Patent application number | Description | Published |
20100049718 | Transactional Processing for Clustered File Systems - Systems and methods for transactional processing within a clustered file system wherein user defined transactions operate on data segments of the file system data. The users are provided within an interface for using a transactional mechanism, namely services for opening, writing and rolling-back transactions. A distributed shared memory technology is utilized to facilitate efficient and coherent cache management within the clustered file system based on the granularity of data segments (rather than files). | 02-25-2010 |
20120265940 | TRANSACTIONAL PROCESSING FOR CLUSTERED FILE SYSTEMS - Systems and methods for transactional processing within a clustered file system wherein user defined transactions operate on data segments of the file system data. The users are provided within an interface for using a transactional mechanism, namely services for opening, writing and rolling-back transactions. A distributed shared memory technology is utilized to facilitate efficient and coherent cache management within the clustered file system based on the granularity of data segments (rather than files). | 10-18-2012 |
20120296945 | IMPLEMENTING TRANSACTIONAL PROCESSING FOR USER OPERATIONS IN CLUSTERED FILE SYSTEMS - Systems. Methods, and Computer Program Products are provided for implementing transactional processing for user operations in a clustered file system (CFS). Transactional functionality is provided for user defined operations for one of writing and modifying files, and user defined write operations and individual user defined modification operations to various possible alternative files are wrapped into either a single transaction or multiple transactions individual. | 11-22-2012 |
20120297141 | IMPLEMENTING TRANSACTIONAL MECHANISMS ON DATA SEGMENTS USING DISTRIBUTED SHARED MEMORY - Systems, Methods, and Computer Program Products are provided for implementing transactional mechanisms by a plurality of procedures on data segments by using distributed shared memory (DSM) agents in a clustered file system (CFS). A new data segment is allocated and an associated cache data segment and metadata data segments, which are allocated for the new data segment and loaded into a cache and modified during the allocating of the new data segment, are added to a list of data segments modified within an associated transaction. The DSM agents assign an exclusive permission to the new data segment. | 11-22-2012 |
20120297247 | RECOVERING TRANSACTIONS OF FAILED NODES IN A CLUSTERED FILE SYSTEM - Systems. Methods, and Computer Program Products are provided for recovering transactions of failed nodes using a recovery procedure in a clustered file system (CFS). A data segment is determined that the data segment should be copied to a final storage location by validating that an ownership of the data segment is not associated with any other operational node, via a distributed shared memory (DSM) agent. The ownership of the data segment is set to a local DSM agent. | 11-22-2012 |
20120303579 | CONCURRENT CHECKPOINTING AND MODIFICATIONS IN A TRANSACTIONAL CLUSTERED FILE SYSTEM - Systems, Methods, and Computer Program Products are provided for concurrent checkpointing and modifications in a transactional clustered file system (CFS). Shadow data segments, whose contents are identical to an original data segment currently being written by a checkpoint operation, for users that require access for modification to data segments concurrently being written within a checkpoint operation. | 11-29-2012 |
20120303592 | RESTORING DATA SEGMENTS OF ROLLED-BACK TRANSACTIONS IN A CLUSTERED FILE SYSTEM - Systems, Methods, and Computer Program Products are provided for restoring data segments in a clustered file system (CFS). Contents of the data segments, that were modified during a transaction, which is being rolled-back to the most recent contents of the data segments prior to the transaction commencing, are restored. Locations of the most recent contents of the data segments, which are restored, are identified. | 11-29-2012 |
20120303682 | CONCURRENT PROCESSING OF TRANSACTIONS AND READ OPERATIONS ACHIEVING SERIALIZATION AND ISOLATION IN CLUSTERED FILE SYSTEMS - Systems. Methods, and Computer Program Products are provided for concurrent processing of transactions and read operations for achieving serialization and isolation in a clustered file system (CFS). Users, performing read only operations, are allowed to currently access the CFS while mutually excluding and serializing transactions of users affecting a same portion of the CFS. Transactions are ordered across a cluster of nodes of the CFS according to the transactions termination time | 11-29-2012 |
