Blaisdell, US
Beth A. Blaisdell, Roswell, GA US
Patent application number | Description | Published |
---|---|---|
20100057551 | POINT-OF-SALE PURCHASE SYSTEM AND METHOD WITH OPTION OF PAYMENT USING LOYALTY POINTS - One representative embodiment provides for the use of frequent flyer miles awarded to a customer by an airline as currency/alternative card type at the point-of-sale. For example, a customer dining at a restaurant can be given the option of paying with frequent flyer miles in addition to other traditional payment types. In such an implementation, the merchant swipes the frequent flyer card at the point-of-sale; the ‘conversion’ of the cost of the goods/services into frequent flyer miles is displayed for the customer; and the customer has the choice of completing the payment by frequent flyer miles or other traditional payment types. Settlement then occurs between merchant and a card processor and the card processor and the airline, respectively. | 03-04-2010 |
Charles T. Blaisdell, Odessa, DE US
Patent application number | Description | Published |
---|---|---|
20090176001 | SOY PROTEIN PRODUCTS HAVING ALTERED CHARACTERISTICS - Soy protein products obtained from high oleic soybeans, wherein such products, have improved whiteness, reduced viscosity and reduced gel-strength, are described. Use of such products in food, beverage and animal feed are also disclosed. | 07-09-2009 |
20110003066 | SOY PROTEIN PRODUCTS HAVING ALTERED CHARACTERISTICS - Soy protein products obtained from high oleic soybeans, wherein such products, have improved whiteness, reduced viscosity and reduced gel-strength, are described. Use of such products in food, beverage and animal feed are also disclosed. | 01-06-2011 |
Charles T. Blaisdell, Middletown, DE US
Patent application number | Description | Published |
---|---|---|
20130216686 | SOY PROTEIN PRODUCTS HAVING ALTERED CHARACTERISTICS - Soy protein products obtained from high oleic soybeans, wherein such products, have improved whiteness, reduced viscosity and reduced gel-strength, are described. Use of such products in food, beverage and animal feed are also disclosed. | 08-22-2013 |
James Blaisdell, Novato, CA US
Patent application number | Description | Published |
---|---|---|
20080235755 | Firewall propagation - Methods and systems for propagating data security policies and rules up a chain of network components, for example, from an end-user device having a firewall, to a network component at the “edge” of the network, such as a so-called “edge” firewall server, from where a policy statement can be transmitted to a service provider, such as an ISP, are described. A device, such as a computer or mobile phone, has, as part of its firewall software, a policy propagation file, that communicates with pre-existing firewall software. The firewall software creates a policy statement upon detecting a triggering event, which is transmitted from the device to the next data security component up the chain, “upstream,” in the network. In some cases this device may be a firewall server or a firewall policy server. The firewall server may combine policy statements from numerous end-user type devices and transmit the policy statement to an external network component, such as an ISP firewall server or similar device. The ISP or other service provider may then use the policy statement to implement date security rules for the devices in the network. In this manner, the firewall operated by the ISP implements rules and policies of a network owner or the owner of a stand-alone device, thereby preventing unwanted traffic from entering the network. | 09-25-2008 |
20080281953 | Managing network components using USB keys - Devices and methods for managing a communications network include using USB keys to provision and management components in the network by having the network component establish a connection to a network administrator device, such as a laptop, PDA, or desktop workstation. A first USB key is used to provision a network component so that it has the necessary security information to interact with a second USB key, used to enable actual management of the component. Once the component has the security information, the second USB key is inserted and certain callback data are made available to the component. It uses this data to make a “call” or connection to an administrator's device. The callback data may be an IP address of the device, an e-mail address, VoIP data, instant messaging data, dial-up data, and so on. Once the connection, initiated and established by the network component, is made the administrator can begin managing the component. | 11-13-2008 |
