Patent application number | Description | Published |
20100298813 | Method and apparatus for extensible intravenous drip line - The extensible intravenous (“i.v.”) drip line tubing uses a helical accordion support structure on which the i.v. tubing is attached. The helical accordion backbone has some tendency to spring back, but this is not relied upon to extend and return the i.v. tubing it carries. The carrier structure keeps the i.v. tubing from getting tangle or kinked. A centrally located retractable line, which is located within the center of the helical accordion structure, acts as the retracting mechanism, as it tends to allow the accordion structure to be pulled into an extended position, while upon rewinding the central cord, the helical accordion support structure can be pushed toward a collapsed position without the i.v. drip line tubing becoming tanked, kinked, and thereby blocked. As a safety feature, so the i.v. line does not encounter and strain between it and the point of entry of the i.v. line into the patient, is one or more wrist and or armbands to which the i.v. carrier is attached by a short, strong line. | 11-25-2010 |
20110077025 | Very low power locator application and apparatus for use with "I-Phone"-like cell phones - This invention provides a method for locating a lost object by utilizing a stripped down cell-phone transceiver which is controlled in an on-off periodicity by an independent timer which is always on, and also has a low power GPS module. The invention provides for a software application to reside, for example, in an I-phone® and to interrogate the stripped down cell phone transceiver which is attached to the lost object and to display the lost object's location on a scalable map. | 03-31-2011 |
20110124326 | Locator for finding lost or misplaced objects - A network based method and system (apparatus) for locating remote objects which have become lost, misplaced or stolen. An iPhone-like “application” interrogates a low duty cycle locator device with a transceiver and GPS chip. The user is alerted via phone message (call and/or text). The locator device is interrogated via a telephony capable computer server. The user checks on a website to view a map with the coordinates of the missing object displayed. An automatic computer-based method of interrogating the locator allows for extremely small duty cycles (milliseconds) while a missing location may become available every minute, five minutes, or ten minutes, for example. | 05-26-2011 |
20150075528 | METHOD AND APPARATUS FOR TANGLE-FREE OXYGEN LINES - The tangle-free, kink-free oxygen supply extensible tubing uses a helical accordion support structure on which the oxygen supply tubing is attached. The helical accordion backbone has some tendency to spring back, but this is not relied upon to extend and return the oxygen supply tubing it carries. The carrier structure keeps the oxygen tubing from getting tangle or kinked. A centrally located retractable line, which is located within the center of the helical accordion structure, acts as the retracting mechanism, as it tends to allow the accordion structure to be pulled into an extended position, while upon rewinding the central cord, the helical accordion support structure can be pushed toward a collapsed position without the oxygen supply line tubing becoming tanked, kinked, and thereby blocked. As a safety feature , so the oxygen line does not encounter and strain between it and the patient, a chest-harness has attachment to the helical accordion support structure. | 03-19-2015 |
20150090790 | METHOD AND APPARATUS FOR UTILIZING THREE DIMENSION PRINTING FOR SECURE VALIDATION - The invention uses three-dimensional printing techniques to lay down a three-dimensional black and white grid (or “4-dimensional” grid, if color is used). To read and decode a three-dimensional bar-code, a light-field camera is used to capture the whole three-dimensional structure and the focus levels are then determined for a predetermined number of vertical levels. Adding color adds another degree of freedom (dimension) in the number and difficulty of encoding and decoding the three-dimensional bar-codes. These bar-codes cannot be simply made or copied, providing a level of security thereby. | 04-02-2015 |
Patent application number | Description | Published |
20090144393 | Method and apparatus for locating candidate data centers for application migration - When an application running at a first data center needs to be migrated to a different data center, the first data center is able to automatically locate an appropriate target data center from among multiple other data centers for receiving the migration of the application. The first data center ensures that a specified level of performance of the application will be maintained following migration of the application by preparing a migration request document that specifies network requirements, server requirements and storage requirements for the application. A targeted data center that is a candidate for receiving migration of the application receives the specified requirements and uses a performance index and other analysis to determine whether its hardware, software and other configurations are capable of meeting the specified requirements. The results of the determination are sent back to the requesting data center, which then decides if migration will be carried out. | 06-04-2009 |
