1460709541-ed7cf865-9ab8-4123-a2b8-a1aaa4da6bfc

1. A pelvic organ prolapse treatment device comprising:
an implantable support configured to treat a prolapsed area of a patient selected from the group consisting of urethrocele prolapse, cystocele prolapse, vault prolapse, uterine prolapse, enterocele prolapse, and rectocele prolapse, the implantable support comprising:
a body portion and an arm having a first end portion connected to the body portion;
a knot connecting a suture to a second end portion of the arm;
the second end portion of the arm being folded to include a first fold and a second fold that combine to reduce the lateral dimension of the second end portion of the arm; and
a tubular dilator disposed over and connected to the knot.
2. The device of claim 1, wherein the tubular dilator is permanently connected to the knot.
3. The device of claim 1, wherein the tubular dilator is permanently connected to the arm.
4. The device of claim 1, wherein the tubular dilator surrounds a circumference of the knot.
5. The device of claim 1, wherein the tubular dilator has an aspect ratio of greater than 7.
6. The device of claim 5, wherein the aspect ratio of the tubular dilator is provided in a range from 7-20.
7. The device of claim 6, wherein the aspect ratio of the tubular dilator is provided in a range from 10-15.
8. The device of claim 1, wherein the tubular dilator has a durometer of between 50-85 Shore D.
9. A pelvic organ prolapse treatment device comprising:
a body implantable support configured to treat a prolapsed area of a patient, the body implantable support comprising a body portion and an arm having a first end portion connected to the body portion, a knot connecting a suture to a second end portion of the arm, with the second end portion of the arm being folded to include a first fold and a second fold that combine to reduce the lateral dimension of the second end portion of the arm; and
a tubular dilator disposed over and connected to the knot,
wherein the tubular dilator has a distal end that is disposed over the knot and a proximal end opposite of the distal end, and the proximal end has a diameter that is smaller than a diameter of the distal end such that the tubular dilator is tapered to converge to the proximal end.
10. The device of claim 9, wherein the tubular dilator has a flexibility characterized in that the dilator bends through at least 180 degrees such that the proximal end is displaced to contact the distal end.
11. The device of claim 10, wherein the tubular dilator has a flexibility characterized in that the dilator bends through an arc associated with a circle having a radius of about 1 mm.
12. A pelvic organ prolapse treatment device comprising:
a body implantable support configured to treat a prolapsed area of a patient, the implantable support comprising a body portion and an arm having a first end portion connected to the body portion, a knot connecting a suture to a second end portion of the arm, with the second end portion of the arm being folded to include a first fold and a second fold that combine to reduce the lateral dimension of the second end portion of the arm; and
a tubular dilator disposed over and connected to the knot,
wherein the tubular dilator is fabricated from a solvent-swellable plastic that is shrinkable to provide attachment of the dilator over the knot and to the arm.
13. The device of claim 12, wherein the tubular dilator is permanently shrunk in place to the knot.
14. The device of claim 1, wherein the first end of the arm is connected to both the edge and a portion of the first lateral side of the body portion.
15. The device of claim 1, further comprising:
a tab connected to the body portion opposite of the edge of the body portion and separated from the arm.
16. The device of claim 1, wherein the knot is located at a juncture of the arm and the suture.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method for intercepting application communications for transmission via a virtual private network connection, the method comprising:
(a) receiving, by an agent of a client, an application routing table identifying one or more applications authorized for access via a virtual private network connection established with an device intermediary to the client and at least one server, each of the one or more applications identified via a name of an executable of the corresponding application;
(b) determining, by the agent, whether a first communication from the client is from a first application with a name of an executable identified by the received application routing table; and
(c) transmitting, by the agent based on the determination, the first communication via the virtual private network connection established with the device.
2. The method of claim 1, comprising transmitting, by the device, the application routing table to the agent.
3. The method of claim 1, comprising establishing, by the agent, the virtual private network connection with the device.
4. The method of claim 1, comprising determining, by the agent, that a second communication is from a second application not identified in the application routing table, and allowing the second communication to pass via the client’s network stack.
5. The method of claim 1, comprising determining, by the agent, that a second communication is from a second application not identified in the application routing table, and not intercepting the network communication.
6. The method of claim 1, comprising determining, by the agent, the name of the executable of the first application via a system level or kernel level call.
7. The method of claim 1, comprising determining, by the agent, the name of the executable of the first application via an application programming interface.
8. The method of claim 1, comprising comparing, by the agent, information from the first communication with information in the application routing table.
9. The method of claim 1, comprising one of granting or denying, by the device, a level of access to the first application based on identification of the first application.
10. The method of claim 1, comprising transmitting, by the agent, to the device an identification of the first application.
11. A system for intercepting application communications for transmission via a virtual private network connection, the system comprising:
an application routing table identifying one or more applications authorized for access via a virtual private network connection established with an device intermediary to a client and at least one server, each of the first one or more applications identified via a name of an executable of the corresponding application; and
an agent of a client, configured for receiving the application routing table, determining, based on the identification, whether a first communication from the client is from an application with a name of an executable identified by the received application routing table, and transmitting, based on the determination, the first communication via the virtual private network connection established with the device.
12. The system of claim 11, wherein the application routing table is transmitted by the device to the agent.
13. The system of claim 11, wherein the agent establishes the virtual private network connection with the device.
14. The system of claim 11, wherein the agent determines that a second communication is from a second application not identified in the application routing table, and allows the second communication to pass via the client’s network stack.
15. The system of claim 11, wherein the agent determines that a second communication is from a second application not identified in the application routing table, and does not intercept the network communication.
16. The system of claim 11, wherein the agent determines the name of the executable of the first application via a system level or kernel level call.
17. The system of claim 11, wherein the agent determines the name of the executable of the first application via an application programming interface.
18. The system of claim 11, wherein the agent compares information from the first communication with information in the application routing table.
19. The system of claim 11, wherein the device grants or denies a level of access to the first application based on identification of the first application.
20. The system of claim 11, wherein the agent transmits to the device an identification of the first application.