Patent application number | Description | Published |
20100138828 | Systems and Methods for Facilitating Virtualization of a Heterogeneous Processor Pool - A system for facilitating virtualization of a heterogeneous processor pool includes a processor allocation component and a hypervisor, each executing on a host computer. The processor allocation component identifies a plurality of physical processors available for computing and determines a set of flags, each of the set of flags identifying a type of functionality provided by each of a subset of the plurality of physical processors. The hypervisor, in communication with the processor allocation component, allocates, to at least one virtual machine, access to one of the subset of the plurality of physical processors. | 06-03-2010 |
20100138829 | Systems and Methods for Optimizing Configuration of a Virtual Machine Running At Least One Process - A system for optimizing configuration of a virtual machine running at least one process includes at least one virtual resource in a virtual machine executing on a computing device, an agent executing within the virtual machine, and a hypervisor. The at least one virtual resource has a configuration parameter. The agent identifies a name of at least one process currently executing on the virtual machine. The hypervisor alters, in response to receiving the identified name from the agent, a value of the configuration parameter. | 06-03-2010 |
20100161922 | SYSTEMS AND METHODS FOR FACILITATING MIGRATION OF VIRTUAL MACHINES AMONG A PLURALITY OF PHYSICAL MACHINES - A method for facilitating migration of virtual machines among a plurality of physical machines includes associating a virtual machine with at least one physical resource inaccessible by a first subset of the plurality of physical machines and available to a second subset of the plurality of physical machines, the virtual machine executing on a first physical machine in the second subset of the plurality of physical machines. The method includes receiving a request to migrate the virtual machine to a second physical machine in the plurality of physical machines. The method includes identifying a second physical machine in the second subset of the plurality of physical machines. The method includes migrating the virtual machine to the second physical machine. | 06-24-2010 |
20120215998 | DEPLOYING A COPY OF A DISK IMAGE FROM SOURCE STORAGE TO TARGET STORAGE - A technique deploys a copy of a disk image from source storage to target storage. The technique involves identifying a particular disk image to be copied from the source storage to the target storage. The technique further involves performing a comparison operation between a first disk image list which lists disk images on the source storage and a second disk image list which lists disk images on the target storage to generate a common disk image list which lists a set of common disk images on both the source and target storage. The technique further involves transferring, from the source storage to the target storage, a set of data portions representing differences between the particular disk image and a common disk image listed on the common disk image list. The set of data portions in combination with the common disk image form a deployed copy on the target storage. | 08-23-2012 |
20130097602 | SYSTEMS AND METHODS FOR FACILITATING VIRTUALIZATION OF A HETEROGENEOUS PROCESSOR POOL - A system for facilitating virtualization of a heterogeneous processor pool includes a processor allocation component and a hypervisor, each executing on a host computer. The processor allocation component identifies a plurality of physical processors available for computing and determines a set of flags, each of the set of flags identifying a type of functionality provided by each of a subset of the plurality of physical processors. The hypervisor, in communication with the processor allocation component, allocates, to at least one virtual machine, access to one of the subset of the plurality of physical processors. | 04-18-2013 |
20140344807 | OPTIMIZED VIRTUAL MACHINE MIGRATION - A virtualization computing platform may host a virtual machine. The virtual machine may be hosted by a first set of resources of the virtualization computing platform. A second set of resources for hosting the virtual machine may be identified. The second set of resources may comprise resources of the virtualization computing platform that are distinct from the first set of resources. At least a portion of a plurality of files associated with the virtual machine may be copied from the first set of resources to the second set of resources. A virtual memory swap file may be identified from among the plurality of files associated with the virtual machine. Based on identifying the virtual memory swap file as a virtual memory swap file, the virtual memory swap file may be treated differently from one or more other of the plurality of files associated with the virtual machine. | 11-20-2014 |
Patent application number | Description | Published |
20090276734 | Projection of Images onto Tangible User Interfaces - A surface computing device is described which has a surface which can be switched between transparent and diffuse states. When the surface is in its diffuse state, an image can be projected onto the surface and when the surface is in its transparent state, an image can be projected through the surface and onto an object. In an embodiment, the image projected onto the object is redirected onto a different face of the object, so as to provide an additional display surface or to augment the appearance of the object. In another embodiment, the image may be redirected onto another object. | 11-05-2009 |
