Sitler
Daniel J. Sitler, Naperville, IL US
Patent application number | Description | Published |
---|---|---|
20110104239 | PROBIOTIC CHEWING GUM METHOD OF MANUFACTURE - An extruded, centerfilled or coated confectionary material is provided which contains a probiotic which is capable of having a shelf life greater than about six months. A chewing gum production method is also provided which produces stick, centerfilled and coated chewing gum with probiotics without substantial loss of probiotics due to excess water, heat or pressure. Probiotics may be included in the chewing gum mass of the stick or coated chewing gum, in the liquid or powder center of a centerfilled gum, in the coating of the coated chewing gum, or as an additional layer upon the stick. The probiotics delivered to the oral cavity provide an oral health benefit to the consumer through suppression of pathogenic bacteria. | 05-05-2011 |
Daniel J. Sitler, Woodridge, IL US
Patent application number | Description | Published |
---|---|---|
20090304856 | COATED CHEWING GUM PRODUCTS - A coated chewing gum product includes a core and a coated portion surrounding the core. The core includes gum base, a liquid flavor portion, and particles including a compounded flavor. The liquid flavor portion includes a mint flavor and a fruit flavor. The coating portion surrounding the core includes a coating flavor. | 12-10-2009 |
Edward T. Sitler, Maryville, TN US
Patent application number | Description | Published |
---|---|---|
20100207816 | WIRELESS UTILITY ASSET MAPPING DEVICE METHOD - A wireless utility asset mapping device method comprises locating a utility asset, and placing a wireless utility asset mapping device over the location of the utility asset. The wireless utility asset mapping devices comprises a pole. A positioning receiver is connected to the pole. A wireless modem is connected to the pole and to the positioning receiver. At least one weatherproof housing is connected to the pole and encloses the positioning receiver and the wireless modem. A coordinate of the wireless utility asset mapping device is determined. The coordinated is wirelessly transmitted to a remote asset tracking computer. | 08-19-2010 |
Michael Sitler, Edmonds, WA US
Patent application number | Description | Published |
---|---|---|
20130067023 | SCALABLE, SELECTIVE TRAFFIC PROXYING - Proxy networks enable a source to send traffic to one or more targets through a set of nodes operating as proxies. However, proxy networks are typically nonselective (often by design), and do not enable a source to specify properties of the nodes selected as proxies to send traffic to the target. Presented herein are proxy network techniques that enable sources to specify node properties in a target request, and that utilize a set of node managers for respective subsets of nodes. For a target request specifying selected node properties, the node managers may select as proxies nodes having the node properties specified in the target request. Additionally, the techniques presented herein promote the flexibility of the proxy network (e.g., adding groups of nodes, expanding the variety of nodes and node properties, and sending various forms of traffic using any protocol to various topics on behalf of many and various sources). | 03-14-2013 |
20140068761 | ABUSE IDENTIFICATION OF FRONT-END BASED SERVICES - Systems and techniques of monitoring, detecting and handling abusive client behavior among data communication to and from a server system is presented. In one embodiment, a method for detecting and handling abusive client comprises: monitoring communications traffic between said server and said client; testing said traffic for abusive activity substantially in real-time; and if abusive activity has been detected, taking action against said abusive activity within a desired time period. In another embodiment, a server system comprises: a capture module that captures data between said server and a client; a package module that packages the said captured data; an analyze data module that detects abusive activity within said captured data; and a recommendations and/or actions module to perform actions in response to said abusive activity. | 03-06-2014 |