20090158282 | Hardware accelaration for large volumes of channels - A method apparatus and system for hardware acceleration for large volumes of channels is described. In an embodiment, the invention is a method. The method includes monitoring an inbound queue for hardware jobs. The method further includes detecting an interrupt from a hardware component. The method also includes transferring a job from the inbound queue to the hardware component. The method may further include transferring a completed job from the hardware component to an outbound queue. The method may also include providing an indication of completion of a job in an outbound queue. | 06-18-2009 |
20090222916 | EMBEDDED PATCH MANAGEMENT - A method, system and apparatus is provided for embedded patch management. In one embodiment, a method is provided. The method includes receiving a call to a code module. The method further includes checking a guardian stack for indications of authorization. The guardian stack is separate from an execution stack. The method also includes passing the call to an internal code module. Moreover, the method includes executing the code module. | 09-03-2009 |
20100088769 | PREVENTING EXECUTION OF TAMPERED APPLICATION CODE IN A COMPUTER SYSTEM - Methods and systems for preventing an application which has been maliciously or inadvertently tampered with from causing harm to a computer system are described. Application code of the tampered application is inputted into a code analyzer. The code is analyzed and functions within the application code are identified and examined. Multiple profiles are created and each identified function is assigned a profile. A profile may be a description of how a function is intended to operate, that is, the function's expected behavior. Multiple replacement functions are created using a first set of functions, where each function is called by the identified functions and a second set of functions where each function in the second set calls the identified function. Calls between functions are examined and a called function is replaced with a replacement function, such that a call to an original function results in a call to the replacement function. The original function is unaware that it is not getting function calls or that such calls are being directed to a replacement function or stub. A replacement function contains code to ensure that the user space maintains its original appearance. | 04-08-2010 |
20120066366 | AGENT-BASED BANDWITH MONITORING FOR PREDICTIVE NETWORK SELECTION - A mobile device, such as a smartphone or a laptop, connects to a network based on the available bandwidth (throughput) of the network rather than on signal strength. The device may send a request containing the device's location to a service provider who has data on networks in the device's location and specifically on bandwidth or pipe performance. This data is used to determine which network in the area would be best to connect to. The network may be a network that does not necessarily have the highest signal strength (often shown as bars on a handset device). The service provider can cause the device to transition to the network having the higher bandwidth. It can also direct the user so that blackout areas are avoided using the network data maintained by the provider. The provider uses testers to obtain current bandwidth data of networks. | 03-15-2012 |
20120137364 | REMOTE ATTESTATION OF A MOBILE DEVICE - Secure services and hardware on a mobile device are disabled if it is detected that software in the untrusted domain, such as the operating system, has been hacked or tampered with. Mobile devices often have rich, unprotected operating systems which are vulnerable to hacking, especially from execution of one or more apps. These apps are separated from secure services on the device, such as e-wallet services, NFC functionality, camera, enterprise access, and the like, and the present invention ensures that tampering with code in the untrusted domain or operating system does not affect these and other secure services. If tampering in the untrusted space is detected, the secure services and possible hardware on the device are shutdown or disabled. The extent of this disablement may depend on various factors, such as use of the device, type of device, context in which device is used (e.g., military, enterprise). | 05-31-2012 |
20120210443 | SECURING AND MANAGING APPS ON A DEVICE - Apps are secured or security-wrapped either before they are downloaded onto a device, such as a smartphone or tablet device, or after they are downloaded but before they are allowed to access the device operating system and cause any potential damage to the device. An app provider, such as an employer or a cellphone provider, can secure its apps before consumers download an app from their app store or marketplace. The app is secured before it is allowed to access the operating system of the device, thereby preventing the app from malicious behavior. Core object code of the app is obtained and the digital signature is removed. App object code is substituted with security program object code, thereby creating a security-wrapped app. The security-wrapped app is prepared for execution on the device and is re-signed with a new key. | 08-16-2012 |
