1
Ammar Al Ali: Wearable portable patient monitor. MASIMO CORPORATION, Knobbe Martens, Olson & Bear, October 24, 2017: US09795300 (16 worldwide citation)

A wearable, portable physiological monitor configured to wirelessly transmit real time information regarding a plurality physiological parameters. The portable monitor includes a plurality of sensor ports, where at least a first sensor port is positioned on a side of a housing of the portable monito ...


2
Assaf Natanzon: Replication optimizated IO. EMC Corporation, R Kevin Perkins, Krishnendu Gupta, October 24, 2017: US09798490 (16 worldwide citation)

A system method and program product for data replication comprising based on metadata, creating a mapping of pending IO to a logical storage medium and changing a mapping of the logical storage medium to tiered storage mediums to optimize the pending IO to the logical storage medium.


3
Ammar Al Ali: Patient monitor for determining microcirculation state. MASIMO CORPORATION, Knobbe Martens Olson & Bear, October 24, 2017: US09795310 (16 worldwide citation)

As placement of a physiological monitoring sensor is typically at a sensor site located at an extremity of the body, the state of microcirculation, such as whether vessels are blocked or open, can have a significant effect on the readings at the sensor site. It is therefore desirable to provide a pa ...


4
Gregory Saul Harrison, Desiree Mejia, Andrew Paul Thomas, Joseph Frank Scalisi: Doorbell package detection systems and methods. SkyBell Technologies, October 24, 2017: US09799183 (15 worldwide citation)

Delivery parcel detection systems can include a doorbell having a first wireless communication system and a floor covering configured for placement on an entryway floor. The doorbell can be communicatively coupled to the floor covering. The floor covering can comprise a sensor configured to detect a ...


5
Assaf Natanzon, Eitan Bachmat, Mark Abashkin: Extent level cache destaging. EMC CORPORATION, Konrad R Lee, Krishnendu Gupta, October 24, 2017: US09798472 (15 worldwide citation)

A System, Computer Program Product, and Computer-executable method for managing cache de-staging on a data storage system wherein the data storage system provides a Logical Unit (LU), the System, Computer Program Product, and Computer-executable method including dividing the LU into two or more exte ...


6
Igor A Baikalov, Tanuj Gulati, Sachin Nayyar, Anjaneya Shenoy, Ganpatrao H Patwardhan: Risk scoring for threat assessment. Securonix, Barry N Young, October 24, 2017: US09800605 (12 worldwide citation)

Threat risks to an enterprise are detected and assessed by assembling singular threats identified using both direct and behavioral threat indicators into composite threats to create complex use cases across multiple domains, and to amplify risks along kill chains of known attacks for early detection ...


7
Christopher Boyd Tirpak: Home automation control based on individual profiling using audio sensor data. ECHOSTAR TECHNOLOGIES INTERNATIONAL CORPORATION, Kilpatrick Townsend & Stockton, October 24, 2017: US09798309 (11 worldwide citation)

Disclosed are methods, systems, and non-transitory, machine-readable media that facilitates home automation control based on individualized audio differentiation of carbon monoxide detectors. Audio characteristics may be determined based on first sensor data. Attributes may be defined based on the a ...


8
Yongbeom Ma, Hyongguk Kim, Jaekul Lee, Moonkil Seo, Mihwa Chang: Mobile terminal and method for controlling the same. LG Electronics, Fish & Richardson P C, October 24, 2017: US09800717 (10 worldwide citation)

An embodiment disclosed in the present disclosure discloses a mobile terminal for performing communication with a vehicle control apparatus installed in a vehicle, and the mobile terminal may include a wireless communication unit configured to form a network comprising the vehicle control apparatus ...


9
Yevgeny Korsunsky, Moisey Akerman: Processing data flows with a data flow processor. Symantec Corporation, Maschoff Brennan, October 24, 2017: US09800608 (10 worldwide citation)

An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Netw ...


10
Kartik Venkataraman, Semyon Nisenzon, Priyam Chatterjee, Gabriel Molina: Systems and methods for synthesizing images from image data captured by an array camera using restricted depth of field depth maps in which depth estimation precision varies. FotoNation Cayman, KPPB, October 24, 2017: US09800856 (8 worldwide citation)

Systems and methods are described for generating restricted depth of field depth maps. In one embodiment, an image processing pipeline application configures a processor to: determine a desired focal plane distance and a range of distances corresponding to a restricted depth of field for an image re ...