20120303683 | CONCURRENT TRANSACTIONAL CHECKPOINTS IN A CLUSTERED FILE SYSTEM - Systems, Methods, and Computer Program Products are provided for performing concurrent checkpoints from file system agents residing on different nodes within in a clustered file system (CFS). Responsibility to checkpoint a modified and a committed data segment to a final storage location is assigned to one of the file system agents. One of the file system agents, which is assigned, is the file system agent whose associated distributed shared memory (DSM) agent is an owner of the data segment. | 11-29-2012 |
20130185342 | MANAGING GLOBAL CACHE COHERENCY AND ACCESS PERMISSIONS - Systems. Methods, and Computer Program Products are provided managing a global cache coherency and reducing messaging traffic for coordination of access permissions in a distributed shared caching for a clustered file systems (CFS). The CFS manages access permissions to an entire space of the data segments by using the DSM module. In response to processing a request message from a remote DSM module to access one of the data segments, including in a response message permission to access the one of the data segments, and deciding if one of a transfer of ownership, and most recent contents of the one of the data segments should be included in the response message for the permission to access the one of the data segments. The last two components of the response message depend upon availability of the one of the data segments that is requested in a local external cache. | 07-18-2013 |
20130185519 | MANAGING GLOBAL CACHE COHERENCY IN A DISTRIBUTED SHARED CACHING FOR CLUSTERED FILE SYSTEMS - Systems. Methods, and Computer Program Products are provided for managing a global cache coherency in a distributed shared caching for a clustered file systems (CFS). The CFS manages access permissions to an entire space of data segments by using the DSM module. In response to receiving a request to access one of the data segments, a calculation operation is performed for obtaining most recent contents of one of the data segments. The calculation operation performs one of providing the most recent contents via communication with a remote DSM module which obtains the one of the data segments from an associated external cache memory, instructing by the DSM module to read from storage the one of the data segments, and determining that any existing contents of the one of the data segments in the local external cache are the most recent contents. | 07-18-2013 |
20130191330 | REDUCING CONTENTION AND MESSAGING TRAFFIC IN A DISTRIBUTED SHARED CACHING FOR CLUSTERED FILE SYSTEMS - Systems. Methods, and Computer Program Products are provided managing global cache coherency and reducing contention and messaging traffic in a distributed shared caching for a clustered file systems (CFS). The CFS manages access to data segment space of the data segments shared between a cluster of nodes by using the file access component. A CFS disk space is partitioned into regions and disk objects are partitioned into groups. Each of the regions and the groups are assigned to a CFS agent residing on each one of the cluster of nodes. | 07-25-2013 |
20140181162 | MANAGING GLOBAL CACHE COHERENCY IN A DISTRIBUTED SHARED CACHING FOR CLUSTERED FILE SYSTEMS - Systems. Methods, and Computer Program Products are provided for managing a global cache coherency in a distributed shared caching for a clustered file systems (CFS). The CFS manages access permissions to an entire space of data segments by using the DSM module. In response to receiving a request to access one of the data segments, a calculation operation is performed for obtaining most recent contents of one of the data segments. The calculation operation performs one of providing the most recent contents via communication with a remote DSM module which obtains the one of the data segments from an associated external cache memory, instructing by the DSM module to read from storage the one of the data segments, and determining that any existing contents of the one of the data segments in the local external cache are the most recent contents. | 06-26-2014 |
20140181408 | MANAGING GLOBAL CACHE COHERENCY IN A DISTRIBUTED SHARED CACHING FOR CLUSTERED FILE SYSTEMS - Systems. Methods, and Computer Program Products are provided for managing a global cache coherency in a distributed shared caching for a clustered file systems (CFS). The CFS manages access permissions to an entire space of data segments by using the DSM module. In response to receiving a request to access one of the data segments, a calculation operation is performed for obtaining most recent contents of one of the data segments. The calculation operation performs one of providing the most recent contents via communication with a remote DSM module which obtains the one of the data segments from an associated external cache memory, instructing by the DSM module to read from storage the one of the data segments, and determining that any existing contents of the one of the data segments in the local external cache are the most recent contents. | 06-26-2014 |