20120246484 | SECURE EXECUTION OF UNSECURED APPS ON A DEVICE - Given the volume of apps being developed and downloaded, performing operations to enable security for mobile devices, such as locating relevant classes and substituting different classes, can become very inefficient when done to a very high number of apps. In the invention, a device is enabled with an app security enforcement layer. The consumer can download unsecured apps and have the app execute on the phone in a secure manner, where potential data loss to the device, such as a smart phone or tablet, is minimized. To make the security wrapping process more efficient, an app template containing markers is created. This template is merged with data in an active user policy or is used to randomize or obfuscate the code to add more security. The process of security wrapping an app becomes more efficient. | 09-27-2012 |
20120246731 | SECURE EXECUTION OF UNSECURED APPS ON A DEVICE - Devices are pre-deployed with an app security mechanism to ensure that apps that are downloaded onto the device do not cause data loss, data leakage, or other harm to the device. A user can start using the device and downloading apps in a conventional or typical manner and be assured that security measures are being taken to minimize potential harm for unsecured and secured apps. An app security enforcement layer or engine operates with, for example, a Type 2 hypervisor on the device, and ensures that any calls by the apps to the operating system of the device are generally safe. Measures such as enhancing or modifying the call, obfuscating the call, or terminating the app may be taken to protect the operating system. These actions are taken based on a policy that may be either interpreted or compiled by the enforcement engine with respect to app execution. The security measures are generally transparent to the user of the device. | 09-27-2012 |
20120304310 | SECURE EXECUTION OF UNSECURED APPS ON A DEVICE - An app is secured on a mobile device by being deconstructed or unbundled into multiple modules, where a module is a segment of app code that performs a particular function. It is then determined which modules from the multiple modules perform some type of security function, for example, a function dealing with confidential or security-related data. These modules, forming a group of modules, are loaded into a trusted execution environment. The app is then re-bundled so that it has the first plurality of modules and the second plurality of modules. The app executes in a manner where the high security functions execute so that break points cannot be inserted into the app code. The re-bundling is done automatically in an app security wrapping process. Security constraints are added to the app. | 11-29-2012 |
20130138969 | PREVENTING GLITCHING OF A FIRMWARE IMAGE USING ONE OR MORE LAYERS OF RANDOMNESS - Layers and elements of randomness are introduced to the firmware image comparison process to prevent hackers from glitching or tampering with the firmware image on a computing device. A hash function is applied to the firmware image thereby obtaining a first hash value. Random blocks of data are selected from the firmware image before it is hashed. Each or some of the random blocks of the firmware image are hashed thereby providing a hash value for the random blocks. The hash values are combined to derive a second hash value. The first hash value and the second hash value are combined to derive a final hash value. The final hash value is digitally signed and compared to a stored hash value. If the two match, a random non-zero value is stored in the relevant register. | 05-30-2013 |
20130247147 | CREATING A VIRTUAL PRIVATE NETWORK (VPN) FOR A SINGLE APP ON AN INTERNET-ENABLED DEVICE OR SYSTEM - An Internet-enabled device, such as a smartphone, tablet, PC, wearable sensor, or household appliance, executes an application (or “app”) has its own VPN connection with a VPN gateway device. The app does not use the device-level or system VPN to connect with the gateway. The app, which may be security wrapped, is made more secure by having its own VPN tunnel with the gateway, wherein the VPN tunnel is not used by other apps running on the device. The conventional (or device-level) VPN connection is not used by the app(s). The app has its own IP stack, an HTTP proxy layer, an IPsec module, and a virtual data link layer which it uses to build IP packets, encapsulate them, and transmit them to a transport module in the device operating system, for example, a UDP module. | 09-19-2013 |
