Patent application number | Description | Published |
20080240122 | CONFIGURING INTERCOMMUNICATIONS BETWEEN COMPUTING NODES - Techniques are described for configuring intercommunications between multiple computing nodes, such as multiple virtual machine nodes hosted on one or more physical computing machines or systems. In some situations, virtual networks may be established and maintained for groups of computing nodes, such as those operated by or on behalf of various users. Such virtual networks may be established in some situations by automatically configuring various communication manager modules to associate communications from a computing node belonging to a virtual network with one or more networking identifiers associated with the virtual network, such that other communication manager modules may appropriately forward or otherwise process such communications. | 10-02-2008 |
20090248846 | CONFIGURING COMMUNICATIONS BETWEEN COMPUTING NODES - Techniques are described for configuring communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks so as to provide an overlay network without encapsulation of the communications. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). | 10-01-2009 |
20090248896 | EMBEDDING OVERLAY VIRTUAL NETWORK ADDRESSES IN UNDERLYING SUBSTRATE NETWORK ADDRESSES - Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). The managing of the communications may include using substrate network addresses that are configured to embed virtual network addresses for a virtual network that is overlaid on the underlying physical substrate network. | 10-01-2009 |
20090249473 | AUTHORIZING COMMUNICATIONS BETWEEN COMPUTING NODES - Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). The managing of the communications may include determining whether communications sent to managed computing nodes are authorized, and providing the communications to the computing nodes only if they are determined to be authorized. | 10-01-2009 |
20100246443 | PROVIDING LOGICAL NETWORKING FUNCTIONALITY FOR MANAGED COMPUTER NETWORKS - Techniques are described for providing logical networking functionality for managed computer networks, such as for virtual computer networks provided on behalf of users or other entities. In some situations, a user may configure or otherwise specify a network topology for a virtual computer network, such as a logical network topology that separates multiple computing nodes of the virtual computer network into multiple logical sub-networks and/or that specifies one or more logical networking devices for the virtual computer network. After a network topology is specified for a virtual computer network, logical networking functionality corresponding to the network topology may be provided in various manners, such as without physically implementing the network topology for the virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users. | 09-30-2010 |
20110022711 | DYNAMICALLY MIGRATING COMPUTER NETWORKS - Techniques are described for providing capabilities to dynamically migrate computing nodes between two or more computer networks while the computer networks are in use, such as to dynamically and incrementally migrate an entire originating first computer network to a destination second computer network at a remote location. For example, the first computer network may include one or more physically connected computer networks, while the second computer network may be a virtual computer network at a remote geographical location (e.g., under control of a network-accessible service available to remote users). The provided capabilities may further include facilitating the ongoing operations of the originating first computer network while a subset of the first computer network computing nodes have been migrated to the remote destination second computer network, such as by forwarding communications between the first and second computer networks in a manner that is transparent to the various computing nodes. | 01-27-2011 |
20120036236 | CONFIGURING INTERCOMMUNICATIONS BETWEEN COMPUTING NODES - Techniques are described for configuring intercommunications between multiple computing nodes, such as multiple virtual machine nodes hosted on one or more physical computing machines or systems. In some situations, virtual networks may be established and maintained for groups of computing nodes, such as those operated by or on behalf of various users. Such virtual networks may be established in some situations by automatically configuring various communication manager modules to associate communications from a computing node belonging to a virtual network with one or more networking identifiers associated with the virtual network, such that other communication manager modules may appropriately forward or otherwise process such communications. | 02-09-2012 |
20120311108 | Providing Access to Configurable Private Computer Networks - Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms. | 12-06-2012 |
20130046874 | DYNAMICALLY MIGRATING COMPUTER NETWORKS - Techniques are described for providing capabilities to dynamically migrate computing nodes between two or more computer networks while the computer networks are in use, such as to dynamically and incrementally migrate an entire originating first computer network to a destination second computer network at a remote location. For example, the first computer network may include one or more physically connected computer networks, while the second computer network may be a virtual computer network at a remote geographical location (e.g., under control of a network-accessible service available to remote users). The provided capabilities may further include facilitating the ongoing operations of the originating first computer network while a subset of the first computer network computing nodes have been migrated to the remote destination second computer network, such as by forwarding communications between the first and second computer networks in a manner that is transparent to the various computing nodes. | 02-21-2013 |
20130132577 | AUTHORIZING COMMUNICATIONS BETWEEN COMPUTING NODES - Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). The managing of the communications may include determining whether communications sent to managed computing nodes are authorized, and providing the communications to the computing nodes only if they are determined to be authorized. | 05-23-2013 |
20130204971 | PROVIDING ACCESS TO CONFIGURABLE PRIVATE COMPUTER NETWORKS - Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms. | 08-08-2013 |
20130205042 | AUTHORIZING COMMUNICATIONS BETWEEN COMPUTING NODES - Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). The managing of the communications may include determining whether communications sent to managed computing nodes are authorized, and providing the communications to the computing nodes only if they are determined to be authorized. | 08-08-2013 |
20140047082 | PROVIDING ACCESS TO CONFIGURABLE PRIVATE COMPUTER NETWORKS - Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms. | 02-13-2014 |