20140181418 | MANAGING GLOBAL CACHE COHERENCY IN A DISTRIBUTED SHARED CACHING FOR CLUSTERED FILE SYSTEMS - Systems. Methods, and Computer Program Products are provided for managing a global cache coherency in a distributed shared caching for a clustered file systems (CFS). The CFS manages access permissions to an entire space of data segments by using the DSM module. In response to receiving a request to access one of the data segments, a calculation operation is performed for obtaining most recent contents of one of the data segments. The calculation operation performs one of providing the most recent contents via communication with a remote DSM module which obtains the one of the data segments from an associated external cache memory, instructing by the DSM module to read from storage the one of the data segments, and determining that any existing contents of the one of the data segments in the local external cache are the most recent contents. | 06-26-2014 |
20140236998 | MANAGING GLOBAL CACHE COHERENCY IN A DISTRIBUTED SHARED CACHING FOR CLUSTERED FILE SYSTEMS - Various embodiments are provided for managing a global cache coherency in a distributed shared caching for a clustered file system (CFS). The CFS manages access permissions to an entire space of data segments by using the DSM module. In response to receiving a request to access one of the data segments, a calculation operation is performed for obtaining most recent contents of one of the data segments. The calculation operation performs one of providing the most recent contents via communication with a remote DSM module which obtains the one of the data segments from an associated external cache memory, instructing by the DSM module to read from storage the one of the data segments, and determining that any existing contents of the one of the data segments in the local external cache are the most recent contents. | 08-21-2014 |
20140325158 | MANAGING GLOBAL CACHE COHERENCY IN A DISTRIBUTED SHARED CACHING FOR CLUSTERED FILE SYSTEMS - Systems. Methods, and Computer Program Products are provided for managing a global cache coherency in a distributed shared caching for a clustered file systems (CFS). The CFS manages access permissions to an entire space of data segments by using the DSM module. In response to receiving a request to access one of the data segments, a calculation operation is performed for obtaining most recent contents of one of the data segments. The calculation operation performs one of providing the most recent contents via communication with a remote DSM module which obtains the one of the data segments from an associated external cache memory, instructing by the DSM module to read from storage the one of the data segments, and determining that any existing contents of the one of the data segments in the local external cache are the most recent contents. | 10-30-2014 |
Patent application number | Description | Published |
20110295797 | SYNCHRONIZATION OF SEQUENTIAL ACCESS STORAGE COMPONENTS WITH BACKUP CATALOG - Various embodiments for synchronization of source and replicated instances of sequential access storage components are provided. Subsequent to a storage operation performed on the source instance by a source component, a synchronization message is sent to a replicated component for the replicated instance. The synchronization message is stored locally in a persistent storage location associated with the source component along with an indicator representative of a time the storage operation was performed. Pursuant to receipt of the synchronization message by the replicated component, the replicated component is updated to a dirty state to indicate a lack of full synchronization between the source and replicated instances. Receipt of the synchronization message is acknowledged by the replicated component by sending a dirty state acknowledgement. If, during a subsequent recovery process, the dirty state is not yet cleared, the replicated component is deemed ineligible for participation in a full restoration operation. | 12-01-2011 |
20120047338 | SWITCHING VISIBILITY BETWEEN VIRTUAL DATA STORAGE ENTITIES - Various embodiments for switching visibility between virtual data storage entities in a data storage environment using a processor device are provided. Visibility of a data storage entity on a first storage system is switched to a replicated data storage entity on a second storage system. Data from the data storage entity is replicated from the first storage system to the second storage system using a common serial number. The data storage entity is hidden from the first storage system by concealing the common serial number. An ejection of the data storage entity from the first storage system is automated, and the replicated data storage entity is introduced to the second storage system. | 02-23-2012 |
