Patent application number | Description | Published |
20090022707 | Combinations of Antibodies Selective for a Tumor Necrosis Factor-Related Apoptosis-Inducing Ligand Receptor and Other Therapeutic Agents - An antibody of the invention interacts with human DR5 or with human DR4 to produce agonistic or antagonistic effects downstream of the receptor including inhibition of cell proliferation and apoptosis. Methods and uses for the antibodies, optionally in combination with various therapeutic agents, are detailed, including treatment of apoptosis-related disease and treatment of dysregulated cell growth. | 01-22-2009 |
20090208483 | ANTIBODY SELECTIVE FOR DR4 AND USES THEREOF - An antibody of the invention interacts with human DR5 or with human DR4 to produce agonistic or antagonistic effects downstream of the receptor including inhibition of cell proliferation and apoptosis. Nucleic acid sequences and amino acid sequences of DR5 and DR4 antibodies have been elucidated and vectors and cells containing and expressing these sequences have been generated. Methods and uses for the antibodies are detailed including treatment of apoptosis-related disease and treatment of dysregulated cell growth. | 08-20-2009 |
20100135951 | Agents and Methods Related to Reducing Resistance To Apoptosis-Inducing Death Receptor Agonists - Provided herein is a method of reversing or preventing a target cell's resistance to a death receptor agonist. Also provided are methods of screening for biomarkers resistance of and monitoring resistance to death receptor agonists. Also provided are methods of selectively inducing apoptosis in a target cell, treating a subject with cancer, autoimmune or inflammatory diseases, comprising administering compositions provided herein. Further provided are compositions comprising agents that modulate CARD containing proteins. | 06-03-2010 |
20100173338 | Biomarkers for Cancer Sensitivity and Uses Thereof - Disclosed herein are biomarkers and uses thereof for evaluating anti-cancer efficacy and sensitivity. | 07-08-2010 |
20110002887 | COMBINATIONS OF ANTIBODIES SELECTIVE FOR DR5 AND OTHER THERAPEUTIC AGENTS - An antibody of the invention interacts with human DR5 or with human DR4 to produce agonistic or antagonistic effects downstream of the receptor including inhibition of cell proliferation and apoptosis. Methods and uses for the antibodies, optionally in combination with various therapeutic agents, are detailed, including treatment of apoptosis-related disease and treatment of dysregulated cell growth. | 01-06-2011 |
20110008324 | Antibody Selective for a Tumor Necrosis Factor-Related Apoptosis-Inducing Ligand Receptor and Uses Thereof - An antibody of the invention interacts with human DR5 to produce agonistic or antagonistic effects downstream of the receptor including inhibition of cell proliferation and apoptosis. Nucleic acid sequences and amino acid sequences of anti-DR5 antibodies have been elucidated and vectors and cells containing and expressing these sequences have been generated. Methods and uses for the antibodies are detailed including treatment of apoptosis-related disease and treatment of dysregulated cell growth. | 01-13-2011 |
20110104143 | Treating Basal-Like Genotype Cancers - Provided herein are methods of treating a subject with cancer comprising administering to the subject a death receptor agonist. Also provided herein are methods of screening a breast cancer cell for responsiveness to a DR5 agonist. Further provided herein are antibodies that selectively bind an N-terminal CARD of DDX3, a DDX3 lacking an N-terminal CARD, and an 80 kDa baculovirus TAP repeat (BIR). | 05-05-2011 |
20120076792 | ANTIBODY SELECTIVE FOR A TUMOR NECROSIS FACTOR-RELATED APOPTOSIS-INDUCING LIGAND RECEPTOR AND USES THEREOF - An antibody of the invention interacts with human DR5 to produce agonistic or antagonistic effects downstream of o the receptor including inhibition of cell proliferation and apoptosis. Nucleic acid sequences and amino acid sequences of anti-DR5 antibodies have been elucidated and vectors and cells containing and expressing these sequences have been generated. Methods and uses for the antibodies are detailed including treatment of apoptosis-related disease and treatment of dysregulated cell growth. | 03-29-2012 |
20120122724 | Agents and Methods Related to Reducing Resistance to Apoptosis-Inducing Death Receptor Agonists - Provided herein is a method of reversing or preventing a target cell's resistance to a death receptor agonist. Also provided are methods of screening for biomarkers resistance of and monitoring resistance to death receptor agonists. Also provided are methods of selectively inducing apoptosis in a target cell, treating a subject with cancer, autoimmune or inflammatory diseases, comprising administering compositions provided herein. Further provided are compositions comprising agents that modulate CARD containing proteins. | 05-17-2012 |
