Vicente, US
Anthony Nacinopa Vicente, Castaic, CA US
Patent application number | Description | Published |
---|---|---|
20110098674 | Method and System for Programming an Infusion Device - A method of programming an infusion device includes receiving an infusion rate for a time period, wherein the time period overlaps with a predefined start of a predefined period of the infusion device. The time period is converted into (1) a first converted time period extending from a start of the time period to the predefined start of the predefined period, and (2) a second converted time period extending from the predefined start of the predefined period to an end of the time period. The infusion device is programmed with the infusion rate for the first converted time period and the second converted time period. | 04-28-2011 |
Antonio Vicente US
Patent application number | Description | Published |
---|---|---|
20120080921 | MEDICAL SUPPORT SYSTEM - A medical support system for medical professionals performing procedures on patients. That medical support system includes adjustable support arms adjacent a patient headrest. The support arms are padded, have concave support surfaces, can freely rotate and pivot, but can also be locked in position via a ball-joint mechanism inside a housing. The ball joint has a compression cap with a conically shaped opening that aligns with a ball that receives a rod that connects to a support arm. Turning the compression cap induces a state of snugness achieved by friction between the ball, the compression cap and the housing. Loosening the compression cap allows rotational and angular positioning of the support arms. The compression cap has a knurled outer surface to assist a medical professional using the medical support system. | 04-05-2012 |
Brian Christopher Vicente, Santa Barbara, CA US
Patent application number | Description | Published |
---|---|---|
20130197266 | Ethyl Acetate Production - A reactive distillation method comprises introducing an feed stream comprising ethanol to a reactive distillation column, contacting the feed stream with a catalyst in the reactive distillation column during a distillation, where the feed stream reacts in the presence of the catalyst to produce a reaction product comprising ethyl acetate and hydrogen, removing ethyl acetate during the distillation from the reactive distillation column as a bottoms stream, and removing hydrogen during the distillation from the reactive distillation column as an overhead stream. | 08-01-2013 |
20140235901 | Production of Higher Alcohols - A reactive distillation method comprises introducing a feed stream to a reactive distillation column, contacting the feed stream with one or more catalysts in the reactive distillation column during a distillation, and removing one or more higher alcohols during the distillation from the reactive distillation column as a bottoms stream. The feed stream comprises one or more alpha hydrogen alcohols, and the feed stream reacts in the presence of the one or more catalysts to produce a reaction product comprising the one or more higher alcohols. | 08-21-2014 |
Franscisco Vicente, Pittsburgh, PA US
Patent application number | Description | Published |
---|---|---|
20140205143 | EYES-OFF-THE-ROAD CLASSIFICATION WITH GLASSES CLASSIFIER - A method for determining an Eyes-Off-The-Road (EOTR) condition exists includes capturing image data corresponding to a driver from a monocular camera device. A detection of whether the driver is wearing eye glasses based on the image data using an eye glasses classifier. When it is detected that the driver is wearing eye glasses, a driver face location is detected from the captured image data and it is determined whether the EOTR condition exists based on the driver face location using an EOTR classifier. | 07-24-2014 |
John Vicente, Roseville, CA US
Patent application number | Description | Published |
---|---|---|
20090003353 | Cross-layer approach to virtualized overlay on ad hoc networks - Methods and apparatus to a cross-layer approach to virtualized overlay on ad hoc networks are described. In one embodiment, a virtual address may be used to search for a (key,value) pair in a virtual overlay. Other embodiments are also described. | 01-01-2009 |
20090089300 | Virtual clustering for scalable network control and management - In some embodiments, the invention involves a system and method relating to a framework to build a new class of network control (policy) and (state) management services. The framework may be used to build a number of self-management services to support decentralized (mesh) networks. In at least one embodiment, the present invention is intended to hybridize centralized and decentralized network models to generate a more stable and robust network environment using clustering. Other embodiments are described and claimed. | 04-02-2009 |
20090089410 | ENTROPY-BASED (SELF-ORGANIZING) STABILITY MANAGEMENT - In some embodiments, the invention involves calculating entropy-based stability values to be used in a framework to build a new class of network control (policy) and (state) management services. The framework may be used to build a number of self-management services to support decentralized (mesh) networks. Other embodiments are described and claimed. | 04-02-2009 |
