Patents by Inventor Paul Greenstein

Paul Greenstein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230255537
    Abstract: An electromechanical system for generating a CPR-corrupted ECG signal is provided. The electromechanical system may include an ECG signal generator electrically coupled to a first contact of an AED. The electromechanical system may further include a potentiometer electrically coupled to the ECG signal generator and a second contact of the AED. The electromechanical system may further include a compression mechanism. The compression mechanism may be configured to receive a vertical force and adjust an impedance of the potentiometer according to the vertical force. The compression mechanism may include a rack having a plurality of teeth and an initial position. The rack may be configured to translate to a second position according to the vertical force. The compression mechanism may further include a gear with a plurality of teeth engaged with the teeth of the rack such that the gear rotates according to the translation of the rack.
    Type: Application
    Filed: June 29, 2021
    Publication date: August 17, 2023
    Inventors: Lok Yiu To, Joseph Diederichs, Alan Paul Greenstein, Chenguang Liu, Christopher Neils, Dawn Jorgenson
  • Patent number: 9403026
    Abstract: An automated external defibrillator (AED) 10 has a changeable language placard (20) which enables the AED to instruct the user in one or more languages. The placard includes a controlling element (120) which is sensed by the AED, and causes the AED to automatically switch the language mode into the corresponding placard language. The placard also includes visual guidance instructions (224, 226).
    Type: Grant
    Filed: January 25, 2013
    Date of Patent: August 2, 2016
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Eric Jonsen, Jacco Christof Eerden, Daniel J. Powers, Kurt Vincent Fischer, Christian James Richard, Alan Paul Greenstein
  • Patent number: 9248307
    Abstract: A language controller (20) is described which can be installed on the front face of an automated external defibrillator (AED) in order to establish the language of the AED user interface. The language controller is in the form of a labeled plaque (210) which informs the user which language is currently in use. The plaque may also contain a button (222) which enables toggling from one language to another. Memory may also reside in the plaque to provide language data to the AED.
    Type: Grant
    Filed: February 1, 2013
    Date of Patent: February 2, 2016
    Assignee: KJONINKLIJKE PHILIPS N.V.
    Inventors: Jacco Christof Eerden, Alan Paul Greenstein
  • Publication number: 20150046149
    Abstract: A language controller (20) is described which can be installed on the front face of an automated external defibrillator (AED) in order to establish the language of the AED user interface. The language controller is in the form of a labeled plaque (210) which informs the user which language is currently in use. The plaque may also contain a button (222) which enables toggling from one language to another. Memory may also reside in the plaque to provide language data to the AED.
    Type: Application
    Filed: February 1, 2013
    Publication date: February 12, 2015
    Inventors: Jacco Christof Eerden, Alan Paul Greenstein
  • Publication number: 20080027780
    Abstract: A service element is defined and represented by a data structure. It includes one or more components and/or one or more other service elements. A service element providing a complete function is a service offering. Management of service elements and/or service offerings is facilitated by a Service Development Tool. In different aspects, the management includes various tasks associated with creating, modifying and deleting service elements, establishing relationships, error checking and optimization. In a further aspect, service elements are packaged and distributed to enable customers to deliver the service elements. Additionally, the hosting of software packages is facilitated.
    Type: Application
    Filed: October 5, 2007
    Publication date: January 31, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Paul GREENSTEIN
  • Publication number: 20070289008
    Abstract: Method and system for verifying correctness of networking aspects of an Information Technology (IT) system that includes a host network of hosts. The hosts include servers and firewalls. A firewall connectivity indication of whether the host network includes an isolated firewall or a cross-zone connected firewall is determined. Determining for each host whether the host is isolated from a communication network to which the IT system is connected determines whether isolated network segments exit within the host network. For each host determined to be isolated from the communication network, the method identifies all network segments of the host network to which each host is connected, determines the unique network segments of the identified network segments, and designates the unique network segments as a set of isolated network segments. The firewall connectivity indication and the set of isolated network segments are stored in a storage medium of a computer system.
    Type: Application
    Filed: April 30, 2007
    Publication date: December 13, 2007
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20070282627
    Abstract: A service element is defined and represented by a data structure. It includes one or more components and/or one or more other service elements. A service element providing a complete function is a service offering. Management of service elements and/or service offerings is facilitated by a Service Development Tool. In different aspects, the management includes various tasks associated with creating, modifying and deleting service elements, establishing relationships, error checking and optimization. In a further aspect, service elements are packaged and distributed to enable customers to deliver the service elements. Additionally, the hosting of software packages is facilitated.