20130291086 | ENSURING NETWORK CONNECTION SECURITY BETWEEN A WRAPPED APP AND A REMOTE SERVER - A network connection between an app on a mobile device and a remote server is either enabled or denied based on whether a security wrapped app can verify that the connection is with a known and trusted server. The wrapped app uses a socket interception layer injected into the app code along with a trust store, also part of the wrapped app to determine whether a network connection attempted by the app should be allowed. The layer buffers relevant function calls from the app by intercepting them before they reach the device operating system. If the layer determines that a network connection is attempted, then it snoops the negotiation phase data stream to discern when the server sends a certificate to the app. It obtains this certificate and compares it to data in the trust store and makes a determination of whether the server is known and trusted. | 10-31-2013 |
20130343543 | USER EXPERIENCE AND METHOD FOR PROMOTING A LOW-ASSURANCE CALL TO A HIGH-ASSURANCE CALL ON A CALLING DEVICE - A low-assurance call on a mobile device to another device may be promoted to a high-assurance call using a user interface. The participants during the call do not need to hang up and start a new high-assurance call. A caller can swipe an icon up a slider, for example, and start a process of promoting the call. The initial low assurance call using SIP servers is terminated but this is transparent to the callers. Once the swipe is performed, a DTLS negotiation is performed between the devices. During this DTLS handshake, which is done directly between the device without involvement of the SIP servers, a key is exchanged. Only the calling devices are aware of this key which is used to encrypt media during the call. Screens on the calling devices show that the call is now high-assurance and security details of the call may also be displayed. | 12-26-2013 |
Jared Blaisdell, Bloomington, MN US
Patent application number | Description | Published |
---|---|---|
20080245039 | Exhaust Filter - An exhaust filter having a pleated filter media mounted between end caps is disclosed herein. The filter has a construction suitable for high temperature environments such as engine exhaust systems. | 10-09-2008 |
Jared D. Blaisdell, Bloomington, MN US
Patent application number | Description | Published |
---|---|---|
20090031717 | EXHAUST FLOW DISTRIBUTION DEVICE - The disclosure is directed to a flow distributor for use to maximize the efficiency and working life of a catalytic converter. The flow distributor is configured such that it directs the gas flow in the center of the exhaust gas stream to the periphery of the gas stream thereby resulting in a more uniform velocity flow pattern. | 02-05-2009 |
20120315195 | Exhaust Flow Distribution Device - The present disclosure relates to an diesel exhaust treatment device including a main body having a central longitudinal axis that extends between first and second ends of the main body. A catalyzed substrate is positioned within an interior of the main body. A side inlet is positioned at a side of the main body for directing exhaust gas into the interior of the main body. A flow distribution element is positioned within the interior of the main body at a location between the side inlet and an upstream face of the substrate. The flow distribution element extends across a direction of exhaust flow through the main body and is mounted at a side of the main body that is opposite the side inlet. | 12-13-2012 |
Jared Dean Blaisdell, Blaine, MN US
Patent application number | Description | Published |
---|---|---|
20090000287 | Exhaust Gas Flow Device - A flow device for an exhaust treatment system includes a base and at least one flow deflector tube secured to the base. The flow deflector tube includes a flow inlet, a flow outlet, and a passage that extends through the flow deflector tube from the flow inlet to the flow outlet. The flow outlet is at an angled orientation to the flow inlet. A method of mixing reactants and exhaust in an exhaust treatment system includes the steps of injecting reactants into exhaust gases flowing through an exhaust conduit used to convey the exhaust gases from an engine. Bent tubes are disposed in the exhaust conduit and used to mix the exhaust gases and the reactants. | 01-01-2009 |
20090104091 | Exhaust Treatment Apparatus And Method Of Making - The present disclosure relates to an exhaust aftertreatment device ( | 04-23-2009 |
20150211404 | EXHAUST GAS FLOW DEVICE - A flow device for an exhaust treatment system includes a base and at least one flow deflector tube secured to the base. The flow deflector tube includes a flow inlet, a flow outlet, and a passage that extends through the flow deflector tube from the flow inlet to the flow outlet. The flow outlet is at an angled orientation to the flow inlet. A method of mixing reactants and exhaust in an exhaust treatment system includes the steps of injecting reactants into exhaust gases flowing through an exhaust conduit used to convey the exhaust gases from an engine. Bent tubes are disposed in the exhaust conduit and used to mix the exhaust gases and the reactants. | 07-30-2015 |
Jeff Blaisdell, Stafford, TX US