20140237100 | MANAGING COMMUNICATIONS FOR MODIFIED COMPUTER NETWORKS - Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are part of a virtual computer network. In some situations, various types of modifications may be made to one or more computing nodes of an existing virtual computer network, and the described techniques include managing ongoing communications for those computing nodes so as to accommodate the modifications. Such modifications may include, for example, migrating or otherwise moving a particular computing node that is part of a virtual network to a new physical network location, or modifying other aspects of how the computing node participates in the virtual network (e.g., changing one or more virtual network addresses used by the computing node). In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users. | 08-21-2014 |
20150134791 | MANAGING COMMUNICATIONS FOR MODIFIED COMPUTER NETWORKS - Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are part of a virtual computer network. In some situations, various types of modifications may be made to one or more computing nodes of an existing virtual computer network, and the described techniques include managing ongoing communications for those computing nodes so as to accommodate the modifications. Such modifications may include, for example, migrating or otherwise moving a particular computing node that is part of a virtual network to a new physical network location, or modifying other aspects of how the computing node participates in the virtual network (e.g., changing one or more virtual network addresses used by the computing node). In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users. | 05-14-2015 |
20150256611 | PROVIDING EXTENDIBLE NETWORK CAPABILITIES FOR MANAGED COMPUTER NETWORKS - Techniques are described for managing communications between multiple computing nodes, such as for computing nodes that are part of managed virtual computer networks provided on behalf of users or other entities. In some situations, one or more of the computing nodes of a managed virtual computer network is configured to perform actions to extend capabilities of the managed virtual computer network to other computing nodes that are not part of the managed virtual computer network, such as by forwarding communications between computing nodes of the managed virtual computer network and the other external computing nodes so as to enable the other external computing nodes to participate in the managed virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users. | 09-10-2015 |
20150350011 | PROVIDING LOGICAL NETWORKING FUNCTIONALITY FOR MANAGED COMPUTER NETWORKS - Techniques are described for providing logical networking functionality for managed computer networks, such as for virtual computer networks provided on behalf of users or other entities. In some situations, a user may configure or otherwise specify a network topology for a virtual computer network, such as a logical network topology that separates multiple computing nodes of the virtual computer network into multiple logical sub-networks and/or that specifies one or more logical networking devices for the virtual computer network. After a network topology is specified for a virtual computer network, logical networking functionality corresponding to the network topology may be provided in various manners, such as without physically implementing the network topology for the virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users. | 12-03-2015 |
Patent application number | Description | Published |
20080201195 | SYSTEM AND METOD FOR TRANSFORMING AN ENTERPRISE USING A COMPONENT BUSINESS MODEL - A system and method are described for using a Component Business Model (CBM) to transform a business. A CBM map is used to identify components that collaborate to provide a specified capability, and a repository supporting the CBM map is filtered to provide a view of the identified components that highlights how they collaborate. The view is used to identify component features contributing to the specified capability. The specified capability is then enhanced by a transformation strategy that includes re-engineering particular components, identifying a pattern characterizing the collaboration between components and adding a component to perform the collaborative pattern, and/or adding an additional feature to the collaboration and adding component to perform the additional feature. The CBM repository provides exemplar best practices that can be adapted for use in a re-engineered component. | 08-21-2008 |
20080215398 | SYSTEM AND METHOD FOR USING A COMPONENT BUSINESS MODEL TO MANAGE AN ENTERPRISE - A method and system are described for using the structure and relationships between components in a component business model of an enterprise to assign components providing monitoring data to a management component. In response to the monitoring data, the management component executes a business rule invoking a service that alters a behavior of the enterprise. The management component contains data rules limiting the information provided by the assigned components, analysis rules defining the interaction between components, and report rules for consolidating recommendations for altering behavior of the enterprise, including decisions to invest in certain aspects of the business, to reengineer certain processes of the business, and to alter operation of certain aspects of the business. | 09-04-2008 |
20080221940 | SYSTEM AND METHOD FOR USING THE COMPONENT BUSINESS MODEL TO ANALYZE BUSINESS VALUE DRIVERS - The method and system uses the component business model as a framework for locating business activities. Business value drivers are identified, related in an influence model, and structured into a prioritized driver tree. The driver tree is used to determine the relative contributions of leaf drivers to the overall value of the business. Business activities contributing to the leaf drivers are then identified, and the relative contributions of the leaf drivers are allocated to the business activities and then rolled up to the components for display as a heat map overlay on a component map. | 09-11-2008 |
20140279888 | METADATA-DRIVEN VERSION MANAGEMENT SERVICE IN PERVASIVE ENVIRONMENT - Metadata driven version management service determines one or more version operations to perform based on the properties of a device, computing environment and metadata associated with a file being versioned. The version management service allows different devices to perform different version operations based on different device properties. | 09-18-2014 |
20140279904 | METADATA-DRIVEN VERSION MANAGEMENT SERVICE IN PERVASIVE ENVIRONMENT - Metadata driven version management service determines one or more version operations to perform based on the properties of a device, computing environment and metadata associated with a file being versioned. The version management service allows different devices to perform different version operations based on different device properties. | 09-18-2014 |
20140317089 | CONTEXT AWARE DYNAMIC SENTIMENT ANALYSIS - A system and method to perform context aware sentiment analysis on a project that includes two or more aspects are described. The method includes identifying one or more inputs related to the project. The method also includes decomposing each of the one or more inputs, based on a content of the one or more comments, into at least one of the two or more aspects to generate one or more comment-aspect sets, each of the two or more aspects representing a context within the project, extracting opinions from each of the comment-aspect sets, and generating a disruptive argument based on the opinions. | 10-23-2014 |
