Abstract:
Systems and methods are provided for displaying an image of a tracked tool on a user interface, wherein at least a portion of the tool is hidden from view in any image on a user interface at any point during a procedure. The tool may include a cutting tool having jaws for clamping a material and a knife for cutting the clamped material, and superimposing an indicator of a knife position on the display during and/or after cutting. The knife position may include a location and/or orientation of the knife, including any or all of a pre-cut, cut-complete, cut-incomplete and an exposed position. The disclosed systems and methods allows a user to view the knife position in applications where the knife may not be visible to a user, which is particularly useful for clamping and cutting a body tissue with a robotic surgical system in minimally invasive procedures.
Abstract:
An armor plated assembly (20) and a protective wall system (120) containing a protective material. The armor plated assembly (20) comprises of a container (22) having opposing walls (26) for encompassing the protective material. The assembly (20) includes an armor device (24) having a first plate (48) and a second plate (50) with one of the opposing walls (26) sandwiched between the first plate (48) and the second plate (50) securing the armor device (24) to the container (22). The armor device (24) impedes the penetration of a projectile through the armor plated assembly (20). The protective wall system (120) includes at least two of the armor plated assemblies (20) with a mechanical connection (140) between the armor devices (126, 134) of the armor plated assemblies (20) for aligning and securing the assemblies (20) in a stacked orientation. A second embodiment of the protective wall system (220) includes at least two containers (222, 234) and a bib (232, 236) adhered to each of the containers (222, 234) such that the bibs (232, 236) overlap in a shingle-like engagement between the stacked containers (222, 234).
Abstract:
Media content to be place shifted is received at the local user device along with a place shift enabled parameter that contains data associated with the received media content and that indicates whether the received media content is authorized to be place shifted. A user command to place shift the received media content to the remote user device is also received. It is then determined, by analyzing the place shift enabled parameter, whether the received media content is authorized to be place shifted and based on this determination the place shifting of the received content to a remote device is allowed or impaired.
Abstract:
An active implantable medical device (AIMD) comprising an implantable electronics module and a tissue interface. At least one of the electronics module and the tissue interface comprises an electrically non-conductive, biocompatible and needle-piercable base having one or more biocompatible electrically conductive strands of conductive filaments stitched to the base. As used herein, stitching a conductive filament to a base refers to sewing, embroidering or otherwise securing the filament to the base through the use of hand or machine needlework.
Abstract:
An active implantable medical device (AIMD). The AIMD comprises: a knitted electrode assembly comprising: at least one biocompatible, electrically non-conductive filament arranged in substantially parallel rows each stitched to an adjacent row, and at least one biocompatible, electrically conductive filament having a first end intertwined with a first row of the at least one non-conductive filament, and a second end intertwined with a second row of the at least one non-conductive filament, wherein the first and second rows are spaced from one another.
Abstract:
Disclosed is an apparatus for handling a sheet of substrate media in a marking assembly. The apparatus includes a rail support track, a first marking zone and a first platen cart. The rail support track forms a closed path. The first marking zone marks a sheet of substrate media. Also, the first platen cart moves along the rail support track. The first platen cart recirculating around the closed path. The first platen cart conveying the sheet of substrate media in a process direction along at least a portion of the closed path through the first marking zone.
Abstract:
A control console to remotely control medical equipment is disclosed having a base with an ergonomically adjustable pedal system. The base further has an opening to receive the pedal system. The pedal system includes a moveable pedal tray with a pedal base. The tray includes a first left pedal assembly and a first right pedal assembly, and an upper tier having a second left pedal assembly and a second right pedal assembly respectively in alignment with and elevated above the first left pedal assembly and the first right pedal assembly. Rollers are rotatable coupled to the moveable pedal tray to allow it roll over a floor. A drive assembly is coupled between the moveable pedal tray and the base. The drive assembly applies a force to the to roll the moveable pedal tray over the floor within the opening of the base.
Abstract:
Disclosed is an apparatus for handling a sheet of substrate media in a marking assembly. The apparatus includes a rail support track, a first marking zone and a first platen cart. The rail support track forms a closed path. The first marking zone marks a sheet of substrate media. Also, the first platen cart moves along the rail support track. The first platen cart recirculating around the closed path. The first platen cart conveying the sheet of substrate media in a process direction along at least a portion of the closed path through the first marking zone.
Abstract:
A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices.