Patent application number | Description | Published |
20090043392 | Artificial Spinal Disc - An artificial disc prosthesis is provided. The prosthesis of the present invention enables spinal segment alignment by having a variable height across its surface. The variable height is achieved by an asymmetric artificial nucleus or by at least one variable height end plate. | 02-12-2009 |
20090043393 | Artificial Spinal Disc - An artificial disc prosthesis is provided. The prosthesis of the present invention enables spinal segment alignment by having a variable height across its surface. The variable height is achieved by an asymmetric artificial nucleus or by at least one variable height end plate. | 02-12-2009 |
20110082556 | Artificial Spinal Disc - An artificial disc prosthesis is provided. The prosthesis enables spinal segment alignment by having a variable height across its surface. The variable height is achieved by an asymmetric artificial nucleus or by at least one variable height end plate. The prosthesis may have a central keel on one end plate and an offset pair of keels on a second end plate. The nucleus may engage a slot or trough in an inner surface of an end plate. The trough can be open on the posterior or anterior end to allow the nucleus to slide into the trough without undue distraction of adjacent vertebrae. The nucleus can be prevented from moving out of the trough by inserting a stop in the trough. | 04-07-2011 |
20110320003 | Artificial Spinal Disc - An artificial disc prosthesis is provided. The prosthesis of the present invention enables spinal segment alignment by having a variable height across its surface. The variable height is achieved by an asymmetric artificial nucleus or by at least one variable height end plate. | 12-29-2011 |
20130204369 | ARTIFICIAL SPINAL DISC - An artificial disc prosthesis is provided. The prosthesis includes first and second end plates and a nucleus. Each end plate may have one or more rows of keels for fixation to vertebral bodies. The nucleus may engage a slot or trough in an inner surface of an end plate. The trough can be open on the posterior or anterior end to allow the nucleus to slide into the trough without undue distraction of adjacent vertebrae. The nucleus can be prevented from moving out of the trough by inserting a stop in the trough. | 08-08-2013 |
Patent application number | Description | Published |
20080310419 | Network interface selection using historical connection information - A computer may be capable of communicating with devices via network through multiple interfaces. When a new connection is to be established, the computer may select an interface to use for the connection. In some embodiments, the interface may be selected based on historical connection information representing the performance of previous network connections that the computer has established through the interfaces. | 12-18-2008 |
20100107240 | NETWORK LOCATION DETERMINATION FOR DIRECT ACCESS NETWORKS - A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall, and therefore can operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through the Internet or other outside network, and therefore, because it is outside the private network firewall, should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller. | 04-29-2010 |
20110125897 | DETECTION OF HOME NETWORK CONFIGURATION PROBLEMS - A diagnostic tool for identifying a configuration of a private network that may disrupt operations involving communication between two devices on the network. The tool, when run on a device in the network, can identify a “double NAT” configuration in which the device may be separated from other devices on the private network by a NAT device. The tool, when run on a computing device, identifies a NAT device, such as a router, to which the device is connected. The tool then identifies a list containing one or more other devices that may be connected to the NAT device. The tool tests whether these other devices also perform NAT functions and are on the private network. Both the NAT device and the devices that may be connected to the NAT device are identified and a determination is made of whether those devices are on the private network by sending requests using one or more protocols that devices on a private network conventionally use but are not conventionally used by devices on other networks. | 05-26-2011 |
Patent application number | Description | Published |
20090222559 | Address Management in a Connectivity Platform - Disclosed are an approach form managing and assigning addresses in a connectivity platform that allows for proprietary connectivity modules (Providers) to plug into the operating system. In this disclosure, when a user/application/computing device, connects to another user on another computing device an address is generated for that user. However, because of a limited number of addresses that are available in an address space, it is necessary to ensure that a conflicting address is not present. To ensure this the connectivity platform determines if the address assigned is in conflict with another address associated with users that are located on the other computing devices. If an address is found to be in conflict the connectivity platform reassigns the address until a non-conflicting address is found. If a non-conflicting address cannot be found the connectivity platform blocks the connection between the user and the other user. | 09-03-2009 |
