whether a main power supply is operating. The determination can be based on comparing the output of the main power supply to an output of the standby power supply. If the main power supply is operating, a switch in the computing device can close to allow the main power supply to provide power to the external device. Moreover, in some embodiments, the switch can close based exclusively on a current demand of the external device from the standby power supply. | 04-16-2015 |
Patent application number | Description | Published |
20090005459 | NMDA receptor antagonists and their use in inhibiting abnormal hyperphosphorylation of microtubule associated protein tau - Aminocyclohexane and aminoalkylcyclohexane compounds, which are systemically-active as NMDA receptor antagonists, are effective in inhibiting abnormal hyperphosphorylation of microtubule associated protein tau, method of treating disorders resulting from or associated with abnormal hyperphosphorylation of microtubule associated protein tau, and pharmaceutical compositions comprising the same. | 01-01-2009 |
20100029572 | Neurotrophic Peptides - The present invention relates to a neurotrophic peptide having an amino acid sequence selected from the group consisting of VG-DGGLFEKKL (SEQ ID No. 1), EDQQVHFTPTEG (SEQ ID No. 2) and IPENEADGMPATV (SEQ ID NO. 3). | 02-04-2010 |
20100273196 | System and Method for Evaluating Blood-Neural Barrier Permeability - A system and method for evaluating blood-neural barrier permeability. Phospholipid liposomes are labeled with a fluorescent phospholipase A | 10-28-2010 |
20110160141 | Neurotrophic Peptides - The present invention relates to a neurotrophic peptide having an amino acid sequence of VGDGGLFEKKL (SEQ ID NO:1), EDQQVHFTPTEG (SEQ ID NO:2) or IPENEADGMPATV (SEQ ID NO:3), and comprising an adamantyl group at the C- and/or N-terminal end. | 06-30-2011 |
20120157537 | NMDA receptor antagonists and their use in inhibiting abnormal hyperphosphorylation of microtubule associated protein tau - Aminocyclohexane and aminoalkylcyclohexane compounds, which are systemically-active as NMDA receptor antagonists, are effective in inhibiting abnormal hyperphosphorylation of microtubule associated protein tau, method of treating disorders resulting from or associated with abnormal hyperphosphorylation of microtubule associated protein tau, and pharmaceutical compositions comprising the same. | 06-21-2012 |
20130143809 | NEUROTROPHIC PEPTIDES - The present invention relates to a neurotrophic peptide having an amino acid sequence of VGDGGLFEKKL (SEQ ID NO:1) and alternatively comprising an adamantyl group at the C- and/or N-terminal end. The neurotrophic peptide can rescue cognition, correct impairments in neural cell proliferation and synaptic plasticity, and thus address the cognitive defects associated with Down syndrome. | 06-06-2013 |
20130157946 | NEUROTROPHIC PEPTIDES - The present invention relates to a neurotrophic peptide having an amino acid sequence of VGDGGLFEKKL (SEQ ID NO: 1) and alternatively comprising an adamantyl group at the C- and/or N-terminal end. The neurotrophic peptide can rescue cognition, correct impairments in neural cell proliferation and synaptic plasticity, and thus address the cognitive defects associated with Alzheimer's disease. | 06-20-2013 |
20140018294 | NEUROGENIC BRAIN-DERIVED NEUROTROPHIC FACTOR PEPTIDES - Five tetra peptides corresponding to different active regions of brain derived neurotrophic factor (BDNF) that are neurotrophic and can modulate BDNF signaling in a partial agonist/antagonist way. The peptides offer a therapeutic approach to neural pathologies where BDNF levels are dysregulated. | 01-16-2014 |
20140357572 | NEUROTROPHIC PEPTIDES FOR THE TREATMENT OF TAUOPATHIES - Peptide 6 and in particular, Peptide 021, may be used to treat tauopathies, such as frontotemporal dementia with Parkinsonism linked to chromosome-17 (FTDP-17) tau, corticobasal degeneration, Pick disease, progressive supranuclear palsy, Guam Parkinsonism dementia complex, dementia pugilistica also known as traumatic encephalopathy or traumatic brain injury, ceroid neuronal lipofusinosis, Hallerworden Sptaz disease, Alzheimer's disease, and adults with Down syndrome. | 12-04-2014 |
20150252087 | TREATMENT OF BRAIN INJURY WITH A NEUROTROPHIC PEPTIDE - A neurotrophic peptide having the sequence VGDGGLFEKKL (SEQ ID NO: 1) may be used to help sustain local microenvironment after mild-to-moderate brain injury. Treatment with the peptide was shown to enhance differentiation of newly born progenitors in the dentate gyrus 30 days after injury and to promote neuronal maturation and survival that is not seen naturally after tramautic brain injuries. | 09-10-2015 |
Patent application number | Description | Published |
20110099247 | OBJECT-BASED COMPUTER SYSTEM MANAGEMENT - A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the ability to intuitively express the administrative intent in an information technology (IT) environment, and to act out the administrative intent based on the information gathered by the management system. Managed elements of an IT environment, such as, by way of example, hardware components, software applications, software updates, software distribution policies, configurations, settings, etc., may be expressed as MOs. Actions, such as, by way of example, detect, install/apply, remove, remediate, enumerate, etc., may be associated with the MOs. The management system manages the computer systems by deploying the appropriate MOs and their associated actions onto the computer systems, and performing the actions on the computer systems. | 04-28-2011 |
