Patent application number | Description | Published |
20120016849 | Sharing and Deconflicting Data Changes In A Multimaster Database System - A computer-based method and system for sharing and deconflicting data changes amongst a plurality of replication sites. In a particular embodiment, data changes at sites to data objects are tracked by each site on a per-data object basis using per-data object version vectors. In another particular embodiment, data changes at sites to links connecting two data objects are tracked by each site on a per-link set basis using per-link set version vectors. In another particular embodiment, per-object version vectors are used to detect a conflict resulting from concurrent changes at two or more sites in which one of the concurrent changes includes an object resolution change. | 01-19-2012 |
20130060742 | MULTI-ROW TRANSACTIONS - Techniques are provided for more efficient multi-row atomic, consistent, isolated and durable (ACID)-compliant transactions with snapshot isolation semantics (or just “multi-row transactions” for short). In some embodiments, the techniques are implemented in a computing system that includes a client application, a lightweight in-memory lease-based lock service, a multi-row transaction orchestrator, and an underlying database system. The transaction orchestrator implements a read protocol and a write protocol that provides support to the client application for carrying out multi-row transactions against the underlying database system irrespective of whether the database system itself supports multi-row transactions. The transaction orchestrator explicitly maintains transaction-level locks obtained from the lease-based lock service as part of the transaction protocol. Further, the transaction orchestrator is tolerant to lock service failure and unavailability without compromising ACID-compliance and snapshot isolation guarantees to the client application. | 03-07-2013 |
20130318060 | MULTI-ROW TRANSACTIONS - Techniques are provided for more efficient multi-row atomic, consistent, isolated and durable (ACID)-compliant transactions with snapshot isolation semantics (or just “multi-row transactions” for short). In some embodiments, the techniques are implemented in a computing system that includes a client application, a lightweight in-memory lease-based lock service, a multi-row transaction orchestrator, and an underlying database system. The transaction orchestrator implements a read protocol and a write protocol that provides support to the client application for carrying out multi-row transactions against the underlying database system irrespective of whether the database system itself supports multi-row transactions. The transaction orchestrator explicitly maintains transaction-level locks obtained from the lease-based lock service as part of the transaction protocol. Further, the transaction orchestrator is tolerant to lock service failure and unavailability without compromising ACID-compliance and snapshot isolation guarantees to the client application. | 11-28-2013 |
20140280155 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR COMPARING AND ASSOCIATING OBJECTS - Computer-implemented systems and methods are disclosed for comparing and associating objects. In some embodiments, a method is provided for associating a first object with one or more objects within a plurality of objects, each object comprising a first plurality of properties, each property comprising data reflecting a characteristic of an entity represented by the object, the associated objects comprising matching data in corresponding properties for a second plurality of properties. The method may include executing, for each object within the plurality of objects and for the first object, the following: creating a slug for the object, the slug comprising the second plurality of properties from the object; and inputting the slug for the object into a Bloom filter. Further, the method may include creating for a bin within the Bloom filter corresponding to the slug for the first object, an association between objects whose slugs correspond to the bin if the slugs for those objects match. | 09-18-2014 |
20140280252 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR COMPARING AND ASSOCIATING OBJECTS - Computer-implemented systems and methods are disclosed for comparing and associating objects. In some embodiments, a method is provided for associating a first object with one or more objects within a plurality of objects, each object comprising a first plurality of properties, each property comprising data reflecting a characteristic of an entity represented by the object, the associated objects comprising matching data in corresponding properties for a second plurality of properties. The method may include executing, for each object within the plurality of objects and for the first object, the following: creating a slug for the object, the slug comprising the second plurality of properties from the object; and inputting the slug for the object into a Bloom filter. Further, the method may include creating for a bin within the Bloom filter corresponding to the slug for the first object, an association between objects whose slugs correspond to the bin if the slugs for those objects match. | 09-18-2014 |