20090222568 | Connectivity Platform - Disclosed are a connectivity platform that allows for proprietary connectivity modules to plug into the operating system and also allows the operating system users and various existing networking applications in the operating system that are authorized by those providers to use that connectivity via existing APIs without the need for the applications to change or for extra configuration of the application to be performed. In an example disclosed herein, the providers provide NAT or firewall traversal and implement the appropriate transport mechanism. This allows for applications and computing devices to communicate in environments where connectivity is prevented by intermediate systems. | 09-03-2009 |
20090248868 | Contact Management in a Serverless Peer-to-Peer System - Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example. | 10-01-2009 |
20100146120 | CALLER-SPECIFIC VISIBILITY MASKS FOR NETWORKING OBJECTS - A computer configured to provide caller-specific network views, even when multiple callers are active on the computer. The operating system of the computer is configured to selectively perform network operations based on the identity of the caller. Network views are implemented by making subsets of networking objects available to each caller, such as a user or an application. Components that execute networking functions can, based on the identify of the caller, select networking objects to use in performing a requested function or verify that required networking objects are available to the caller. The network views may be stored as visibility masks in a database. APIs may be provided to create, modify, and delete visibility masks in the database. The masks may support arbitrary and potentially overlapping subsets of networking objects for the callers. | 06-10-2010 |
20130019042 | MECHANISM TO SAVE SYSTEM POWER USING PACKET FILTERING BY NETWORK INTERFACEAANM Ertugay; Osman N.AACI BellevueAAST WAAACO USAAGP Ertugay; Osman N. Bellevue WA USAANM Thaler; David G.AACI RedmondAAST WAAACO USAAGP Thaler; David G. Redmond WA USAANM Hari; MahenderAACI RedmondAAST WAAACO USAAGP Hari; Mahender Redmond WA USAANM Ritz; Andrew J.AACI SammamishAAST WAAACO USAAGP Ritz; Andrew J. Sammamish WA USAANM Dabagh; AlirezaAACI KirklandAAST WAAACO USAAGP Dabagh; Alireza Kirkland WA US - A network interface that connects a computing device to a network may be configured to process incoming packets and determine an action to take with respect to each packet, thus decreasing processing demands on a processor of the computing device. The action may be indicating the packet to an operating system of the computing device immediately, storing the packet in a queue of one or more queues or discarding the packet. When the processor is interrupted, multiple packets aggregated on the network interface may be indicated to the operating system all at once to increase the device's power efficiency. Hardware of the network interface may be programmed to process the packets using filter criteria specified by the operating system based on information gathered by the operating system, such as firewall rules. | 01-17-2013 |
20130067059 | Keep Alive Management - Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing device. The keep alive interval is used to maintain one or more notification channels between one or more applications of the computing device and a network. | 03-14-2013 |
20130067060 | Wake Pattern Management - Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device is monitored and a traffic pattern is recognized in the monitored network traffic. An application of the computing device is identified that corresponds to the recognized traffic pattern and responsive to this identification, at least a portion of the identified application is woken. | 03-14-2013 |
20130067061 | Network Communication and Cost Awareness - Network communication and cost awareness techniques are described. In one or more implementations, functionality is exposed through one or more application programming interfaces (APIs) that is accessible to a plurality of applications of the computing device to perform network communication. Data is returned to one or more of the plurality of applications regarding a cost network used to perform the network communication. | 03-14-2013 |
20130067260 | Operating System Management of Network Interface Devices - Operating system management of network interface devices is described. In one or more implementations, a determination is made by an operating system that network traffic associated with one or more applications of the computing device has completed. Responsive to the determination, a network interface device is caused to transition to a mode to reduce power consumption of the network interface device by the operating system. | 03-14-2013 |