    Type: Application
    Filed: August 20, 2007
    Publication date: December 6, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Greenstein, Galina Grunin, Luu Nguyen
  • Publication number: 20070130097
    Abstract: A method and system for predicting a user activity level associated with an application. An activity level is a number of transactions performed by users utilizing the application per time period or a number of users utilizing the application per time period. Measurements of activity levels are assigned to a user activity metric (UAM) variable, and associated values are assigned to a set of factors. At least one correlation coefficient between each factor and the UAM is calculated. In response to a maximum correlation coefficient associated with a factor being less than a pre-defined threshold, the factor is excluded from the set of factors to facilitate forming a subset of factors associated with correlation coefficients whose absolute values are greater than or equal to the pre-defined threshold. A regression model utilizing the subset is generated to predict an activity level.
    Type: Application
    Filed: December 1, 2005
    Publication date: June 7, 2007
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20070100676
    Abstract: A method and system for optimally scheduling an activity managed by a web application. Date and time ranges are initialized with predefined values. A tentative start date included in the date range and a tentative start time included in the time range are automatically calculated, and are included in a tentative schedule for the activity. A time period is determined by the tentative schedule and a duration of the activity. The automatic calculation prevents the time period from overlapping a time interval during which the web application is to experience a peak load. The tentative schedule is presented to the user via the interface, and is recalculated and redisplayed in response to the user updating a load-related parameter. The user selects a final schedule, which is the tentative schedule or a user-specified schedule different from the tentative schedule.
    Type: Application
    Filed: October 27, 2005
    Publication date: May 3, 2007
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20060248501
    Abstract: A method and system for porting an abstract Information Technology (IT) structure into an IT delivery environment. An abstract IT structure A that is currently within an IT delivery environment X is translated by generating a virtual IT structure V from the abstract IT structure A through specification of an IT delivery environment Y. Delivery binding the virtual IT structure V to the IT delivery environment Y generates a delivery-bound virtual IT structure D. The delivery-bound virtual IT structure D is deployed in the IT delivery environment Y, resulting in a real IT structure instance R capable of operating in the IT delivery environment Y.
    Type: Application
    Filed: June 13, 2006
    Publication date: November 2, 2006
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Greenstein, Gregory Vilshansky
  • Publication number: 20060248546
    Abstract: A method and system for adapting an Information Technology (IT) structure to maintain service levels. An IT structure is deployed in an IT delivery environment. A service level associated with the IT structure is specified. At least one operational characteristic of the IT structure corresponding to the specified service level is identified. For each identified operational characteristic, a corresponding threshold is established in such that if the corresponding threshold is violated then the specified service level is not sustained. After establishing the thresholds, operation of the IT structure is monitored. The monitoring detects a condition wherein a measured value of a first operational characteristic has violated the corresponding threshold associated with the first operational characteristic such that the specified service level is not sustained by the measured value of the first operational characteristic, causing degradation of the specified service level.
    Type: Application
    Filed: June 13, 2006
    Publication date: November 2, 2006
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin
  • Publication number: 20060195373
    Abstract: This invention introduces a method, system and computer readable media that enables a computer system or computer networked system to perform enterprise portfolio transition optimization. The invention considers several key factors that are traditionally treated informally. The invention provides a sequential decision model for enterprise portfolio transition management of computer and software resources. Using a finite state Markov Decision process, a mathematical formulation is developed to ensure an optimal enterprise portfolio transition plan, with the objective of balancing expected value and risk, that is solved numerically via an approximate dynamic programming algorithm. The output of the model is a set of recommendations in the form of a transition plan for each of the computer and software resources selected within the enterprise portfolio during each phase of a planning horizon.
    Type: Application
    Filed: February 28, 2005
    Publication date: August 31, 2006
    Inventors: David Flaxer, Paul Greenstein, Robert Hampshire, Anil Nigam, John Vergo
  • Publication number: 20060156274
    Abstract: A method for verifying correctness of an Information Technology (IT) structure instance D of an IT structure R, a method for detecting an unauthorized change in an operating instance X of an IT structure R, a method for verifying conformance of an IT structure to an IT delivery environment, associated computer program products, and associated processes for integrating computing infrastructure. The method for verifying correctness of an IT structure instance D determines whether a reverse specification RD for D differs from R. The method for detecting an unauthorized change in an operating instance X of an IT structure R determines whether authorized changes in R have occurred. The method for verifying conformance of an IT structure to an IT delivery environment verifies compliance of the IT structure relating to: product standard compliance, compliance of software elements of the IT structure primitive composition, software application type compliance, and network traffic compliance.