20140317118 | CONTEXT AWARE DYNAMIC SENTIMENT ANALYSIS - A system and method to perform context aware sentiment analysis on a project that includes two or more aspects are described. The method includes identifying one or more inputs related to the project. The method also includes decomposing each of the one or more inputs, based on a content of the one or more comments, into at least one of the two or more aspects to generate one or more comment-aspect sets, each of the two or more aspects representing a context within the project, extracting opinions from each of the comment-aspect sets, and generating a disruptive argument based on the opinions. | 10-23-2014 |
Patent application number | Description | Published |
20120162057 | SENSING USER INPUT USING THE BODY AS AN ANTENNA - A human input system is described herein that provides an interaction modality that utilizes the human body as an antenna to receive electromagnetic noise that exists in various environments. By observing the properties of the noise picked up by the body, the system can infer human input on and around existing surfaces and objects. Home power lines have been shown to be a relatively good transmitting antenna that creates a particularly noisy environment. The human input system leverages the body as a receiving antenna and electromagnetic noise modulation for gestural interaction. It is possible to robustly recognize touched locations on an uninstrumented home wall using no specialized sensors. The receiving device for which the human body is the antenna can be built into common, widely available electronics, such as mobile phones or other devices the user is likely to commonly carry. | 06-28-2012 |
20140070940 | SENSOR NODES, APPARATUSES, AND METHODS FOR WIRELESSLY TRANSMITTING DATA TO A POWER INFRASTRUCTURE - Apparatuses, sensor nodes, systems and methods for modulating and transmitting sensor data wirelessly to an existing power line network are described. An apparatus may include a microcontroller having an oscillator and an input/output buffer. The microcontroller may process an electrical signal and the input/output buffer may drive a digital signal. The apparatus may include a transmitter utilizing the oscillator and the input/output buffer of the microcontroller. The transmitter may include a resonator coupled to the oscillator and modulation circuitry coupled to the oscillator and resonator. The resonator may modulate a frequency of the oscillator responsive to a modulation signal based on the processed electrical signal. The transmitter may further include an antenna coupled to the input/output buffer of the microcontroller for transmission of the data, and a resonant tank coupled to an output of the input/output buffer to provide an analog signal to the antenna. | 03-13-2014 |
20140072060 | RECEIVER, APPARATUS, AND METHODS FOR WIRELESSLY RECEIVING DATA FROM A POWER INFRASTRUCTURE - Apparatuses, receivers, systems and methods for receiving data via a power line infrastructure. An exemplary apparatus includes a base station configured to receive a signal from a power line of a structure by coupling to the power line through an electrical outlet. The base station may include an impedance matching circuit configured to match an impedance of the power line of the structure, and a receiver coupled to the impedance matching circuit. The receiver may be configured to demodulate the signal received from the power line of the structure, convert the demodulated signal into a digital signal, and provide the digital signal to a decoder. | 03-13-2014 |
20150013772 | AUTOMATIC VALVE SHUTOFF DEVICE AND METHODS - Examples of automatic valve shutoff systems are described which may include an actuation device including an actuator and a valve attachment portion. The valve attachment portion may be configured for attachment with an existing valve in a fluid or compressible gas supply line. The system may further include a controller coupled to the actuation device, wherein the controller is configured to initiate a valve shutoff process in response to a wireless signal. Wake-up circuitry may be coupled to the controller and configured to monitor the supply line for vibrations and activate the controller in response to the vibrations. | 01-15-2015 |
20150326280 | RECEIVER, APPARATUS, AND METHODS FOR WIRELESSLY RECEIVING DATA FROM A POWER INFRASTRUCTURE - Apparatuses, receivers, systems and methods for receiving data via a power line infrastructure. An exemplary apparatus includes a base station configured to receive a signal from a power line of a structure by coupling to the power line through an electrical outlet. The base station may include an impedance matching circuit configured to match an impedance of the power line of the structure, and a receiver coupled to the impedance matching circuit. The receiver may be configured to demodulate the signal received from the power line of the structure, convert the demodulated signal into a digital signal, and provide the digital signal to a decoder. | 11-12-2015 |
Patent application number | Description | Published |
20090204930 | IPHYSICAL DESIGN SYSTEM AND METHOD - A design system for designing complex integrated circuits (ICs), a method of IC design and program product therefor. A layout unit receives a circuit description representing portions in a grid and glyph format. A checking unit checks grid and glyph portions of the design. An elaboration unit generates a target layout from the checked design. A data prep unit prepares the target layout for mask making. A pattern caching unit selectively replaces portions of the design with previously cached results for improved design efficiency. | 08-13-2009 |
20090259983 | METHODS FOR DESIGNING A PRODUCT CHIP A PRIORI FOR DESIGN SUBSETTING, FEATURE ANALYSIS, AND YIELD LEARNING - A method for designing a chip a priori for design subsetting, feature analysis, and yield learning. The method includes identifying a plurality of signal paths within a chip design that can be readily identified from chip fail data and removing a fraction of the plurality of signal paths that have physical design constraints to generate a subset of the plurality of signal paths. The method further includes constructing a physical implementation of each of the signal paths in the subset, identifying one or more signal paths in the subset that are not constructed consistently with the respective physical implementation, and removing those signal paths from the subset. | 10-15-2009 |
20100023913 | METHOD FOR IC WIRING YIELD OPTIMIZATION, INCLUDING WIRE WIDENING DURING AND AFTER ROUTING - Disclosed are embodiments of a method, service, and computer program product for performing yield-aware IC routing for a design. The method performs an initial global routing which satisfies wiring congestion constraints. Next, the method performs wire spreading and wire widening on the global route, layer by layer, based on, for example, a quadratic congestion optimization. Following this, timing closure is performed on the global route using results of the wire spreading and wire widening. Post-routing wiring width and wire spreading adjustments are made using the critical area yield model. In addition, the method allows for the optimization of already-routed data. | 01-28-2010 |