Patent application number | Description | Published |
---|---|---|
20150240077 | AQUEOUS POLYURETHANE DISPERSION DERIVED FROM TERTIARY ALKENYL GLYCIDYL ESTERS - This invention relates to a Waterborne Polyurethane Dispersions (WPU) derived from the reaction products of tertiary alkyl glycidyl esters based hydroxyl terminal polyester polyols with polyisocyanates and chain extended with poly-functional amines and dispersed in water have shown the surprising inherent ability for self-coalescence. Furthermore the cured films have shown improved hardness and abrasion resistance over these benchmarks with a significant reduction in coalescing solvent needed to accomplish film formation. | 08-27-2015 |
Jeffrey O. Blaisdell, Colchester, VT US
Patent application number | Description | Published |
---|---|---|
20100047791 | MOLECULAR ACCESSIBILITY ASSAY - Methods and compositions are provided for determining polypeptide-nucleic acid interactions. | 02-25-2010 |
John A. Blaisdell, Suffield, CT US
Patent application number | Description | Published |
---|---|---|
20130266107 | METHODS FOR PROTECTION OF NUCLEAR REACTORS FROM THERMAL HYDRAULIC/NEUTRONIC CORE INSTABILITY - The invention relates to methods for protecting a nuclear reactor core, such as a boiling water reactor core, from fuel and cladding damage due to thermal hydraulic instability in extended operating power flow conditions and, in particular, when an extended power uprate is implemented. The methods employ existing licensed stability methodologies and incorporated minor changes, e.g., to the Average Power Range Monitor (APRM)-based trip system to preclude operation inside the stability vulnerable region of the power/flow map. The APRM-based trip system is modified to set down the APRM flow-biased scram line when core flow is less than a predetermined core flow to prevent the core from entering an unstable region of operation. | 10-10-2013 |
Kenneth C. Blaisdell, Gilbert, AZ US
Patent application number | Description | Published |
---|---|---|
20140024178 | MAGNETICALLY SEALED WAFER PLATING JIG SYSTEM AND METHOD - A wafer plating jig system comprising an electrically insulating wafer plating jig base having a plurality of overlapping cavities of different depths, each cavity configured to receive a semiconductor wafer of a different size and an electrically conductive cover plate comprising an open center surrounded by a support, the cover plate comprising an electrical conductor surrounding the open center and with at least one of the overlapping cavities of the wafer plating jig base. | 01-23-2014 |
Mark H. Blaisdell, Bountiful, UT US
Patent application number | Description | Published |
---|---|---|
20130177872 | CUSTOMIZABLE SCULPTABLE ANATOMICAL HEALING CAPS, SYSTEMS, AND RELATED METHODS - Customizable sculptable healing caps include a hollow elongate body extending between a proximal end and a distal end, as well as an enlarged cuff body extending laterally outward from the hollow elongate body. The cuff body includes a subgingival portion that is anatomically sized and shaped for providing substantially custom filling of the emergence portion of a void resulting from removal of a selected tooth. An exposed portion of the cuff body that resides gingivally above the subgingival portion may also be provided. At least the subgingival portion comprises a sculptable material (e.g., plastic or composite material) so that a practitioner can easily remove select portions with a burr, build up portions with application of a adhering dental material, or both to allow chair-side full customization so that the resulting subgingival portion fills the emergence portion of the void, better preserving the gingival features surrounding the site of tooth removal. | 07-11-2013 |
20140124969 | CASTING JIG FOR CHAIR-SIDE MANUFACTURE OF CUSTOMIZABLE SCULPTABLE ANATOMICAL HEALING CAPS - Casting jigs, methods, and kits that may be used in manufacture of anatomical healing caps. A casting jig may include a body having one or more wells within the body, each well being open at a proximal end thereof and having a negative shape corresponding to an anatomical healing cuff body of a given tooth position. Each respective anatomical healing cuff body negative shape includes an asymmetrical cross-section and an irregular surface so that an anatomical healing cuff body having said shape is configured to provide substantially custom filling of at least an emergence portion of a void where a natural tooth once emerged or should have emerged from the void (e.g., in the case of a congenitally missing tooth). The casting jig may further include a socket at a distal end of each well that is configured to receive therein a dental implant or dental implant analog. | 05-08-2014 |
