Abstract: Systems and methods for in-line TCP processing using a systolic array. For example, data received for storage is processed in-line prior to encryption and/or sending to a remote storage device (e.g., cloud storage or server).
Type:
Application
Filed:
September 24, 2024
Publication date:
May 15, 2025
Applicant:
Secturion Systems, Inc.
Inventors:
TIMOTHY PAUL ABEL, JACOB FROGGET, DEREK OWENS, JORDAN ANDERSON
Abstract: Various embodiments include a system or platform that uses electrochemistry to upcycle waste products and low-value minerals into valuable, carbon dioxide (CO2)-neutral materials. Various embodiments may include systems and/or methods for processing material inputs using an electrochemical reactor. Various embodiments may include systems, methods, and/or devices for capturing and sequestering carbon dioxide (CO2) while producing valuable co-products.
Type:
Application
Filed:
November 21, 2024
Publication date:
May 15, 2025
Applicant:
Sublime Systems, Inc.
Inventors:
Jesse D. BENCK, Yet-Ming CHIANG, Leah D. ELLIS, Kyle DOMINGUEZ, Mariya LAYUROVA
Abstract: Techniques are disclosed relating to providing fast access to restored data in a cloud storage environment. A computing system stores multiple sets of incremental backup data that reflect changes in data being backed up between backup intervals and metadata that indicates which set of incremental backup data stores a given object. The computing system generates an endpoint for a requesting computing system, where the endpoint supports requests for restored backup data and data responses. In response to a request from the requesting computing system via the endpoint, the computing system queries the metadata based on the request and stores metadata retrieved from the query in a key/value store using object identification information as key data and the retrieved metadata as value data. The computing system provides requested data according to a lazy loading technique, including providing requested data via the endpoint based on the metadata in the key/value store.
Type:
Application
Filed:
November 9, 2023
Publication date:
May 15, 2025
Applicant:
Commvault Systems, Inc.
Inventors:
Xia Hua, Woonho Joseph Jung, Jinmyeong Kim, Junhwan Kim, Seunghyeon Kim, Yuchon Yi, Nicholas Gerald Zehender, Jason Sarich, Jaewon Wi
Abstract: A data storage environment can include one or more virtual machines instantiated on a host computing device. Based on physical location data of the one or more virtual machines received from the host computing device, a storage manager can control the performance of a secondary copy operation on one or more storage units that store virtual machine data associated with the one or more virtual machines and/or the performance of a secondary copy operation on the one or more virtual machines.
Type:
Application
Filed:
December 10, 2024
Publication date:
May 15, 2025
Applicant:
Commvault Systems, Inc.
Inventors:
Ashwin Gautamchand SANCHETI, Henry Wallace DORNEMANN
Abstract: Systems, methods, and apparatuses for providing optimization of network resources. The system is operable to monitor the electromagnetic environment, analyze the electromagnetic environment, and extract environmental awareness of the electromagnetic environment. The system extracts the environmental awareness of the electromagnetic environment by including customer goals. The system is operable to use the environmental awareness with the customer goals and/or user defined policies and rules to extract actionable information to help the customer optimize the network resources.
Abstract: Systems, methods, and apparatuses for providing optimization of network resources. The system is operable to monitor the electromagnetic environment, analyze the electromagnetic environment, and extract environmental awareness of the electromagnetic environment. The system extracts the environmental awareness of the electromagnetic environment by including customer goals. The system is operable to use the environmental awareness with the customer goals and/or user defined policies and rules to extract actionable information to help the customer optimize the network resources.
Abstract: Systems, methods, and apparatuses for providing optimization of network resources. The system is operable to monitor the electromagnetic environment, analyze the electromagnetic environment, and extract environmental awareness of the electromagnetic environment. The system extracts the environmental awareness of the electromagnetic environment by including customer goals. The system is operable to use the environmental awareness with the customer goals and/or user defined policies and rules to extract actionable information to help the customer optimize the network resources.
Abstract: Systems and methods of sensor data fusion including sensor data capture, curation, linking, fusion, inference, and validation. The systems and methods described herein reduce computational demand and processing time by curating data and calculating conditional entropy. The system is operable to fuse data from a plurality of sensor types. A computer processor optionally stores fused sensor data that the system validates above a mathematical threshold.
Abstract: Systems and methods of sensor data fusion including sensor data capture, curation, linking, fusion, inference, and validation. The systems and methods described herein reduce computational demand and processing time by curating data and calculating conditional entropy. The system is operable to fuse data from a plurality of sensor types. A computer processor optionally stores fused sensor data that the system validates above a mathematical threshold.
Abstract: Systems and methods of sensor data fusion including sensor data capture, curation, linking, fusion, inference, and validation. The systems and methods described herein reduce computational demand and processing time by curating data and calculating conditional entropy. The system is operable to fuse data from a plurality of sensor types. A computer processor optionally stores fused sensor data that the system validates above a mathematical threshold.
Abstract: Systems and methods of sensor data fusion including sensor data capture, curation, linking, fusion, inference, and validation. The systems and methods described herein reduce computational demand and processing time by curating data and calculating conditional entropy. The system is operable to fuse data from a plurality of sensor types. A computer processor optionally stores fused sensor data that the system validates above a mathematical threshold.
Abstract: Systems, methods, and apparatuses for providing dynamic, prioritized spectrum utilization management. The system includes at least one monitoring sensor, at least one data analysis engine, at least one application, a semantic engine, a programmable rules and policy editor, a tip and cue server, and/or a control panel. The tip and cue server is operable utilize the environmental awareness from the data processed by the at least one data analysis engine in combination with additional information to create actionable data.
Type:
Application
Filed:
January 15, 2025
Publication date:
May 15, 2025
Applicant:
Digital Global Systems, Inc.
