Patent application number | Description | Published |
20080248032 | COMPOSITIONS AND METHODS FOR PROTECTION AGAINST CARDIAC AND/OR CENTRAL NERVOUS SYSTEM TISSUE INJURY BY INHIBITING SPHINGOSINE-1-PHOSPHATE LYASE - The present invention relates generally to the prevention and/or treatment of cardiac and stroke injury. In particular, the present invention provides compositions and methods for preventing and treating tissue injury in cardiac and stroke settings and injury due to ischemia/reperfusion, hypoxia, cardiotoxicity of certain therapeutic regimens, and other causes, by administering an agent that inhibits sphingosine-1-phosphate lyase (SPL) activity. | 10-09-2008 |
20090202551 | IMMUNOMODULATION BY ALTERING SPHINGOSINE 1-PHOSPHATE LYASE (SPL) ACTIVITY - Compositions and methods for modulating immune function are provided based on the unexpected discovery that inhibition of sphingosine-1-phosphate lyase (SPL) activity confers useful immunosuppressive effects, for example to modulate immune function in treatment or prevention of inflammation, transplant graft rejection, autoimmune disease, allergy, or other conditions, including therapeutic alteration of immune system cell survival and/or proliferation. Altering SPL activity by direct or indirect pharmacological intervention, or alternatively by molecular genetic methods to alter SPL expression levels, are also contemplated. | 08-13-2009 |
20090203044 | SPHINGOSINE-1-PHOSPHATE LYASE POLYPEPTIDES, POLYNUCLEOTIDES AND MODULATING AGENTS AND METHODS OF USE THEREFOR - Compositions, methods and kits for diagnosing and treating cancer are provided. Therapeutic compositions may comprise agents that modulate the expression or activity of a sphingosine-1-phosphate lyase (SPL). Such compositions may be administered to a mammal afflicted with cancer. Diagnostic methods and kits may employ an agent suitable for detecting alterations in endogenous SPL. Such methods and kits may be used to detect the presence of a cancer or to evaluate the prognosis of a known disease. SPL polypeptides, polynucleotides and antibodies are also provided. | 08-13-2009 |
20110098317 | USE OF UNSATURATED SPHINGOSINE COMPOUNDS AS CHEMOTHERAPEUTIC AGENTS FOR THE TREATMENT OF CANCER - The present invention is directed to unsaturated sphingosine compounds which are useful as therapeutic agents for the treatment of cancer and for the treatment of other diseases including diabetes and infection with intracellular bacteria. This invention is also directed to methods of using the compounds and pharmaceutical compositions comprising the compounds in treating these diseases. | 04-28-2011 |
20150051207 | USE OF UNSATURATED SPHINGOSINE COMPOUNDS AS CHEMOTHERAPEUTIC AGENTS FOR THE TREATMENT OF CANCER - The present invention is directed to unsaturated sphingosine compounds which are useful as therapeutic agents for the treatment of cancer and for the treatment of other diseases including diabetes and infection with intracellular bacteria. The invention is also directed to methods of using the compounds and pharmaceutical compositions comprising the compounds in treating these diseases. | 02-19-2015 |
Patent application number | Description | Published |
20120317432 | ESTIMATING AND PRESERVING BATTERY LIFE BASED ON USAGE PATTERNS - Embodiments apply user-specific usage patterns to estimate and preserve remaining battery life on a computing device. An amount of battery drain and an execution context are determined and stored for a plurality of recurring time periods. The execution context identifies operations executed by the computing device, signal strength, and other data describing the associated time period. If one of the operations is expected to be executed during a recurrence of at least one of the time periods, the expected execution is adjusted based on execution context and an estimated remaining battery life for the computing device. For example, the computing device may postpone or reschedule the operation for a time period during which the operation is expected to have a greater likelihood of completing successfully. In some embodiments, the battery preservation operations are automatically enabled at a particular threshold. | 12-13-2012 |
20140289543 | ESTIMATING AND PRESERVING BATTERY LIFE BASED ON USAGE PATTERNS - Embodiments apply user-specific usage patterns to estimate and preserve remaining battery life on a computing device. An amount of battery drain and an execution context are determined and stored for a plurality of recurring time periods. The execution context identifies operations executed by the computing device, signal strength, and other data describing the associated time period. If one of the operations is expected to be executed during a recurrence of at least one of the time periods, the expected execution is adjusted based on execution context and an estimated remaining battery life for the computing device. For example, the computing device may postpone or reschedule the operation for a time period during which the operation is expected to have a greater likelihood of completing successfully. In some embodiments, the battery preservation operations are automatically enabled at a particular threshold. | 09-25-2014 |