20140319713 | CASTING JIG INCLUDING ELONGATE HANDLE FOR CHAIR-SIDE MANUFACTURE OF CUSTOMIZABLE SCULPTABLE ANATOMICAL HEALING CAPS, AND METHOD FOR FORMING BIS-ACRYLIC CROWN - Casting jigs, methods, and kits that may be used in manufacture of anatomical healing caps. A casting jig may include a body having one or more wells within the body, each well being open at a proximal end thereof and having a negative shape corresponding to an anatomical healing cuff body of a given tooth position. The casting jig includes an opening through the bottom surface through which an elongate handle may be inserted, allowing a temporary abutment to be coupled into the distal end of the elongate handle, so that the abutment is disposed in the well, held in place by the handle, as it is used as a core about which the anatomical healing cuff body is formed. A crown forming jig for forming an inexpensive, chair-side prepared bis-acrylic temporary crown that may be easily and quickly installed over the anatomical healing cuff body is also disclosed. | 10-30-2014 |
Michael Wayne Blaisdell, Simpsonville, SC US
Patent application number | Description | Published |
---|---|---|
20110265488 | ALTERNATE METHOD FOR DILUENT INJECTION FOR GAS TURBINE NOx EMISSIONS CONTROL - A method and system for gas turbine emissions management through delivery of a diluent fluid stream (steam, CO2, N2 etc) into a gas turbine combustion system while the gas turbine is operating on a conventional fuel such as light distillate oil or natural gas. The diluent injection system delivers required diluent-to-fuel ratios over the emissions compliance operating range of the gas turbine. The method for diluent injection is coupling the injection system to a gas turbine compressor discharge purge system, such that the diluent fluid is mixed with compressor discharge air. The mixed compressor discharge purge air and diluent stream are injected into the gas turbine combustor through a non-fueled combustion fuel nozzle passage to achieve emissions guarantee compliance. | 11-03-2011 |
Rick Blaisdell, Stratham, NH US
Patent application number | Description | Published |
---|---|---|
20100017294 | EMAIL ADVERTISEMENT SYSTEM AND METHOD - An outgoing email server inserts electronic advertisements in outgoing email messages. The server creates enhanced email messages in which the original plain email message text is framed with one or more electronic advertisements, as well as banners or footers related to the company or organization where the email author is employed. The system allows the assignment of one or more keywords to each electronic advertisement to facilitate the placing of electronic advertisements on a contextual basis. The preferred system searches the text of the outgoing email message for the one or more keywords assigned to the electronic advertisement. In another aspect, the system uses a database including email addresses for prospective recipients and assigns targeting words to those email addresses. If these targeting words match the keywords assigned to the advertisement, the advertisement will be placed. The system also allows electronic advertisements to be placed on a static or rotating basis. In addition, the system provides means for selecting and designing electronic advertisement campaigns using the above techniques. | 01-21-2010 |
20140082117 | CLIENT DEVICE LOCKDOWN AND CONTROL SYSTEM - A method of controlling a plurality of slave devices includes receiving, at a master device, a connection request from each slave device in the plurality of slave devices, where the connection request is sent from a wrapper application executing on each slave device, and authenticating the connection request from each slave device. The method further includes sending, from the master device, an authorization acknowledgement to the wrapper applications of an authorized set of slave devices in the plurality of slave devices. The method further includes sending a first command from the master device to the authorized set of slave devices, where the first command allows the execution of a first application on each slave device in the authorized set of slave devices, and monitoring the execution of the first application on each slave device. | 03-20-2014 |
Russell C. Blaisdell, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20090106777 | TYPICALITY FILTERING OF EVENT INDICATORS FOR INFORMATION TECHNOLOGY RESOURCES - A monitor for information technology resources improved by introducing typicality filters to analyze potential event indicators such as alerts. A typicality filter keeps a time-dependent history of the frequency of occurrence of an associated event, wherein time is segmented into monitoring periods. At the end of each monitoring period, a present count of occurrences of the event is determined, and compared with the numbers of occurrences of that event in a subset of monitoring periods read from the history. If the present count exceeds the number of occurrences of the event in a predetermined proportion of the subset of historical monitoring periods, a first action is invoked; otherwise, a second action is invoked. | 04-23-2009 |
