Patent application number | Description | Published |
20130339392 | DYNAMIC MAP TEMPLATE DISCOVERY AND MAP CREATION - A method, system and computer program product for dynamic map template discovery and map creation may include determining a frequency of use of a data object in a database and discovering a dynamic map template corresponding to the data object based on the frequency of use of the data object. The method may also include creating a dynamic map from the dynamic map template in response to discovering the dynamic map template. | 12-19-2013 |
20130339393 | DYNAMIC MAP TEMPLATE DISCOVERY AND MAP CREATION - A method, system and computer program product for dynamic map template discovery and map creation may include determining a frequency of use of a data object in a database and discovering a dynamic map template corresponding to the data object based on the frequency of use of the data object. The method may also include creating a dynamic map from the dynamic map template in response to discovering the dynamic map template. | 12-19-2013 |
20150220579 | OPTIMIZATION OF AN IN MEMORY DATA GRID (IMDG) SCHEMA BASED UPON A NO-SQL DOCUMENT MODEL - Embodiments of the present invention provide a method, system and computer program product for IMDG No-SQL schema optimization. In an embodiment of the invention, an IMDG No-SQL schema optimization method is provided. The method includes parsing documents of a No-SQL database, such as a document-oriented database, to select an object model mapping the documents of the No-SQL database to different portions of the IMDG, and selecting a partitioning schema for the IMDG according to the documents. Thereafter, a change in the documents of the No-SQL database can be detected, for example a change in data density of the documents of the No-SQL database, and in response to detecting the change, the documents of the No-SQL database are parsed to select a new object model of the No-SQL database mapping the documents to different portions of the IMDG, and to select a new partitioning schema for the IMDG according to the documents. | 08-06-2015 |
20150254266 | DATA DUPLICATION DETECTION IN AN IN MEMORY DATA GRID (IMDG) - Embodiments of the invention provide a method, system and computer program product for data duplication detection in an in memory data grid (IMDG). A method for data duplication detection in an IMDG includes computing a hash value for each binary data value in a key value pair of a partition in an IMDG. The method also includes generating a map including an entry for each unique computed hash value and one or more keys corresponding to binary data values of respective key value pairs from which the hash value had been uniquely computed. Thereafter, only those hash values in the map with multiple keys associated therewith are identified and binary data corresponding to the multiple keys of the identified hash values are reported as potential duplicate data in the IMDG. | 09-10-2015 |
20150254267 | DATA DUPLICATION DETECTION IN AN IN MEMORY DATA GRID (IMDG) - Embodiments of the invention provide a method, system and computer program product for data duplication detection in an in memory data grid (IMDG). A method for data duplication detection in an IMDG includes computing a hash value for each binary data value in a key value pair of a partition in an IMDG. The method also includes generating a map including an entry for each unique computed hash value and one or more keys corresponding to binary data values of respective key value pairs from which the hash value had been uniquely computed. Thereafter, only those hash values in the map with multiple keys associated therewith are identified and binary data corresponding to the multiple keys of the identified hash values are reported as potential duplicate data in the IMDG. | 09-10-2015 |
Patent application number | Description | Published |
20120137290 | MANAGING MEMORY OVERLOAD OF JAVA VIRTUAL MACHINES IN WEB APPLICATION SERVER SYSTEMS - The invention relates to memory overload management for Java virtual machines (JVMs) in Web application sever systems. Disclosed is a method and system of memory overload management for a Web application sever system, wherein the Web application sever system comprises multiple JVMs, the method comprising: determining one or more replica shards for which replacement shall be performed; determining one or more target JVMs for storing a corresponding replica shard set including at least one replica shard from the one or more replica shards; and for each target JVM, performing the following: judging whether the free memory of the target JVM is adequate for storing the corresponding replica shard set; if the judging result is negative, performing the following: causing the target JVM to suspend the creation of session until the free memory of the target JVM becomes adequate for storing the corresponding replica shard set. | 05-31-2012 |