20140165051 | PROGRAM EXECUTION SERVICE WINDOWS - Techniques for guaranteeing that a software program is executed on a machine only during designated periods of time are provided. Service windows define time periods during which software programs targeted to execute on a machine are allowed to execute on the machine. On the machine, the service windows work in conjunction with a client process that is executing on the machine to guarantee execution of the software programs by the client process only during available service windows. | 06-12-2014 |
Patent application number | Description | Published |
20080201780 | Risk-Based Vulnerability Assessment, Remediation and Network Access Protection - A system administrator may define a vulnerability and vulnerability setting for the client machine and may associate a level of risk with the vulnerability. The client may assess the level of risk associated with the vulnerability setting on the client machine and may report data regarding the level of risk to the system administrator. | 08-21-2008 |
20080244071 | Policy definition using a plurality of configuration items - Policy definition using a plurality of configuration items is described. In one or more implementations, a plurality of policies is defined, each having a different combination of a plurality of configuration items. The policies are then implemented such that each of the clients is provided a respective amount of access to one or more resources based on compliance with applicable policies. | 10-02-2008 |
20090199175 | Dynamic Allocation of Virtual Application Server - A management system for virtual applications may deploy sets of virtual applications to many client devices, dynamically allocate virtual application servers to individual clients, manage updates to the virtual applications, and provide other high level management to deployments of virtual applications. A client device may include a virtual application management client that may communicate with a management server. The management client may add or remove virtual applications to the client device based on a policy received from the management server, and may query the management server to determine a currently available virtual application distribution server when a virtual application is requested. The management server may distribute and manage versions of applications across one or more virtual application distribution servers. | 08-06-2009 |
20090199178 | Virtual Application Management - A management system for virtual applications may deploy sets of virtual applications to many client devices by defining and distributing policies. The polices may define which client devices and/or users may permitted to access a virtual application from a server and how the virtual application may be used. A client device may include a virtual application management client that may communicate with a management server to retrieve and implement the policies. The management client may add or remove virtual applications to the client device based on a policy received from the management server. In some embodiments, policies may also be distributed and implemented on a virtual application server. | 08-06-2009 |
Patent application number | Description | Published |
20080281652 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR DETERMINING AN OPTIMAL INFORMATION TECHNOLOGY REFRESH SOLUTION AND ASSOCIATED COSTS - A method, system and program product for determining an optimal information technology refresh solution and associated costs for implementing the information technology refresh solution in a business. The method includes deploying on a computer system an information technology refresh solution tool that is configured to determine an optimal information technology refresh solution based on business-technical data and/or business rules stored in a data repository. The method further includes updating the stored business-technical data and/or business rules based on one or more business-technical requirements, including any existing business constraints and any prospective business constraints and prioritizing the business-technical data updated to determine the optimal information technology refresh solution, such that, the optimal information technology refresh solution determined can be implemented in the business. Further, the method includes calculating, using the information technology refresh solution tool, an estimation of operational costs for implementing the optimal information technology refresh solution determined. | 11-13-2008 |