20130004521 | TARGETING CANCER STEM CELLS - Provided is a method of determining the level of resistance or sensitivity of cancer stem cells to a death receptor agonist. The method includes detecting the level of IAP in one or more DR5/DDX3/IAP complexes in or from the cancer stem cells. Also provided is a method of killing cancer stem cells in a subject and a method of reducing the risk of cancer recurrence in a subject. | 01-03-2013 |
20130243780 | Antibody Selective for a Tumor Necrosis Factor-Related Apoptosis-Inducing Ligand Receptor and Uses Thereof - An antibody of the invention interacts with human DR5 to produce agonistic or antagonistic effects downstream of the receptor including inhibition of cell proliferation and apoptosis. Nucleic acid sequences and amino acid sequences of anti-DR5 antibodies have been elucidated and vectors and cells containing and expressing these sequences have been generated. Methods and uses for the antibodies are detailed including treatment of apoptosis-related disease and treatment of dysregulated cell growth. | 09-19-2013 |
20130324433 | Agents and Methods Related to Reducing Resistance to Apoptosis-Inducing Death Receptor Agonists - Provided herein is a method of reversing or preventing a target cell's resistance to a death receptor agonist. Also provided are methods of screening for biomarkers resistance of and monitoring resistance to death receptor agonists. Also provided are methods of selectively inducing apoptosis in a target cell, treating a subject with cancer, autoimmune or inflammatory diseases, comprising administering compositions provided herein. Further provided are compositions comprising agents that modulate CARD containing proteins. | 12-05-2013 |
20140308288 | ANTIBODY SELECTIVE FOR A TUMOR NECROSIS FACTOR-RELATED APOPTOSIS-INDUCING LIGAND RECEPTOR AND USES THEREOF - An antibody of the invention interacts with human DR5 to produce agonistic or antagonistic effects downstream of the receptor including inhibition of cell proliferation and apoptosis. Nucleic acid sequences and amino acid sequences of anti-DR5 antibodies have been elucidated and vectors and cells containing and expressing these sequences have been generated. Methods and uses for the antibodies are detailed including treatment of apoptosis-related disease and treatment of dysregulated cell growth. | 10-16-2014 |
20140314774 | HER3 ANTIBODIES AND USES THEREOF - Provided herein are antibodies specific for HER3. Also provided are methods of treating cancer in a subject comprising administering an effective amount of the antibodies described herein to the subject. | 10-23-2014 |
Patent application number | Description | Published |
20120066363 | SYSTEM AND METHOD FOR USING A GRIDLINK DATA SOURCE TO CONNECT AN APPLICATION SERVER WITH A CLUSTERED DATABASE - A system and method can support using a data source to connect an application server with a clustered database. The clustered database includes a plurality of database instances and is associated with a notification service. The notification service can be used by the clustered database to broadcast notifications that describe a state change in the plurality of database instances. The data source includes a connection pool, which manages a set of connections to the plurality of database instances in the clustered database. The data source operates to register with the notification service to receive notifications on the change of the clustered database, wherein the application server operates to configure and manage connection to the clustered database, adaptively according to the state change of the clustered database at run time. | 03-15-2012 |
20130054516 | SYSTEM AND METHOD FOR PROVIDING SESSION AFFINITY IN A CLUSTERED DATABASE ENVIRONMENT - A clustered database environment (e.g. Oracle Real Application Cluster (RAC)) includes multiple database instances that appear as one server. An application server (e.g. WebLogic Server (WLS)) can use a data source (e.g. an Oracle GridLink data source) and connection pools to connect with the clustered database. In accordance with an embodiment, a data source configuration allows for specification of a preferred affinity policy, such as a data affinity, temporal affinity, and/or session or session-based affinity policy. In accordance with an embodiment, the system includes a number of features that improve application connectivity in the clustered database environment, including a select-only case for application continuity, wherein an application-independent infrastructure, e.g. implemented within a Java Database Connectivity (JDBC) driver, enables recovery of work from an application perspective and masks system communications, hardware failures and hangs. | 02-28-2013 |