20120278344 | PROXIMITY GRIDS FOR AN IN-MEMORY DATA GRID - Techniques are described for scaling an in-memory data grid to satisfy the needs of client applications requesting data from the in-memory data grid. The in-memory data grid may monitor a variety of factors, such as data traffic or number of received queries from a particular geographical region, to determine whether to create a proximity grid. A proximity grid is an extension of the in-memory data grid that services queries originating from a defined geographic region. Each proximity grid stores data objects relevant to the proximity grid's assigned geographic region. Queries originating from the client applications within the geographic regions are then routed to the corresponding proximity grid for execution. The proximity grid may be terminated when the need of the client applications within the geographic region has subsided. | 11-01-2012 |
20120311295 | SYSTEM AND METHOD OF OPTIMIZATION OF IN-MEMORY DATA GRID PLACEMENT - A method, system, and program product for optimizing distribution and availability of data partitions is disclosed. Placement logic is run for data partition distribution which optimizes a configuration of a memory data grid. A performance impact of adding new members to the memory data grid is provided. Replication of data partitions in the memory data grid is minimized. Optimum data partition distribution in the memory data grid is determined. | 12-06-2012 |
20130212340 | PARTITION AWARE QUALITY OF SERVICE FEATURE - A method for providing a partition aware quality of service feature may include receiving an indication of data to be stored in a distributed memory grid, determining a quality of service policy rule to be applied in relation to storage of the data in the memory grid based on the indication, and initiating storage of data blocks of the data in the memory grid. The data blocks may be provided with corresponding partition identifiers that facilitate retrieval of the data by indicating a location of storage of respective ones of the data blocks within the memory grid. The method may further include providing a quality of service token in association with the partition identifier based on the quality of service policy rule. | 08-15-2013 |
20130227232 | PARTITION AWARE QUALITY OF SERVICE FEATURE - A method for providing a partition aware quality of service feature may include receiving an indication of data to be stored in a distributed memory grid, determining a quality of service policy rule to be applied in relation to storage of the data in the memory grid based on the indication, and initiating storage of data blocks of the data in the memory grid. The data blocks may be provided with corresponding partition identifiers that facilitate retrieval of the data by indicating a location of storage of respective ones of the data blocks within the memory grid. The method may further include providing a quality of service token in association with the partition identifier based on the quality of service policy rule. | 08-29-2013 |
20140007052 | DYNAMICALLY CONFIGURING AN INTEGRATED DEVELOPMENT ENVIRONMENT | 01-02-2014 |
20140007053 | DYNAMICALLY CONFIGURING AN INTEGRATED DEVELOPMENT ENVIRONMENT | 01-02-2014 |
20140074966 | INTELLIGENT MAPPING FOR AN ENTERPRISE GRID - A computer receives a request from a client application for data within an enterprise grid. The computer sends the data along with a program to monitor the application's use of the data. The computer subsequently receives from the program a subset of the data being utilized by the client application. Responsive to a subsequent request for the data, the computer sends to the client application only the data corresponding to the identified subset of data being utilized. | 03-13-2014 |
20140089260 | WORKLOAD TRANSITIONING IN AN IN-MEMORY DATA GRID - Embodiments of the present invention disclose a method, system, and computer program product for transitioning a workload of a grid client from a first grid server to a second grid server. A replication process is commenced transferring application state from the first grid server to the second grid server. Prior to completion of the replication process: the grid client is rerouted to communicate with the second grid server. The second grid server receives a request from the grid client. The second grid server determines whether one or more resources necessary to handle the request have been received from the first grid server. Responsive to determining that the one or more resources have not been received from the first grid server, the second grid server queries the first grid server for the one or more resources. The second grid server responds to the request from the grid client. | 03-27-2014 |
20140244953 | IDENTIFYING AND ACCESSING REFERENCE DATA IN AN IN-MEMORY DATA GRID - Embodiments relate to providing normalization techniques for reference data in an in-memory data grid. An aspect includes monitoring object creation and access in an in-memory data grid and identifying reference data in an object field of a plurality of object instances. A reference map for the object field is created and the reference map is replicated across all partitions of the in-memory data grid. The reference data of an embodiment is stored in the reference map and the object field is updated to identify the reference map. Accordingly, the reference data may be accessed using the created reference map. | 08-28-2014 |
