G06F2206/1008

Control systems and methods for blood or fluid handling medical devices

A processor of a medical device configured to communicate with a remote server can be programmed to protect the medical device from exposure to unauthorized or malicious software. A system or method to implement this form of protection can include, for example, at least one processor on the medical device, a control software module that controls the operation of the medical device and is executable on the processor, a data management module that manages data flow to and from the control software module from sources external to the medical device, and an agent module that has access to a limited number of designated memory locations in the medical device. In addition, a hemodialysis apparatus can be configured to operate in conjunction with an apparatus for providing purified water from a source such as a municipal water supply or a well. A system for controlling delivery of purified water to the hemodialysis apparatus can comprise a therapy controller of the hemodialysis apparatus configured to communicate with a controller of a water purification device, and a user interface controller of the hemodialysis apparatus configured to communicate with the therapy controller, and to send data to and receive data from a user interface.

Optimizing garbage collection based on survivor lifetime prediction
11550712 · 2023-01-10 · ·

A predictive method for scheduling of the operations is described. The predictive method utilizes data generated from computing an expected lifetime of the individual files or objects within the container. The expected lifetime of individual files or objects can be generated based on machine learning techniques. Operations such as garbage collection are scheduled at an epoch where computational efficiencies are realized for performing the operation.

COMPUTER IMPLEMENTED METHODS AND SYSTEMS FOR PROJECT MANAGEMENT

Described herein is a computer implemented method. The method comprises receiving, from a server application, project data defining a plurality of tasks and a plurality of iterations, each iteration having a start time and an end time and displaying, on a display, a timeline graphical user interface including a plurality of task timelines, each task timeline corresponding to one of the plurality of tasks. The method further comprises detecting a first user input, the first user input associated with a particular task and, in response to detecting the first user input, displaying a plurality of available drop zones in the particular task's timeline, each available drop zone corresponding to an available iteration, an available iteration being an iteration that the particular task can be assigned to.

PERVASIVE INTERMEDIATE NETWORK ATTACHED STORAGE APPLICATION WITH ASYNCHRONOUSLY RENDERED CONTENT
20170359353 · 2017-12-14 ·

A Pervasive Intermediate Network Attached Storage Application (PINApp) enables users to digitally assign (pin) a folder or drive to a public cloud storage service for the purpose of sharing their digital content with others. The PINApp enables users to engage the cloud storage services without the need to upload the digital content to the cloud in order for it to be viewed or shared. The Asynchronously Rendered Conduit (ARC) allows content owners to create rules to govern the private and public usage of digital content across users, devices, networks, and realms.

HYBRID NETWORK END SYSTEM DEVICE
20170353329 · 2017-12-07 ·

Provided is a hybrid network end system device for a network system with an end system unit and a switch. The switch here exhibits at least one first port of the switch and a second port of the switch for connection with the network system.

CONTROL SYSTEMS AND METHODS FOR BLOOD OR FLUID HANDLING MEDICAL DEVICES

A processor of a medical device configured to communicate with a remote server can be programmed to protect the medical device from exposure to unauthorized or malicious software. A system or method to implement this form of protection can include, for example, at least one processor on the medical device, a control software module that controls the operation of the medical device and is executable on the processor, a data management module that manages data flow to and from the control software module from sources external to the medical device, and an agent module that has access to a limited number of designated memory locations in the medical device. In addition, a hemodialysis apparatus can be configured to operate in conjunction with an apparatus for providing purified water from a source such as a municipal water supply or a well. A system for controlling delivery of purified water to the hemodialysis apparatus can comprise a therapy controller of the hemodialysis apparatus configured to communicate with a controller of a water purification device, and a user interface controller of the hemodialysis apparatus configured to communicate with the therapy controller, and to send data to and receive data from a user interface.

Pervasive intermediate network attached storage application
09792452 · 2017-10-17 ·

A Pervasive Intermediate Network Attached Storage Application (PINApp) enables users to digitally assign (pin/tack) a folder or drive to a public cloud storage service for the purpose of sharing their digital content with others. The PINApp enables users to engage the cloud storage services without the need to upload the digital content to the cloud in order for it to be viewed or shared. The PINApp can be used to unify all of the digital content stored on multiple devices and cloud services for a single owner or user.

Multifunction button

Aspects of the present invention enable a storage device (e.g., a recordable book, toy, computing device) to be controlled with a single control button that performs multiple functions. Different interactions with the button produce a different control input. In one aspect, the storage device is an audio recording device that can record, lock, unlock, transfer to a separate storage device, or play back one or more audio recordings. These five functions (i.e., recording, locking, unlocking, transferring, and playing back) are initiated or facilitated by depressing a single button located on the audio storage device for different lengths of time or in different patterns. Audio recordings may be played in response to user interactions with the button to help the user interact with the button properly and warn the user of action that is about to be taken.

CONTROL METHOD AND DEVICE FOR TERMINAL
20170277420 · 2017-09-28 ·

The embodiments of the present application provide a control method and device for a terminal. The control method for the terminal comprises: acquiring first operation information of a user at an edge touch area of the terminal; and cleaning up a memory of the terminal according to the first operation information of the user at the edge touch area of the terminal. In the technical solutions provided by the embodiments of the present application, when the memory of the terminal is cleaned, the operation is simple and convenient, the efficiency of cleaning up the memory of the terminal is improved, and the problem that the efficiency of cleaning up the memory of the terminal is relatively low existed in the prior art can be solved.

Optimizing Garbage Collection Based On Survivor Lifetime Prediction
20210390045 · 2021-12-16 ·

A predictive method for scheduling of the operations is described. The predictive method utilizes data generated from computing an expected lifetime of the individual files or objects within the container. The expected lifetime of individual files or objects can be generated based on machine learning techniques. Operations such as garbage collection are scheduled at an epoch where computational efficiencies are realized for performing the operation.