20150271640 | WI-FI TILE TRANSFER - Various technologies described herein pertain to transferring geospatial tiles for Wi-Fi networks. A geospatial tile specifies a geographic region and includes data pertaining to a plurality of Wi-Fi networks having respective geographic coverage areas within the geographic region. A mobile device can receive an indicator that corresponds to a geospatial tile for retrieval by the mobile device. Further, the mobile device can request the geospatial tile from a tile management system based upon the indicator. Upon receiving the geospatial tile from the tile management system, the mobile device stores the geospatial tile in a tile cache. Further, the mobile device can automatically connect to a particular Wi-Fi network from the plurality of Wi-Fi networks utilizing data for the particular Wi-Fi network included in the geospatial tile when the mobile device is positioned within a geographic coverage area of the particular Wi-Fi network. | 09-24-2015 |
Patent application number | Description | Published |
20090241136 | Method to Precondition a Storage Controller for Automated Data Collection Based on Host Input - An FTDC interface with the host or user. The interface can include a command application programming interface (API) or a data storage Command-Line Interface (DS CLI)/Graphical User Interface (GUI). In certain embodiments, the FTDC interface allows a host or user to customize a desired FTDC on a two-tiered system. The first tier is one in which a host/user selects, from a list of conditions, which ones, upon occurrence of those conditions, they would like the controller to perform FTDC. The second tier a second selection such that for each first tier item, the host/user will select the level of FTDC (collection and offloading of logs and/or the forcing and offloading of a statesave). | 09-24-2009 |
20110208922 | POOL OF DEVICES PROVIDING OPERATING SYSTEM REDUNDANCY - Systems, methods, and computer program products for providing operating system (O/S) redundancy in a computing system are provided. One system includes a host computing device, a plurality of memory devices, and a sub-loader coupled between the host computing device and the plurality of memory devices. Each memory device stores a respective O/S and the sub-loader is configured such that the plurality of memory devices appear transparent to the host computing device. One method includes designating, a first logical unit device as a primary logical unit device and subsequently determining that the first logical unit device is unresponsive. The designation is removed from the first logical unit device and a second logical unit device is designated as a new primary logical unit device. One computer program product includes instructions for performing the above method. | 08-25-2011 |
20130080704 | MANAGEMENT OF POINT-IN-TIME COPY RELATIONSHIP FOR EXTENT SPACE EFFICIENT VOLUMES - A storage controller receives a request to establish a point-in-time copy operation by placing a space efficient source volume in a point-in-time copy relationship with a space efficient target volume, wherein subsequent to being established the point-in-time copy operation is configurable to consistently copy the space efficient source volume to the space efficient target volume at a point in time. A determination is made as to whether any track of an extent is staging into a cache from the space efficient target volume or destaging from the cache to the space efficient target volume. In response to a determination that at least one track of the extent is staging into the cache from the space efficient target volume or destaging from the cache to the space efficient target volume, release of the extent from the space efficient target volume is avoided. | 03-28-2013 |
20130205093 | MANAGEMENT OF POINT-IN-TIME COPY RELATIONSHIP FOR EXTENT SPACE EFFICIENT VOLUMES - A storage controller receives a request to establish a point-in-time copy operation by placing a space efficient source volume in a point-in-time copy relationship with a space efficient target volume, wherein subsequent to being established the point-in-time copy operation is configurable to consistently copy the space efficient source volume to the space efficient target volume at a point in time. A determination is made as to whether any track of an extent is staging into a cache from the space efficient target volume or destaging from the cache to the space efficient target volume. In response to a determination that at least one track of the extent is staging into the cache from the space efficient target volume or destaging from the cache to the space efficient target volume, release of the extent from the space efficient target volume is avoided. | 08-08-2013 |