20140244954 | IDENTIFYING AND ACCESSING REFERENCE DATA IN AN IN-MEMORY DATA GRID - Embodiments relate to providing normalization techniques for reference data in an in-memory data grid. An aspect includes monitoring object creation and access in an in-memory data grid and identifying reference data in an object field of a plurality of object instances. A reference map for the object field is created and the reference map is replicated across all partitions of the in-memory data grid. The reference data of an embodiment is stored in the reference map and the object field is updated to identify the reference map. Accordingly, the reference data may be accessed using the created reference map. | 08-28-2014 |
20150019584 | SELF-LEARNING JAVA DATABASE CONNECTIVITY (JDBC) DRIVER - Various embodiments include solutions for querying desired data from a database without pulling supererogatory data. In one embodiment, a method includes: obtaining an initial database access query between an application and the database at a self-learning JDBC driver; monitoring subsequent database access queries between the application and the database over a period; and generating a modified database access query for querying the database from the self-learning JDBC driver, the modified database access query based upon the subsequent database access queries between the application and the database over the period. | 01-15-2015 |
20150189474 | USING LOCATION AND PROPENSITY BASED PREDICTIVE ANALYTICS TO PROVIDE MOBILE MESSAGE QOS - In the sending messages, a notification system determines locations of mobile devices and user profiles for users of the mobile devices, identifies a target message for a target device, determines a number of users with overlapping target message candidacy based on the locations and the user profiles, and determines whether the number of users exceed a predetermined threshold. If the number of users exceeds the predetermined threshold, the notification system determines a target message trigger time based on when the number of users exceed a predetermined threshold, determines a target message assembly time and a target message delivery time, and determines whether a sum of the target message assembly time and the target message delivery time is less than a difference between a current time and the trigger time. If so, then a sending of the target message to the target device for displaying at the target device is triggered. | 07-02-2015 |
20150277783 | OPTIMIZED TRANSFER AND STORAGE OF HIGHLY DENORMALIZED DATA IN AN IN-MEMORY DATA GRID - A method for transferring and storing a data set associated with an in-memory data grid (IMDG) is provided. The method may include identifying at least two data object instances associated with the data set based on a determined relationship between the at least two data object instances. The method may also include performing a field relation analysis on the identified at least two data object instances and recording the field relation analysis. The method may include receiving a request for a data object associated with the data set. The method may include determining if an optimization can be performed on the data object. The method may include omitting a field value associated with the data object based on the determined optimization. The method may include inflating the omitted field value into the data set associated with the data object request and returning the data set with the inflated field value. | 10-01-2015 |
20150278302 | OPTIMIZED TRANSFER AND STORAGE OF HIGHLY DENORMALIZED DATA IN AN IN-MEMORY DATA GRID - A method for transferring and storing a data set associated with an in-memory data grid (IMDG) is provided. The method may include identifying at least two data object instances associated with the data set based on a determined relationship between the at least two data object instances. The method may also include performing a field relation analysis on the identified at least two data object instances and recording the field relation analysis. The method may include receiving a request for a data object associated with the data set. The method may include determining if an optimization can be performed on the data object. The method may include omitting a field value associated with the data object based on the determined optimization. The method may include inflating the omitted field value into the data set associated with the data object request and returning the data set with the inflated field value. | 10-01-2015 |
20150293945 | AUTONOMIC DATA PARTITION PLACEMENT IN AN IN-MEMORY DATA GRID - A method for autonomic data partition placement in an in-memory data grid (IMDG) based on usage sampling is provided. The method may include sampling access pattern data, during a configurable window, of a client accessing one or more data objects in the IMDG. Analytics are applied to the sampled access pattern data to determine a replacement partition schema, based on the analyzed sampled access pattern data exceeding at least one performance threshold. The deployed partition schema is altered, based on the replacement partition schema. | 10-15-2015 |
Patent application number | Description | Published |