20150046870 | CONTEXT-SENSITIVE VIEWS - A context-sensitive viewing system is disclosed in which various data visualizations, also referred to a contextual views, of a common set of data may be viewed by a user on an electronic device. Data in the system may comprise data objects and associated properties and/or metadata, and may be stored in one or more electronic data stores. As a user of the system views and manipulates a first contextual view of a set of data objects, one or more other contextual views of the same set of data objects may be updated accordingly. Updates to the secondary contextual views may, in various embodiments, happen real-time. Further, the secondary contextual views may be visible to the user simultaneously with the primary contextual view. A user may switch from one view to another, and may manipulate data in any view, resulting in updates in the other views. | 02-12-2015 |
20150106379 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR COMPARING AND ASSOCIATING OBJECTS - Computer-implemented systems and methods are disclosed for comparing and associating objects. In some embodiments, a method is provided for associating a first object with one or more objects within a plurality of objects, each object comprising a first plurality of properties, each property comprising data reflecting a characteristic of an entity represented by the object, the associated objects comprising matching data in corresponding properties for a second plurality of properties. The method may include executing, for each object within the plurality of objects and for the first object, the following: creating a slug for the object, the slug comprising the second plurality of properties from the object; and inputting the slug for the object into a Bloom filter. Further, the method may include creating for a bin within the Bloom filter corresponding to the slug for the first object, an association between objects whose slugs correspond to the bin if the slugs for those objects match. | 04-16-2015 |
20150112956 | TRANSACTION PROTOCOL FOR READING DATABASE VALUES - Techniques are provided for more efficient multi-row atomic, consistent, isolated and durable (ACID)-compliant transactions with snapshot isolation semantics (or just “multi-row transactions” for short). In some embodiments, the techniques are implemented in a computing system that includes a client application, a lightweight in-memory lease-based lock service, a multi-row transaction orchestrator, and an underlying database system. The transaction orchestrator implements a read protocol and a write protocol that provides support to the client application for carrying out multi-row transactions against the underlying database system irrespective of whether the database system itself supports multi-row transactions. The transaction orchestrator explicitly maintains transaction-level locks obtained from the lease-based lock service as part of the transaction protocol. Further, the transaction orchestrator is tolerant to lock service failure and unavailability without compromising ACID-compliance and snapshot isolation guarantees to the client application. | 04-23-2015 |
20150186821 | COMPUTER-IMPLEMENTED METHODS AND SYSTEMS FOR ANALYZING HEALTHCARE DATA - Computer-implemented systems and methods are provided for analyzing healthcare-related entity performance. In one implementation, a method is implemented with one or more processors and includes accessing a data structure including information that specifies healthcare-related interactions and identifying, from the data structure, a first set of interactions associated with a first healthcare-related entity. The method also includes identifying, from the data structure, a second set of interactions associated with one or more filter selections and processing the information of the identified first and second set of interactions to provide performance information of the first healthcare-related entity and one or more healthcare-related entities associated with the one or more filter selections. The method also includes generating a user interface that includes the performance information of the first healthcare-related entity and the one or more healthcare-related entities indicating a performance of the first healthcare-related entity and the one or more healthcare-related entities respectively. | 07-02-2015 |