20120047392 | DISASTER RECOVERY REPLICATION THROTTLING IN DEDUPLICATION SYSTEMS - Various embodiments for disaster recovery (DR) replication throttling in a computing environment by a processor device are provided. Communication is arrested between a source data entity and a replicated data entity at a location declared in a DR mode. The DR mode is negotiated to a central replication management component as a DR mode entry event. The DR mode entry event is distributed, by the central replication management component, to each member in a shared group. The DR mode is enforced using at least one replication policy. | 02-23-2012 |
20120089866 | DISASTER RECOVERY PRODUCTION TAKEOVER - Various embodiments for disaster recovery (DR) production takeover in a computing environment by a processor device are provided. If, for a designated storage system operable in the computing environment, a takeover operation may be executed, and a DR storage system has validly replaced the designated storage system using a replacement process, a withdrawal of a DR mode of operation is performed, and ownership of at least one storage device operable in the computing environment is transferred to the DR storage system. The replacement process authorizes the DR storage system to transfer the ownership while withdrawn from the DR mode of operation. | 04-12-2012 |
20120096306 | DISASTER RECOVERY FAILBACK - Various embodiments for disaster recovery (DR) failback in a computing environment by a processor device are provided. Pursuant to execution of a predetermined failback policy, if a storage device is not preexistent in a source storage system operable in the computing environment, and an owner of the storage device is one of a DR storage system and a storage system having previously withdrawn from a replication grid, and the DR storage system has authorization to transfer ownership of the storage device by a replacement operation, an instance of the storage device is replicated to the source storage system to generate a replicated instance of the storage device on the source storage system, and ownership of the storage device is designated as the source storage system for each of the instance and the replicated instance of the storage device. | 04-19-2012 |
20120221820 | SWITCHING VISIBILITY BETWEEN VIRTUAL DATA STORAGE ENTITIES - Visibility of a data storage entity on a first storage system is switched to a replicated data storage entity on a second storage system. Data from the data storage entity is replicated from the first storage system to the second storage system using a common serial number. The data storage entity is hidden from the first storage system by concealing the common serial number. An ejection of the data storage entity from the first storage system is automated, and the replicated data storage entity is introduced to the second storage system. | 08-30-2012 |
20120226660 | SYNCHRONIZATION OF SEQUENTIAL ACCESS STORAGE COMPONENTS WITH BACKUP CATALOG - Subsequent to a storage operation performed on the source instance by a source component, a synchronization message is sent to a replicated component for the replicated instance. The synchronization message is stored locally in a persistent storage location associated with the source component along with an indicator representative of a time the storage operation was performed. Pursuant to receipt of the synchronization message by the replicated component, the replicated component is updated to a dirty state to indicate a lack of full synchronization between the source and replicated instances. Receipt of the synchronization message is acknowledged by the replicated component by sending a dirty state acknowledgement. If, during a subsequent recovery process, the dirty state is not yet cleared, the replicated component is deemed ineligible for participation in a full restoration operation. | 09-06-2012 |
20120226937 | DISASTER RECOVERY REPLICATION THROTTLING IN DEDUPLICATION SYSTEMS - Communication is arrested between a source data entity and a replicated data entity at a location declared in a DR mode. The DR mode is negotiated to a central replication management component as a DR mode entry event. The DR mode entry event is distributed, by the central replication management component, to each member in a shared group. The DR mode is enforced using at least one replication policy. | 09-06-2012 |