20130304561 | SYSTEMS AND METHODS FOR PROVIDING A USER INCENTIVE PROGRAM USING SMART CARD TECHNOLOGY - Systems and methods for providing a loyalty and rewards system that implements a user incentive program using smart card technology are provided. A loyalty system allows a user to systematically search, identify, store, and redeem electronic coupons and rebates associated with products from a large number of providers and manufactures. The loyalty system also integrates the activities associated with the user incentive program (e.g., coupon collection, storage, and redemption, etc.), with existing payment methods (e.g., charging a credit card, etc.) using smart card technology. Thus, the loyalty system allows the user to obtain savings and otherwise participate in the user incentive program without adding time consuming and tedious processing that is normally associated with coupon and rebate programs. | 11-14-2013 |
20150379550 | IDENTIFYING AND DISPENSING SPECIAL OFFERS BASED ON CURRENT AND/OR PAST TRANSACTIONS - Systems and methods for providing a loyalty and rewards system that implements a user incentive program using smart card technology are provided. A loyalty system allows a user to systematically search, identify, store, and redeem electronic coupons and rebates associated with products from a large number of providers and manufactures. The loyalty system also integrates the activities associated with the user incentive program (e.g., coupon collection, storage, and redemption, etc.), with existing payment methods (e.g., charging a credit card, etc.) using smart card technology. Thus, the loyalty system allows the user to obtain savings and otherwise participate in the user incentive program without adding time consuming and tedious processing that is normally associated with coupon and rebate programs. | 12-31-2015 |
20160005067 | IDENTIFYING PRODUCTS OF INTEREST BASED ON A USER PROFILE - Systems and methods for providing a loyalty and rewards system that implements a user incentive program using smart card technology are provided. A loyalty system allows a user to systematically search, identify, store, and redeem electronic coupons and rebates associated with products from a large number of providers and manufactures. The loyalty system also integrates the activities associated with the user incentive program (e.g., coupon collection, storage, and redemption, etc.), with existing payment methods (e.g., charging a credit card, etc.) using smart card technology. Thus, the loyalty system allows the user to obtain savings and otherwise participate in the user incentive program without adding time consuming and tedious processing that is normally associated with coupon and rebate programs. | 01-07-2016 |
Patent application number | Description | Published |
20090052462 | Line-Plane Broadcasting in a Data Communications Network of a Parallel Computer - Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network. | 02-26-2009 |
20090055474 | Line-Plane Broadcasting in a Data Communications Network of a Parallel Computer - Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network. | 02-26-2009 |
20090240838 | Broadcasting A Message In A Parallel Computer - Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path. | 09-24-2009 |
Patent application number | Description | Published |
20100282293 | ILLUMINATION AGNOSTIC SOLAR PANEL - In one example, a photovoltaic module includes a plurality of discrete photovoltaic cells arranged in a plurality of cell rows, and a substantially electrically conductive and continuous area backsheet. The photovoltaic cells in each cell row are electrically connected in parallel to each other. The cell rows are electrically connected in series to each other and include a first row and a last row. The backsheet forms a current return path between the first and last rows. The photovoltaic cells are configured such that, in operation, current flows substantially uni-directionally through the plurality of photovoltaic cells between the first row and the last row. | 11-11-2010 |
20120204935 | HIGHLY EFFICIENT SOLAR ARRAYS - In an example, a solar energy system includes multiple PV modules, multiple reflectors, and a racking assembly. Each of the reflectors is positioned opposite a corresponding one of the PV modules. The racking assembly mechanically interconnects the PV modules and the reflectors to form an interconnected system. The racking assembly defines gaps within the racking assembly and between adjacent PV modules and reflectors. The interconnected system includes multiple contact points associated with the gaps. The gaps and contact points configure the interconnected system to accommodate surface unevenness of an installation surface up to a predetermined surface unevenness. | 08-16-2012 |
20130312812 | SPACE AND ENERGY EFFICIENT PHOTOVOLTAIC ARRAY - In an embodiment, a solar energy system includes multiple photovoltaic modules, each oriented substantially at a same angle relative to horizontal. The angle is independent of a latitude of an installation site of the solar energy system and is greater than or equal to 15 degrees. The solar energy system defines a continuous area within a perimeter of the solar energy system. The solar energy system is configured to capture at the photovoltaic modules substantially all light incoming towards the continuous area over an entire season. | 11-28-2013 |