20150187036 | COMPUTER-IMPLEMENTED METHODS AND SYSTEMS FOR ANALYZING HEALTHCARE DATA - Computer-implemented systems and methods are provided for analyzing healthcare-related entity performance. In one implementation, a method is implemented with one or more processors and includes receiving a request that includes one or more filter selections and accessing a data structure including information that specifies a plurality of categories of healthcare-related interactions associated with multiple healthcare-related entities. The method also includes identifying a set of categories from the plurality of categories based on the one or more filter selections and processing the information of the identified categories to provide performance information of one or more entities of the multiple healthcare-related entities in accordance with the one or more filter selections. The method further includes generating a user interface that includes the performance information indicating a performance of the one or more entities. | 07-02-2015 |
Patent application number | Description | Published |
20100155782 | SUPER CMOS DEVICES ON A MICROELECTRONICS SYSTEM - A low cost IC solution is disclosed in accordance with an embodiment to provide Super CMOS microelectronics macros. Hereinafter, the Super CMOS or Schottky CMOS all refer to SCMOS. The SCMOS device solutions with a niche circuit element, the complementary low threshold Schottky barrier diode pairs (SBD) made by selected metal barrier contacts (Co/Ti) to P- and N- Si beds of the CMOS transistors. A DTL like new circuit topology and designed wide contents of broad product libraries, which used the integrated SBD and transistors (BJT, CMOS, and Flash versions) as basic components. The macros are composed of diodes that are selectively attached to the diffusion bed of the transistors, configuring them to form generic logic gates, memory cores, and analog functional blocks from simple to the complicated, from discrete components to all grades of VLSI chips. Solar photon voltaic electricity conversion and bio-lab-on-a-chip are two newly extended fields of the SCMOS IC applications. | 06-24-2010 |
20140152343 | SUPER CMOS DEVICES ON A MICROELECTRONICS SYSTEM - A low cost IC solution is disclosed in accordance with an embodiment to provide Super CMOS microelectronics macros. Hereinafter, the Super CMOS or Schottky CMOS all refer to SCMOS. The SCMOS device solutions with a niche circuit element, the complementary low threshold Schottky barrier diode pairs (SBD) made by selected metal barrier contacts (Co/Ti) to P— and N—Si beds of the CMOS transistors. A DTL like new circuit topology and designed wide contents of broad product libraries, which used the integrated SBD and transistors (BJT, CMOS, and Flash versions) as basic components. The macros are composed of diodes that are selectively attached to the diffusion bed of the transistors, configuring them to form generic logic gates, memory cores, and analog functional blocks from simple to the complicated, from discrete components to all grades of VLSI chips. Solar photon voltaic electricity conversion and bio-lab-on-a-chip are two newly extended fields of the SCMOS IC applications. | 06-05-2014 |
20160104691 | SUPER CMOS DEVICES ON A MICROELECTRONICS SYSTEM - A low cost IC solution is disclosed in accordance with an embodiment to provide Super CMOS microelectronics macros. Hereinafter, the Super CMOS or Schottky CMOS all refer to SCMOS. The SCMOS device solutions with a niche circuit element, the complementary low threshold Schottky barrier diode pairs (SBD) made by selected metal barrier contacts (Co/Ti) to P- and N-Si beds of the CMOS transistors. A DTL like new circuit topology and designed wide contents of broad product libraries, which used the integrated SBD and transistors (BJT, CMOS, and Flash versions) as basic components. The macros are composed of diodes that are selectively attached to the diffusion bed of the transistors, configuring them to form generic logic gates, memory cores, and analog functional blocks from simple to the complicated, from discrete components to all grades of VLSI chips. Solar photon voltaic electricity conversion and bio-lab-on-a-chip are two newly extended fields of the SCMOS IC applications. | 04-14-2016 |
Patent application number | Description | Published |
20080281627 | System and method for improving the performance of electronic media advertising campaigns through multi-attribute analysis and optimization - Automated system, methods, algorithms, procedures, and computer software programs and computer program products for improving and optimizing the performance of messaging campaigns, particularly for marketing campaigns in which advertisements or other messages are distributed over an interactive measurable medium such as the Internet. Analysis and Optimization method and procedure, an automated system, and system and method that exploit the underlying multi-attribute structure, as well as other features and advantages. Optimization procedures allocate the ad alternatives or other message to the customer population to optimize business objectives such as maximizing the number of positive responses received. Procedure for generating message allocations that improve and attempt to optimize the campaign performance. Methods ensure that campaign constraints are not violated. Methods can be implemented on a computer that is programmed to retrieve message performance information and to generate recommended message allocations for each stage in a multi-stage messaging campaign to achieve messaging goals. | 11-13-2008 |