20090076990 | METHOD AND SYSTEM FOR AUTOMATICALLY CONTROLLING IN-PROCESS SOFTWARE DISTRIBUTIONS - A method and system for controlling an in-process software distribution to computing devices. A time of a disturbance in an environment of a computing device is predicted based on a change in a pressure exerted on the computing device. A checkpoint in a time interval of a distribution of a set of software upgrade increments to the computing device is automatically determined. The checkpoint is prior to the time of the disturbance. The determination of the checkpoint utilizes length(s) of increment(s) of the set of increments. Prior to the checkpoint, the computing device receives the increment(s). The computing device requests an interruption of the distribution beginning at the checkpoint. In one embodiment, the computing device is a buoy-like energy capture and generation device. | 03-19-2009 |
20110010343 | OPTIMIZATION AND STAGING METHOD AND SYSTEM - An optimization method and system. The method includes receiving by a computing system a data footprint associated with data and a human resource model. The data footprint comprises a primary data section, a secondary data section, and an archive data section. A plurality of data storage strategies are associated with the primary data section, said secondary data section, and said archive data section. The plurality of data storage strategies are compared to each other. A data staging orchestrator software module is executed. The computing system determines based on results of executing the data staging orchestrator software module, an optimal migration time, an optimal migration speed, and an optimal migration cost for managing storage for portions of the data. The computing system executes a risk modulation software module and determines a risk associated with the managing. | 01-13-2011 |
20120075067 | SENSOR BASED TRUTH MAINTENANCE METHOD AND SYSTEM - A truth maintenance method and system. The method includes receiving by a computer processor from RFID tags embedded in sensors, event data associated with events detected by said sensors. The computer processor associates portions of the event data with associated RFID tags and derives assumption data associated with each portion of the portions. The computer processor retrieves previous assumption data derived from and associated with previous portions of previous event data retrieved from the RFID tags and executes non monotonic logic with respect to the assumption data and the previous assumption data. In response, the computer processor generates and stores updated assumption data associated with the assumption data and the previous assumption data. | 03-29-2012 |
20120078835 | DATA BASED TRUTH MAINTENANCE METHOD AND SYSTEM - A truth maintenance method and system. The method includes receiving by a computer processor, health event data associated with heath care records for patients. The computer processor associates portions of the health event data with associated patients and related records in a truth maintenance system database. The computer processor derives first health related assumption data and retrieves previous health related assumption data derived from and associated with previous portions of previous health event data. The computer processor executes non monotonic logic with respect to the first health related assumption data and the previous health related assumption data. In response, the computer processor generates and stores updated first updated health related assumption data associated with the first health related assumption data and the previous health related assumption data. | 03-29-2012 |
20120191661 | OPTIMIZATION AND STAGING - An optimization method and system. The method includes receiving by a computing system a data footprint associated with data and a human resource model. The data footprint comprises a primary data section, a secondary data section, and an archive data section. A plurality of data storage strategies are associated with the primary data section, said secondary data section, and said archive data section. The plurality of data storage strategies are compared to each other. A data staging orchestrator software module is executed. The computing system determines based on results of executing the data staging orchestrator software module, an optimal migration time, an optimal migration speed, and an optimal migration cost for managing storage for portions of the data. The computing system executes a risk modulation software module and determines a risk associated with the managing. | 07-26-2012 |
20130282644 | SENSOR BASED TRUTH MAINTENANCE - A truth maintenance method and system. The method includes receiving by a computer processor from RFID tags embedded in sensors, event data associated with events detected by said sensors. The computer processor associates portions of the event data with associated RFID tags and derives assumption data associated with each portion of the portions. The computer processor retrieves previous assumption data derived from and associated with previous portions of previous event data retrieved from the RFID tags and executes non monotonic logic with respect to the assumption data and the previous assumption data. In response, the computer processor generates and stores updated assumption data associated with the assumption data and the previous assumption data. | 10-24-2013 |