20140035373 | ILLUMINATION AGNOSTIC SOLAR PANEL - In one example, a photovoltaic module includes a plurality of discrete photovoltaic cells arranged in a plurality of cell rows, and a substantially electrically conductive and continuous area backsheet. The photovoltaic cells in each cell row are electrically connected in parallel to each other. The cell rows are electrically connected in series to each other and include a first row and a last row. The backsheet forms a current return path between the first and last rows. The photovoltaic cells are configured such that, in operation, current flows substantially uni-directionally through the plurality of photovoltaic cells between the first row and the last row. | 02-06-2014 |
20140174535 | HIGHLY EFFICIENT SOLAR ARRAYS - In an example, a solar energy system includes multiple PV modules, multiple reflectors, and a racking assembly. Each of the reflectors is positioned opposite a corresponding one of the PV modules. The racking assembly mechanically interconnects the PV modules and the reflectors to form an interconnected system. The racking assembly defines gaps within the racking assembly and between adjacent PV modules and reflectors. The interconnected system includes multiple contact points associated with the gaps. The gaps and contact points configure the interconnected system to accommodate surface unevenness of an installation surface up to a predetermined surface unevenness. | 06-26-2014 |
20140360561 | FULLY REDUNDANT PHOTOVOLTAIC ARRAY - In an embodiment, a photovoltaic (PV) system includes a direct current (DC) bus, multiple PV modules and multiple inverter units. The PV modules are electrically coupled in parallel to the DC bus. The inverter units have DC inputs electrically coupled in parallel to the DC bus and have alternating current (AC) outputs electrically coupled to an AC grid. | 12-11-2014 |
Patent application number | Description | Published |
20110166575 | SACROILIAC FUSION SYSTEM - An undercutting system for preparing a region between ilium and sacrum for sacroiliac fusion. The undercutting system includes an insertion apparatus and a cutting assembly. The cutting assembly is operably attached to the insertion apparatus. The cutting assembly is movable with respect to the insertion apparatus between a retracted configuration and an extended configuration. | 07-07-2011 |
20110295272 | RADIAL DEPLOYMENT SURGICAL TOOL - A radial deployment surgical tool having an inner shaft, an outer shaft and a function head. The radial deployment surgical tool is adapted for performing surgical procedures within narrow regions within a patient. | 12-01-2011 |
20130030456 | SACROILIAC FUSION SYSTEM - An undercutting system for preparing a region between an ilium and a sacrum for sacroiliac fusion. The undercutting system includes a probe assembly and a cutting assembly. The probe assembly is operably mounted to the insertion apparatus. The probe assembly is moveable with respect to the insertion apparatus between a retracted configuration and an extended configuration. In the extended configuration at least a portion of the probe assembly extends laterally from the insertion apparatus. The cutting assembly is operably mounted with respect to the probe assembly and the insertion apparatus. The cutting assembly is movable with respect to the insertion apparatus between a retracted configuration and an extended configuration. In the extended configuration at least a portion of the cutting assembly extends laterally from the insertion apparatus. | 01-31-2013 |
20130197590 | SACROILIAC FUSION SYSTEM - An undercutting system for preparing a region between an ilium and a sacrum for sacroiliac fusion. The undercutting system includes an insertion apparatus, a probe assembly and a cutting assembly. The probe assembly is operably mounted to the insertion apparatus. The probe assembly is moveable with respect to the insertion apparatus between a retracted configuration and an extended configuration. In the extended configuration at least a portion of the probe assembly extends from the insertion apparatus. The cutting assembly is operably mounted with respect to the probe assembly and the insertion apparatus. The cutting assembly is movable with respect to the insertion apparatus between a retracted configuration and an extended configuration. In the extended configuration at least a portion of the cutting assembly extends from the insertion apparatus. | 08-01-2013 |
20130226181 | SACROILIAC FUSION SYSTEM - An undercutting system for preparing a region between ilium and sacrum for sacroiliac fusion. The undercutting system includes an insertion apparatus and a cutting assembly. The insertion apparatus has an elongate shaft and a rotatable handle. The cutting assembly is operably attached to the insertion apparatus. Rotation of the handle with respect to the shaft causes the cutting assembly to move with respect to the shaft between a retracted configuration and an extended configuration. When in the extended configuration, at least a portion of the cutting assembly extends laterally from the shaft. | 08-29-2013 |