20110238487 | System and Method for Improving the Performance of Electronic Media Advertising Campaigns Through Multi-Attribute Analysis and Optimization - Automated system, methods, algorithms, procedures, and computer software programs and computer program products for improving and optimizing the performance of messaging campaigns, particularly for marketing campaigns in which advertisements or other messages are distributed over an interactive measurable medium such as the Internet. Analysis and Optimization method and procedure, an automated system, and system and method that exploit the underlying multi-attribute structure, as well as other features and advantages. Optimization procedures allocate the ad alternatives or other message to the customer population to optimize business objectives such as maximizing the number of positive responses received. Procedure for generating message allocations that improve and attempt to optimize the campaign performance. Methods ensure that campaign constraints are not violated. Methods can be implemented on a computer that is programmed to retrieve message performance information and to generate recommended message allocations for each stage in a multi-stage messaging campaign to achieve messaging goals. | 09-29-2011 |
Patent application number | Description | Published |
20100332720 | Direct Memory Access and Super Page Swapping Optimizations For A Memory Blade - A system and method is illustrated for identifying an Input/Output (I/O) driver module, using a hypervisor, to receive a read command to read a virtual memory page from a remote memory location. Further, the system and method includes reading the remote virtual memory page, using the I/O driver module, into a memory buffer managed by the I/O driver module. Additionally, the system and method includes storing the virtual memory page in the memory buffer to a persistent storage device. The system and method also includes identifying a remote super page, using a hypervisor, the remote super page including a remote sub page. Additionally, the system and method includes identifying a local super page, using the hypervisor, the local super page including a local sub page. Further, the system and method includes swapping the local sub page for the remote sub page, using the hypervisor, the swapping occurring over a network. | 12-30-2010 |
20110072204 | MEMORY SERVER - A memory server providing remote memory for servers independent from the memory server. The memory server includes memory modules and a page table. A memory controller for the memory server allocates memory in the memory modules for each of the servers and manages remote memory accesses for the servers. The page table includes entries identifying the memory module and locations in the memory module storing data for the servers. | 03-24-2011 |
20110113115 | STORAGE SYSTEM WITH A MEMORY BLADE THAT GENERATES A COMPUTATIONAL RESULT FOR A STORAGE DEVICE - One embodiment is a storage system having one or more compute blades to generate and use data and one or more memory blades to generate a computational result. The computational result is generated by a computational function that transforms the data generated and used by the one or more compute blades. One or more storage devices are in communication with and remotely located from the one or more compute blades. The one or more storage devices store and serve the data for the one or more compute blades. | 05-12-2011 |
20120005556 | Organizing And Managing A Memory Blade With Super Pages And Buffers - A system and method is illustrated wherein a protocol agent module receives a memory request encoded with a protocol, the memory request identifying an address location in a memory module managed by a buffer. Additionally, the system and method includes a memory controller to process the memory request to identify the buffer that manages the address location in the memory module. Further, the system and method includes an address mapping module to process the memory request to identify at least one super page associated with the memory module, the at least one super page associated with the address location. | 01-05-2012 |
20120030406 | HYPERVISOR-BASED MANAGEMENT OF LOCAL AND REMOTE VIRTUAL MEMORY PAGES - A system and method is illustrated for comparing a target memory address and a local memory size using a hypervisor module that resides upon a compute blade, the comparison based upon a unit of digital information for the target memory address and an additional unit of digital information for the local memory size. Additionally, the system and method utilizes swapping of a local virtual memory page with a remote virtual memory page using a swapping module that resides on the hypervisor module, the swapping based upon the comparing of the target memory address and the local memory size. Further, the system and method is implemented to transmit the local virtual memory page to a memory blade using a transmission module that resides upon the compute blade. | 02-02-2012 |