20090300283 | Method and apparatus for dissolving hot spots in storage systems - Hot spots in a storage system may be located and dissolved in a smallest feasible time. A particular volume can be selected to be migrated from a hot spot with a minimum workload, and the most appropriate destination for receiving the migration is identified prior to beginning the migration. A management computer may monitor the load of each array group in the storage system in order to detect hot spots, and calculate estimated migration times for selecting a volume to be migrated from a hot spot according to shortest estimated time. Furthermore, because the storage controller needs to re-write data that is updated in an already-migrated area by a host computer during the migration, choosing the smallest volume is not the only consideration taken into account. Write access rates by host computers to the volume be migrated are taken into consideration when determining a candidate for migration. | 12-03-2009 |
20090313198 | Methods and systems for performing root cause analysis - A root cause analysis engine uses event durations and gradual deletion of events to improve analysis accuracy and reduce the number of required calculations. Matching ratios of relevant rules are recalculated every time notification of an event is received. The calculation results are held in a rule memory in the analysis engine. Each event has a valid duration, and when the duration has expired, that event is deleted from the rule memory. Events held in the rule memory can be deleted without affecting other events held in the rule memory. The analysis engine can then re-calculate the matching ratio of each rule by only performing the re-calculation with respect to affected rules related to the deleted event. The calculation cost can be reduced because analysis engine processes events incrementally or decrementally. Analysis engine can determine the most possible conclusion even if one or more condition elements were not true. | 12-17-2009 |
20100250630 | METHOD AND APPARATUS FOR DEPLOYING VIRTUAL HARD DISK TO STORAGE SYSTEM - Exemplary embodiments of the invention provide a solution to deploy a virtual hard disk (VHD) to virtual device with maximizing capacity efficiency and data access performance by making the allocation unit size of virtual device the same as that of the VHD. In one embodiment, a method of deploying a VHD file to a storage apparatus comprises checking a block size of the VHD file received by the storage apparatus based on a header of the VHD file; creating a virtual volume to provide a page size which is same size as the block size of the VHD file; and performing one of (A) copying contents of the VHD file to the created virtual volume by allocating one page of the created virtual volume for each block of the VHD file; or (B) formatting the created virtual volume with a virtual volume file system, and copying the VHD file to the formatted virtual volume. | 09-30-2010 |
20100325273 | METHOD AND APPARATUS FOR LOCATING CANDIDATE DATA CENTERS FOR APPLICATION MIGRATION - When an application running at a first data center needs to be migrated to a different data center, the first data center is able to automatically locate an appropriate target data center from among multiple other data centers for receiving the migration of the application. The first data center ensures that a specified level of performance of the application will be maintained following migration of the application by preparing a migration request document that specifies network requirements, server requirements and storage requirements for the application. A targeted data center that is a candidate for receiving migration of the application receives the specified requirements and uses a performance index and other analysis to determine whether its hardware, software and other configurations are capable of meeting the specified requirements. The results of the determination are sent back to the requesting data center, which then decides if migration will be carried out. | 12-23-2010 |
20110047414 | METHOD AND APPARATUS FOR CAUSE ANALYSIS INVOLVING CONFIGURATION CHANGES - A technique determines which configuration change(s) caused an application invocation failure of a computer application without the need for a knowledge database. To determine which configuration change is the most likely cause, the cause analysis program ( | 02-24-2011 |