20140088596 | METHOD OF REPAIRING SACROILIAC FUSION - A method of repairing a prior sacroiliac fusion that was not effective at stabilizing a sacroiliac joint. The prior sacroiliac fusion used a first fastening device that extended between an ilium and a sacrum. At least one aperture is formed that at least partially extends through at least one of an ilium and a sacrum. An undercutting system is inserted at least partially into the aperture and is used to cut tissue between the ilium and the sacrum. A second fastening device is inserted into the first aperture to retain the ilium in a stationary position with respect to the sacrum. | 03-27-2014 |
20150327872 | METHOD OF PERFORMING SACROILIAC FUSION - A method of performing an orthopedic procedure in a sacroiliac region. At least a portion of an undercutting system is inserted at least partially into an aperture in at least one of an ilium and a sacrum. The undercutting system includes an insertion apparatus, a probe assembly and a cutting assembly. The probe assembly is moved with respect to the insertion apparatus from a retracted position to an extended position so that at least a portion of the probe assembly is between the ilium and the sacrum. The probe assembly is manipulated between the ilium and the sacrum. The cutting assembly is moved with respect to the insertion apparatus from a refracted position to an extended position so that at least a portion of the probe assembly is between the ilium and the sacrum. The cutting assembly is manipulated between the ilium and the sacrum to cut tissue between the ilium and the sacrum. | 11-19-2015 |
Patent application number | Description | Published |
20090062824 | Magnetic gastric band or the like, and related methods - A structure that can be used as a gastric band (and that may also have other uses as an implant elsewhere in a patient) includes a plurality of magnetic elements in a serial array that can be implanted so that the array extends in a circumferential direction around the patient's stomach (or other body tissue structure in the patient). Circumferentially adjacent magnetic elements magnetically attract one another to apply radial pressure to the tissue structure encompassed by the array, but those elements can also move apart in response to sufficient outward pressure from the encompassed tissue structure and/or the contents of (e.g., food in) that tissue structure. When used as a gastric band, the device can provide resistance to excessive food intake, which can help promote weight loss. | 03-05-2009 |
20100076573 | METHODS AND APPARATUS FOR TREATING BODY TISSUE SPHINCTERS AND THE LIKE - A plurality of structures that resiliently attract one another are provided for implanting in a patient around a body tissue structure of the patient. For example, the body tissue structure may be the esophagus, and the plurality of structures may be implanted in an annulus around the outside of the esophagus, the annulus being substantially coaxial with the esophagus. The attraction may be between annularly adjacent ones of the structures in the annulus, and it may be provided, for example, by magnets or springs. The array of structures is preferably self-limiting with respect to the smallest area that it can encompass, and this smallest area is preferably large enough to prevent the apparatus from applying excessive pressure to tissue passing through that area. | 03-25-2010 |
20120150214 | METHODS AND APPARATUS FOR TREATING BODY TISSUE SPHINCTERS AND THE LIKE - A plurality of structures that resiliently attract one another are provided for implanting in a patient around a body tissue structure of the patient. For example, the body tissue structure may be the esophagus, and the plurality of structures may be implanted in an annulus around the outside of the esophagus, the annulus being substantially coaxial with the esophagus. The attraction may be between annularly adjacent ones of the structures in the annulus, and it may be provided, for example, by magnets or springs. The array of structures is preferably self-limiting with respect to the smallest area that it can encompass, and this smallest area is preferably large enough to prevent the apparatus from applying excessive pressure to tissue passing through that area. | 06-14-2012 |
20140336696 | METHODS AND APPARATUS FOR TREATING BODY TISSUE SPHINCTERS AND THE LIKE - A plurality of structures that resiliently attract one another are provided for implanting in a patient around a body tissue structure of the patient. For example, the body tissue structure may be the esophagus, and the plurality of structures may be implanted in an annulus around the outside of the esophagus, the annulus being substantially coaxial with the esophagus. The attraction may be between annularly adjacent ones of the structures in the annulus, and it may be provided, for example, by magnets or springs. The array of structures is preferably self-limiting with respect to the smallest area that it can encompass, and this smallest area is preferably large enough to prevent the apparatus from applying excessive pressure to tissue passing through that area. | 11-13-2014 |
Patent application number | Description | Published |
20130121135 | DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 05-16-2013 |
20130121166 | DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 05-16-2013 |
20130155835 | APPLIANCE IN A MOBILE DATA NETWORK THAT SPANS MULTIPLE ENCLOSURES - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 06-20-2013 |