20120131278 | DATA STORAGE APPARATUS AND METHODS - Data storage apparatus and methods are disclosed. A disclosed example data storage apparatus comprises a cache layer and a processor in communication with the cache layer. The processor is to dynamically enable or disable the cache layer via a cache layer enable line based on a data store access type. | 05-24-2012 |
Patent application number | Description | Published |
20090320678 | Sorbent Filter for the Removal of Vapor Phase Contaminants - Methods and apparatuses are described for removing a contaminant, such as a vaporous trace metal contaminant like mercury, from a gas stream. In one embodiment, a primary particulate collection device that removes particulate matter is used. In this embodiment, a sorbent filter is placed within the housing of the primary particulate collection device, such as an electrostatic precipitator or a baghouse, to adsorb the contaminant of interest. In another embodiment, a sorbent filter is placed within or after a scrubber, such as a wet scrubber, to adsorb the contaminant of interest. In some embodiments, the invention provides methods and apparatuses that can advantageously be retrofit into existing particulate collection equipment. In some embodiments, the invention provides methods and apparatuses that in addition to removal of a contaminant additionally remove particulate matter from a gas stream. | 12-31-2009 |
20100202945 | Method and Apparatus for the Enhanced Removal of Aerosols and Vapor Phase Contaminants from a Gas Stream - The invention provides methods and apparatuses for removing aerosols and, in some cases, vapor phase contaminants, such as mercury, from a gas stream. One method is directed to the removal of additional aerosols from a gas stream from which aerosols have previously been removed by using a screen in combination with a primary aerosol collection device. Another method is directed to the removal of both aerosols and vapor phase contaminants by using a sorbent in combination with a screen. Another method is directed to the removal of vapor phase contaminants by using a catalyst to convert the contaminant to a form that is more easily removed from the gas stream and optionally injecting a chemical to increase the rate of conversion. The invention also provides various apparatuses for use in performing the various methods of the invention. | 08-12-2010 |
20110056417 | CATALYST ASH PROTECTOR - A combustion apparatus includes: a combustion device operable to produce flue gas having large particulate ash entrained therein; an outlet duct coupled in flow communication with the combustion device so as to receive the flue gas; a screen positioned at least partially in the outlet duct downstream of the combustion device, the screen effective to trap large particulate ash while permitting flow of the flue gas therethrough; and apparatus operable to remove large particulate ash from the screen while at least a portion of the screen remains inside the duct. | 03-10-2011 |
20110223082 | Chemically-Enhanced Sorbent Activation Process and Method for Using Same - The invention in its various embodiments is directed to methods and equipment for generating an activated sorbent from a sorbent precursor with the addition of certain chemicals that enhance the effectiveness of the activated sorbent. The invention in its various embodiments is also directed to the methods and equipment for generating some of the chemicals that are added to the raw carbonaceous material or activated sorbent to enhance its effectiveness. The invention in its various embodiments is also directed to methods and equipment for generating certain chemicals that can be added to a gas stream to convert a given gaseous pollutant to a form that is more easily removed from the gas stream. | 09-15-2011 |
20110223088 | Method and Apparatus for On-Site Production of Lime and Sorbents for Use in Removal of Gaseous Pollutants - The invention provides various methods for removing gas phase pollutants by calcining limestone or dolomite using flash calcination to produce a high surface area lime or hydrated lime and directly adding the lime or hydrated lime to a gas stream containing gas phase pollutants. In other methods, the production of an activated sorbent, such as activated carbon, is combined with the production of the high surface area lime or hydrated lime and directly added to a gas stream containing gas phase pollutants. The combination of lime or hydrated lime and an activated sorbent enhances the removal of gas phase pollutants such as those from a coal-fired boiler flue gas. | 09-15-2011 |
20120247330 | METHOD AND APPARATUS FOR RAPID ADSORPTION-DESORPTION CO2 CAPTURE - An apparatus for capture and sequestration of CO | 10-04-2012 |