20120239974 | DISASTER RECOVERY FAILBACK - Pursuant to execution of a predetermined failback policy, if a storage device is not preexistent in a source storage system operable in the computing environment, and an owner of the storage device is one of a DR storage system and a storage system having previously withdrawn from a replication grid, and the DR storage system has authorization to transfer ownership of the storage device by a replacement operation, an instance of the storage device is replicated to the source storage system to generate a replicated instance of the storage device on the source storage system, and ownership of the storage device is designated as the source storage system for each of the instance and the replicated instance of the storage device. | 09-20-2012 |
20120284555 | OPTIMIZING DISASTER RECOVERY SYSTEMS DURING TAKEOVER OPERATIONS - Exemplary method, system, and computer program product embodiments for optimizing disaster recovery systems during takeover operations are provided. In one embodiment, by way of example only, a flag is set in a replication grid manager to identify replication grid members to consult in a reconciliation process for resolving intersecting and non-intersecting data amongst the disaster recovery systems for a takeover operation. The replication grid members are consulted for the takeover operation to accommodate a coordination of an ownership synchronization process for cartridges not distributed on-time to the replication grid members. Additional system and computer program product embodiments are disclosed and provide related advantages. | 11-08-2012 |
20120284556 | COORDINATED DISASTER RECOVERY PRODUCTION TAKEOVER OPERATIONS - For coordinated disaster reovery, a reconciliation process is performed for resolving intersecting and non-intersecting data amongst disaster recovery systems for takeover operations. An ownership synchronization process is coordinated for replica cartridges via the reconciliation process at the disaster recovery systems. The disaster recovery systems continue as a replication target for source systems and as a backup target for local backup applications. | 11-08-2012 |
20120284559 | COORDINATED DISASTER RECOVERY PRODUCTION TAKEOVER OPERATIONS - For coordinated disaster recovery, a reconciliation process is performed for resolving intersecting and non-intersecting data amongst disaster recovery systems for takeover operations. An ownership synchronization process is coordinated for replica cartridges via the reconciliation process at the disaster recovery systems. The disaster recovery systems continue as a replication target for source systems and as a backup target for local backup applications. | 11-08-2012 |
20120310883 | PROTECTING DATA SEGMENTS IN A COMPUTING ENVIRONMENT - Exemplary method, system, and computer program product embodiments for protecting data segments by a processor device in a computing environment, are provided. In one embodiment, by way of example only, a history table is configured to accompany data segments for consultation during a replication operation. If the history table indicates an ownership conflict, the replication operation is inhibited. | 12-06-2012 |
20130166946 | DISASTER RECOVERY PRODUCTION TAKEOVER - Various embodiments for disaster recovery (DR) production takeover in a computing environment by a processor device are provided. If, for a designated storage system operable in the computing environment, a takeover operation may be executed, and a DR storage system has validly replaced the designated storage system using a replacement process, a withdrawal of a DR mode of operation is performed, and ownership of at least one storage device operable in the computing environment is transferred to the DR storage system. The replacement process authorizes the DR storage system to transfer the ownership while withdrawn from the DR mode of operation. | 06-27-2013 |
20130198135 | PROTECTING DATA SEGMENTS IN A COMPUTING ENVIRONMENT - Exemplary method, system, and computer program product embodiments for protecting data segments by a processor device in a computing environment, are provided. In one embodiment, by way of example only, a history table is configured to accompany data segments for consultation during a replication operation. If the history table indicates an ownership conflict, the replication operation is inhibited. | 08-01-2013 |
20130232111 | OPTIMIZING DISASTER RECOVERY SYSTEMS DURING TAKEOVER OPERATIONS - Exemplary method, system, and computer program product embodiments for optimizing disaster recovery systems during takeover operations are provided. In one embodiment, by way of example only, a flag is set in a replication grid manager to identify replication grid members to consult in a reconciliation process for resolving intersecting and non-intersecting data amongst the disaster recovery systems for a takeover operation. The replication grid members are consulted for the takeover operation to accommodate a coordination of an ownership synchronization process for cartridges not distributed on-time to the replication grid members. Additional system and computer program product embodiments are disclosed and provide related advantages. | 09-05-2013 |