20110252135 | METHOD AND APPARATUS FOR LOCATING CANDIDATE DATA CENTERS FOR APPLICATION MIGRATION - When an application running at a first data center needs to be migrated to a different data center, the first data center is able to automatically locate an appropriate target data center from among multiple other data centers for receiving the migration of the application. The first data center ensures that a specified level of performance of the application will be maintained following migration of the application by preparing a migration request document that specifies network requirements, server requirements and storage requirements for the application. A targeted data center that is a candidate for receiving migration of the application receives the specified requirements and uses a performance index and other analysis to determine whether its hardware, software and other configurations are capable of meeting the specified requirements. The results of the determination are sent back to the requesting data center, which then decides if migration will be carried out. | 10-13-2011 |
20110307742 | METHOD AND APPARATUS FOR CAUSE ANALYSIS INVOLVING CONFIGURATION CHANGES - A technique determines which configuration change(s) caused an application invocation failure of a computer application without the need for a knowledge database. To determine which configuration change is the most likely cause, the cause analysis program ( | 12-15-2011 |
20120117573 | METHOD AND SYSTEM FOR PERFORMING ROOT CAUSE ANALYSIS - A root cause analysis engine uses event survival times and gradual deletion of events to improve analysis accuracy and reduce the number of required calculations. Certainty factors of relevant rules are recalculated every time notification of an event is received. The calculation results are held in a rule memory in the analysis engine. Each event has a survival time, and when the time has expired, that event is deleted from the rule memory. Events held in the rule memory can be deleted without affecting other events held in the rule memory. The analysis engine can then re-calculate the certainty factor of each rule by only performing the re-calculation with respect to affected rules that are related with the deleted event. The calculation cost can be reduced because analysis engine processes events incrementally or decrementally. | 05-10-2012 |
20140025621 | METHOD AND SYSTEM FOR PERFORMING ROOT CAUSE ANALYSIS - A root cause analysis engine uses event survival times and gradual deletion of events to improve analysis accuracy and reduce the number of required calculations. Certainty factors of relevant rules are recalculated every time notification of an event is received. The calculation results are held in a rule memory in the analysis engine. Each event has a survival time, and when the time has expired, that event is deleted from the rule memory. Events held in the rule memory can be deleted without affecting other events held in the rule memory. The analysis engine can then re-calculate the certainty factor of each rule by only performing the re-calculation with respect to affected rules that are related with the deleted event. The calculation cost can be reduced because analysis engine processes events incrementally or decrementally. Analysis engine can determine the most possible conclusion even if one or more condition elements were not true, because analysis engine can calculate the certainty factor of rule even if one or more events were not notified to analysis engine. | 01-23-2014 |
20140082423 | METHOD AND APPARATUS FOR CAUSE ANALYSIS INVOLVING CONFIGURATION CHANGES - A technique determines which configuration change(s) caused an application invocation failure of a computer application without the need for a knowledge database. To determine which configuration change is the most likely cause, the cause analysis program checks other computers that have experienced the same configuration changes. The cause analysis program checks and counts the application invocation results before and after each configuration change is done. If the same configuration changes are found in the other computers, the program checks whether each configuration change caused or cured the same problem in that computer. The program counts the similar cases for all of the computers. Subsequently, the program calculates the ratio of those instances involving a change from success to failure and the ratio of those instances involving a change from failure to success out of all instances for each configuration change. | 03-20-2014 |
20150188752 | METHOD AND SYSTEM FOR PERFORMING ROOT CAUSE ANALYSIS - A root cause analysis engine uses event survival times and gradual deletion of events to improve analysis accuracy and reduce the number of required calculations. Certainty factors of relevant rules are recalculated every time notification of an event is received. The calculation results are held in a rule memory in the analysis engine. Each event has a survival time, and when the time has expired, that event is deleted from the rule memory. Events held in the rule memory can be deleted without affecting other events held in the rule memory. The analysis engine can then re-calculate the certainty factor of each rule by only performing the re-calculation with respect to affected rules that are related with the deleted event. The calculation cost can be reduced because analysis engine processes events incrementally or decrementally. Analysis engine can determine the most possible conclusion even if one or more condition elements were not true, because analysis engine can calculate the certainty factor of rule even if one or more events were not notified to analysis engine. | 07-02-2015 |