20130095019 | Chemically-Enhanced Sorbent Activation Process and Methods for Using Same - The invention is directed to methods and equipment for generating an activated sorbent from a sorbent precursor with the addition of certain chemicals that enhance the effectiveness of the activated sorbent. The invention is also directed to the methods and equipment for generating some of the chemicals that are added to the raw carbonaceous material or activated sorbent to enhance its effectiveness. The invention is also directed to methods and equipment for generating certain chemicals that can be added to a gas stream to convert a given gaseous pollutant to a form that is more easily removed from the gas stream. The invention is also directed to methods and equipment for adding an activated sorbent and various chemicals for a gas stream having one or more gaseous pollutants. | 04-18-2013 |
20130255488 | METHOD AND APPARATUS FOR RAPID ADSORPTION-DESORPTION CO2 CAPTURE - An apparatus for capture and sequestration of CO | 10-03-2013 |
20150059572 | METHOD AND APPARATUS FOR RAPID ADSORPTION-DESORPTION CO2 CAPTURE - A method of capturing and sequestering a gas species from a fossil fuel-fired power plant flue gas is disclosed. The method includes the step of providing an apparatus having a vessel adapted to be pressurized and a hollow fiber membrane contained in the vessel and having a sorbent embedded therein. The method further includes the steps of subjecting the hollow fiber membrane to a flow of flue gas, removing one or more gas species from the flue gas with the hollow fiber membrane, and regenerating the sorbent contained in the hollow fiber membrane. | 03-05-2015 |
Patent application number | Description | Published |
20140273765 | Polishing System with Front Side Pressure Control - A polishing apparatus includes a platen having a first surface to support a polishing pad and a second surface, a carrier head to hold a substrate against the polishing pad, a plurality of through-holes defined in the platen, and a pad pressure control assembly adjacent on a side of the platen opposite the carrier head. | 09-18-2014 |
20140273766 | Polishing System with Front Side Pressure Control - A polishing apparatus includes a platen having a first surface to support a polishing pad and a second surface, a carrier head to hold a substrate against the polishing pad, a plurality of through-holes defined in the platen, and a pad pressure control assembly adjacent on a side of the platen opposite the carrier head. | 09-18-2014 |
20140315473 | MULTI-DISK CHEMICAL MECHANICAL POLISHING PAD CONDITIONERS AND METHODS - A pad conditioner may include multiple independently mounted conditioning elements configured to condition a polishing pad used in, e.g., a chemical mechanical polishing (CMP) process. In some embodiments, the pad conditioner may include a main assembly disk and a main assembly base plate attached to the main assembly disk via a gimbal connection. A plurality of pad conditioner assemblies may be attached to the main assembly base plate. In some embodiments, each pad conditioner assembly may include a pad conditioner disk attached to the main assembly base plate, a pad conditioner base attached to the pad conditioner disk via a gimbal connection, and a conditioning element attached to the pad conditioner base. Methods of conditioning a polishing pad are also provided, as are other aspects. | 10-23-2014 |
Patent application number | Description | Published |
20130100074 | PEN INTERFACE FOR A TOUCH SCREEN DEVICE - A system and method that allows pen input and touch input to better co-exist during writing on a touch screen device, such as a tablet device. If the pen/stylus is detected as present and is pointed at the surface, inputs initiated by a user's finger (or other) touch are rejected and pen inputs are allowed. If the pen is detected as present, but is pointed away from the writing surface of the touch screen, stylus/pen inputs are rejected and touch inputs are allowed. If pen is not detected as present, the system ignores all pen inputs. Erasing functions are also provided. The size of the eraser can be made proportional to the pressure level, contact size or signal level of the pen or the user's finger performing the erasing. | 04-25-2013 |
20130100160 | INFRARED REFLECTION BASED COVER DETECTION - A system and method for improving power consumption by providing the ability to detect whether a cover is placed on top of Infrared, IR, touch device. While the cover is in the open state, a certain amount of the light transmitted by the IR transmitters is directed upward and away from the IR receivers in the device. When the cover is closed, this light is reflected off of the cover and is incident on the IR receivers. The system of the present invention recognizes this increased level of received IR light and determines that the cover is in a closed position. Having made such a determination that the cover is placed on the device, the device's power savings system can switch to an appropriate power saving mode. | 04-25-2013 |