Inventors:
Armando Montalvo, Edward Hummel, Dwight Inman
Abstract: A self-shielded and computer controlled system for performing non-invasive stereotactic radiosurgery and precision radiotherapy using a linear accelerator mounted within a two degree-of-freedom radiation shield coupled to a three-degree of freedom patient table is provided. The radiation shield can include an axial shield rotatable about an axial axis and an oblique shield independently rotatable about an oblique axis, thereby providing improved range of trajectories of the therapeutic and diagnostic radiation beams. Such shields can be balanced about their respective axes of rotation and about a common support structure to facilitate ease of movement. Such systems can further include an imaging system to accurately deliver radiation to the treatment target and automatically make corrections needed to maintain the anatomical target at the system isocenter.
Type:
Application
Filed:
January 15, 2025
Publication date:
May 15, 2025
Applicant:
Zap Surgical Systems, Inc.
Inventors:
Younes Achkire, Raymond Wilbur, John Adler, Manoocher Birang, Radhika Mohan Bodduluri, Hui Zhang, Tom McDermott, Chris Lee, Kaustubh Sonawale, Cesare Jenkins
Abstract: Systems and methods are described and illustrated for percutaneously implanting a stimulation lead for treating sleep-related disordered breathing.
Type:
Application
Filed:
January 17, 2025
Publication date:
May 15, 2025
Applicant:
Inspire Medical Systems, Inc.
Inventors:
Mark A. Christopherson, Quan Ni, John Rondoni
Abstract: The disclosed approach works without the individualized credentials of failed machines when setting up recovery VMs in a cloud computing environment. Each recovery VMs is customized to properly correspond to the system state of its failed counterpart. An illustrative data storage management system recovers backup data and system states collected from the counterpart computing devices, custom-configures recovery VMs in the cloud computing environment, and injects the desired drivers into each recovery VM during an enhanced bare-metal restore process. The enhanced bare-metal restore process works without the failed computer's credentials. The system also restores the backed up data to recovery volumes attached to the recovery VMs. The present approach is both scalable and secure.
Type:
Application
Filed:
January 16, 2025
Publication date:
May 15, 2025
Applicant:
Commvault Systems, Inc.
Inventors:
Amit MAHAJAN, Ratish Babu ANDHAM VEETIL, Venkatesh MAHARAJAN
Abstract: Virtual machine (VM) proliferation may be reduced through the use of Virtual Server Agents (VSAs) assigned to a group of VM hosts that may determine the availability of a VM to perform a task. Tasks may be assigned to existing VMs instead of creating a new VM to perform the task. Furthermore, a VSA coordinator may determine a grouping of VMs or VM hosts based on one or more factors associated with the VMs or the VM hosts, such as VM type or geographical location of the VM hosts. The VSA coordinator may also assign one or more VSAs to facilitate managing the group of VM hosts. In some embodiments, the VSA coordinators may facilitate load balancing of VSAs during operation, such as during a backup operation, a restore operation, or any other operation between a primary storage system and a secondary storage system.
Type:
Grant
Filed:
February 22, 2024
Date of Patent:
May 13, 2025
Assignee:
Commvault Systems, Inc.
Inventors:
Rajiv Kottomtharayil, Rahul S. Pawar, Ashwin Gautamchand Sancheti, Sumer Dilip Deshpande, Sri Karthik Bhagi, Henry Wallace Dornemann, Ananda Venkatesha
Abstract: A system for providing integrated detection and countermeasures against unmanned aerial vehicles include a detecting element, a location determining element and an interdiction element. The detecting element detects an unmanned aerial vehicle in flight in the region of, or approaching, a property, place, event or very important person. The location determining element determines the exact location of the unmanned aerial vehicle. The interdiction element can either direct the unmanned aerial vehicle away from the property, place, event or very important person in a non-destructive manner, or can cause disable the unmanned aerial vehicle in a destructive manner.
Type:
Grant
Filed:
September 24, 2021
Date of Patent:
May 13, 2025
Assignee:
XiDrone Systems, Inc.
Inventors:
Dwaine A. Parker, Damon E. Stern, Lawrence S. Pierce
Abstract: A microprocessor includes an instruction cache (IC) of architectural instructions (AIs) and a macro-op cache (MOC) comprising a MOC tag RAM (MTR) and a MOC data RAM (MDR) that holds macro-ops (MOPs) into which AIs have been translated. A MOC entry comprises one MTR entry and one or more MDR entries. A prediction unit (PRU) provides a sequence of fetch block descriptors (FBDs) in program order that describe a corresponding sequence of fetch blocks (FBlks). The PRU comprises a fetch block predictor (FBP) and the MTR which look up a corresponding sequence of fetch block start addresses (FBSAs) to generate respective hit indicators used to generate, for each FBD, a fetch source indicator (FSI) that indicates either the MOC or the IC. An instruction fetch unit (IFU) consumes the sequence of FBDs in program order and initiates a fetch of AIs/MOPs from the IC/MDR based on the FSI.
Abstract: Tools used to acquire a core tissue sample are disclosed. A portion of the tools may be configured to rotate when acquiring the core tissue sample. The tools include a partoff tab to sever the core tissue sample from a lesion and to retain the core tissue sample when the tool is removed from the patient. The tools may further include a light source to illuminate a working field.
Abstract: A computerized method for increasing throughput of encapsulated data over a network is described. First, a determination, at a first network device, of a number of available processing resources located at a second network device is conducted. Thereafter, a plurality of connections are generated between the first network device and the second device. The plurality of connections corresponding in number to the number of available processing resources. Data received by the first network device is associated with a first connection of the plurality of tunneling connections. Thereafter, translation data unique to a tunneling session associated with the first connection is generated and the received data is encapsulated with the translation data to generate the encapsulated data for transmission to the second network device.