20100044858 | Product Chips and Die With a Feature Pattern That Contains Information Relating to the Product Chip, Methods for Fabricating Such Product Chips and Die, and Methods for Reading a Feature Pattern From a Packaged Die - Product chips and die, methods for fabricating product chips, and methods for tracking the identity of die after singulation from a wafer. The product chips and die include a pattern of features formed in a metallization level of a back-end-of-line (BEOL) wiring structure. The features in the pattern contain information relating to the die, such as a unique identifier that includes a wafer identification for a wafer used to fabricate the die and a product chip location for the die on the wafer. The features may be imaged with the assistance of a beam of electromagnetic radiation that penetrates into a packaged die and is altered by the presence of the features in a way that promotes imaging. | 02-25-2010 |
20120119333 | PRODUCT CHIPS AND DIE WITH A FEATURE PATTERN THAT CONTAINS INFORMATION RELATING TO THE PRODUCT CHIP - Product chips and die that include a pattern of features formed in a metallization level of a back-end-of-line (BEOL) wiring structure. The features in the pattern contain information relating to the die, such as a unique identifier that includes a wafer identification used to fabricate the die and a product chip location for the die on a wafer. The features may be imaged with the assistance of a beam of electromagnetic radiation that penetrates into a packaged die and is altered by the presence of the features in a way that promotes imaging. | 05-17-2012 |
20120120758 | METHODS FOR READING A FEATURE PATTERN FROM A PACKAGED DIE - Methods for tracking the identity of die after singulation from a wafer. The product chips and die include a pattern of features formed in a metallization level of a back-end-of-line (BEOL) wiring structure. The features in the pattern contain information relating to the die, such as a unique identifier that includes a wafer identification used to fabricate the die and a product chip location for the die on a wafer. The features may be imaged with the assistance of a beam of electromagnetic radiation that penetrates into a packaged die and is altered by the presence of the features in a way that promotes imaging. | 05-17-2012 |
20120167029 | PHYSICAL DESIGN SYSTEM AND METHOD - A design system for designing complex integrated circuits (ICs), a method of IC design and program product therefor. A layout unit receives a circuit description representing portions in a grid and glyph format. A checking unit checks grid and glyph portions of the design. An elaboration unit generates a target layout from the checked design. A data prep unit prepares the target layout for mask making. A pattern caching unit selectively replaces portions of the design with previously cached results for improved design efficiency. | 06-28-2012 |
20140072125 | ACOUSTIC DIAGNOSIS AND CORRECTION SYSTEM - An acoustic monitoring system includes a portable acoustic detection device, a sound analysis device and a confidence level device. The portable acoustic detection device is capable of receiving sound at one or more locations near a sound-producing device. The sound analysis device receives the sound from the portable sound detection device, determines a diagnosis based on a comparison between the sound and pre-recorded sound data, and outputs the diagnosis to the portable acoustic detection device. The sound analysis device also determines a corrective action for inhibiting the sound, which is also output to the portable sound detection device. The confidence level device determines a confidence level of the diagnosis indicating a likelihood that the diagnosis is successfully diagnosed. | 03-13-2014 |
20140074435 | ACOUSTIC DIAGNOSIS AND CORRECTION SYSTEM - An acoustic monitoring system includes a portable acoustic detection device, a sound analysis device and a confidence level device. The portable acoustic detection device is capable of receiving sound at one or more locations near a sound-producing device. The sound analysis device receives the sound from the portable sound detection device, determines a diagnosis based on a comparison between the sound and pre-recorded sound data, and outputs the diagnosis to the portable acoustic detection device. The sound analysis device also determines a corrective action for inhibiting the sound, which is also output to the portable sound detection device. The confidence level device determines a confidence level of the diagnosis indicating a likelihood that the diagnosis is successfully diagnosed. | 03-13-2014 |
20140375380 | OPTIMIZING OPERATING RANGE OF AN ELECTRONIC CIRCUIT - According to a method herein, a portion of an electronic circuit is identified. The electronic circuit comprises logic circuitry. The portion of the electronic circuit is designed in at least two versions. Each of the at least two versions is evaluated using a plurality of operating conditions. The current operating conditions are determined. One version of the at least two versions is identified as a selected version based on the performance under the current operating conditions. The selected version has relatively optimal performance based on at least one of clock frequency, supply voltage, and power limit. The selected version is activated for use in the portion of the electronic circuit. The remaining versions of the at least two versions are deactivated. | 12-25-2014 |
20150089638 | SMART METER SECURITY SYSTEM AND METHOD - A system, method and computer program product for protecting utility usage information from utility company users, e.g., power company endpoints. Smart meters monitor endpoint service usage to identify the start of a critical usage period. During critical usage periods the smart meters select and modulates a generic usage pattern by the difference between the pattern and actual usage. Instead of sending actual usage data, the smart meter sends the modulated generic usage pattern to the service provider. The service provider extracts the deltas and determines endpoint service usage from the extracted deltas. | 03-26-2015 |
20150089639 | SMART METER SECURITY SYSTEM AND METHOD - A system, method and computer program product for protecting utility usage information from utility company users, e.g., power company endpoints. Smart meters monitor endpoint service usage to identify the start of a critical usage period. During critical usage periods the smart meters select and modulates a generic usage pattern by the difference between the pattern and actual usage. Instead of sending actual usage data, the smart meter sends the modulated generic usage pattern to the service provider. The service provider extracts the deltas and determines endpoint service usage from the extracted deltas. | 03-26-2015 |