20090133096 | MICRO AND MACRO TRUST IN A DECENTRALIZED ENVIRONMENT - A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of components. Each component in the first entity has at least the trust level of the first entity. | 05-21-2009 |
20100293262 | AUTOMATED SYSTEM MANAGEMENT PROCESS - A method and apparatus for an automated system management process are described. According to an embodiment of the invention, a method comprises receiving data regarding operation of a network; automatically generating network policies based at least in part on the data regarding operation of the network using automation intelligence; applying the network policies to modify operations of the network; and receiving data regarding the operation of the network after the modification of the operations of the network. | 11-18-2010 |
20100318643 | SYSTEMS AND METHODS FOR VIRTUALIZING FUNCTIONS AND DECENTRALIZING SERVICE DELIVERY IN A FLAT NETWORK OF INTERCONNECTED PERSONAL DEVICES - Systems and methods are described herein to virtualize functions and decentralize services in a flat-graph network of client devices. Other embodiments include apparatus and systems of devices comprising virtual node modules to perform a variety of service functions. Further embodiments include methods for overlaying service functions on a flat-graph network of client devices. | 12-16-2010 |
20110211481 | CROSS-LAYER APPROACH TO VIRTUALIZED OVERLAY ON AD HOC NETWORKS - Methods and apparatus to a cross-layer approach to virtualized overlay on ad hoc networks are described. In one embodiment, a virtual address may be used to search for a (key, value) pair in a virtual overlay. Other embodiments are also described. | 09-01-2011 |
20120089663 | APPARATUS FOR END-USER TRANSPARENT UTILIZATION OF COMPUTATIONAL, STORAGE, AND NETWORK CAPACITY OF MOBILE DEVICES, AND ASSOCIATED METHODS - Mobile devices, systems, and methods for end-user transparent utilization of computational, storage, and network capacity of mobile device are described herein. A communication interface may be responsive to a request for a resource from a network of mobile devices. A database may store mobile device information and, in response to the request, identify at least one mobile device having the resource. A virtual machine dispatcher may generate a command to a virtual machine dispatch agent of the at least one mobile device to create a virtual machine to perform the resource. | 04-12-2012 |
20120311666 | MICRO AND MACRO TRUST IN A DECENTRALIZED ENVIRONMENT - A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of components. Each component in the first entity has at least the trust level of the first entity. | 12-06-2012 |
20150111567 | Apparatus for End-User Transparent Utilization of Computational, Storage, and Network Capacity of Mobile Devices, and Associated Methods - Mobile devices, systems, and methods for end-user transparent utilization of computational, storage, and network capacity of mobile device are described herein. A communication interface may be responsive to a request for a resource from a network of mobile devices. A database may store mobile device information and, in response to the request, identify at least one mobile device having the resource. A virtual machine dispatcher may generate a command to a virtual machine dispatch agent of the at least one mobile device to create a virtual machine to perform the resource. | 04-23-2015 |
John B. Vicente, Roseville, CA US
Patent application number | Description | Published |
---|---|---|
20090150568 | METHOD AND APPARATUS FOR SYNCHRONIZING BETWEEN A CENTRALIZED SYSTEM AND A DECENTRALIZED SYSTEM - Machine-readable media, methods, apparatus and system for synchronizing between a decentralized computing system and a centralized computing system. In some embodiments, a decentralized record may be received from a computing platform, wherein the decentralized record may be created when the computing platform communicates in a decentralized pattern. Information may be detected from the decentralized record to provide detected information, wherein the detected information may reveal a decentralization characteristic of the decentralized record. Then, the decentralized record may be converted into a centralized record while hiding the detected information from the centralized record and the centralized record may be sent to a server. | 06-11-2009 |
20140096241 | CLOUD-ASSISTED METHOD AND SERVICE FOR APPLICATION SECURITY VERIFICATION - A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web server. An application security module of the client device intervenes and transmits an application verification request to a cloud service system. The cloud service system retrieves data regarding the security of the application and source from cloud resources and a local database of the cloud server. The cloud service system then uses the data to authenticate the source and verify the security of the browser-based application. The cloud service system provides the client device with a recommendation regarding the security of the browser-based application and updates its local database. The client device may then consider the recommendation in determining whether to download or execute the browser-based application and provide feedback to the cloud service system. The client device may also perform a local security analysis after receiving the cloud service system's recommendation. | 04-03-2014 |