20100100716 | Conserving Power Using Predictive Modelling and Signaling - Methods and systems for conserving power using predictive models and signaling are described. Parameters of a power management policy are set based on predictions based on user activity and/or signals received from a remote computer which define a user preference. In an embodiment, the power management policy involves putting the computer into a sleep state and periodically waking it up. On waking, the computer determines whether to remain awake or to return to the sleep state dependent upon the output of a predictive model or signals that encode whether a remote user has requested that computer remain awake. Before returning to the sleep state, a wake-up timer is set and this timer triggers the computer to subsequently wake-up. The length of time that the timer is set to may depend on factors such as the request from the remote user, context sensors and usage data. | 04-22-2010 |
20110210917 | User Interface Control Using a Keyboard - User interface control using a keyboard is described. In an embodiment, a user interface displayed on a display device is controlled using a computer connected to a keyboard. The keyboard has a plurality of alphanumeric keys that can be used for text entry. The computer receives data comprising a sequence of key-presses from the keyboard, and generates for each key-press a physical location on the keyboard. The relative physical locations of the key-presses are compared to calculate a movement path over the keyboard. The movement path describes the path of a user's digit over the keyboard. The movement path is mapped to a sequence of coordinates in the user interface, and the movement of an object displayed in the user interface is controlled in accordance with the sequence of coordinates. | 09-01-2011 |
20110214053 | Assisting Input From a Keyboard - Assisting input from a keyboard is described. In an embodiment, a processor receives a plurality of key-presses from the keyboard comprising alphanumeric data for input to application software executed at the processor. The processor analyzes the plurality of key-presses to detect at least one predefined typing pattern, and, in response, controls a display device to display a representation of at least a portion of the keyboard in association with a user interface of the application software. In another embodiment, a computer device has a keyboard and at least one sensor arranged to monitor at least a subset of keys on the keyboard, and detect an object within a predefined distance of a selected key prior to activation of the selected key. The processor then controls the display device to display a representation of a portion of the keyboard comprising the selected key. | 09-01-2011 |
20110252163 | Integrated Development Environment for Rapid Device Development - An integrated development environment for rapid device development is described. In an embodiment the integrated development environment provides a number of different views to a user which each relate to a different aspect of device design, such as hardware configuration, software development and physical design. The device, which may be a prototype device, is formed from a number of objects which are selected from a database and the database stores multiple data types for each object, such as a 3D model, software libraries and code-stubs for the object and hardware parameters. A user can design the device by selecting different views in any order and can switch between views as they choose. Changes which are made in one view, such as the selection of a new object, are fed into the other views. | 10-13-2011 |
20120038891 | Projection of Images onto Tangible User Interfaces - The techniques described herein provide a surface computing device that includes a surface layer configured to be in a transparent state and a diffuse state. In the diffuse state, an image can be projected onto the surface. In the transparent state, an image can be projected through the surface. | 02-16-2012 |
20120072626 | Automatic Addressing Protocol for a Shared Bus - An automatic addressing protocol for a shared bus is described. In an embodiment, devices connected in a chain by a shared bus are also connected by an independent electrical connection between each pair of neighboring devices. A protocol is used over the independent electrical connections which is independent of that used on the shared bus. Devices in the chain receive at least one device ID from an upstream neighbor via the independent electrical connection and either use this received ID as their ID or use the received ID to compute their ID. Where the device has a downstream neighbor, a device then transmits at least one device ID to the downstream neighbor via the independent electrical connection and this transmitted ID may be their ID or an ID generated based on their ID, for example, by incrementing the ID by one. The process is repeated by devices along the chain. | 03-22-2012 |
20130007192 | DEVICE SENSOR AND ACTUATION FOR WEB PAGES - An embedded device sensor and actuation web page access system and method for providing a web application (such as a web page) access to sensor data about an embedded device and access to actuation mechanisms (such as vibration) associated with the device. The system and method can use the sensor data to obtain context information about the embedded device and understand what a user of the device is doing at any given moment. The sensor data can be used by the web application to influence how content is served up to the user. In some embodiments, the sensor data is provided to the web server using the headers in HTTP requests. Moreover, actuation commands for actuation mechanisms on the embedded device are provided using the headers of HTTP responses. Embodiments of the system and method provide a website access to sensor data and actuation commands without changing website operation. | 01-03-2013 |