Russell C. Blaisdell, Knoxville, TN US
Patent application number | Description | Published |
---|---|---|
20140143211 | Managing and Reconciling Information Technology Assets in a Configuration Database - A method and system for managing and reconciling naming conflicts in a configuration database. Attributes are collected about a detected resource in a network. Valid names for the detected resource are created based on the collected attributes and a set of naming rules. A valid name is created for each naming rule, and the naming rules have a priority order. A master-alias table is search to locate a match between existing names of known resources recorded in the master-alias table and any of the valid names. A partial match of resource attributes is determined to exist when all of the valid names in the set of valid names do not match an existing name in a matching entry. The detected resource is determined to be a new resource or an existing resource based on a priority of the naming rules used to create the valid names. | 05-22-2014 |
Russell C. Blaisdell, Cedar Park, TX US
Patent application number | Description | Published |
---|---|---|
20090094488 | System and Method for Monitoring Application Availability - A system and method for monitoring the availability of an application in a distributed data processing environment are provided. The performance aspects of application availability are defined in terms of easily observed and computed characteristics of the application as it behaves in a deployed environment with the deployed configuration. The system and method observe the application processes, the structural resources they require, and the consumable resources they require from the running system itself. These observations are then used to derive minimum requirements for the resource requirement aspects of availability as well as derive criteria for normal behavioral conditions. These minimum requirements and normal behavioral conditions are then used to establish monitoring rules or conditions for monitoring the operation of the application to determine if availability of the application is degrading such that a notification needs to be sent to an administrator. | 04-09-2009 |
20120096163 | Method and System for Managing and Reconciling Information Technology Assets in a Configuration Database - A method and system for managing and reconciling naming conflicts in a configuration database. Attributes are collected about a detected resource in a network. Valid names for the detected resource are created based on the collected attributes and a set of naming rules. A valid name is created for each naming rule, and the naming rules have a priority order. A master-alias table is search to locate a match between existing names of known resources recorded in the master-alias table and any of the valid names. A partial match of resource attributes is determined to exist when all of the valid names in the set of valid names do not match an existing name in a matching entry. The detected resource is determined to be a new resource or an existing resource based on a priority of the naming rules used to create the valid names. | 04-19-2012 |
Steven J. Blaisdell, Jackson, NJ US
Patent application number | Description | Published |
---|---|---|
20110250163 | MONO- AND DI-PEG IL-10 PRODUCTION; AND USES - Provided are methods of producing a mixture of mono- and di-pegylated IL-IO. | 10-13-2011 |
20120282654 | ANTIBODY PURIFICATION - The present invention provides, in part, a multi-step process for purifying antibodies including chromatographic purification and filter purification. | 11-08-2012 |
20150086505 | Mono- and Di-Peg IL-10 Production; and Uses - Provided are methods of producing mono- and di-pegylated IL-10. | 03-26-2015 |
Timothy G. Blaisdell, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20110206192 | MESSAGING SYSTEM CONFIGURATOR - Apparatus, methods, and machine-readable articles of manufacture facilitate configuration of a networked messaging system. In some embodiments, nodes of the system are automatically interrogated to obtain current configuration information of each of the nodes, and a configuration file with the nodes' current configuration information is generated and stored in a format that is readily editable. Exemplary formats include spreadsheet, comma separated variables, and other text formats. An administrator is allowed to access and edit the configuration file, resulting in an updated configuration file with updated configuration information. Editing may include adding and removing servers, creating and removing digital networking mailboxes or links on the nodes, and other configuration changes. After the file is edited and the administrator or another authorized person issues a command to configure the system, messages are automatically sent to the nodes to configure the system in accordance with the updated configuration information. | 08-25-2011 |