20130298131 | CONTINUOUS OPTIMIZATION OF ARCHIVE MANAGEMENT SCHEDULING BY USE OF INTEGRATED CONTENT-RESOURCE ANALYTIC MODEL - A method and associated system for continuously optimizing data archive management scheduling. A flow network is modeled. The flow network represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices such that an optimal path in the flow network from a task of at least one archive management task to a worker program of the archive management system represents an optimal initial schedule for the worker program to perform the task. | 11-07-2013 |
20130346358 | DATA BASED TRUTH MAINTENANCE - A truth maintenance method and system. The method includes receiving by a computer processor, health event data associated with heath care records for patients. The computer processor associates portions of the health event data with associated patients and related records in a truth maintenance system database. The computer processor derives first health related assumption data and retrieves previous health related assumption data derived from and associated with previous portions of previous health event data. The computer processor executes non monotonic logic with respect to the first health related assumption data and the previous health related assumption data. In response, the computer processor generates and stores updated first updated health related assumption data associated with the first health related assumption data and the previous health related assumption data. | 12-26-2013 |
20150339160 | CONTINUOUS OPTIMIZATION OF ARCHIVE MANAGEMENT SCHEDULING BY USE OF INTEGRATED CONTENT-RESOURCE ANALYTIC MODEL - A method and associated system for continuously optimizing data archive management scheduling. A flow network is modeled, which creates vertexes organized in multiple levels and creating multiple edges sequentially connecting the vertexes of the multiple levels. The multiple levels consist of N+1 levels denoted as LEVEL | 11-26-2015 |
Patent application number | Description | Published |
20090042907 | Bicyclic aromatic sulfinyl derivatives - The present invention provides compounds of the structure: | 02-12-2009 |
20090062284 | Thio-Substituted Biarylmethanesulfinyl Derivatives - The present invention is related to chemical compositions, processes for the preparation thereof and uses of the composition. Particularly, the present invention relates to compositions that include substituted biaryl-methanesulfinyl acetamides of Formula (I): | 03-05-2009 |
20090291918 | PROTEASOME INHIBITORS AND METHODS OF USING THE SAME - The present invention provides boronic acid compounds, boronic esters, and compositions thereof that can modulate apoptosis such as by inhibition of proteasome activity. The compounds and compositions can be used in methods of inducing apoptosis and treating diseases such as cancer and other disorders associated directly of indirectly with proteasome activity. | 11-26-2009 |
20110144033 | Proteasome Inhibitors and Methods of Using the Same - The present invention provides boronic acid compounds, boronic esters, and compositions thereof that can modulate apoptosis such as by inhibition of proteasome activity. The compounds and compositions can be used in methods of inducing apoptosis and treating diseases such as cancer and other disorders associated directly of indirectly with proteasome activity. | 06-16-2011 |
20120041196 | Proteasome Inhibitors and Methods of Using the Same - The present invention provides boronic acid compounds, boronic esters, and compositions thereof that can modulate apoptosis such as by inhibition of proteasome activity. The compounds and compositions can be used in methods of inducing apoptosis and treating diseases such as cancer and other disorders associated directly of indirectly with proteasome activity. | 02-16-2012 |
20140088042 | Proteasome Inhibitors And Methods Of Using The Same - The present invention provides boronic acid compounds, boronic esters, and compositions thereof that can modulate apoptosis such as by inhibition of proteasome activity. The compounds and compositions can be used in methods of inducing apoptosis and treating diseases such as cancer and other disorders associated directly of indirectly with proteasome activity. | 03-27-2014 |
Patent application number | Description | Published |
20150287017 | Systems and Methods for Transacting at an ATM Using a Mobile Device - The disclosed embodiments provide systems and methods for transacting at a local financial service provider device using a mobile device. The system may include one or more memory devices storing instructions and one or more processors configured to execute the instructions to receive transaction data associated with a transaction request received from a mobile device associated with a customer. The transaction data may include a customer identifier. Additionally, the instructions may cause the processor to receive authentication data associated with the customer. The authentication data may be provided by the customer operating the mobile device and without requiring the customer to input data directly at the local financial service provider device. The one or more processors may further determine whether the received authentication data authenticates the transaction, authorize the transaction, and provide an indication to the local financial service provider device to perform the transaction. | 10-08-2015 |