20130007700 | CODE SUGGESTIONS - Code suggestion technique embodiments are presented that improve the productivity of a programmer by assisting in both the writing of code and in debugging the code as it is being written. In general, this is accomplished by automating a search of a database of the past work and problem solving activities of programmers to make suggestion to a programmer currently writing code. For example, as a programmer enters code, suggested ways of finishing a line or code section are presented based on how previous programmers finished a similar line or code section. Another example involves a programmer who encounters an error message while writing code. In such a case, the programmer is provided with a suggested fix or fixes, based on the actions taken by previous developers when encountering a similar problem. | 01-03-2013 |
20130169687 | Manipulation of Graphical Objects - One or more graphical objects are displayed in a fixed orientation with reference to a sensed reference direction. Manipulation is achieved by fixing the orientation or position of a displayed graphical object with reference to an apparatus, such as the display itself or a proxy device, detecting a change in orientation of that apparatus and editing the orientation of the graphical object based on the detected change. | 07-04-2013 |
20130262888 | CONSERVING POWER USING PREDICTIVE MODELLING AND SIGNALING - Methods and systems for conserving power using predictive models and signaling are described. Parameters of a power management policy are set based on predictions based on user activity and/or signals received from a remote computer which define a user preference. In an embodiment, the power management policy involves putting the computer into a sleep state and periodically waking it up. On waking, the computer determines whether to remain awake or to return to the sleep state dependent upon the output of a predictive model or signals that encode whether a remote user has requested that computer remain awake. Before returning to the sleep state, a wake-up timer is set and this timer triggers the computer to subsequently wake-up. The length of time that the timer is set to may depend on factors such as the request from the remote user, context sensors and usage data. | 10-03-2013 |
20130275957 | CUSTOMIZING APPLIANCES - Configuring appliances is described. In an embodiment an appliance, for example, a domestic appliance can have both a physical user interface, for example the buttons on the appliance and a remote user interface. In various embodiments a user can access the remote user interface by connecting to a network interface associated with the appliance using a client device. The client device can display the remote user interface of the appliance and the user can use the remote user interface to configure settings and functions of the appliance and of the physical and remote user interfaces. In various embodiments the remote user interface can be used in combination with the physical user interface. In various embodiments the remote user interface is a development environment which enables the user to change the functionality of the appliance by altering or replacing program files which are executed at the appliance. | 10-17-2013 |
20130290910 | USER INTERFACE CONTROL USING A KEYBOARD - User interface control using a keyboard is described. In an embodiment, a user interface displayed on a display device is controlled using a computer connected to a keyboard. The keyboard has a plurality of alphanumeric keys that can be used for text entry. The computer receives data comprising a sequence of key-presses from the keyboard, and generates for each key-press a physical location on the keyboard. The relative physical locations of the key-presses are compared to calculate a movement path over the keyboard. The movement path describes the path of a user's digit over the keyboard. The movement path is mapped to a sequence of coordinates in the user interface, and the movement of an object displayed in the user interface is controlled in accordance with the sequence of coordinates. | 10-31-2013 |
20130346762 | OPTIMIZING BATTERY USE FOR KNOWN FUTURE LOAD - Methods for optimizing battery use for a known future load are described. In an embodiment, one or more battery cells are selected from a set of battery cells to provide power to a computing-based device. The battery cells are selected based on discharge profile data for each battery cell and both the current power requirement and a known future power requirement of the computing-based device. The known future power requirement is calculated based on information available to the operating system running on the computing-based device. In some examples, one or more battery cells may also be selected for charging when a power source is available and these cells may be selected based on charge profile data and the known future power requirement. The selection of the battery cells may also be made in order to satisfy a battery optimization goal, which may be defined by a user. | 12-26-2013 |
20140093079 | SECURELY JOINING A SECURE WIRELESS COMMUNICATIONS NETWORK - Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network. | 04-03-2014 |
20150124968 | SECURELY JOINING A SECURE WIRELESS COMMUNICATIONS NETWORK - Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network. | 05-07-2015 |
Patent application number | Description | Published |
