Abstract:
Computer systems and corresponding methods are provided for computer assisted research in a network are provided that generate interface screens that include a map view of a plurality of selectable objects disposed in a nuclear arrangement in segmented rings about a first level object. The computing device is configured to receive selections of the displayed objects and expand the display to include additional segmented levels all surrounding the first level object.
Abstract:
Computer systems and corresponding methods are provided for computer assisted research in a network are provided that generate interface screens that include a map view of a plurality of selectable objects disposed in a nuclear arrangement in segmented rings about a first level object. The computing device is configured to receive selections of the displayed objects and expand the display to include additional segmented levels all surrounding the first level object.
Abstract:
Electronic devices may be provided with compasses for detecting the Earth's magnetic field. Electronic devices may be provided with electronic components that generate interfering magnetic fields for the compass. Electronic components may be coupled between a power supply line and a power return line on a printed circuit. The power return line may be configured to generate a compensating magnetic field to counteract the interfering magnetic fields. The power return line may be formed parallel to the power supply line. The power supply line may have multiple branches equidistant from the compass. The power return line may have a portion closer to the compass than the power supply line and the electronic component. The power return line may have multiple branches, may be provided with resistors on each branch and may include a portion of a circular loop the runs around the compass on the printed circuit board.
Abstract:
Improved techniques for accessing data storage systems are disclosed. These techniques detect, correct and prevent undesirable access delays experienced in storage systems. “Slow-access” refers to an access operation that does not successfully complete within a predetermined amount of time. When slow-access is detected, an attempt is made to provide data by other means rather than waiting for the access operation to eventually complete. By way of example, parity information is used to generate data rather than waiting beyond a predetermined amount of time for a “slow-read” operation to complete. In addition, preventative measures can be taken to avoid reoccurrence of a “slow-access” operating once it has been identified. These preventative measures, for example, include rewriting the same data to the same data section that caused the slow-access problem or remapping the section to another section in order to avoid the same section of data to cause another slow access problem.
Abstract:
An electrophysiology catheter includes a tube having a proximal end, a distal end, and a lumen therebetween. The tube is preferably comprised of multiple sections of different flexibility, arranged so that the flexibility of the catheter increases from the proximal end to the distal end. There is a first generally hollow electrode member at the distal end. At least one magnetically responsive element is disposed at least partially in the hollow electrode, for orienting the distal end of the catheter with an externally applied magnetic field. Multiple magnets can be distributed over the distal portion of the device. The end electrode can have openings for delivering irrigating fluid, and/or a sleeve can be provided around the tube to create an annular space for the delivering of irrigating fluid. A temperature sensor can be provided to control the operation of the catheter. A localization coil can also be included to sense the position and orientation of the catheter.
Abstract:
A system and method that allows developers to debug a component while it is restricted by any arbitrary set of specific permissions, or restricted by an existing permission set associated with a security “zone.” A security sandbox is mimicked within the development environment so that developers can study how applications perform inside the sandbox. Developers are able create any sandbox and debug inside it, where violating any bound of the artificial sandbox will throw a security exception and drop the user out on the exact line of code which generated the error, as well as provide helpful information about how to correct the error.
Abstract:
Improved techniques for accessing data storage systems are disclosed. These techniques detect, correct and prevent undesirable access delays experienced in storage systems. “Slow-access” refers to an access operation that does not successfully complete within a predetermined amount of time. When slow-access is detected, an attempt is made to provide data by other means rather than waiting for the access operation to eventually complete. By way of example, parity information is used to generate data rather than waiting beyond a predetermined amount of time for a “slow-read” operation to complete. In addition, preventative measures can be taken to avoid reoccurrence of a “slow-access” operating once it has been identified. These preventative measures, for example, include rewriting the same data to the same data section that caused the slow-access problem or remapping the section to another section in order to avoid the same section of data to cause another slow access problem.
Abstract:
An electrophysiology catheter includes a tube having a proximal end, a distal end, and a lumen therebetween. The tube is preferably comprised of multiple sections of different flexibility, arranged so that the flexibility of the catheter increases from the proximal end to the distal end. There is a first generally hollow electrode member at the distal end. A magnetically responsive element is disposed at least partially in the hollow end electrode, for aligning the distal end of the catheter with an externally applied magnetic field. The hollow end electrode can have openings for delivering irrigating fluid, and/or a sleeve can be provided around the tube to create an annular space for the delivering of irrigating fluid. A temperature sensor can be provided to control the operation of the catheter. A localization coil can also be provided to sense the position and orientation of the catheter.
Abstract:
Techniques for improving access time in data storage systems are disclosed. These techniques can be used to prevent undesirable access delays that are often experienced in conventional storage systems. “Slow-access” can be defined as an access operation that does not successfully complete within a predetermined amount of time. The “slow-access” time can, for example, be defined based on a system requirement, specification, or a particular need of a specific application. As such, when detected “slow-access” indicates a potential performance problem that can manifest in undesirable effects. A data storage system is evaluated for potential performance problems by scanning it for “slow-access.” In addition, preventative measures are taken to prevent occurrence of a “slow-access” once it has been identified. These measures can prevent the undesirable effects experienced in conventional storage systems. This also means that specific system or application requirements can be certified and met.
Abstract:
A system and method that allows developers to debug a component while it is restricted by any arbitrary set of specific permissions, or restricted by an existing permission set associated with a security “zone.” A security sandbox is mimicked within the development environment so that developers can study how applications perform inside the sandbox. Developers are able create any sandbox and debug inside it, where violating any bound of the artificial sandbox will throw a security exception and drop the user out on the exact line of code which generated the error, as well as provide helpful information about how to correct the error.