20130054600 | SYSTEM AND METHOD FOR IMPROVING APPLICATION CONNECTIVITY IN A CLUSTERED DATABASE ENVIRONMENT - A clustered database environment (e.g. Oracle Real Application Cluster (RAC)) includes multiple database instances that appear as one server. An application server (e.g. WebLogic Server (WLS)) can use a data source (e.g. an Oracle GridLink data source) and connection pools to connect with the clustered database. In accordance with an embodiment, a data source configuration allows for specification of a preferred affinity policy, such as a data affinity, temporal affinity, and/or session or session-based affinity policy. In accordance with an embodiment, the system includes a number of features that improve application connectivity in the clustered database environment, including a select-only case for application continuity, wherein an application-independent infrastructure, e.g. implemented within a Java Database Connectivity (JDBC) driver, enables recovery of work from an application perspective and masks system communications, hardware failures and hangs. | 02-28-2013 |
20130066837 | RECOVERING STATEFUL READ-ONLY DATABASE SESSIONS - A process, apparatus, and computer-readable medium are provided for rebuilding a database session when a previous database session becomes unavailable and the commands previously sent for execution on the previous database session satisfy certain criteria. The process includes determining whether or not a set of commands sent by a client for execution on the previous database session is acceptable to replay based at least in part on whether or not the set of commands satisfies one or more criteria. The process further includes determining that the previous database session is unavailable. In response to determining that the previous database session is unavailable, if the set of commands is acceptable for replay, the set of commands is sent for execution on a new database session to rebuild the state on the new database session. The process masks the outage from the application. | 03-14-2013 |
20130066955 | MASKING DATABASE OUTAGES FROM CLIENTS AND APPLICATIONS - Methods, devices, and computer-readable media are provided for restoring state that was built up on a first session between a first server instance and a client to a second session between a second server instance and the client. Non-transactional session state that existed for the first session is preserved by repeating non-transactional commands in the second session. Transactions are executed in the second session when the transactions did not complete in the first session. The first server instance sends, to the client in the first session, information to maintain for a possible replay of commands that were sent in a request to the first server instance for execution in the first session. If the first session becomes unavailable, the maintained information may be used by the second server instance to restore the database session, masking the outage from users, applications, and clients. | 03-14-2013 |
20130297566 | RECOVERING STATEFUL READ-ONLY DATABASE SESSIONS - A process, apparatus, and computer-readable medium are provided for rebuilding a database session when a previous database session becomes unavailable and the commands previously sent for execution on the previous database session satisfy certain criteria. The process includes determining whether or not a set of commands sent by a client for execution on the previous database session is acceptable to replay based at least in part on whether or not the set of commands satisfies one or more criteria. The process further includes determining that the previous database session is unavailable due to a planned or unplanned recoverable error. In response to determining that the previous database session is unavailable, if the set of commands is acceptable for replay, the set of commands is sent for execution on a new database session to rebuild the state, which was exposed to the client from the previous database session, on the new database session. The process masks the outage from the application. | 11-07-2013 |