20140043265 | SYSTEM AND METHOD FOR DETECTING AND INTERPRETING ON AND OFF-SCREEN GESTURES - A system and method for the detection and interpretation of unique and distinctive gestures by extending the input sensor area to a perimeter area beyond the display area. In systems that have more flexible requirements, an additional gesture band can be located within the display area. The extended input sensor area allows for new gestures that are facilitated by the expanded sensor area. One gesture initiated around the corner of the device is most useful as ‘next’ and ‘previous’ navigation gestures found in traditional electronic publication reader applications, but can be overloaded or repurposed to serve different functions depending on the context. An gesture is used to initiate screen capture process. A third gesture is a corner-fold bookmark gesture and is used to bookmark a page by ‘dog earing’ the corner of the page electronically. An additional gesture, also initiated at the corner of the device launches selectable icons for the most frequently used applications. | 02-13-2014 |
20140247238 | SYSTEM AND METHOD FOR DUAL MODE STYLUS DETECTION - A system and method for improved accuracy in the detection of a stylus on a touch sensitive surface of an electronic device, such as a tablet. A dual method of detection is employed including electromagnetic induction detection of the stylus as it is in the vicinity of the screen of the electronic device, as well as capacitive detection of the stylus tip as it contacts the touch screen. The electronic device detects the presence of the top of the stylus and provides the general coordinates of its position. Then, as touches occur on the surface of the device, e.g., the stylus tip as well as the various parts of the user's hand, the system uses the coordinates supplied from the electromagnetic induction detection to very quickly and accurately pinpoint the actual location of the stylus input on the surface of the device. | 09-04-2014 |
Patent application number | Description | Published |
20090131747 | Instrument And Method For Remotely Manipulating A Tissue Structure - A retractor and a surgical tool are positioned within a cannula, and a dissection cradle of the retractor is positioned at the distal end of the cannula. The retractor includes a dissection cradle that is resiliently supported along an axis skewed relative to the axis of the cannula. The dissection cradle, in operation, is extended to cradle the target vessel, and the retractor may be fully extended to urge the vessel away from the axis of the cannula to isolate a side branch for exposure to a surgical tool. The retractor includes a hollow support and a spray nozzle disposed in the distal end of the retractor to form an irrigation system and lens washer that can be selectively positioned to direct the spray of irrigation fluid at a remote surgical site or at an endoscopic lens. | 05-21-2009 |
20110101069 | Surgical Stapler with Direct Sled to Staple Contact - An exemplary surgical stapler may include a staple holder, staples positioned within the staple holder, and at least one structure slidable within the staple holder to contact directly at least one staple, where that direct contact deploys at least one staple from the staple holder. Another exemplary surgical stapler may include a staple holder, an anvil movably connected to the staple holder, staples positioned within the staple holder; and a sled slidable within the staple holder to contact directly at least one staple, where that direct contact urges at least one staple out of the staple holder and against the anvil. | 05-05-2011 |
20120010463 | INSTRUMENT AND METHOD FOR REMOTELY MANIPULATING A TISSUE STRUCTURE - A retractor and a surgical tool are posittioned within a cannula, and a dissection cradle of the retractor is positioned at the distal end of the cannula. The retractor includes a dissection cradle that is resiliently supported along an axis skewed relative to the axis of the cannula. The dissection cradle, in operation, is extended to cradle the target vessel, and the retractor may be fully extended to urge the vessel away from the axis of the cannula to isolate a side branch for exposure to a surgical tool. The retractor includes a hollow support and a spray nozzle disposed in the distal end of the retractor to form an irrigation system and lens washer that can be selectively positioned to direct the spray of irrigation fluid at a remote surgical site or at an endoscopic lens. | 01-12-2012 |
20130178878 | SURGICAL STAPLE FOR ANASTOMOSIS - A surgical staple for connecting two tubular tissue structures may include a substantially rectangular base having a first edge and a second edge substantially parallel to one another, and a third edge substantially perpendicular to the first and said second edges; and may also include at least three deformable tines extending from the first and second edges of said base; where no tine that extends from the first edge may be positioned at substantially the same distance from the third edge as any said tine that extends from the second edge; and where deformation of the tines secures the tubular tissue structures together. | 07-11-2013 |