20150089640 | ENDPOINT LOAD REBALANCING CONTROLLER - A endpoint load rebalancing controller, method of controlling endpoint activity to suppress side channel variation and computer program product for controlling endpoint activity for suppressing side channel variation in information from utility company users, e.g., from power company endpoints. The load rebalancing controller monitors period to period endpoint service usage and predicts next period endpoint service usage. Whenever the controller maintains determines that the endpoint usage will exhibit a change that may be sufficient to convey activity information in side channel activity, the controller rebalances activity for the next period. Rebalancing may include shifting off-line execution from one period to another and capping or increasing on-line execution activity. | 03-26-2015 |
20150089657 | ENDPOINT LOAD REBALANCING CONTROLLER - A endpoint load rebalancing controller, method of controlling endpoint activity to suppress side channel variation and computer program product for controlling endpoint activity for suppressing side channel variation in information from utility company users, e.g., from power company endpoints. The load rebalancing controller monitors period to period endpoint service usage and predicts next period endpoint service usage. Whenever the controller maintains determines that the endpoint usage will exhibit a change that may be sufficient to convey activity information in side channel activity, the controller rebalances activity for the next period. Rebalancing may include shifting off-line execution from one period to another and capping or increasing on-line execution activity. | 03-26-2015 |
20150194355 | CRYSTAL OSCILLATOR AND THE USE THEREOF IN SEMICONDUCTOR FABRICATION - Systems and methods are provided for implementing a crystal oscillator to monitor and control semiconductor fabrication processes. More specifically, a method is provided for that includes performing at least one semiconductor fabrication process on a material of an integrated circuit (IC) disposed within a processing chamber. The method further includes monitoring by at least one electronic oscillator disposed within the processing chamber for the presence or absence of a predetermined substance generated by the at least one semiconductor fabrication process. The method further includes controlling the at least one semiconductor fabrication process based on the presence or absence of the predetermined substance detected by the at least one electronic oscillator. | 07-09-2015 |
20150206263 | JURISDICTION MODELING EMPLOYING CROSS SYSTEM DEPENDENCIES - A method of modeling a jurisdiction provides jurisdiction resilience information and jurisdiction impact information. The method models a jurisdiction system by determining the multiple different systems present in a particular jurisdiction. The method determines the assets of the multiple different systems and stores asset information describing the respective assets of the multiple different systems in a jurisdiction meta-model. The method may determine critical paths across the different systems of the jurisdiction and identify those critical paths across different systems in the jurisdiction meta-model. The method may also determine cascading effects of incidents to assets within each system and identify those cascading effects within each system in the jurisdiction meta-model. The method may also determine cross-cascading effects of incidents to assets across different systems of the jurisdiction and identifying those cross-cascading effects in the jurisdiction meta-model. | 07-23-2015 |
20150206264 | JURISDICTION MODELING EMPLOYING CROSS SYSTEM DEPENDENCIES TO DETERMINE INCIDENT IMPACT AND RESILIENCE - A method of modeling a jurisdiction provides jurisdiction resilience information and jurisdiction impact information. The method models a jurisdiction system by determining the multiple different systems present in a particular jurisdiction. The method determines the assets of the multiple different systems and stores asset information describing the respective assets of the multiple different systems in a jurisdiction meta-model. The method may determine critical paths across the different systems of the jurisdiction and identify those critical paths across different systems in the jurisdiction meta-model. The method may also determine cascading effects of incidents to assets within each system and identify those cascading effects within each system in the jurisdiction meta-model. The method may also determine cross-cascading effects of incidents to assets across different systems of the jurisdiction and identifying those cross-cascading effects in the jurisdiction meta-model. | 07-23-2015 |
Patent application number | Description | Published |
20080300432 | Chemical Production Processes and Systems - Chemical production processes are provided that include reacting a metal comprising olefin to form a conjugated olefin; reacting a heterohalogenated olefin to form a conjugated olefin; reacting a halogenated alkane to form a conjugated olefin; and/or reacting a hydrohalogenated olefin to form a conjugated olefin. Chemical production systems are also provided that can include: a first reactant reservoir configured to house a perhalogenated olefin; a second reactant reservoir configured to house a catalyst mixture; a first reactor coupled to both the first and second reservoirs, the first reactor configured to house a metal-comprising mixture and receive both the perhalogenated olefin form the first reactant reservoir and the reactant mixture from the second reactant reservoir; and a product collection reservoir coupled to the first reactor and configured to house a conjugated olefin. | 12-04-2008 |
20100069687 | PROCESS FOR SYNTHESIS OF POLYALPHAOLEFIN AND REMOVAL OF RESIDUAL CATALYST COMPONENTS - A process for reducing the level of residual catalyst comprising one or more 1-halo-2-methylpropanes and a Group 13 metal catalyst from a crude polyolefins product, the process comprising contacting the crude organic product with a solid adsorbent in an adsorbent system. Also provided is a co-catalyst system for polymerizing alpha olefins. | 03-18-2010 |
20100234653 | PROCESSES FOR MAKING ALKYL HALIDES - The invention is directed to processes for producing an alkyl halide, preferably isobutyl bromide. In one embodiment, the process comprises the steps of: (a) contacting an alcohol with a hydrogen halide in a reactor at elevated temperature under conditions effective to form an initial product mixture comprising the alkyl halide, the alcohol, the hydrogen halide and water; (b) cooling the initial product mixture to form a cooled organic phase positioned above a cooled aqueous phase; (c) separating the cooled organic phase from the cooled aqueous phase. The process preferably further comprises a step of: (d) heating at least a portion of the cooled aqueous phase under conditions effective to form additional alkyl halide. | 09-16-2010 |
20130005620 | Pressure Process for Overbased Magnesium Oxide Dispersions - Overbased MgO dispersions with high magnesium content and acceptably low viscosities are prepared without gel formation by heating to 280-360° C. under high pressure in a sealed reactor a mixture of MgO, selected dispersants, low MW carboxylic acids, water and a hydrocarbon solvent having a boiling point below 280° C. No additional solubilizing or dispersing agents, promoters or reactants such as carbon dioxide, amines, alcohols etc are needed to obtain the desired dispersions. Compositions such as lubricating oils and fuels containing the overbased magnesium dispersions as additives are also disclosed. | 01-03-2013 |