20130155843 | AUTONOMIC ERROR RECOVERY FOR A DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - A mechanism provides autonomic recovery for a breakout appliance at the edge of a mobile data network from a variety of errors using a combination of hardware, software and network recovery actions. The recovery actions proceed upon a sliding scale depending on the severity of the problem to achieve the goals of minimizing disruption to traffic flowing through the NodeB while also maintaining an acceptable cost of ownership/maintenance of the system by automatically recovering from as many problems as possible. The error recovery functions within the breakout system hide the error recovery complexities from the management system upstream in the mobile data network. For critical, non-recoverable errors, the autonomic recovery mechanism works in conjunction with a fail-to-wire module to remove the breakout system in the event of a failure in such a way that the mobile data network functions as if the breakout system is no longer present. | 06-20-2013 |
20130155873 | HOSTING EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 06-20-2013 |
20130157616 | APPLIANCE IN A MOBILE DATA NETWORK THAT SPANS MULTIPLE ENCLOSURES - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 06-20-2013 |
20130157644 | AUTONOMIC ERROR RECOVERY FOR A DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - A mechanism provides autonomic recovery for a breakout appliance at the edge of a mobile data network from a variety of errors using a combination of hardware, software and network recovery actions. The recovery actions proceed upon a sliding scale depending on the severity of the problem to achieve the goals of minimizing disruption to traffic flowing through the NodeB while also maintaining an acceptable cost of ownership/maintenance of the system by automatically recovering from as many problems as possible. The error recovery functions within the breakout system hide the error recovery complexities from the management system upstream in the mobile data network. For critical, non-recoverable errors, the autonomic recovery mechanism works in conjunction with a fail-to-wire module to remove the breakout system in the event of a failure in such a way that the mobile data network functions as if the breakout system is no longer present. | 06-20-2013 |
20130160085 | HOSTING EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 06-20-2013 |
20130163413 | LAYERED CONTROL OF SERVICE INTERFACE FOR A BREAKOUT COMPONENT IN A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The breakout component includes a service interface that performs primary control by one system, and backup control by a different system. | 06-27-2013 |
20130165177 | LAYERED CONTROL OF SERVICE INTERFACE FOR A BREAKOUT COMPONENT IN A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The breakout component includes a service interface that performs primary control by one system, and backup control by a different system. | 06-27-2013 |
20130173898 | SECURE BOOT OF A DATA BREAKOUT APPLIANCE WITH MULTIPLE SUBSYSTEMS AT THE EDGE OF A MOBILE DATA NETWORK - A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform modules (TPM) to secure multiple subsystems. Further described is utilizing a first TPM to boot a service processor and then utilizing a second TPM to secure boot two additional subsystems. Booting of the final subsystem is accomplished in a two step process which first loads a boot loader and verifies the boot loader, and then second loads an operating system load image and verifies the operating system code. | 07-04-2013 |
20130174220 | SECURE BOOT OF A DATA BREAKOUT APPLIANCE WITH MULTIPLE SUBSYSTEMS AT THE EDGE OF A MOBILE DATA NETWORK - A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform modules (TPM) to secure multiple subsystems. Further described is utilizing a first TPM to boot a service processor and then utilizing a second TPM to secure boot two additional subsystems. Booting of the final subsystem is accomplished in a two step process which first loads a boot loader and verifies the boot loader, and then second loads an operating system load image and verifies the operating system code. | 07-04-2013 |
20130188477 | DISTRIBUTED CONTROL OF A FAIL-TO-WIRE SWITCH FOR A NETWORK COMMUNICATION LINK - A fail-to-wire (FTW) module preserves a primary data path connection from an upstream computer to a downstream computer if there is any kind of failure in a breakout data path to a breakout system. The FTW module provides switches between the incoming data network data and the breakout system such that when the breakout system encounters a failure, the switches are de-activated to bypass the breakout system. The switches in the FTW module are activated by a system health signal controlled by a health monitor in the breakout system. The health monitor provides intelligent switch control based on alerts from a variety of control points. These control points include firmware, hardware, thermal sensors, subsystem operating systems, subsystem software applications, and appliance tamper logic in order to determine if the FTW module switches should be in an active or inactive state. | 07-25-2013 |
20130208580 | HOSTING EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 08-15-2013 |