20140173089 | CLOUD DATA STORAGE LOCATION MONITORING - Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information. Other embodiments are described and claimed. | 06-19-2014 |
20140181489 | CLOUD TRANSFORMABLE DEVICE - Technologies for performing a platform transformation on a computing device include transforming a transformable component of the computing device from a first hardware configuration in which a first set of hardware features is enabled to a second hardware configuration in which different hardware features are enabled. The computing device has a first capability when in the first configuration and a different capability when in the second configuration. In performing the platform transformation, the computing device determines a platform transformation build, establishes a communication connection with a cloud-based platform transformation service, and identifies and retrieves relevant platform definitions from the cloud-based platform transformation service. The platform definitions are used in effecting the desired platform transformation. | 06-26-2014 |
20140189120 | AD HOC DECENTRALIZED CLOUD INFRASTRUCTURE - Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes. | 07-03-2014 |
20140282890 | DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES - Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container. | 09-18-2014 |
20150120617 | APPARATUS AND METHODS FOR CAPTURING AND GENERATING USER EXPERIENCES - Embodiments of apparatus and methods for capturing and generating user experiences are described. In embodiments, an apparatus may include a processor. The apparatus may also include a data storage module, coupled with the processor, to store sensor data collected by a plurality of sensors attached to one or more devices. The apparatus may further include an experience correlation module, coupled with the data storage module, to associate at least a portion of the sensor data with a user experience based at least in part on one or more rules identifying the user experience, to enable regenerating at least a part of the user experience for a user based at least in part on the portion of the sensor data. Other embodiments may be described and/or claimed. | 04-30-2015 |
Jose German Vicente, Spring, TX US
Patent application number | Description | Published |
---|---|---|
20110271823 | Electronic Selector Switch for Perforation - A circuit includes a line input for receiving a line power. The circuit further includes a line output for transmitting the line power. The circuit further includes a next-gun-detect output and a next-gun-detect input. The circuit further includes a first detonator connection and a second detonator connection, the second detonator connection being connected to a ground. The line input is coupled to the first detonator connection through a one-polarity-pass component that only allows power of a first polarity to pass. The line input is coupled to the first detonator connection through a detonate-enable switch circuit that is coupled to the next-gun-detect output and the line input. The detonate-enable switch passes power only if (a) the next-gun-detect output is not coupled to the next-gun-detect input and (b) power of a second polarity has previously been applied to the line input while the next-gun-detect output is not coupled to the next-gun-detect input. | 11-10-2011 |
Julio Vicente, Rochester, NY US
Patent application number | Description | Published |
---|---|---|
20130206054 | Device for facilitating detection of hygienic hand washing - A door mountable device for facilitating detection of hygienic hand washing. A dye dispenser is mounted on a door handle in a manner such that a soap washable dye is deposited on hands that contact the handle upon entry into a restroom facility. The resulting dye stain area is removed by thorough hand washing. Any stain remaining upon exiting the restroom is an indicator that hands have not been hygienically washed. | 08-15-2013 |
Manuel Vicente, Goldens Bridge, NY US
Patent application number | Description | Published |
---|---|---|
20100069121 | TELECOMMUNICATIONS OBELISK WITH CELLULAR NETWORK COLOCATION - A telecommunications tower is formed as an obelisk and permits collocation of multiple telecommunications network carriers. The tower includes a Façade shaped like an obelisk over a frame structure and is designed to blend with the surrounding architecture and landscape. The obelisk Façade disguises the internal support frame structure and antenna arrays within the tower. The obelisk and support frame are constructed above a base structure. The base structure may include multiple levels or rooms. Each level may permit storage of cellular communications equipment. The design features of the tower permit collocation of multiple carriers within a common tower. | 03-18-2010 |
Maria Da Graca Henriques Vicente, Baton Rouge, LA US