20150287018 | Systems and Methods for Transacting at an ATM Using a Mobile Device - The disclosed embodiments provide systems and methods for transacting at a local financial service provider device using a mobile device. The system may include one or more processors configured to execute instructions to receive transaction data associated with a transaction request including a customer identifier received from a mobile device associated with the customer. Additionally, the processors may receive authentication data associated with the customer that may be provided by the customer operating the mobile device and without requiring the customer to input data directly at the local financial service provider device. The processors may further determine whether the received authentication data authenticates the transaction, authorize the transaction, and provide an indication to the local financial service provider device to perform the transaction based on a determination that the customer operating the mobile device is physically located within a threshold distance away from the local financial service provider device. | 10-08-2015 |
20150287028 | Systems and Methods for Authenticating Electronic Transactions - The disclosed embodiments provide systems and methods for authenticating electronic transactions. A system for authenticating electronic transactions may include one or more memory devices storing instructions and one or more processors configured to receive transaction data associated with a transaction and further associated with a customer. The transaction data includes a customer identifier. The one or more processors may be configured to identify a customer account associated with the customer based on the customer identifier, and determine an authentication tier level associated with the transaction. The authentication tier level may reflect one or more levels of authentication required to authorize the transaction. The one or more processors may be configured to receive authentication data associated with a customer, and determine whether the authentication data satisfies the authentication tier level associated with the transaction and authorize the transaction when the authentication data satisfies the authentication tier level. | 10-08-2015 |
Patent application number | Description | Published |
20120004802 | MEDIATION OF TASKS BASED ON ASSESSMENTS OF COMPETING COGNITIVE LOADS AND NEEDS - Among other things, one or more techniques and/or systems are disclosed for mediating tasks in real-time for safety-related concerns. A nature for a safety-related primary task, such as contextual elements of the task, is determined; and a nature of a secondary task that draws attention away from the primary task is also determined. A risk factor for a potential lack of cognitive resources which may be needed by the primary task is determined by applying the nature of the primary task and the nature of the secondary task to a trained risk factor model. The risk factor is applied to one or more safety-related systems in real-time, for example, to mitigate potential safety concerns. | 01-05-2012 |
20120011511 | METHODS FOR SUPPORTING USERS WITH TASK CONTINUITY AND COMPLETION ACROSS DEVICES AND TIME - Concepts and technologies are described herein for providing task continuity and supporting task completion across devices and time. A task management application is configured to monitor one or more interactions between a user and a device. The interactions can include the use of the device, the use of one or more applications, and/or other tasks, subtasks, or other operations. Predictive models constructed from data or logical models can be used to predict the attention resources available or allocated to a task or subtask as well as the attention and affordances available within a context for addressing the task and these inferences can be used to mark or route the task for later reminding and display. In some embodiments, the task management application is configured to remind or execute a follow-up action when a session is resumed. Embodiments include providing users with easy to use gestures and mechanisms for providing input about desired follow up on the same or other devices. | 01-12-2012 |
20130275983 | Methods for Supporting Users with Task Continuity and Completion Across Devices and Time - Concepts and technologies are described herein for providing task continuity and supporting task completion across devices and time. A task management application is configured to monitor one or more interactions between a user and a device. The interactions can include the use of the device, the use of one or more applications, and/or other tasks, subtasks, or other operations. Predictive models constructed from data or logical models can be used to predict the attention resources available or allocated to a task or subtask as well as the attention and affordances available within a context for addressing the task and these inferences can be used to mark or route the task for later reminding and display. In some embodiments, the task management application is configured to remind or execute a follow-up action when a session is resumed. Embodiments include providing users with easy to use gestures and mechanisms for providing input about desired follow up on the same or other devices. | 10-17-2013 |
