Patents Assigned to LLC
-
Publication number: 20250130387Abstract: Multi-piece device assemblies for fixing cables, such as fiber optic cables, in a telecommunications closure. Features of the assemblies can improve versatility and flexibility in fixing different numbers of cables at different times, as network and connectivity needs for the telecommunications closure change. In an embodiment, the assembly includes two body pieces that can each support a cable fixation and that removably interlock with each other.Type: ApplicationFiled: August 30, 2022Publication date: April 24, 2025Applicant: CommScope Technologies LLCInventors: Philippe COENEGRACHT, Matthew CAMPSTEYN
-
Publication number: 20250127548Abstract: A pectus excavatum treating apparatus or assembly having two pectus bars joined by a connecting member.Type: ApplicationFiled: October 18, 2024Publication date: April 24, 2025Applicants: Medical Design Innovation, LLC, KLS Martin, L.P.Inventors: David M. Notrica, Carson Quigley, Grant Wilson, Daniel Grimm
-
Publication number: 20250130224Abstract: Provided are systems and methods for tagging biomolecules of interest, methods of generating tagged biomolecules, and methods of use thereof. An adapter system comprises one or more epitope tags operably linked to an antibody binding domain (AbBD), which may be a photoreactive antibody binding domain (pAbBD). A pAbBD may be used to covalently photocrosslink epitope tags to immunoglobulins or immunoglobulin fragments, which may in turn be used to label biomolecules of interest. Such epitope-tagged immunoglobulins may be used in various biological research applications, including multiplexed staining assays and tandem affinity pulldown assays.Type: ApplicationFiled: August 3, 2022Publication date: April 24, 2025Applicants: THE TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIA, ALPHATHERA LLCInventors: Andrew TSOURKAS, Yi Shu
-
Publication number: 20250130863Abstract: provisioning cloud-agnostic resource instances by sharing cloud resources is described herein. One example method includes creating a blueprint using a development platform, wherein the blueprint includes a definition of a resource, and wherein provisioning the resource includes provisioning a first cloud resource and a second cloud resource provided by a cloud provider, provisioning a first instance of the resource of the blueprint by provisioning a first instance of the first cloud resource and a first instance of the second cloud resource, and provisioning a second instance of the resource of the blueprint, wherein provisioning the second instance of the resource includes provisioning a second instance of the first cloud resource and sharing the first instance of the second cloud resource.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Applicant: VMware LLCInventors: Plamen Veselinov Peev, Marin Dzhigarov, Ventsyslav Raikov
-
Publication number: 20250128103Abstract: Environmentally-clean wildfire inhibitor liquid biochemical solutions produced from an aqueous mixture of alkali metal salt derived from a non-polymerized saturated carboxylic acid such as lactic acid, and dissolved in water along with a dispersing and coalescing agent, realized as an ester of a non-polymerized saturated carboxylic acid, and dissolved in the water to provide a liquid fire inhibitor solution that can be sprayed on combustible surfaces to form thin alkali metal salt crystalline coatings on the combustible surfaces when and as water molecules in the liquid fire inhibitor evaporate to the environment during drying operations, to inhibit fire ignition, flame spread and smoke development.Type: ApplicationFiled: June 23, 2024Publication date: April 24, 2025Applicant: Mighty Fire Breaker LLCInventor: Stephen Conboy
-
Publication number: 20250130826Abstract: A method and system for providing access to virtual desktops may include receiving an input indicating hovering of a pointer over an icon in a toolbar, identifying one or more existing virtual desktops, determining a state for each of the one or more existing virtual desktops by identifying one or more instances of any applications that are currently running in each of the one or more existing virtual desktops and determining a running state for each of the one or more instances, and displaying a preview of each of the one or more existing virtual desktops in response to the hovering of the pointer over the icon. The preview may include displaying the running state for one of the one or more instances for each existing virtual desktop.Type: ApplicationFiled: November 5, 2024Publication date: April 24, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Leo Tian YUE, Clinton Edward RUTKAS, Lee Dicks CLARK, Peter Josef KREISEDER, Robert Joseph DISANO
-
Publication number: 20250131203Abstract: A method and apparatus comprising computer code configured to cause a processor or processors to receive an input question to the LLM, model an advantage for the input question based on at least one of a multi-gaussian mixed matrix (GMM) model and an entropy regularizer, and train the LLM based on the advantage, and the advantage includes a proximal policy optimization (PPO) objective where modeling the advantage is based on the multi-GMM model, and the advantage includes a combination of an output of a reward model (RM) and an average model performance for the input question where modeling the advantage is based on the entropy regularizer.Type: ApplicationFiled: October 19, 2023Publication date: April 24, 2025Applicant: TENCENT AMERICA LLCInventors: Baolin PENG, Linfeng SONG, Haitao MI
-