Patent application number | Description | Published |
20140283124 | Method for Managing Access to Documents Protected by Digital Rights Management - A method for managing user access of a document protected by digital rights management (DRM), includes the steps of a server checking whether a user who is attempting to access a DRM-protected document has necessary rights to access the document, the server denying the user's access to the document if the user does not have the necessary rights to access the document, the server providing, if the user does not have the necessary rights to access the document, the user with an instant and pre-prepared prompt containing a unique identification (ID) of the document to direct and assist the user to complete required tasks for acquiring rights to the document, and upon completion of the required tasks by the user, the server granting the necessary rights to the user to access the document. | 09-18-2014 |
20140298488 | METHOD FOR AUTOMATING THE MANAGEMENT AND INTERPRETATION OF DIGITAL DOCUMENTS AND THEIR OWNERS RIGHTS METADATA FOR GENERATING DIGITAL RIGHTS MANAGEMENT PROTECTED CONTENTS - A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document. | 10-02-2014 |
20140380143 | DYNAMIC DISPLAY METHOD OF MULTI-LAYERED PDF DOCUMENTS - A method for dynamic display of at least one layer in a PDF document, comprising the steps of setting at least one criterion for at least one property of a trigger to change a display state of the at least one layer of the PDF document to another display state of the at least one layer of the PDF document, creating a script that can be processed by a PDF document reader and that contains the at least one criterion for the at least one property of the trigger, and embedding the script in the PDF document, wherein when the PDF document is opened by the PDF document reader, the script causes evaluation of the at least one property for the trigger, and if the at least one criterion for the at least one property of the trigger is met, then the script causes a change of the display state of the at least one layer of the PDF document. | 12-25-2014 |
20150248195 | USER INTERFACE METHOD FOR MODIFYING A SELECTION LIST OF ITEMS TO ADD OR REMOVE ITEMS WHILE INDICATING ORIGINAL SELECTION - A user interface display method implemented on a computer-controlled device to allow an operator to define a list of selected items among a plurality of items available for selection. The operator starts by selecting a pre-existing list containing a number of selected items. A modified list is generated which initially contains the same items as the pre-existing list. The device displays all of the items available for selection, as well as first and second indications associated with each item initially in the modified list. Then, in response to operator inputs to add items to (or remove items from) the modified list, second indications are displayed (or removed from display) in association with the items to be added (or removed), without changing the display of any of the first indications and any of the plurality of items. The modified list is saved without changing the pre-existing list. | 09-03-2015 |
20150271211 | RIGHTS MANAGEMENT POLICIES WITH NONTRADITIONAL RIGHTS CONTROL - A method for managing rights management policies for user access and use of digital documents with nontraditional rights control in addition to traditional rights management services (RMS) based on digital rights management (DRM) policies assigned to respective digital documents and their users and stored in an RMS database, including the steps of: a server, upon receiving a user's request regarding a document protected by one or more DRM policies, determining whether the document has additional nontraditional rights control for the user; the server checking a nontraditional policy service (NPS) database, and validating the user's information with one or more NPS database entries of NPS policy extensions pertaining to the document and the user, where the NPS policy extensions amend the DRM policies with additional nontraditional rights control; and the server denying the user's request if the user's information cannot be validated by anyone of said one or more NPS database entries of the NPS policy extensions pertaining to the document and the user, or granting the user's request if the user's information can be validated by all of said one or more NPS database entries of the NPS policy extensions pertaining to the document and the user. | 09-24-2015 |
20150356277 | METHOD FOR AUTOMATING THE MANAGEMENT AND INTERPRETATION OF DIGITAL DOCUMENTS AND THEIR OWNERS RIGHTS METADATA FOR GENERATING DIGITAL RIGHTS MANAGEMENT PROTECTED CONTENTS - A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document. | 12-10-2015 |