20150105588 | FIXED BED PROCESS FOR CLAY CATALYZED ALKYLATION OF AROMATIC AMINES - Aromatic amines, for example, diarylamines such as diphenylamine, dinaphthylamine, N-phenyl-N-naphthyl amine etc., are alkylated by passing a mixture of the amine and an olefin, though a clay catalyst in a fixed bed reactor system. The process is conveniently run as a continued process, produces an alkylated aromatic amine in excellent purity and provides efficiencies in material and energy use. | 04-16-2015 |
Patent application number | Description | Published |
20090088797 | SURGICAL ANCHOR DEVICE - A tissue anchor comprising a body having a longitudinal axis, a proximal end with one set of dimensions and a projected surface area, a distal end with a second set of dimensions and a projected surface area where the respective dimensions of the first and second ends are not identical and the projected areas are substantially the same. The tissue anchor may further have a fixing member to attach the anchor and one or more tissues together or to attach the other structures to tissue. | 04-02-2009 |
20100292710 | SURGICAL FASTENERS, APPLICATOR INSTRUMENTS, AND METHODS FOR DEPLOYING SURGICAL FASTENERS - An applicator instrument for dispensing surgical fasteners includes a housing, an elongated shaft extending from the housing, the elongated shaft having a proximal end coupled with the housing and a distal end remote therefrom, and a firing system for dispensing surgical fasteners from the distal end of the elongated shaft. The firing system includes a firing rod disposed in the elongated shaft, the firing system having a firing cycle with a first stage for advancing the firing rod toward the distal end of the elongated shaft at a first rate of speed and a second stage for advancing the firing rod toward the distal end of the elongated shaft at a second rate of speed that is greater than the first rate of speed. | 11-18-2010 |
20100292712 | SURGICAL FASTENERS, APPLICATOR INSTRUMENTS, AND METHODS FOR DEPLOYING SURGICAL FASTENERS - An applicator instrument for dispensing surgical fasteners includes a housing, an elongated shaft extending from the housing, a firing rod disposed inside the elongated shaft and being movable within a first plane between a retracted position and an extended position, an advancer disposed inside the elongated shaft and being moveable within a second plane between a retracted position and an extended position, and a staging assembly located adjacent the distal end of the elongated shaft and being adapted to align surgical fasteners with a distal end of the firing rod. The staging assembly is held below the second plane by the advancer when the advancer is in the extended position and the staging assembly is adapted to move into at least partial alignment with the distal end of the firing rod when the advancer is in the retracted position. | 11-18-2010 |
20100292713 | SURGICAL FASTENERS, APPLICATOR INSTRUMENTS, AND METHODS FOR DEPLOYING SURGICAL FASTENERS - A firing system for an applicator instrument adapted to dispense surgical fasteners includes a housing, an elongated shaft extending from the housing, a firing rod disposed within the elongated shaft, a firing rod release engageable with the firing rod for preventing distal movement of the firing rod during at least one stage of a firing cycle, a trigger mounted to the housing, and a firing spring having a first end connected with the firing rod and a second end adapted for being sequentially coupled and decoupled from the trigger during the firing cycle. The firing cycle includes an initial stage in which the trigger is open and decoupled from the energy storing element, and the firing spring is at least partially compressed, and a piloting stage during which the firing rod release is disengaged from the firing rod for enabling distal movement of the firing rod. | 11-18-2010 |
20100292715 | SURGICAL FASTENERS, APPLICATOR INSTRUMENTS, AND METHODS FOR DEPLOYING SURGICAL FASTENERS - A surgical fastener for securing a prosthetic device to tissue includes a first leg having a distal end, a proximal end, and a first insertion tip at the distal end of the first leg, and a second leg including a distal end, a proximal end, and a second insertion tip at the distal end of the second leg. A bridge connects the proximal ends of the first and second legs for forming a closed end of the surgical fastener. The first insertion tip has a first insertion tool seating surface, and the second insertion tip has a second insertion tool seating surface. The first insertion tool seating surface is closer to the distal end of the first leg than the proximal end of the first leg, and the second insertion tool seating surface is closer to the distal end of the second leg than the proximal end of the second leg. The first and second legs extend along respective longitudinal axes, and the first and second insertion tips are skewed outwardly relative to the respective longitudinal axes. | 11-18-2010 |
Patent application number | Description | Published |
20110079627 | APPLICATOR INSTRUMENTS HAVING CURVED AND ARTICULATING SHAFTS FOR DEPLOYING SURGICAL FASTENERS AND METHODS THEREFOR - An applicator instrument for dispensing surgical fasteners includes a housing and a curved shaft. Surgical fasteners are disposed within the curved shaft for being dispensed from the distal end of the curved shaft. An advancer is disposed inside the curved shaft for shifting the surgical fasteners one position closer to the distal end of the curved shaft each time the advancer moves distally. A firing element is disposed inside the curved shaft and is movable between the proximal and distal ends of the curved shaft for dispensing the surgical fasteners from the distal end of the curved shaft. A staging assembly is adapted to receive a leading one of the surgical fasteners from the advancer as the advancer moves distally to shift the leading surgical fastener into substantial alignment with the firing element when the advancer moves proximally. | 04-07-2011 |
20130218177 | SURGICAL FASTENERS HAVING ARTICULATING JOINTS AND DEFLECTABLE TIPS - A surgical fastener for securing a prosthetic device to tissue includes a first leg having a proximal end, a distal end, a first insertion tip at the distal end, and a first articulating joint that separates said first leg into a proximal segment and a distal segment that is deflectable relative to the proximal segment, and a second leg including a proximal end, a distal end, a second insertion tip at the distal end, and a second articulating joint that separates said second leg into a proximal segment and a distal segment that is deflectable relative to the proximal segment. A bridge connects the proximal ends of the first and second legs for forming a closed end of the surgical fastener. After implantation in tissue, the insertion tips are deflectable away from vessels and nerves to minimize injury to the vessels and nerves, and to minimize patient discomfort and pain. | 08-22-2013 |