20130297971 | DISASTER RECOVERY FAILBACK - Pursuant to execution of a predetermined failback policy, if a storage device is not preexistent in a source storage system operable in the computing environment, and an owner of the storage device is one of a DR storage system and a storage system having previously withdrawn from a replication grid, and the DR storage system has authorization to transfer ownership of the storage device by a replacement operation, and an instance of the storage device is replicated to the source storage system to generate a replicated instance of the storage device on the source storage system. | 11-07-2013 |
20140074781 | SYNCHRONIZATION OF SEQUENTIAL ACCESS STORAGE COMPONENTS WITH BACKUP CATALOG - Subsequent to a storage operation performed on the source instance by a source component, a synchronization message is sent to a replicated component for the replicated instance. The synchronization message is stored locally in a persistent storage location associated with the source component along with an indicator representative of a time the storage operation was performed. Pursuant to receipt of the synchronization message by the replicated component, the replicated component is updated to a dirty state to indicate a lack of full synchronization between the source and replicated instances. | 03-13-2014 |
20150242287 | OPTIMIZING DISASTER RECOVERY SYSTEMS DURING TAKEOVER OPERATIONS - Exemplary method, system, and computer program product embodiments for optimizing disaster recovery systems during takeover operations are provided. In one embodiment, by way of example only, a flag is set in a replication grid manager to identify replication grid members to consult in a reconciliation process for resolving intersecting and non-intersecting data amongst the disaster recovery systems for a takeover operation. Additional system and computer program product embodiments are disclosed and provide related advantages. | 08-27-2015 |
Patent application number | Description | Published |
20090044637 | Drop detector system - The invention provides an optical drop detection system ( | 02-19-2009 |
20100286559 | DIAGNOSTIC METHODS AND SYSTEMS BASED ON URINE ANALYSIS - A diagnostic method and apparatus for detecting at least one change in a urinary parameter indicative of a body malfunction, the method comprising at least semi-continuously monitoring in real time at least one of a sodium level, an oxygen level, a potassium level, and combinations thereof in the urine of a catheterized patient; whereby at least one parameter is monitored so as to detect one or more changes in the at least one parameter to reflect at least one of a fluid state, an electrolyte balance, a kidney state, a kidney perfusion and an organ perfusion in the patient, indicative of the body malfunction in the patient, in which the monitoring is preferably performed through electrodes that are arranged perpendicularly to the flow of urine through a patient's catheter system. | 11-11-2010 |
20110046516 | DIAGNOSTIC METHOD AND APPARATUS - The present invention provides a diagnostic method comprising continuously monitoring and transmitting urine output and urine flow rates of a catheterized patient to means which correlate the same with at least one of renal perfusion, renal function, fluid status, polyuria, oleguria, hypoperfusion, hemorrhage shock and GFR. | 02-24-2011 |
20110046899 | DROP DETECTOR SYSTEM - The invention provides an optical drop detection system ( | 02-24-2011 |
20140073991 | DIAGNOSTIC METHOD AND APPARATUS - The present invention provides a diagnostic method comprising continuously monitoring and transmitting urine output and urine flow rates of a catheterized patient to means which correlate the same with at least one of renal perfusion, renal function, fluid status, polyuria, oleguria, hypoperfusion, hemorrhage shock and GFR. | 03-13-2014 |
20140074071 | SYSTEMS AND METHODS FOR REMOVAL OF URINE - The present invention provides an arrangement ( | 03-13-2014 |
20140316219 | DIAGNOSTIC METHODS AND SYSTEMS BASED ON URINE ANALYSIS - A method for diagnosing a body malfunction is provided. At least one change in urinary parameter values, being indicative of the body malfunction, is monitored and detected. A volumetric urinary output of kidneys is monitored using a urine flow monitoring apparatus having a low flow metering device. It is determined whether a change exists in at least one of a volume value of the volumetric urinary output, and a trend of the corresponding urinary parameter value during a predetermined period. Signals are received from a plurality of electrodes, representing the urinary parameter values. The body malfunction is detected based on the determination of the change in at least one of the volume value and the trend. | 10-23-2014 |