Patent application number | Description | Published |
---|---|---|
20090215105 | Tetraazaporphyrin-Based Compounds and Their Uses - Asymmetrically substituted metal-phthalocyanine compounds are disclosed. These compounds and other phthalo-cyanine-derivatives are used in bioimaging, bioanalysis, FRET and quenching techniques, photodynamic therapy, DNA analysis for cells, proteins, tissues and other biological entities, and other applications. Near-infrared fluorescence minimizes matrix effects typically seen in other methods of analyzing biochemical entities in cells, proteins, tissues and other biological entities. | 08-27-2009 |
20090318680 | Boron-Containing Porphyrin Compounds and Their Uses - Boron-containing porphyrin compounds are disclosed that may be used for boron neutron capture therapy of tumors, radiotherapy of tumors, and photodynamic therapy of tumors. | 12-24-2009 |
Maria Teresita Vicente, Marlton, NJ US
Patent application number | Description | Published |
---|---|---|
20120209761 | System and Method for Providing Borrowing Schemes - A system and method providing a borrowing scheme. The method comprises the steps of: establishing an interest-free revolving amount or account using the computer processor; establishing a periodic payment for maintaining the interest-free revolving amount or account using the computer processor; and automatically revising the interest-free revolving amount or account or the periodic payment using the computer processor based upon at least one user performance metric over a predetermined period of time; wherein the interest-free revolving amount or account or the periodic payment for maintaining the interest-free revolving amount is determined by the user via the network | 08-16-2012 |
20130151404 | System and Method For Providing Borrowing Schemes - A system and method providing a borrowing scheme. The method comprises the steps of: establishing an interest-free revolving amount or account using the computer processor; establishing a periodic payment for maintaining the interest-free revolving amount or account using the computer processor; and automatically revising the interest-free revolving amount or account or the periodic payment using the computer processor based upon at least one user performance metric over a predetermined period of time; wherein the interest-free revolving amount or account or the periodic payment for maintaining the interest-free revolving amount is determined by the user via the network | 06-13-2013 |
Nataniel Barbosa Vicente, Louisville, KY US
Patent application number | Description | Published |
---|---|---|
20110054713 | GLOBAL TRIP UNIT - A method of setting a ground fault trip response function for a trip unit includes enabling a ground fault protection mode for the trip unit, setting the ground fault trip response function for the trip unit, wherein the ground fault trip response function is a double knee time current function. | 03-03-2011 |
Nelson Vicente, Selden, NY US
Patent application number | Description | Published |
---|---|---|
20110270631 | REMOTE HEALTHCARE DATA-GATHERING AND VIEWING SYSTEM AND METHOD - A medical data collection method and system ( | 11-03-2011 |
Oriol Vicente, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20150119155 | INFLATABLE SURFING APPARATUS AND METHOD - A water or other amusement attraction that includes an inflatable portion or material. A cavity of the attraction is located underneath an upper surface, the upper surface configured to support a flow of water and at least one rider thereon. A volume of water is configured to be disposed within the cavity, the upper surface floating upon the volume of water while connected to at least one side wall, floor, and/or nozzle structure. A pump and nozzle assembly, positioned outside of the cavity, communicates with the water within the cavity for flowing a portion of the water over the upper surface. A drainage portion, adjacent to the upper surface, drains the flowing water back into the cavity for recirculation. Support components, such as a plurality of beams or an inflatable grid structure help maintain stability for the attraction. | 04-30-2015 |
Robert Anthony Vicente, Huntington Beach, CA US
Patent application number | Description | Published |
---|---|---|
20110210153 | HITCH-HIKER - A safe is provided comprising a main box having a predetermined size, such that the safe may also be used as a step; a lockable flip lid pivotally connected to the inside of said main box; a top lid, pivotally connected to the upper edge of said main box such that it disguises the said flip lid, and configured such that it is capable of being used as a step; and means for locking the safe to the hitch of a vehicle. | 09-01-2011 |
20140099162 | SAFE ATTACHED TO THE HITCH OF A VEHICLE - A safe is provided comprising a main box having a predetermined size, such that the safe may also be used as a step; a lockable flip lid pivotally connected to the inside of the main box; a top lid, pivotally connected to the upper edge of the main box such that it disguises the flip lid, and configured such that it is capable of being used as a step; and means for locking the safe to the hitch of a vehicle. | 04-10-2014 |