Publication number: 20250131434Abstract: In aspects of location based transaction authentication, a mobile device includes a location service to determine a device location of the mobile device. The mobile device also implements a transaction authentication manager that can receive a transaction location of a transaction associated with an account of a user of the mobile device, and compare the device location of the mobile device to the transaction location of the transaction. The transaction authentication manager can also receive a one time password that is masked in response to determining that the device location does not match the transaction location, and reveal the one time password in response to receiving an input on the mobile device to authenticate the transaction.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Applicant: Motorola Mobility LLCInventors: Amit Kumar Agrawal, Vijayprakash Idlur, Panduranga Reddy Pailla
-
Publication number: 20250133020Abstract: Implementations described and claimed herein provide systems and methods for custom-defined network routing. In one implementation, a set of custom defined network flow rules is received at an edge router of a primary network, which is in communication with a customer network. The set of custom defined network flow rules correspond to network traffic associated with the customer network. The set of custom defined network flow rules is stored in a forwarding table on the edge router. A packet of data is received at the edge router. The packet of data is attributed to the customer network. The set of custom defined network flow rules is applied to the pack of data using the forwarding table.Type: ApplicationFiled: January 3, 2025Publication date: April 24, 2025Applicant: Level 3 Communications, LLCInventor: Eric Osborne
-
Publication number: 20250133140Abstract: A device assembly having a syndicated data service interface that is communicatively coupled to a vendor-specific syndicated data application platform and having an installed vendor specific syndicated data application, with the interface receiving point-to-multipoint non-addressed transport bearer channels of different syndicated data channel transport networks initially only including the monitoring of the syndicated data channels and not decoding the syndicated data messages or syndicated data informational data contained therein, identifying from the transport bearer channels a received syndicated data channel having an syndicated data channel identifier of the specific syndicated data device, and reading the syndicated data messages within the received syndicated data channel and extracting the syndicated data supplier-independent informational data from the syndicated data message and providing the extracted syndicated data informational data to at least one of the installed vendor specific syndicated dType: ApplicationFiled: December 20, 2024Publication date: April 24, 2025Applicant: Datacast Labs, LLCInventor: Mark Wood
-
Publication number: 20250133460Abstract: In wireless communications, an uplink imbalance can exist for a wireless device (e.g., a cell phone), where the uplink signal strength is insufficient for reliable uplink transmissions from the wireless device to the serving node (e.g., 4G/5G base station or Wi-Fi access point) even though the downlink signal strength is sufficient for reliable downlink transmissions from the serving node to the wireless device. In one implementation, the wireless device detects an uplink imbalance based on missing downlink ACK messages from the serving node in response to its periodic uplink measurement reports to the serving node. In another implementation, the network (e.g., the serving node) detects an uplink imbalance based on missing uplink measurement reports from the wireless device. In either case, the detection of an uplink imbalance triggers initiation of handover processing to a neighbor node having sufficient signal strength.Type: ApplicationFiled: October 19, 2023Publication date: April 24, 2025Applicant: Charter Communications Operating, LLCInventors: Pareshkumar Panchal, Muhib Taiye Oduwaiye
-
Publication number: 20250130831Abstract: An asynchronous mechanism for processing synchronous operation flows is described herein. One example method includes receiving a request from an orchestrator engine to determine a state of a cloud resource of a cloud automation platform, propagating the request to the cloud automation platform, caching a task identifier received from the cloud automation platform responsive to the request, receiving data indicative of the state of the cloud resource from the cloud automation platform wherein the data is associated with the task identifier, and providing the data to the orchestrator engine.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Applicant: VMware LLCInventors: Kostadin Dinkov, Atanas Todorov, Marin Dzhigarov, Boris Angelov, Ventsyslav Raikov
-
Publication number: 20250127097Abstract: An agricultural baler includes a bale chamber and a bale ejection system that includes a chute with a first half portion extending along a first bale axis and a second half portion extending along a second bale axis that is parallel and spaced apart from the first bale axis. The chute receives a first bale and a second bale in the first half portion and the second half portion, respectively. The bale ejection system includes a first ejection ramp aligned with the first half portion of the chute that discharges the first bale along the first bale axis and a second ejection ramp extending from the second half portion of the chute that guides the second bale from the second bale axis to the first bale axis such that the first bale and the second bale are discharged in a single line onto the ground surface of the field.Type: ApplicationFiled: October 9, 2024Publication date: April 24, 2025Applicant: CNH Industrial America LLCInventor: Devin Cooley
-