20130245642 | CLAMPING DEVICES FOR DISPENSING SURGICAL FASTENERS INTO SOFT MEDIA - A clamping device for dispensing surgical fasteners includes a lower arm having a proximal end, a distal end, and a longitudinal axis extending between the proximal and distal ends, and an upper arm pivotally connected with the lower arm. An actuator is coupled with the upper and lower arms for moving the distal ends of the arms toward one another for closing the clamping device. A surgical fastener dispenser is secured to the distal end of the lower arm. The dispenser includes a cartridge body having a top surface with a surgical fastener dispenser opening. A pad is pivotally connected to the distal end of the upper arm. When the clamping device is closed, a bottom surface of the pad applies a clamping force upon the top surface of the cartridge body for dispensing one of the surgical fasteners at an angle that is perpendicular to the longitudinal axis. | 09-19-2013 |
20130304091 | APPLICATOR INSTRUMENTS HAVING DISTAL END CAPS FOR FACILITATING THE ACCURATE PLACEMENT OF SURGICAL FASTENERS DURING OPEN REPAIR PROCEDURES - An applicator instrument for dispensing surgical fasteners includes a housing, a firing system disposed in the housing, an actuator coupled with the housing for actuating the firing system, an elongated shaft extending from the housing, the elongated shaft having an outer diameter, and a cap secured to the distal end of the elongated shaft, whereby the cap has a lower distal edge that extends laterally beyond the outer diameter of the elongated shaft. The lower distal edge of the cap has a length that is greater than the outer diameter of the elongated shaft. The cap has a distal end face that slopes upwardly and proximally from the lower distal edge, and the cap has a surgical fastener delivery window formed in the distal end face for dispensing surgical fasteners. The delivery window has a lower end that is spaced from the lower distal edge. | 11-14-2013 |
20130304092 | APPLICATOR INSTRUMENTS FOR DISPENSING SURGICAL FASTENERS DURING OPEN REPAIR PROCEDURES - An applicator instrument for dispensing surgical fasteners includes a housing, a firing system disposed in the housing and being moveable in distal and proximal directions along a first axis, and an elongated shaft extending from the housing, the elongated shaft having a proximal section and a distal section that is oriented at an angle relative to the proximal section. A plurality of surgical fasteners are disposed in the elongated shaft. The applicator instrument has a handle that extends upwardly from the housing along a second axis that defines an acute angle with the first axis. A trigger is mounted on the handle, and a linkage couples the trigger with the handle and the firing system. When the trigger is squeezed, the linkage guides the trigger along a linear path of movement relative to the handle. | 11-14-2013 |
20140379001 | METHODS OF USING APPLICATOR INSTRUMENTS FOR SECURING PROSTHETIC DEVICES TO TISSUE - A method of securing a prosthetic device to tissue includes providing an applicator instrument including a housing, a shaft, surgical fasteners, a firing rod for dispensing the surgical fasteners from the shaft, a trigger, and an energy storing element. The method includes positioning a prosthetic device over tissue, juxtaposing a distal end of the shaft with the prosthetic device, and compressing the trigger for piloting the firing rod toward the distal end of the elongated shaft at a first rate of speed. The method includes preventing the firing rod from moving distally while building up energy in the energy storing element, and further compressing the trigger for releasing the firing rod for distal movement and transferring the built up energy for moving the firing rod toward the distal end of the elongated shaft at a second rate of speed that is greater than the first rate of speed. | 12-25-2014 |
20150080919 | SURGICAL FASTENERS FOR SECURING PROSTHETIC DEVICES TO TISSUE - A surgical fastener includes a first leg having a distal end, a proximal end, and a first insertion tip at the distal end of the first leg, the first insertion tip having a first distal piercing point, and a second leg having a distal end, a proximal end, and a second insertion tip at the distal end of the second leg, the second insertion tip having a second distal piercing point. A bridge connects the first and second legs. The first and second distal piercing points are located outside the respective first and second legs. The first and second legs extend along respective longitudinal axes, and the first and second insertion tips are asymmetrical and skewed outwardly relative to said respective longitudinal axes of the first and second legs. | 03-19-2015 |
20150351753 | Methods and Devices for Reinforcing a Staple Line - Adjunct material and methods of using adjunct material to reinforce a staple line are provided herein. In general, adjunct material can be used to maintain a seal in tissue and prevent stapled tissue from tearing. This adjunct material can be coupled to a jaw of a surgical stapler, and can be deployed into tissue along with the staples. In some embodiments, the adjunct material can be sized and shaped so that a portion of the material extends laterally outside of the staple line and distributes strain to tissue outside of the staple line. In certain aspects, sealant can be applied to the staple line and to the adjunct material in various ways to further seal the tissue and/or prevent leaks from forming in the tissue. | 12-10-2015 |
20150351760 | DEVICES AND METHODS FOR SEALING STAPLES IN TISSUE - Devices and methods for applying sealants to surgical instruments are described herein. In one embodiment, a surgical device is described that can include at least one nozzle formed at a proximal end of the device that is configured to receive a sealant, as well as an applicator formed at a distal end of the device that is configured to deliver the sealant received by the at least one nozzle. The applicator can be configured to interface with at least one of a first and second jaw of a surgical stapler such that the sealant delivered from the applicator can be deposited into a plurality of openings formed in the surgical stapler. | 12-10-2015 |
Patent application number | Description | Published |
20080319255 | PERICARDIAL SPACE IMAGING FOR CARDIAC SUPPORT DEVICE IMPLANTATION - A method for implanting a cardiac support device (CSD) on a patient's heart. An amount of contrast agent sufficient to cause structures on the heart to be visible upon fluoroscopic or other imaging is introduced into the pericardial space surrounding the heart. The heart and contrast agent are imaged to provide a visual indication of the location of the structures of the heart. The CSD is placed on the heart using the visual indications provided by the imaging. | 12-25-2008 |
20100268019 | CADIAC SUPPORT DEVICE DELIVERY TOOL WITH INDEPENDENTLY MOVABLE ARMS - A device for delivery of a cardiac support device for treating cardiac disease of a heart includes a multistage deployment mechanism and an actuating mechanism for controlling the positions of the deployment mechanism. The deployment mechanism is operable to change between a retracted state and an extended state, and includes a plurality of independent stages, including, in one embodiment, a first stage including a guide structure for location adjacent a portion of the patient's heart when in the extended state. A second stage is movably coupled to the first stage, and is guided by the guide structure between the retracted and extended states. The second stage further releasably engages and supports the cardiac support device and positions the cardiac support device at the desired implantation location, guided by the guide structure of the stage. In some embodiments, the deployment mechanism may include additional stages. The actuating mechanism drives the deployment mechanism between the retracted and extended states, and independently controls the positions of the multiple stages of the deployment mechanism. | 10-21-2010 |