20080209046 | HEALTH-RELATED OPPORTUNISTIC NETWORKING - A wireless opportunistic network that can facilitate data transfer by way of interconnected devices is disclosed. In accordance with this opportunistic network, each of the devices effectively contributes to the transfer of the information thereby obviating the need for an external carrier. In this manner, the carrier infrastructure is embodied and distributed throughout the individual devices of the network. In a particular aspect, the opportunistic network is employed to transfer and make available health-related data. This functionality can be used in many scenarios related to heath from, monitoring patients and conveying basic diagnostic data to identifying bioterrorism by way of collaborating data between a number of devices within the network. Essentially, the innovation provides for at least two core functional ideas, the opportunistic network infrastructure and the use of the network in health related scenarios. | 08-28-2008 |
20110320564 | HEALTH-RELATED OPPORTUNISTIC NETWORKING - A wireless opportunistic network that can facilitate data transfer by way of interconnected devices is disclosed. In accordance with this opportunistic network, each of the devices effectively contributes to the transfer of the information thereby obviating the need for an external carrier. In this manner, the carrier infrastructure is embodied and distributed throughout the individual devices of the network. In a particular aspect, the opportunistic network is employed to transfer and make available health-related data. This functionality can be used in many scenarios related to heath from, monitoring patients and conveying basic diagnostic data to identifying bioterrorism by way of collaborating data between a number of devices within the network. Essentially, the innovation provides for at least two core functional ideas, the opportunistic network infrastructure and the use of the network in health related scenarios. | 12-29-2011 |
20130232552 | Automatic Context Sharing with Privacy - The subject disclosure is directed towards a technology by which a computing device user may share context-related information (e.g., including current activity) with other recipient machines. A requestor may request to peek at a user's context, and if the requestor is valid (pre-approved by the user), a response based on context-related information is sent, which may be via a cloud service. The response may be filtered and/or adjusted based upon the identity of the requestor and other information associated with that identity, e.g., filtering criteria set by the user. Also described is notifying the user of the peek request, and logging information corresponding to the request and response. A broadcast message may also be sent by the device to share context without waiting for a peek request. | 09-05-2013 |
20150229751 | SECURELY DETERMINING THE LOCATION OF A USER - Methods for securely and precisely determining the location of a user are described. The methods involve a situated device dock which is associated with an application and has a known physical location. The dock comprises a sensor to detect a user portable device in proximity to the dock and a module for communicating a session key to a proximate user portable device. The session key is known to a server and enables the user portable device to verify to the server that it is proximate to the device dock and therefore can be associated with the known physical location of the device dock. Based on the known location of the user portable device, functionality within an application or web application running on the device is enabled or disabled. | 08-13-2015 |
20150258434 | GAMING SYSTEM FOR MODULAR TOYS - An interactive computer game is described which works in conjunction with a number of physical modules that a user can connect together in different ways to form a coherent physical whole object. The game receives data from the object via a wireless link, the data identifying at least which modules form part of the object and updates game play based on the data received. At some point within the game play, the game presents an objective or goal to the user which the user can only achieve by interacting with the physical object formed from the modules. In an embodiment, this interaction comprises re-arranging the modules or swapping modules to form an object with a different visual appearance, moving all or part of the object and/or interacting with a sensor on a module in the object. The game may receive further data from the object during the user interaction. | 09-17-2015 |
20150258435 | MODULAR CONSTRUCTION FOR INTERACTING WITH SOFTWARE - A modular assembly system is described which enables interaction with an interactive software experience such as a game. The system enables a coherent physical whole object to be assembled from a core module and one or more peripheral modules. The core module includes a battery, processor and a wireless module which is able to communicate with the interactive software experience which runs on a separate computing device such as a smartphone, tablet or games console. Each of the peripheral modules stores a module ID and these IDs are collected by the core module and communicated to the interactive software experience. The user experience within the interactive software experience changes dependent upon the set of modules which are connected to form the coherent physical whole object and may also be altered as a result of manipulation of the coherent physical whole object or individual modules. | 09-17-2015 |
