Patent application number | Description | Published |
20130055968 | Veterinary restraint collar and improvement - A veterinary restraint collar, such as for a cat or dog, comprising one or more concentric rings of soft, flexible and non-resilient material sewn together on their inner and outer margins with binding and a drawstring passage for an elasticized drawstring on the inner margin to secure the collar around the animal's neck. Numerous sizes provide a flexible barrier restricting the animal's ability to reach treatment areas of its body with its mouth. Different materials are used for different sizes to establish the effectiveness of the collar and to provide a comfortable experience for the animal. The improvement of replacing one panel of the collar with a post-treatment instructions panel, sewn into the collar, provides veterinary and other animal professionals the means to assure the well-being of the animal through these written instructions. | 03-07-2013 |
20150053147 | Veterinary restraint collar and improvement - A veterinary restraint collar for an animal, such as a cat or dog, comprising one or more layers of soft and relatively flexible stain resistant material forming a ring to be placed around the neck of the animal. The collar has a drawstring around its inner periphery and radial reinforcing stays for stiffening the collar and also has a post-treatment instructions panel composed of special writing material, such as the non-woven plastic Tyvek, for receiving hand-written instructions in permanent or durable ink for the continuing care and recovery of the animal experiencing professional injury, surgery, dental or grooming procedures. The special writing material is different in appearance from the protective material and occupies either a full segment of the collar or a substantial portion of one segment, preferably on the back side with the front side covered by a stain resistant coating or sheet. | 02-26-2015 |
Patent application number | Description | Published |
20140181247 | System, Security and Network Management Using Self-Organizing Communication Orbits in Distributed Networks - In one aspect, machines in a managed network implements a set of rules that cause individual machines to directly interact with only a small number of machines in the network (i.e., a local neighborhood within the network), while the independent local actions of the individual machines collectively cause the individual machines to be self-organized into one or more communication orbits without any global control or coordination by a server or an administrator. The communication orbits are used for supporting network, security and system management communications in the managed network. | 06-26-2014 |
20140181295 | Creation and Maintenance of Self-Organizing Communication Orbits in Distributed Networks - In one aspect, machines in a managed network implements a set of rules that cause individual machines to directly interact with only a small number of machines in the network (i.e., a local neighborhood within the network), while the independent local actions of the individual machines collectively cause the individual machines to be self-organized into one or more communication orbits without any global control or coordination by a server or an administrator. The communication orbits are used for supporting network, security and system management communications in the managed network. | 06-26-2014 |
20150149624 | Fast Detection and Remediation of Unmanaged Assets - In one aspect, methods, system, and computer-readable media for monitoring unmanaged assets in a network having a plurality of managed machines include: at a first managed machine of the plurality of managed machines, wherein the plurality of managed machine are arranged in a linear communication orbit and have respective identifiers, and each managed machine is coupled to at least one respective neighbor by a corresponding local segment of the linear communication orbit: responding to a detection instruction for detecting unmanaged assets currently present in the network, by: scanning for live unmanaged machines within a selected portion of the network that is associated with a range of identifiers that includes identifiers between the respective identifiers of the first managed machine and a respective neighbor of the first managed machine; and generating a local report identifying one or more unmanaged machines that have been detected within the selected portion of the network. | 05-28-2015 |
20150163132 | Parallel Distributed Network Management - A method of parallel processing by networked devices, in which distributed data in a network is accessed in parallel to provide results. Commands and queries by a user station define a set of such distributed data. The networked devices access the distributed data in portions, individually process each portion, conduct peer-to-peer communication to aggregate results from processing each portion, and individually determine whether and when to report results. Making effective use of network assets (such as processing and storage at each node), making effective use of concurrency of network assets, limiting bandwidth use between network assets and user stations, and limiting use of assets (such as processing and storage) at user stations. | 06-11-2015 |
Patent application number | Description | Published |
20080222280 | PSEUDO-AGENT - A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices. | 09-11-2008 |
20080222296 | DISTRIBUTED SERVER ARCHITECTURE - A method and apparatus for synchronizing network element state when a network connection between a plurality of servers is restored after a network failure includes a plurality of objects that exist within the network. Each object exists in a plurality of different versions, in which each said different object version results from modifications to an object made by different servers during the network failure when the servers are unable to communicate with each other but otherwise continue to function. Each object comprises a vector including a separate version number for each server, in which each server increments its version number in the vector when it modifies the object. An automatic conflict resolution mechanism provides, at each server, a most up to date view of all objects across all of said plurality of servers upon restoration of the network connection between said plurality of servers after said network failure. The conflict resolution mechanism reconciles the existence of said plurality of different versions of an object to determine which object version should take precedence over other object versions. Conflict resolution is performed when there are multiple versions of a same object at a server. The conflict resolution mechanism also comprises at least one tie breaking rule that is applied to decide which servers take precedence over other servers when determining which object version should take precedence over other object versions. | 09-11-2008 |
20080228442 | STATISTICAL DATA INSPECTOR - An embodiment of the invention provides a technique that allows the collection, storage, and manipulation of data collected in a computer network. | 09-18-2008 |
20080320006 | ENTERPRISE CONSOLE - A console for an enterprise suite is disclosed. The enterprise suite addresses the increasingly complex problem of keeping critical systems updated, compatible, and free of security holes. It uses Fixlet® technology to identify vulnerable computers on the network and then allows authorized personnel to correct problems across any subset of the network with a few simple mouse-clicks. The enterprise suite helps keep the networked computers updated and properly patched, all from a central console which, along with supporting architectural enhancements, is the subject matter of this document. The invention allows rolling out a security patch in minutes instead of months, thus allowing an administrator to stay ahead of potential hacker attacks. The invention also makes it possible to track the progress of each computer as updates are applied, thus making it simple to gauge the level of compliance across the entire enterprise. | 12-25-2008 |
20100017494 | FORMALIZING, DIFFUSING AND ENFORCING POLICY ADVISORIES AND MONITORING POLICY COMPLIANCE IN THE MANAGEMENT OF NETWORKS - An apparatus and method for centralized policy management of large-scale networks ( | 01-21-2010 |
20100332992 | METHOD AND APPARATUS FOR INSPECTING THE PROPERTIES OF A COMPUTER - The invention disclosed herein enables a collection of computers and associated communications infrastructure to offer a new communications process which allows information providers to broadcast information to a population of information consumers. The information may be targeted to those consumers who have a precisely formulated need for the information. This targeting may be based on information which is inaccessible to other communications protocols. The targeting also includes a time element. Information can be brought to the attention of the consumer precisely when it has become applicable, which may occur immediately upon receipt of the message, but may also occur long after the message arrives. The communications process may operate without intruding on consumers who do not exhibit the precisely-specified need for the information, and it may operate without compromising the security or privacy of the consumers who participate. | 12-30-2010 |
20110066752 | DYNAMIC BANDWIDTH THROTTLING - An approximation of the bandwidth of the narrowest link in a network is determined by watching how fast data gets to the other end and then back again. The rate of data transmission is limited according to this approximation. Dynamic capacity of the link, i.e. the amount of data that can be in-flight at the same time, neglecting any buffers, is also tracked. The technique looks at how much data is in-flight and, if there is more data in flight than the dynamic capacity of the network, the data transmission rate is slowed down. | 03-17-2011 |
20120203818 | PSEUDO-AGENT - A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices. | 08-09-2012 |