20140108750 | ESTABLISHING A POINT-IN-TIME COPY RELATIONSHIP BETWEEN SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for establishing a point-in-time copy relationship between source logical addresses and target logical addresses. A point-in-time (PiT) copy establish command specifies a source set comprising a subset of source logical addresses in at least one storage and a target set comprising a subset of target logical addresses in the at least one storage. The source set of source logical addresses are copied to the target set of target logical addresses. The source logical addresses map to source tracks and wherein the target logical addresses map to target tracks. Copy information is generated indicating whether the source logical addresses in the source set have been copied to the target set. Complete is returned to the PiT copy establish command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108751 | PROCESSING A COPY COMMAND DIRECTED TO A FIRST STORAGE ARCHITECTURE FOR DATA THAT IS STORED IN A SECOND STORAGE ARCHITECTURE - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108752 | MANAGING UPDATES AND COPYING DATA IN A POINT-IN-TIME COPY RELATIONSHIP EXPRESSED AS SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses. A copy relationship indicates a source set of a subset of source logical addresses to copy to a target set comprising a subset of target logical addresses. An update is received to a source logical address that has not been copied. Determinations are made of the target logical address corresponding to the source logical address to be updated according to the copy relationship, a target group of target logical addresses in the target set that include the determined target logical address, and the source logical addresses in the source set that correspond to the target logical addresses in the target group. The determined source logical addresses are copied to the target logical addresses in the determined target group. | 04-17-2014 |
20140108756 | BITMAP SELECTION FOR REMOTE COPYING OF UPDATES - In one embodiment of the present description, a copy relationship is established between a storage location at a first site and a storage location at a second site in a data storage system, wherein a dynamically assignable bitmap preset to one of a plurality of different predetermined bit patterns is selected as a function of both the availability of the selected bitmap and the type of predetermined bit pattern identified for the selected bitmap. The selected bitmap may be assigned as an out-of-sync bitmap wherein updates to the storage location at one site, which are to be copied to the storage location at the other site, are indicated in the selected bitmap, and data writes being written to the storage location at the one site, are copied to the storage location at the other site, using the selected bitmap as an out-of-sync bitmap. Other aspects are described. | 04-17-2014 |
20140108757 | PROCESSING A COPY COMMAND DIRECTED TO A FIRST STORAGE ARCHITECTURE FOR DATA THAT IS STORED IN A SECOND STORAGE ARCHITECTURE - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108857 | BITMAP SELECTION FOR REMOTE COPYING OF UPDATES - In one embodiment of the present description, a copy relationship is established between a storage location at a first site and a storage location at a second site in a data storage system, wherein a dynamically assignable bitmap preset to one of a plurality of different predetermined bit patterns is selected as a function of both the availability of the selected bitmap and the type of predetermined bit pattern identified for the selected bitmap. The selected bitmap may be assigned as an out-of-sync bitmap wherein updates to the storage location at one site, which are to be copied to the storage location at the other site, are indicated in the selected bitmap, and data writes being written to the storage location at the one site, are copied to the storage location at the other site, using the selected bitmap as an out-of-sync bitmap. Other aspects are described. | 04-17-2014 |
20140351533 | PARALLEL PROCESSES FOR PERFORMING MULTIPLE INCREMENTAL COPIES - A storage controller receives a write command with respect to a track, from a host. A first process determines that the track is a source track and also determines that at least one corresponding target track is in an incremental copy relation to the source track. A second process is generated to modify a target change recording structure, where the second process executes in parallel with the first process. | 11-27-2014 |