20120265082 | INTRA-OPERATIVE HEART SIZE MEASURING TOOL - A heart size measuring tool includes a tubular body, a flexible measuring cord having length indicia, a measuring cord support mechanism movable between retracted and extended states with respect to the body, and an actuating mechanism to move the measuring cord support mechanism. When in the retracted state the measuring cord support mechanism is positioned within the tubular body with the measuring cord in a collapsed position. When the measuring cord support mechanism is in the extended state the measuring cord extends around a portion of a heart to be measured. A scale on the body can be used in connection with the indicia on the measurement cord to provide a reading of the heart size. | 10-18-2012 |
20140206984 | PERICARDIAL SPACE IMAGING FOR CARDIAC SUPPORT DEVICE IMPLANTATION - A method for implanting a cardiac support device (CSD) on a patient's heart. An amount of contrast agent sufficient to cause structures on the heart to be visible upon fluoroscopic or other imaging is introduced into the pericardial space surrounding the heart. The heart and contrast agent are imaged to provide a visual indication of the location of the structures of the heart. The CSD is placed on the heart using the visual indications provided by the imaging. | 07-24-2014 |
20150305870 | INTRA-OPERATIVE HEART SIZE MEASURING TOOL - A heart size measuring tool includes a tubular body, a flexible measuring cord having length indicia, a measuring cord support mechanism movable between retracted and extended states with respect to the body, and an actuating mechanism to move the measuring cord support mechanism. When in the retracted state the measuring cord support mechanism is positioned within the tubular body with the measuring cord in a collapsed position. When the measuring cord support mechanism is in the extended state the measuring cord extends around a portion of a heart to be measured. A scale on the body can be used in connection with the indicia on the measurement cord to provide a reading of the heart size. | 10-29-2015 |
Patent application number | Description | Published |
20100217384 | Method For Replacing Native Valve Function Of A Diseased Aortic Valve - Methods for replacing native valve function of a diseased aortic valve are disclosed. In an embodiment, a method for replacing native valve function of a diseased aortic valve in a patient includes: (a) receiving an artificial heart valve assembly mounted about a first mounting position on a catheter system, (b) guiding the artificial heart valve assembly through the vasculature of the patient, (c) while the catheter system having the artificial heart valve assembly mounted thereto is in the patient's vasculature, mounting the artificial heart valve assembly about a second mounting position on the catheter system, (d) delivering the artificial heart valve assembly to the region of the diseased aortic valve, (e) expanding the artificial heart valve assembly in the region of the diseased aortic valve, and (f) withdrawing the catheter system from the patient's vasculature. | 08-26-2010 |
20100249921 | Cardiac Valve Procedure Methods and Devices - Devices and methods for performing intravascular procedures without cardiac bypass include embodiments of temporary filter devices, temporary valves, and prosthetic valves. The temporary filter devices have a cannula which provides access for surgical tools for effecting repair of cardiac valves. The cannula may have filters which prevent embolitic material from entering the coronary arteries and aorta. The valve devices may also have a cannula for insertion of the valve into the aorta. The valve devices expand in the aorta to occupy the entire flow path of the vessel and operate to prevent blood flow and to permit flow through the valve. The prosthetic valves include valve fixation devices which secure the prosthetic valve to the wall of the vessel. The prosthetic valves are introduced into the vascular system in a compressed state, advanced to the site of implantation, and expanded and secured to the vessel wall. | 09-30-2010 |
20110118830 | System For Replacing Native Valve Function Of A Diseased Aortic Valve - Methods for replacing native valve function of a diseased aortic valve are disclosed. In an embodiment, a method for replacing native valve function of a diseased aortic valve in a patient includes: (a) receiving an artificial heart valve assembly mounted about a first mounting position on a catheter system, (b) guiding the artificial heart valve assembly through the vasculature of the patient, (c) while the catheter system having the artificial heart valve assembly mounted thereto is in the patient's vasculature, mounting the artificial heart valve assembly about a second mounting position on the catheter system, (d) delivering the artificial heart valve assembly to the region of the diseased aortic valve, (e) expanding the artificial heart valve assembly in the region of the diseased aortic valve, and (f) withdrawing the catheter system from the patient's vasculature. | 05-19-2011 |
20120010639 | Apparatus and method for manipulating tissue - Apparatus for reconfiguring tissue, the apparatus comprising a shaft having a distal end and a proximal end; at least one effector mechanism movably mounted to the distal end of the shaft, each effector mechanism comprising at least one gripping element for gripping tissue to that effector mechanism, the at least one effector mechanism being configured to capture the gripped tissue against said shaft, at least one actuating mechanism mounted to the proximal end of the shaft, and at least one connection mechanism connecting the at least one actuating mechanism to the at least one effector mechanism, whereby a user may utilize the at least one actuating mechanism to actuate the at least one effector mechanism so as to reconfigure tissue. | 01-12-2012 |
20140257470 | METHOD AND APPARATUS FOR RESECTING AND REPLACING AN AORTIC VALVE - Apparatus for resecting a diseased heart valve, the apparatus comprising: a body portion; a first handle and a second handle; a cutting blade; a set of retaining arms; a pass-off tool having a first attachment device configured to selectively engage the first handle attached to the body portion so as to allow placement of the second handle of the body portion adjacent to the diseased heart valve, and a controller tool having a second attachment device at the distal end thereof, the second attachment device configured to selectively engage the second handle attached to the body portion so as to allow positioning of the body portion adjacent to the diseased heart valve, a cutting blade actuator configured to cause the cutting blade to selectively rotate, and a retaining arm actuator configured to selectively position the set of retaining arms from the contracted state to the expanded state. | 09-11-2014 |