20130117446 | ADDRESS MANAGEMENT IN A CONNECTIVITY PLATFORM - Disclosed are an approach form managing and assigning addresses in a connectivity platform that allows for proprietary connectivity modules (Providers) to plug into the operating system. In this disclosure, when a user/application/computing device, connects to another user on another computing device an address is generated for that user. However, because of a limited number of addresses that are available in an address space, it is necessary to ensure that a conflicting address is not present. To ensure this the connectivity platform determines if the address assigned is in conflict with another address associated with users that are located on the other computing devices. If an address is found to be in conflict the connectivity platform reassigns the address until a non-conflicting address is found. If a non-conflicting address cannot be found the connectivity platform blocks the connection between the user and the other user. | 05-09-2013 |
20140310546 | Operating System Management of Network Interface Devices - Operating system management of network interface devices is described. In one or more implementations, a determination is made by an operating system that network traffic associated with one or more applications of the computing device has completed. Responsive to the determination, a network interface device is caused to transition to a mode to reduce power consumption of the network interface device by the operating system. | 10-16-2014 |
20140369358 | CONNECTIVITY PLATFORM - Disclosed are a connectivity platform that allows for proprietary connectivity modules to plug into the operating system and also allows the operating system users and various existing networking applications in the operating system that are authorized by those providers to use that connectivity via existing APIs without the need for the applications to change or for extra configuration of the application to be performed. In an example disclosed herein, the providers provide NAT or firewall traversal and implement the appropriate transport mechanism. This allows for applications and computing devices to communicate in environments where connectivity is prevented by intermediate systems. | 12-18-2014 |
20150052373 | Keep Alive Management - Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing device. The keep alive interval is used to maintain one or more notification channels between one or more applications of the computing device and a network. | 02-19-2015 |
Patent application number | Description | Published |
20100160047 | Scalable Game Primitives / Distributed Real-Time Aggregation Of Player Data - Disclosed herein is a set of coordinated game service primitives that allows for custom, per-game, logic. A new game with new custom logic can be added without needing to change any public api or database schema or write any new server code. The same hardware may be shared across many games. And the system scales linearly. That is, if the number of servers is doubled, then so is the number of concurrent users that can be supported. Also disclosed are systems and methods for two-stage aggregation. Pre-aggregation may take place on a plurality of front-end server. Final aggregation may take place on one or more back-end servers. A name value store may be used to reliably store state. | 06-24-2010 |
20100285885 | MASSIVELY MULTIPLAYER GAME MESSAGE SCHEDULING - A massively multiplayer game management service includes a scheduling module that establishes a message receiving period and a game data aggregation period. The massively multiplayer game management service further includes a message receiving module that, during the message receiving period that overlaps at least part of the game data aggregation period, receives a message from a player client. The message may include an identifier and an execution time that follows the game data aggregation period. The massively multiplayer game management service further includes a message sending module that sends game data, aggregated in a game space location corresponding to the identifier, to the player clients upon occurrence of the execution time. | 11-11-2010 |
20110275431 | ROLE ASSIGNMENT IN MULTIPLAYER GAMES - Dynamic role selection of players for different roles in multiplayer gaming sessions is provided. Users seeking to participate in different roles in the game may request participation in the role. Selection of players for roles is made dynamically by varying a selection component for different sessions of the game. The selection component may be a user's game score over different time periods, and can be rotated for different sessions of the game, so that various levels of players have an opportunity to fill game roles. | 11-10-2011 |
20120128010 | MINIMIZING NETWORK LATENCY IN INTERACTIVE INTERNET APPLICATIONS - A method and system that enhances a user's performance while interacting with an interactive internet application such as a Massively Multiplayer Online (MMO) game is provided. The network latency experienced by users participating in the MMO game is minimized by dynamically determining an optimal transmission action for a message generated by the MMO game. In one embodiment, determining the optimal transmission action for a message includes dynamically determining the optimal number of redundant Forward Error Correction (FEC) packets to add to a message prior to transmitting a message to a receiving device. The optimal number of FEC packets is determined based on a wide range of varying network conditions. | 05-24-2012 |