HEALTH MONITORS

Brand Owner (click to sort) Address Description
METAPHOR TREYMED, INC. N56 W24790 N. Corporate Circle Sussex WI 53089 Health monitors, featuring a sensor, that measure physiologic performance and components therefore, namely, respiratory air flow sensors, breathing tube, breathing mask, breath air sampler, air sample processing devices, and respiratory gas sampling and analysis devices; health monitors comprised of a sensor that measure metabolic performance; health monitors comprised of a sensor that measures respiration performance; apparatus for respiration performance analysis; respiratory air flow sensors;
METAPHOR CardioPulmonary Technologies, Inc. Unit C N56 W24790 North Corporate Circle Sussex WI 53089 Health monitors, featuring a sensor, that measure physiologic performance and components therefore, namely, respiratory air flow sensors, breathing tube, breathing mask, breath air sampler, air sample processing devices, and respiratory gas sampling and analysis devices; health monitors comprised of a sensor that measure metabolic performance; health monitors comprised of a sensor that measures respiration performance; apparatus for respiration performance analysis; respiratory air flow sensors;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A Node Manager monitors the status of multiple servers. The Node Manager detects server failures, periodically monitors server health status, and performs server maintenance. When the Node Manager detects a server failure, it determines whether or not the server should be restarted. While periodically monitoring servers, the Node Manager may determine how often to trigger a health check, how long to wait for a response, and how to proceed if the server is deemed failed. The Node Manager may be controlled by an Administrative Server directly or by an external administrative agent. An administrative agent may control the Node Manager by interfacing with the Administrative Server. The Node Manager and AS may authenticate each other and encode their communications to each other for increased security.