Patents by Inventor Yogesh Shah
Yogesh Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250134653Abstract: An apparatus for endovascular repair of aorta root includes a self-expanding valved conduit and a self-expanding non-valved conduit. The valved conduit is configured for endovascular placement within an aortic valve of a subject. The valved conduit includes a valve between a distal end and a proximal end and includes a fenestration disposed between the valve and the proximal end of the valved conduit. The fenestration is configured for allowing fluid flow from inside the valved conduit to a coronary artery of the subject. The non-valved conduit is configured for endovascular placement within an aortic root of the subject. The proximal end of the valved conduit is fixed inside a distal end of the non-valved conduit and the distal end of the valved conduit extends outside the distal end of the non-valved conduit. The non-valved conduit also includes a fenestration in fluid communication with the fenestration in the valved conduit.Type: ApplicationFiled: October 14, 2024Publication date: May 1, 2025Inventors: Mehrdad GHOREISHI, Bradley TAYLOR, Shahab TOURSAVADKOHI, Aakash Yogesh SHAH
-
Publication number: 20230248939Abstract: A modular cannula for drainage and return of fluids from and to a body, such as the body of a patient, is adjustable to enable an operator to achieve desired flow characteristics during such fluid drainage and return procedures. The modular, dual-lumen cannula system has an outer drainage cannula and an inner return cannula that is moveable with respect to the outer drainage cannula. By enabling movement of the inner return cannula with respect to the outer drainage cannula, a distance between return outlet ports at the distal end of the return cannula and drainage ports at the distal end of the drainage cannula may be manually adjusted. Such adjustable distance allows for optimal positioning of both the drainage and return ports that are particularly adapted to an individual patient’s physiology, in turn enabling optimal fluid flow characteristics to be achieved regardless of that patient physiology.Type: ApplicationFiled: February 10, 2023Publication date: August 10, 2023Inventors: Bartley P. Griffith, Zhongjun Wu, Chetan Pasrija, Aakash Yogesh Shah, Zachary Kon
-
Patent number: 10542022Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: GrantFiled: June 6, 2017Date of Patent: January 21, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Patent number: 10013416Abstract: Disclosed are various embodiments for an automated service agent. Natural language inputs are obtained from a client. The natural language inputs and other data are input to machine learning models to identify intents reflected in the natural language inputs. A state in a workflow is updated to reflect the identified intents. Responses may be communicated to the client to further progress in the workflow.Type: GrantFiled: December 18, 2015Date of Patent: July 3, 2018Assignee: Amazon Technologies, Inc.Inventors: Vikas Seshagiri Rao Bhardwaj, Jared Kane Kramer, Hung Chiu Phillip Keung, Kapil Chahal, Tarun Agarwal, Jason Sun, Gunashekar Jayaraman, Dhvani Yogesh Shah, Ariel Grob Dos Santos, Sheng Bi, Polly Po Yee Lee, Anirban Chakraborty
-
Publication number: 20180027007Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: ApplicationFiled: June 6, 2017Publication date: January 25, 2018Inventors: Nirav Yogesh SHAH, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Publication number: 20170364295Abstract: A method or system capable of providing additional storage capacity using small form-factor (“SFP”) non-volatile memory (“NVM”) solid state drive (“SSD”) with modular to modular configuration is disclosed. A system includes a processing device, SFP auxiliary plug (“SAP”), and power SAP. In one embodiment, the processing device includes multiple SFP sockets operable to provide data communication. The SAP, having a SSD connector and an auxiliary connector, facilitates storing information persistently via NVM. The SSD connector of SAP is used for communicating with the processing device when the SAP is plugged into one of the SFP sockets. The power SAP, having a power connector and a power extension connector, is capable of providing electrical power to the SAP when the power extension connector and the auxiliary connector are coupled or connected.Type: ApplicationFiled: June 14, 2017Publication date: December 21, 2017Applicant: CNEX Labs, IncInventors: Bernie Sardinha, Shakti Yogesh Shah, Ross Stenfort
-
Patent number: 9705905Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: GrantFiled: May 8, 2014Date of Patent: July 11, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Publication number: 20160027007Abstract: Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests.Type: ApplicationFiled: October 8, 2015Publication date: January 28, 2016Inventors: Nirav Yogesh Shah, Michael James Ott, Manisha Balasaheb Powar
-
Patent number: 9053162Abstract: Technologies are described herein for implementing a hosted multi-tenant application system. The server computers utilized to provide the hosted application are organized into logical groupings of server computers called scale groups. One or more tenants are assigned to each scale group. When a new tenant is provisioned, the tenant is assigned to a scale group and a database server in the assigned scale group creates a database for the tenant. An association between the tenant and the scale group is also created in a shared configuration database. When a request is received from a tenant to access the hosted application, the shared configuration database is consulted to locate the scale group hosting the tenant. Once the appropriate scale group has been located, the request is redirected to the appropriate scale group for processing.Type: GrantFiled: June 27, 2008Date of Patent: June 9, 2015Assignee: Microsoft Technology Licensing, LLCInventors: David Robert Shutt, Michael James Ott, Nirav Yogesh Shah, Jagan Peri, Ramesh T. Bangalore
-
Publication number: 20140245437Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: ApplicationFiled: May 8, 2014Publication date: August 28, 2014Applicant: MICROSOFT CORPORATIONInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Patent number: 8745361Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: GrantFiled: December 2, 2008Date of Patent: June 3, 2014Assignee: Microsoft CorporationInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Publication number: 20110020440Abstract: The present invention relates to a stable pharmaceutical composition comprising soft gelatin capsules containing at least one sparingly soluble active drug (singly or in combination with sparingly soluble and/or soluble drugs) and a solvent system, wherein the solvent system comprises of solvent, co-solvent, solubilizer(s), surfactant, aqueous solution of alkali and crystal growth inhibitor. The present invention further relates to process for preparing a stable pharmaceutical composition of sparingly soluble active drug(s) in soft gelatin capsules.Type: ApplicationFiled: November 15, 2008Publication date: January 27, 2011Applicant: CADILA PHARMACEUTICALS LIMITEDInventors: Indravadan Ambalal Modi, Bakulesh Mafatlal Khamar, Ashok Sitaram Omray, Vandana Patravale, Kartik Yogesh Shah, Prashant Yogesh Patel
-
Publication number: 20100138639Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: ApplicationFiled: December 2, 2008Publication date: June 3, 2010Applicant: Microsoft CorporationInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Publication number: 20090327139Abstract: Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Nirav Yogesh Shah, Michael James Ott, Manisha Balasaheb Powar
-
Publication number: 20090164291Abstract: A system, method, and interactive computer program product are provided for interactively analyzing sourcing options for positions within an organization utilizing a multidimensional, multi-factor analysis. Additionally, this technology provides for evaluating positions in an organization, evaluating the potential for outsourcing, and determining from where to source candidates for the positions in an objective, timely, and cost-effective manner. The dimensions include short-term, tactical drivers and long-term, strategic drivers. The factors include intellectual property, customer facing, availability of skills in the local marketplace, flexibility, communications channels utilized, cost, duration, and organization readiness to procure externally sourced candidates. An interactive, on-screen interview questionnaire and coach is utilized. The system is reconfigurable on a per-client basis.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Applicant: COMPUCREDIT CORPORATIONInventors: Yogesh Shah, Krishnamoorthy Srinivasan, Willa Fabian
-
Publication number: 20090049056Abstract: Technologies are described herein for implementing a hosted multi-tenant application system. The server computers utilized to provide the hosted application are organized into logical groupings of server computers called scale groups. One or more tenants are assigned to each scale group. When a new tenant is provisioned, the tenant is assigned to a scale group and a database server in the assigned scale group creates a database for the tenant. An association between the tenant and the scale group is also created in a shared configuration database. When a request is received from a tenant to access the hosted application, the shared configuration database is consulted to locate the scale group hosting the tenant. Once the appropriate scale group has been located, the request is redirected to the appropriate scale group for processing.Type: ApplicationFiled: June 27, 2008Publication date: February 19, 2009Applicant: MICROSOFT CORPORATIONInventors: David Robert Shutt, Michael James Ott, Nirav Yogesh Shah, Jagan Peri, Ramesh T. Bangalore
-
Patent number: D458001Type: GrantFiled: November 27, 2000Date of Patent: May 28, 2002Inventor: Yogesh Shah
-
Patent number: D460598Type: GrantFiled: November 27, 2000Date of Patent: July 16, 2002Inventor: Yogesh Shah