Renganathan
Chezhian Renganathan, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140369186 | METHODS AND SYSTEMS WITH ENHANCED ROBUSTNESS FOR MULTI-CHASSIS LINK AGGREGATION GROUP - A method implemented for a link aggregation group is disclosed. The link aggregation group contains a local interface and a remote interface. The local interface is a logical interface formed by a plurality of network elements including a local network element and a peer network element. The local network element communicates with the peer network element through an inter-peer link. The method starts with determining that the local network element is active by checking that an aggregate state of the links coupled to the local network element is active. The method continues with detecting an anomaly of the active links and sending a notification to the peer network element about the anomaly. Then method continues with receiving an activation confirmation that the peer network element is ready for switching and switching traffic from the active links to the inter-peer link in response to receiving the activation confirmation. | 12-18-2014 |
Karthikeyan Renganathan, Holladay, UT US
Patent application number | Description | Published |
---|---|---|
20090187419 | Systems And Methods For A Decision Support Alert Feed - Certain embodiments of the present invention provide a clinical decision support system comprising a clinical decision support processing component adapted to determine the occurrence of an event based at least in part on at least one message received by the clinical decision support processing component and an alert feed server adapted to publish a clinical alert to an alert feed based at least in part on the event. The alert feed is in a standard syndication format. | 07-23-2009 |
Kutralanathan Renganathan, Cleveland, OH US
Patent application number | Description | Published |
---|---|---|
20120230996 | Compositions And Methods For Macular Degeneration - The present invention pertains to methods of inhibiting angiogenesis (e.g., ocular angiogenesis choroidal neovasculariztion) in an individual in need thereof comprising administering to the individual an agent that inhibits one or more CEP protein adducts wherein the angiogenesis is the result of 5 oxidative peptide modification of polyunsaturated fatty acids (PUFA) in the individual, and administration of the agent inhibits angiogenesis in the individual. | 09-13-2012 |
Kutralanathan Renganathan, Boulder, CO US
Patent application number | Description | Published |
---|---|---|
20100143380 | COMPOSITIONS AND METHODS FOR MACULAR DEGENERATION - The present invention pertains to methods of inhibiting angiogenesis in an individual in need thereof comprising administering to the individual an agent that inhibits one or more CEP protein adducts wherein the angiogenesis is the result of oxidative peptide modification of polyunsaturated fatty acids (PUFA) in the individual, and administration of the agent inhibits angiogenesis in the individual. In one embodiment, the invention is directed to methods of inhibiting ocular angiogenesis in an individual in need thereof comprising administering to the individual an agent that inhibits the angiogenic activity of one or more CEP protein adducts wherein administration of the. agent inhibits ocular angiogenesis in the individual. In another embodiment, the invention is directed to methods of inhibiting choroidal neovascularization in an individual in need thereof comprising administering to the individual an agent that inhibits the angiogenic activity of one or more CEP protein adducts wherein administration of the agent inhibits choroidal neovascularization in the individual. | 06-10-2010 |
Narendren Renganathan, Burlington, MA US
Patent application number | Description | Published |
---|---|---|
20110066192 | Expandable Ring Intervertebral Fusion Device - An expandable tube having a substantially semicircular unexpanded shape is inserted into the disc space after the disc material has been removed therefrom. A plurality of expandable lockable rings are passed over this tube in their unexpanded states and positioned along the anterior edge of the endplates. The tube is then expanded, thereby forcing the rings to expand. The rings hold their final expanded configuration via a one-way locking mechanism. Once sufficient distraction is achieved and the rings locked, the tube is collapsed and removed, thereby leaving the expanded, locked rings behind to support the disc space. | 03-17-2011 |
Sakthivel Renganathan, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120124240 | LOCAL CONTROL NETWORK PROCESSOR (LCNP) EMULATOR FOR MULTI-GENERATION CONTROL SYSTEMS - A multi-generation distributed control system includes a first generation (FG) DCS connected to a local control network (LCN) including FG client nodes. A second generation (SG) DCS connected to a non-LCN data highway includes a server node connected between the LCN and the non-LCN data highway and SG client nodes. The server node includes a LCN processor (LCNP) board. LCNP emulator software including a server LCNP emulator software component is at the server node and a client LCNP emulator software component at the SG client nodes. The server LCNP emulator software component translates between LCN data and data highway protocol data and adds one of a plurality of LCN address slots to communications received from the LCN for delivery to the SG DCS that each correspond to a SG client node. Each client LCNP emulator software component provides one of the LCN address slots at its SG client node. | 05-17-2012 |
Sidharth Renganathan, Ambler, PA US
Patent application number | Description | Published |
---|---|---|
20140129100 | DISTRIBUTED HIERARCHICAL CONTROL SYSTEM FOR A TANDEM AXLE DRIVE SYSTEM - A hierarchical control system for a tandem axle assembly for a vehicle is provided. The hierarchical control system includes a vehicle level controller, an actuator, a shift controller, and a sensor. The shift controller is capable of placing the tandem axle assembly in at least a first operating condition and a second operating condition using the actuator. In response to the sensor and an operating condition of at least one of the power source and the transmission of the vehicle, the shift controller adjusts a manner of placing the tandem axle assembly in at least one of the first operating condition and the second operating condition. The hierarchical control system facilitates performing a shifting procedure in an automatic manner or as desired by an operator of the vehicle without excessively increasing a cost and a complexity of the tandem axle assembly. | 05-08-2014 |
Venkataramann Renganathan, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20130185557 | Detection of Invalid Escrow Keys - A secure hash, such as a Hash-based Message Authentication Code (“HMAC”), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach. | 07-18-2013 |
20130198294 | DYNAMIC CROSS-SITE REQUEST FORGERY PROTECTION IN A WEB-BASED CLIENT APPLICATION - A canary value is used to validate a message from a non-web browser client application to a web server providing web services to mitigate cross-site forgery attacks. The canary value is generated by the server in party by applying a hash function to a user identifier and a time stamp. The server provides the canary value to the client application in response to receiving a message that does not have a canary or has an expired canary. The client application upon receiving an error message with a canary message will resend the prior message with the canary value present. The client application caches the canary value for subsequent messages until a new canary value is received. The canary value allows the server to ignore messages generated by the client application under control of an attacker. | 08-01-2013 |