20150191268 | MEDICATION DISPENSER - The present invention provides a medication dispenser enabling the controlled sequential delivery of a regimen of pills on an as-needed basis with a predetermined prescribed minimum time interval between delivery of each pill, from any flat multiple pill-containing pack of the blister package type having at least one column of pills to be dispensed, said dispenser comprising: a) an access portal sized to receive at least one any such blister pack and to guide said pack to at least one electromechanical blister pack advancing unit which in turn sequentially advances said pack to a stationary de-pilling station, said station comprising: i. pill detecting means; ii. a blister pack support having at least one pill receiving aperture, sized and positioned to receive pills of different sizes, shapes and spacing in said blister pack array; and, iii. an electromechanical depilling press means positioned, upon activation, to force at least one pill at a time from its respective blister through the backing of said blister via said aperture as said blister pack is advanced through said stationary | 07-09-2015 |
Patent application number | Description | Published |
20090138070 | Stent Apparatuses for Treatment Via Body Lumens and Methods of Use - An enhanced stent apparatus, comprising: a support element, wherein the support element is constructed to be positioned in a body lumen; and, a porous structure, the porous structure located on a surface of the support element, and wherein the porous structure is comprised of at least one fiber under 30 microns in diameter, has a coverage area of less than 30% and is provided with apertures. | 05-28-2009 |
20100204772 | Filter Assemblies - Disclosed is a filter assembly, comprising: a radially expandable vascular flow-increasing device, and a filter including an expandable proximal opening having an operative connection with the radially expandable vascular flow-increasing device, the proximal opening configured to expand in conjunction with expansion of the device, such that when the opening is in an expanded configuration, the filter is configured to filter debris from a fluid stream in which the filter is disposed. | 08-12-2010 |
20100241214 | OPTIMIZED STENT JACKET - A method of stenting, comprises: implanting a stent assembly in a vessel of a subject, the stent assembly, including: a stent jacket, comprising an expansible mesh structure, formed of fibers of a diameter between about 7 micrometers and about 18 micrometers, the diameter having a property of forming a substantially stable layer of endothelial cells, covering the fibers, thus reducing platelet aggregation, and an expansible stent, operatively associated with the stent jacket. The method further comprises administering to the subject an active pharmaceutical ingredient (API) comprising a platelet aggregation reducer for a shortened time period, not exceeding six months, the shortened time period being a consequence of the property. In accordance with some embodiments, the administration of a platelet aggregation. | 09-23-2010 |
20100324651 | Knitted Stent Jackets - Disclosed is an assembly for opening a vessel lumen comprising a radially expandable stent configured to open a vessel lumen, the radially expandable stent comprises a curved wall having a proximal portion, a distal portion and a lumen connecting the proximal portion and the distal portion. The assembly further comprises a knitted jacket comprising a plurality of interconnected loops, the knitted jacket further comprising a tubular wall that substantially surrounds an exterior surface of the radially expandable stent, and at least one retainer belt that slidingly passes through at least one knitted loop of the plurality of interconnected loops in the knitted jacket. | 12-23-2010 |
20100324664 | Bifurcated Stent Assemblies - Disclosed is a stent assembly for expanding in vivo vessels, the assembly comprises: two stents, a first stent and a second stent, the two stents positioned so that a forward end of the first stent is separated by a predetermined distance from a rearward end of the second stent, and a stent jacket spanning the predetermined distance such that a first end of the jacket is operatively associated with the first stent and a second end of the jacket is operatively associated with the second stent. | 12-23-2010 |