20150258436 | DATA STORE FOR A MODULAR ASSEMBLY SYSTEM - A data store for a modular assembly system is described. The data store comprises a number of records, each record relating to a physical module in the modular assembly system and comprising a module ID, an owner ID for the module and one or more properties fields. The properties field(s) define any property of the module and different records may define different properties. At least one of the fields in each data record (e.g. the module ID or owner ID) is verified by an authentication service. A user assembles two or more modules into a coherent physical whole object to act as a user input device to an interactive software experience. The data store communicates with the interactive software experience and causes a change in behavior of the interactive software experience in response to a check of the data records for each of the modules in the object. | 09-17-2015 |
20150258458 | INTERACTIVE SMART BEADS - Interactive smart beads are described. The beads are attached to a connecting element and form a fashion item such as a necklace or bracelet. The connecting element detects the presence of beads which are part of the fashion item and also beads which are part of nearby fashion items. The connecting element also autonomously generates interactions between two or more detected beads and transmits data about the interactions to a software experience so that a user can view a graphical representation of the interactions. In various examples each bead represents a character, environment, object, etc. and the software experience displays an animated story based on the characters, environments, objects, etc. represented by the beads involved in an interaction. | 09-17-2015 |
20150258459 | STORING STATE FOR PHYSICAL MODULAR TOYS - A modular assembly system is described in which each module comprises a storage element which stores an identifier for the module and data relating to the module. At least some of the module data is variable and is updated based on user interaction with an interactive software experience (e.g. state data). Each module also comprises one or more connectors for connecting to other modules to form a coherent physical whole object. In an embodiment, the system further comprises the interactive software experience which provides user objectives which can only be satisfied by the user interacting with the object or with modules that form the object. At least one of the modules in the object comprises a communication module which passes identifiers and module data to the interactive software experience and receives updated module data from the interactive software experience for storing in one of the modules in the object. | 09-17-2015 |
20150288698 | EVOLVING RULE BASED CONTACT EXCHANGE - Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends upon adherence or proper application of a prior set. In an embodiment, an initial set of restrictions are generated based on input from a first user, the restrictions relating to contact made by a second user to the first user. These initial restrictions are subsequently modified in response to the second user contacting the first user based on the contact made and a characteristic of the contact. The methods may apply to any form of contact between the first and second users and in an embodiment applies to contact made by the second user to a cellular telephone number belonging to the first user. | 10-08-2015 |
Patent application number | Description | Published |
20080262628 | Mri Compatible Implant Comprising Electrically Conductively Closed Loops - The present invention relates to an implant | 10-23-2008 |
20110201892 | EXPANDABLE THORACIC ACCESS PORT - A surgical access assembly includes a body having first and second body members. Each body member has an opposed side and an outer side. The body members are coupled to one another by a connector and are moveable with respect to one another between an approximated position and a spread position wherein the opposed sides are flexed outwardly and apart from one another to define a passageway therebetween. A flexible membrane is coupled to the first and second body members and extends therefrom such that translating the flexible membrane radially outwardly moves the body members from the approximated position to the spread position. | 08-18-2011 |
20110201893 | EXPANDABLE THORACIC ACCESS PORT - A surgical access assembly includes a body having first and second side panels opposing one another and first and second end panels interconnecting the side panels. The first and second end panels are moveable between a folded position and an expanded position to correspondingly move the first and second side panels with respect to one another between an approximated position and a spaced apart position. In the spaced apart position, the first and second side panels are flexed outwardly and apart from one another to define a passageway therebetween. A flexible membrane is coupled to the first and second side panels and extends proximally therefrom. | 08-18-2011 |
20110201896 | EXPANDABLE SURGICAL ACCESS PORT - A surgical access assembly is disclosed that is configured and dimensioned for positioning within an opening in tissue providing access to and internal body cavity to facilitate the passage of a surgical instrument into an internal work site. The surgical access assembly includes first and second arms and third and fourth arms. The first and second arms and the third and fourth arms are configured and dimensioned for relative movement such that the surgical access assembly is reconfigurable between a first configuration, wherein a first transverse dimension is defined, and a second configuration wherein a second transverse dimension is defined. The first transverse dimension is smaller than the second transverse dimension. | 08-18-2011 |