20130208674 | HOSTING EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 08-15-2013 |
20130265868 | HOSTING DEVICE-SPECIFIC EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 10-10-2013 |
20130265936 | HOSTING DEVICE-SPECIFIC EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts device-specific edge applications that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 10-10-2013 |
20140036690 | AGGREGATED APPLIANCE IN A MOBILE DATA NETWORK - A mobile data network includes a breakout appliance at the edge of the mobile data network and an appliance in the core network that includes multiple enclosures. Each appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliances without revealing details regarding the hardware and software used to implement the appliances. An aggregate appliance in the mobile data network defines high-level commands, which each have a corresponding set of steps that are performed when the high-level command is executed. Each step causes one or more of the defined commands to be executed on the breakout appliance and/or the appliance in the core network and/or one a related software entity. This aggregated appliance allows configuring and controlling the breakout appliance and the appliance in the core network in a way that is transparent to most existing components in the mobile data network. | 02-06-2014 |
20140038583 | AGGREGATED APPLIANCE IN A MOBILE DATA NETWORK - A mobile data network includes a breakout appliance at the edge of the mobile data network and an appliance in the core network that includes multiple enclosures. Each appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliances without revealing details regarding the hardware and software used to implement the appliances. An aggregate appliance in the mobile data network defines high-level commands, which each have a corresponding set of steps that are performed when the high-level command is executed. Each step causes one or more of the defined commands to be executed on the breakout appliance and/or the appliance in the core network and/or one a related software entity. This aggregated appliance allows configuring and controlling the breakout appliance and the appliance in the core network in a way that is transparent to most existing components in the mobile data network. | 02-06-2014 |
20140044039 | COOPERATIVE MOBILITY MANAGEMENT IN A MOBILE DATA NETWORK WITH DATA BREAKOUT AT THE EDGE - A TCP context is transferred to a Gi Optimizer to provide cooperative mobility management in a mobile data network with a breakout system. The breakout system includes an Iub Optimizer at the MIOP@NodeB, and the Gi Optimizer at the MIOP@Core. When a MIOP@NodeB detects a mobility event for a broken out user equipment (UE), the Iub optimizer in the MIOP@NodeB coordinates with the Gi optimizer to transfer the TCP/UDP connection established between the UE and the IuB Optimizer to the Gi Optimizer. After the transfer, the UE is served by the Gi Optimizer. The transfer of the TCP/UDP connection to the Gi optimizer may require tunnel stitching at the MIOP@RNC depending on the PDP context state and the RRC state of the UE. | 02-13-2014 |
20140045486 | COOPERATIVE MOBILITY MANAGEMENT IN A MOBILE DATA NETWORK WITH DATA BREAKOUT AT THE EDGE - A TCP context is transferred to a Gi Optimizer to provide cooperative mobility management in a mobile data network with a breakout system. The breakout system includes an Iub Optimizer at the MIOP@NodeB, and the Gi Optimizer at the MIOP@Core. When a MIOP@NodeB detects a mobility event for a broken out user equipment (UE), the Iub optimizer in the MIOP@NodeB coordinates with the Gi optimizer to transfer the TCP/UDP connection established between the UE and the IuB Optimizer to the Gi Optimizer. After the transfer, the UE is served by the Gi Optimizer. The transfer of the TCP/UDP connection to the Gi optimizer may require tunnel stitching at the MIOP@RNC depending on the PDP context state and the RRC state of the UE. | 02-13-2014 |
20140120978 | NETWORK MANAGEMENT FOR WIRELESS APPLIANCES IN A MOBILE DATA NETWORK - A network management system utilizes an element manager at the RNC level to reduce the workload and efficiently manage multiple wireless appliances in a mobile data network. Management communications from the network management system flow through the element manager to all devices under the RNC level appliance hosting the element manager. The element manager provides for fault management, performance monitoring and configuration of the many breakout appliances and reports necessary information back to the network management system. | 05-01-2014 |
20140122946 | NETWORK MANAGEMENT FOR WIRELESS APPLIANCES IN A MOBILE DATA NETWORK - A network management system utilizes an element manager at the RNC level to reduce the workload and efficiently manage multiple wireless appliances in a mobile data network. Management communications from the network management system flow through the element manager to all devices under the RNC level appliance hosting the element manager. The element manager provides for fault management, performance monitoring and configuration of the many breakout appliances and reports necessary information back to the network management system. | 05-01-2014 |