20120010649 | IN VIVO FILTER ASSEMBLY - Disclosed is an assembly for filtering debris flowing in an in vivo fluid stream, the assembly comprising at least one balloon configured to volumetrically expand and, during at least a portion of the expansion, operatively connect with a filter, and to contract following the expansion. The assembly further comprising a filter configured to operatively connect with the at least one balloon during at least a portion of the volumetric expansion of the at least one balloon, such that the filter expands during the operative connection in order to filter debris from a fluid flowing in a fluid stream within which the expanded filter is disposed. | 01-12-2012 |
20130095797 | APPARATUS AND METHOD FOR INTERFACING WITH A CELL-PHONE NETWORK - A smart card for use with a mobile communication device adapted to communicate over a cell-phone network, the smart card comprising: at least one communication port for communicating with a transceiver via a communication channel that is not a cell-phone channel; and a processor configured to receive from the transceiver an IMSI from a SIM having an authentication key, and an authentication response generated by the SIM responsive to the SIM's authentication key and a challenge by a cell-phone network, and to transmit the received IMSI and authentication response to the mobile communication device for transmission to the cell-phone network via a cell-phone communication channel provided by the cell-phone network. | 04-18-2013 |
20130274858 | STENT WITH SHEATH AND METAL WIRE RETAINER - A stent assembly ( | 10-17-2013 |
20140309723 | STENT WITH SHEATH AND METAL WIRE - A stent assembly includes a stent and a fiber mesh sleeve covering the stent. A wire runs along the stent over the sleeve and fastened to the stent at multiple points so as to attach the sleeve to the stent. | 10-16-2014 |
20140309725 | OPTIMIZED DRUG-ELUTING STENT ASSEMBLY - A stent assembly including a stent configured to be positioned in a body lumen, and a knitted stent jacket including an expansible mesh structure having a coverage area of less than 25%, having approximate aperture diameters greater than 20 micrometers, and surrounding an external surface of the stent and coaxially associated therewith, wherein the stent assembly elutes an amount of an active pharmaceutical agent. | 10-16-2014 |
20150032197 | CAROTID STENT ASSEMBLY AND METHODS FOR TREATMENT VIA BODY LUMENS - A stent assembly adapted to carotid arterial placement that includes a self-expanding support element comprising metal struts constructed to be positioned in a body lumen and expanded from a retracted state to an expanded state, and a knitted cover disposed over an exterior of the support element and along an entire length thereof, wherein the knitted cover comprises a single polymer fiber having a diameter of at least 40 nanometers to 30 microns, wherein the self-expanding support element and knitted cover together have apertures sized 20 microns to smaller than 100 microns in diameter to block larger debris when the stent assembly is placed in a carotid artery and expanded to the expanded state. Methods of stenting a carotid artery by applying the stent assembly to the carotid artery of a patient in need of treatment and expanding the stent assembly in situ are disclosed. | 01-29-2015 |
20150119971 | STENT-MESH ASSEMBLY AND METHODS - A method of affixing a stent jacket to a stent, comprising aligning the stent jacket coaxially with the stent, placing a portion of the stent within a portion of the stent jacket, wherein a central axis of the stent is aligned with a central axis of the stent jacket, and affixing the stent jacket to the stent with a plurality of stitches, wherein the plurality of stitches form a plurality of consecutive loops that pass through one or more holes in the stent jacket and through an outer surface of the stent. | 04-30-2015 |
20150156817 | MOBILE HOT SPOT - A portable wireless access point (My WAP) comprising: circuitry that supports wireless communication to and from the My WAP; a plurality of proxy-SIMs each configured to be assigned selectively any of a plurality of subscriber identity module (SIM) identities as an alias SIM identity; and a controller operable to assign an alias SIM identity to each proxy-SIM in the plurality of proxy-SIMs and control the proxy-SIM to use the alias SIM identity and the circuitry to establish a communication channel between a communication device connected to the My WAP and a cell-phone network. | 06-04-2015 |
20150230953 | STENT WITH SHEATH AND METAL WIRE AND METHODS - A stent assembly includes a stent and a fiber mesh sleeve covering the stent. A wire runs along the stent over the sleeve and fastened to the stent at multiple points so as to attach the sleeve to the stent. Methods of making the stent assembly are included. | 08-20-2015 |