Patent application number | Description | Published |
20090305337 | SAMPLE PROCESSING SYSTEM AND METHOD - Provided is a system and method for staining of one or more samples, including providing one or more self-contained sample processing receptacles, each of the one or more self-contained sample processing receptacles configured to be inserted into an auto-staining instrument; and enabling one of one or more staining procedures appropriate for the one or more samples as a function of a choice of self-contained sample processing receptacle, each of the one or more self-contained sample processing receptacles configured to process each inserted sample of the one or more samples within the self-contained sample processing receptacle. | 12-10-2009 |
20120321534 | SAMPLE PROCESSING SYSTEM AND METHOD - Provided is a system and method for staining of one or more samples, including providing one or more self-contained sample processing receptacles, each of the one or more self-contained sample processing receptacles configured to be inserted into an auto-staining instrument; and enabling one of one or more staining procedures appropriate for the one or more samples as a function of a choice of self-contained sample processing receptacle, each of the one or more self-contained sample processing receptacles configured to process each inserted sample of the one or more samples within the self-contained sample processing receptacle. | 12-20-2012 |
20120329140 | SAMPLE PROCESSING SYSTEM AND METHOD - Provided is a system and method for staining of one or more samples, including providing one or more self-contained sample processing receptacles, each of the one or more self-contained sample processing receptacles configured to be inserted into an auto-staining instrument; and enabling one of one or more staining procedures appropriate for the one or more samples as a function of a choice of self-contained sample processing receptacle, each of the one or more self-contained sample processing receptacles configured to process each inserted sample of the one or more samples within the self-contained sample processing receptacle. | 12-27-2012 |
20140263634 | SPECIMEN READER EMPLOYING OPTICAL AND RFID SCANNING - A specimen reader receives a specimen rack that includes multiple rack slots that receive respective specimen holders. The specimen holders may include an RFID and barcode. The specimen reader includes multiple sensing regions that align with respective rack slots of the specimen rack. The specimen reader optically senses the presence of specimen holders in the sensing regions that correspond to the rack slots. When the specimen reader detects a newly inserted specimen holder in a particular rack slot, the specimen reader sends RF interrogation signals to the sensing regions. The specimen holders in the sensing regions respond by transmitting their respective RFID unique identifiers. The specimen reader compares currently received RFID unique identifiers with prior received RFID unique identifiers to determine the RFID unique identifier of the newly inserted specimen holder. | 09-18-2014 |
20140266620 | SPECIMEN TRACKING VIA BARCODE AND RFID CORRELATION AT ACCESSION TIME - A specimen holder includes an RFID tag that exhibits an RFID unique identifier. The specimen holder also includes a barcode that exhibits a barcode unique identifier. The user may place a specimen holder in a particular rack slot of a multiple slot specimen rack that is situated on a specimen reader. The specimen reader may receive this specimen holder at accession time. The specimen reader reads both the RFID tag and the barcode of the newly inserted specimen holder. The specimen reader may correlate the RFID unique identifier and barcode unique identifier with one another and store the RFID unique identifier and barcode unique identifier associated with one another in a database. The database may also associate the RFID unique identifier and barcode unique identifier of the newly inserted specimen holder with a rack slot unique identifier that the database also stores. | 09-18-2014 |
20140277695 | AUTOMATIC TRACKING OF A SPECIMEN HOLDER MOVED FROM ONE SPECIMEN RACK TO ANOTHER - A user may move a specimen holder from one specimen rack to another specimen rack. A database automatically tracks the movement of the specimen holder from a rack slot of one specimen rack to a rack slot of the other specimen rack. To track movement of the specimen holder, the user places a specimen rack on a specimen reader that determines the location of any specimen holders in slots of the specimen rack. The user removes a particular specimen holder from a particular rack slot of the specimen rack and the database is updated to reflect removal of the particular specimen holder from the specimen rack. The user places another specimen rack on the reader and inserts the newly removed specimen holder in a slot of the another specimen rack. The database is updated to reflect insertion of the specimen holder in a particular slot of the another rack. | 09-18-2014 |