20110319719 | THORACIC ACCESS PORT - A surgical access assembly having a body including a leading end, a trailing end, and first and second body members extending between the leading and trailing ends. The leading end, trailing end and first and second body members define a passageway therethrough for receipt of surgical instrumentation. First and second flexible wing members extend proximally from the body. A flexible member is attached to the body and extends proximally therefrom. | 12-29-2011 |
20120238818 | Covering Apparatus For An Endoscope Lens - A covering apparatus for a surgical viewing instrument. The apparatus includes a tape having a first length overlying the viewing portion of the surgical viewing instrument, the tape movable across the viewing portion to move the first length away from the viewing portion and advance a second cleaner length of tape to a position overlying the viewing portion. | 09-20-2012 |
20120296170 | THORACIC ACCESS PORT - A surgical access assembly for positioning within an opening in tissue including an outer frame positionable outside a patient and defining an opening therein dimensioned to receive a surgical instrument therethrough. The outer frame includes first and second portions. The first portion is biased into locking engagement with the second portion such that a first engagement structure is in locking engagement with a second engagement structure. An inner member is positionable within a patient and a flexible member extends between the inner member and outer member and is operatively associated with the outer member. The first portion is movable to overcome the bias to move the first and second engagement structures to a disengaged position, wherein in the disengaged position at least one of the first and second portions is movable with respect to the other portion to adjust the tension on the flexible member to retract tissue. | 11-22-2012 |
20130150670 | THORACIC SCOPE PORT CLEANER - An instrument for cleaning a lens of a scope includes an elongated sheath and a cleaning portion. The elongated sheath defines a lumen dimensioned and configured to slidingly receive the scope therein. The cleaning portion is positioned in a distal portion of the lumen. The cleaning portion includes a membrane formed from an elastic material. The membrane includes one or more openings to facilitate translation of the scope through the membrane. | 06-13-2013 |
20130150681 | THORACIC ACCESS ASSEMBLY - A surgical access assembly for accessing a cavity of a patient includes a proximal frame member, a distal frame member, and a membrane between the proximal and distal frame members. The proximal frame member is positionable adjacent an external surface of tissue and has first and second frame portions movable between a contracted condition and an expanded condition to expand an opening defined therethrough. The membrane defines a loop disposed about at least a portion of the proximal frame member at a proximal end thereof and is engaged to the distal frame member at a distal end thereof. The membrane is transitionable between a crumpled condition and an extended condition upon transitioning of the proximal frame member between the contracted condition and the expanded condition. | 06-13-2013 |
20140235952 | EXPANDABLE THORACIC ACCESS PORT - A surgical access assembly includes a body having first and second body members. Each body member has an opposed side and an outer side. The body members are coupled to one another by a connector and are moveable with respect to one another between an approximated position and a spread position wherein the opposed sides are flexed outwardly and apart from one another to define a passageway therebetween. A flexible membrane is coupled to the first and second body members and extends therefrom such that translating the flexible membrane radially outwardly moves the body members from the approximated position to the spread position. | 08-21-2014 |
20150126816 | THORACIC ACCESS ASSEMBLY - A surgical access assembly for accessing a cavity of a patient includes a proximal frame member, a distal frame member, and a membrane between the proximal and distal frame members. The proximal frame member is positionable adjacent an external surface of tissue and has first and second frame portions movable between a contracted condition and an expanded condition to expand an opening defined therethrough. The membrane defines a loop disposed about at least a portion of the proximal frame member at a proximal end thereof and is engaged to the distal frame member at a distal end thereof. The membrane is transitionable between a crumpled condition and an extended condition upon transitioning of the proximal frame member between the contracted condition and the expanded condition. | 05-07-2015 |
20150250468 | THORACIC ACCESS PORT - A surgical access assembly for positioning within an opening in tissue including an outer frame positionable outside a patient and defining an opening therein dimensioned to receive a surgical instrument therethrough. The outer frame includes first and second portions. The first portion is biased into locking engagement with the second portion such that a first engagement structure is in locking engagement with a second engagement structure. An inner member is positionable within a patient and a flexible member extends between the inner member and outer member and is operatively associated with the outer member. The first portion is movable to overcome the bias to move the first and second engagement structures to a disengaged position, wherein in the disengaged position at least one of the first and second portions is movable with respect to the other portion to adjust the tension on the flexible member to retract tissue. | 09-10-2015 |