20150089509 | DATA PROCESSING RESOURCE MANAGEMENT - In accordance with one aspect of the present description execution of a particular command by a data processor such as a storage controller, may include obtaining priority over a resource which is also associated with execution of another command, setting a timer for the duration of a dynamically set timeout period, and detecting a potential deadlock condition as a function of expiration of the dynamically set timeout period before execution of the particular command is completed. In one embodiment, the particular command releases priority over the resource upon detection of the potential deadlock condition, and then reobtains priority over the resource in a retry of the command. It is believed that such an arrangement can relieve a potential deadlock condition, allowing execution of one or more commands including the particular command to proceed. Other features and aspects may be realized, depending upon the particular application. | 03-26-2015 |
20150227455 | MANAGEMENT OF POINT-IN-TIME COPY RELATIONSHIP FOR EXTENT SPACE EFFICIENT VOLUMES - A storage controller receives a request to establish a point-in-time copy operation by placing a space efficient source volume in a point-in-time copy relationship with a space efficient target volume, wherein subsequent to being established the point-in-time copy operation is configurable to consistently copy the space efficient source volume to the space efficient target volume at a point in time. A determination is made as to whether any track of an extent is staging into a cache from the space efficient target volume or destaging from the cache to the space efficient target volume. In response to a determination that at least one track of the extent is staging into the cache from the space efficient target volume or destaging from the cache to the space efficient target volume, release of the extent from the space efficient target volume is avoided. | 08-13-2015 |
20150269069 | PROCESSING A POINT-IN-TIME COPY ESTABLISH COMMAND TO COPY DATA - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 09-24-2015 |
20150277798 | MANAGING UPDATES AND COPYING DATA IN A POINT-IN-TIME COPY RELATIONSHIP EXPRESSED AS SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses. A copy relationship indicates a source set of a subset of source logical addresses to copy to a target set comprising a subset of target logical addresses. An update is received to a source logical address that has not been copied. Determinations are made of the target logical address corresponding to the source logical address to be updated according to the copy relationship, a target group of target logical addresses in the target set that include the determined target logical address, and the source logical addresses in the source set that correspond to the target logical addresses in the target group. The determined source logical addresses are copied to the target logical addresses in the determined target group. | 10-01-2015 |
Patent application number | Description | Published |
20100120010 | Constructed response scoring mechanism - A system, method, and related techniques are disclosed for scoring user responses to constructed response test items. The system includes a scoring engine for receiving a user response to a test question and evaluating the response against a scoring rubric. The scoring rubric may include a binding stage, an assertion stage, and a scoring stage. Furthermore, the system includes a database for referencing elements used by the scoring engine which may comprise objects, object sets, attributes of objects, and transformations of any elements. | 05-13-2010 |
20110311957 | CONSTRUCTED RESPONSE SCORING MECHANISM - A system, method, and related techniques are disclosed for scoring user responses to constructed response test items. The system includes a scoring engine for receiving a user response to a test question and evaluating the response against a scoring rubric. The scoring rubric may include a binding stage, an assertion stage, and a scoring stage. Furthermore, the system includes a database for referencing elements used by the scoring engine which may comprise objects, object sets, attributes of objects, and transformations of any elements. | 12-22-2011 |
20110311958 | CONSTRUCTED RESPONSE SCORING MECHANISM - A system, method, and related techniques are disclosed for scoring user responses to constructed response test items. The system includes a scoring engine for receiving a user response to a test question and evaluating the response against a scoring rubric. The scoring rubric may include a binding stage, an assertion stage, and a scoring stage. Furthermore, the system includes a database for referencing elements used by the scoring engine which may comprise objects, object sets, attributes of objects, and transformations of any elements. | 12-22-2011 |