20150178648 | PEER-TO-PEER NETWORKING - In one embodiment, a method of managing productivity with a peer-to-peer system is disclosed. The disclosed information handling system (IHS) may receive information from a particular user who may be a medical professional such as a doctor or other medical practitioner. In one embodiment, the IHS may include an information store, revenue tool, doctor referral tool, specialist referral tool, facility referral tool, consultation tool and a samples tool. The particular user may use the revenue tool of the IHS to view the predicted revenue of upcoming appointments in his or her schedule. The revenue tool of the IHS may predict the revenue of appointments by utilizing information from the information store of the IHS. These tools may automatically increase the revenue of the user by scheduling additional appointments and referring appointments to other medical professionals in the peer-to-peer network. | 06-25-2015 |
Patent application number | Description | Published |
20080317631 | Nanotube Device and Method of Fabrication - A nanotube device and a method of depositing nanotubes for device fabrication are disclosed. The method relates to electrophoretic deposition of nanotubes, and allows a control of the number of deposited nanotubes and positioning within a defined region. | 12-25-2008 |
20090045061 | Nanotube Devices and Vertical Field Effect Transistors - A method of depositing nanotubes in a region defined by an aperture is disclosed. The method provides advantageous control over the number of nanotubes to be deposited, as well as the pattern and spacing of nanotubes. Electrophoretic deposition, along with proper configuration of the aperture, allows at least one nanotube to be deposited in a target region with nanometer scale precision. Pre-sorting of nanotubes, e.g., according to their geometries or other properties, may be used in conjunction with embodiments of the invention to facilitate fabrication of devices with specific performance requirements. The method is useful for many applications where it is desirable to deposit more than one nanotube in a defined region. For example, vertical field effect transistor (VFET) designs may benefit from having more than one nanotube forming a channel to allow more current to flow through the device. By controlling the number of nanotubes to be deposited, one can ensure that the VFET output can be designed with sufficient current to meet the parameters of a logic circuit input. | 02-19-2009 |
20100086470 | Rapid microwave process for purification of nanocarbon preparations - A novel microwave-assisted process is described for the rapid removal of catalytic metal and non-desirable carbon impurities in fullerene, single wall, and multiple wall carbon nanotube preparations. The purification process is carried out at various programmed pressures, power levels and reaction times in a suspension of the nanocarbon moieties in the presence of strong acids (for example, a mixture of sulfuric acid and nitric acid), in weak acids (for example, acetic acid) and in the presence of chelating agents (for example, EDTA—ethylenediaminetetraacetic acid). In one embodiment, high metal removal efficiency of 70 to 90% is observed. | 04-08-2010 |
20100279179 | System and Method for Directed Self-Assembly Technique for the Creation of Carbon Nanotube Sensors and Bio-Fuel Cells on Single Plane - Improved nanotube devices and systems/methods for fabrication thereof are provided. The present disclosure provides systems/methods for depositing controlled numbers of nanotubes with specific properties at predefined locations for the fabrication of nanotube devices. The nanotube devices may be utilized in a range of applications. A bio-fuel cell system that does not require a proton exchange membrane separator and does not need a mediator to transfer charge is provided. This exemplary bio-fuel cell uses enzyme functionalized SWNTs for the anode/cathode. The absence of a membrane in the bio-fuel cell configuration opens up the possibility of other configurations that would otherwise be unfeasible. This includes a bio-fuel cell where the anode/cathode are on the same substrate. Since the electrodes can share the same substrate, the configuration may be integrated with a circuit device on the same substrate. An IC and its power source may be fabricated on the same silicon wafer. | 11-04-2010 |
20100326813 | Microwave Induced Functionalization of Single Wall Carbon Nanotubes and Composites Prepared Therefrom - The invention is directed to a method of forming, producing or manufacturing functionalized nanomaterials, and, specifically, soluble functionalized nanomaterials. The presently described invention also relates to nanomaterial-based composites consisting of a target material, which can include ceramic, polymer, or metallic matrices incorporated into or grown on nanomaterials, as well as a method or synthesis technique for the formation, production, or manufacture of nanomaterial-based composites through microwave-induced reaction. | 12-30-2010 |
20110240480 | Nanotube Device and Method of Fabrication - A nanotube device and a method of depositing nanotubes for device fabrication are disclosed. The method relates to electrophoretic deposition of nanotubes, and allows a control of the number of deposited nanotubes and positioning within a defined region. | 10-06-2011 |