Publication number: 20250128364Abstract: The present invention has a block with a cylindrical stud and a cylindrical hole. A hex-head screw has a screw head portion, a middle portion and a threaded portion. The threaded portion of the hex-head screw can be fitted to the base of a clamp through the cylindrical hole, so that the clamp can freely rotate, using the cylindrical stud as a pivoting point, and the clamp's location on a welding table can be shifted to provide a proper location on the surface of a workpiece. The cylindrical stud has an overall length sufficient to extend through the thickness of a welding table opening, where a matching lock nut can be easily used to screw on to threaded portion of the stud, thus tightening the clamp in place. When the clamp handle is engaged, the cylindrical stud, even if the lock nut is not used, binds to a welding table opening, but when the clamp handle is disengaged, the clamp can rotate as the cylindrical stud rotates in the welding table opening without angle limitation.Type: ApplicationFiled: December 30, 2024Publication date: April 24, 2025Applicant: Fireball Tool Works LLCInventor: Jason A Marburger
-
Publication number: 20250128835Abstract: A mobility management entity (MME) receives, from a first base station of a fourth generation (4G) network, a handover request for a handover of a wireless device to a second base station of a fifth generation (5G) network. The MME selects a session management controller supporting an aerial service and interworking between the 4G network and the 5G network. The MME receives, from the session management controller, a message indicating a creation of a session of the wireless device with the second base station of the 5G network. The message comprises an indication of an authentication and/or authorization (AA) status of the aerial service of the wireless device. Based on the handover request, the MME sends, to an access and mobility management function (AMF) of the 5G network, the indication of the AA status of the aerial service of the wireless device.Type: ApplicationFiled: December 9, 2024Publication date: April 24, 2025Applicant: Ofinno, LLCInventors: Jinsook Ryu, Esmael Hejazi Dinan, Kyungmin Park, Peyman Talebi Fard, Taehun Kim, Weihua Qiao
-
Publication number: 20250130025Abstract: A polymer ammunition cartridge that includes a cartridge body extending from the base end and a cartridge nose extending from the body is disclosed. The cartridge nose has a shoulder and a neck that extends to a projectile opening forming a distal end of the cartridge. Defined on the inner surface of the neck at an intermediate position between the shoulder and the projectile opening is an annular shelf. The neck further includes at least one wicking groove formed on the inner surface and extending from the projectile opening to the annular shelf. The wicking groove is configured to receive adhesive after a bullet has been installed into the neck and the annular shelf arrests the flow of adhesive thereby structurally limiting bondage between the neck and a bullet to the longitudinal length of the wicking grooves.Type: ApplicationFiled: October 19, 2023Publication date: April 24, 2025Applicant: True Velocity IP Holdings, LLCInventors: Florian HERZOG, David F. MORAN, Lonnie BURROW, Jacob WILLIAMS, Drew ROSEK, Salvatore FANELLI
-
Publication number: 20250132802Abstract: A first wireless device transmits, to a second wireless device, a first request triggering a first aperiodic channel state information (CSI) report on a first carrier of a sidelink communication. Based on the first carrier being different from a second carrier of the sidelink communication, the first wireless device transmits to the second wireless device, a second request triggering a second aperiodic CSI report on a second carrier while the first aperiodic CSI report on the first carrier is ongoing, wherein the sidelink CSI report timer is running while the first aperiodic CSI report is ongoing. The first wireless device receives, from the second wireless device, the first aperiodic CSI report on the first carrier.Type: ApplicationFiled: December 24, 2024Publication date: April 24, 2025Applicant: Ofinno, LLCInventors: Kyungmin Park, Jongwoo Hong, Esmael Hejazi Dinan, SungDuck Chun, Hyoungsuk Jeon, Taehun Kim, Jian Xu
-
Publication number: 20250128783Abstract: A control line router for a headset of a bicycle includes a barrier disposed between a component of the bicycle and a segment of a control line within a headtube of the bicycle.Type: ApplicationFiled: October 15, 2024Publication date: April 24, 2025Applicant: SRAM, LLCInventors: CHARLES DUNLAP, KEVIN WESLING
-
Publication number: 20250129707Abstract: A fiber optic sensing system is disclosed for improved accuracy analysis of an ESP operating downhole. The fiber optic system continues to operate and transmit data after a down hole power cable has been grounded and cannot transmit data over the downhole power cable. Analysis of harmonics and power quality up to the two hundredth harmonic are measured and analyzed. Transient peaks along the complete cable run are measured and analyzed along with measures of electrical frequency; and 3 Phase Voltage & Current at the motor.Type: ApplicationFiled: October 9, 2024Publication date: April 24, 2025Applicant: MGD – IP LLCInventor: Salvatore FRANK GRANDE, III
-
Publication number: 20250132983Abstract: A method for telemetry analysis of a digital twin includes analyzing network traffic sent or received by a host network. Entities exchanging data with the host network are identified. A plurality of applications within the host network used for sending or receiving the exchanged data may be identified. A digital twin of the host network is developed based upon the identified entities exchanging data with the host network and the applications within the host network used for sending or receiving the exchanged data. Stimuli may be applied to the digital twin, and the likelihood of a change in state within the host network is assessed based upon the applied stimuli.Type: ApplicationFiled: November 14, 2024Publication date: April 24, 2025Applicant: BROADSTONE TECHNOLOGIES, LLCInventors: Taimur ASLAM, Andrew J. SURWILO