    Type: Application
    Filed: May 23, 2005
    Publication date: July 13, 2006
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20060150143
    Abstract: A method and associated computer program product for developing an Information Technology (IT) system. An abstract IT structure for the IT system is provided. A virtual IT structure for the IT system is generated from the abstract IT structure by a translator. A real IT structure for the IT system is generated from the virtual IT structure.
    Type: Application
    Filed: December 14, 2004
    Publication date: July 6, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20060143532
    Abstract: A method for managing a cost of ownership of a portfolio of N software applications (N?2). A regression function is identified for each application. Each regression function expresses an approximate cost of ownership of the applications in terms of parameters and coefficients. J applications A1, A2, . . . , AJ are selected from the N applications such that a remaining N?J applications are unselected (J<N). The coefficients for the N?J unselected applications constitute a subset of the coefficients for the J selected applications. Fj represents the approximate cost of ownership of the application Aj for j=1, 2, . . . , J. An actual cost of ownership Gj of application Aj for j=1, 2, . . . , J is provided. The coefficients for the J selected applications are determined so as to minimize a function H=?j Wj|Fj?Gj|P(P>0). ?j represents a summation over j from j=1 to j=J. Wj are predetermined weights.
    Type: Application
    Filed: December 14, 2004
    Publication date: June 29, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitrii Andreev, Paul Greenstein, Gregory Vilshansky
  • Publication number: 20060125847
    Abstract: An Information Technology (IT) system display method and computer program product. A description is provided of a configuration of devices, network segments, and vertical connectors relating to an IT structure. The devices are initially distributed to form a distribution of the devices in a matrix representing a display screen. A defined goal value of the configuration is a function of a length and weight of each network segment, a length and weight of each vertical connector, and a penalty for each crossing of a device by a network segment. An overlay pattern of the network segments and the vertical connectors overlayed on the matrix is displayed in accordance with the description and the final distribution of the devices in the matrix. The goal value for the final distribution is lower than for the initial distribution. The final distribution is displayed on the display screen together with the overlay pattern.
    Type: Application
    Filed: February 17, 2005
    Publication date: June 15, 2006
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20060130133
    Abstract: A firewall rule generation method, a load balancing rule generation method, and a wrapper generation method, for an Information Technology (IT) system, associated computer program products, and an associated processes for integrating computing infrastructure. The firewall rule generation method generates firewall rules allowing data transmission between a computer and a client, and subsequently assigns the firewall rules to firewalls of the IT system. The load balancing rule generation method assigns a load balancing mechanism to a load balanced group to which execution of an application is assigned, wherein the load balanced group has servers therein. For a client and computer having a communication protocol therebetween that is not allowed by a security policy, the wrapper generation method generates a communication protocol wrapper that opens a Transmission Control Protocol (TCP) connection between the client and the computer such that the TCP connection is allowed by the security policy.
    Type: Application
    Filed: May 3, 2005
    Publication date: June 15, 2006
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20060129419
    Abstract: A method for managing a business. At least one relationship is determined between N business components (B1, B2, . . . , BN) and respective N costs (C1, C2, . . . , CN) and respective N values (V1, V2, . . . , VN) pertaining to the N business components. The N business components are a subset of M business components (B1, B2, . . . , BM) of a Component Based Model (CBM) of the M business components subject to M?2 and N?M. Determining the at least one relationship includes relating business components of the CBM with an Information Technology (IT) model of an IT system. The IT model includes abstract IT structures, virtual IT structures, real IT structures, or combinations thereof.
    Type: Application
    Filed: June 23, 2005
    Publication date: June 15, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Flaxer, Paul Greenstein, Robert Hampshire, Anil Nigam, Guy Rackham, John Vergo
  • Publication number: 20060129518
    Abstract: A computer-implemented method for optimizing an aspect of an Information Technology (IT) structure of an IT system, the aspect of the IT structure is optimized with respect to at least one control parameter. The IT structure includes a plurality of elements. Each element independently is a hardware element, a software element, or a combination of a hardware element and a software element. Each control parameter has a value that is specific to each element of the IT structure.
    Type: Application
    Filed: October 31, 2005
    Publication date: June 15, 2006
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Greenstein, Galina Grunin, Gregory Vilshansky