20140236948 | SYSTEM AND METHOD FOR IMPROVING APPLICATION CONNECTIVITY IN A CLUSTERED DATABASE ENVIRONMENT - A clustered database environment includes multiple database instances that appear as one server. An application server can use a data source and connection pools to connect with the clustered database. A notification service broadcasts notifications describing state changes in the database instances, which are then used by the data source and connection pools to control access to the database instances. A data source configuration allows for specification of a preferred affinity policy. A session affinity policy is used to provide database instance affinity for database access made under the context of a web session, whereby database operations are directed to a particular instance for a period of time when the application may be performing multiple, related updates to a specific data set. Directing such operations to a single database instance can be used to improve application performance due to increased local cache utilization. | 08-21-2014 |
20140324910 | SYSTEM AND METHOD FOR CONNECTION LABELING FOR USE WITH CONNECTION POOLS - A system and method for connection labeling for use with connection pools. In accordance with an embodiment, the system comprises a connection pool, including a plurality of connection objects which provide connections that software applications can use to make requests to access the database, wherein each of the connections can be labeled according to the configuration of particular applications; and a connection pool logic that identifies connections labeled as high-cost connections, and avoids using those high-cost connections to serve requests when the total number of connections is below a particular threshold value. | 10-30-2014 |
20140324911 | SUPPORT FOR CLOUD-BASED MULTI-TENANT ENVIRONMENTS USING CONNECTION LABELING - A system and method for connection labeling for use with connection pools, including support for cloud-based multi-tenant environments using connection labeling. In accordance with an embodiment, the system comprises a connection pool, including a plurality of connection objects which provide connections that software applications can use to make requests to access the database, wherein each of the connections can be labeled according to the configuration of particular applications; and a connection pool logic that identifies connections labeled as high-cost connections, and controls the creation or repurposing of high-cost connections to serve requests from the multiple tenants or tenant applications. | 10-30-2014 |
20140379756 | SYSTEM AND METHOD FOR TRANSPARENT MULTI KEY-VALUE WEIGHTED ATTRIBUTED CONNECTION USING UNI-TAG CONNECTION POOLS - A system and method for transparent multi key-value weighted attributed connection using uni-tag connection pools. In accordance with an embodiment, a connection pool enables labeling of connections that software applications can use to access a database. A connection pool associated with a database enables tagging of connection pools at the database and allows applications to selectively obtain connections based on tags. A request is received from an application to query data from the database using a labeled connection or low-cost alternative. If a low-cost connection is found, but requires configuration, the system returns unmatched labels for use by the application in configuring its environment to use the connection. The system can also generate a tag for the connection. Upon subsequent release of the database session, the tag can be made available for subsequent use of the tag, or a tagged connection, by the same or by other applications. | 12-25-2014 |
20150026213 | SYSTEM AND METHOD FOR PROVIDING A SHAREABLE GLOBAL CACHE FOR USE WITH A DATABASE ENVIRONMENT - Described herein is a system and method for providing a shareable global cache for use with a database environment. In accordance with an embodiment, a shareable global cache is used for caching connections to database instances. When a request is received for a particular service, the system looks for an idle connection to that service, and, if none is available, locates an existing connection to a database instance serving that service and switches a service on the existing connection to that service. | 01-22-2015 |
20150026405 | SYSTEM AND METHOD FOR PROVIDING A SECOND LEVEL CONNECTION CACHE FOR USE WITH A DATABASE ENVIRONMENT - Described herein is a system and method for providing a level 2 connection cache for use with a database environment. In accordance with an embodiment, a second level, or level 2 (L2), connection cache is used to cache no-session connections for use with a database. When a connection is requested, a no-session connection (NSC) can be retrieved from the cache and a database session is attached. Later, when the connection is closed, the database session is logged off and the no-session connection returned to the cache for subsequent use. | 01-22-2015 |
20150326673 | TRANSACTIONAL AND NON-TRANSACTIONAL DATA FOR MAINTAINING SESSION STATE - Transactional and non-transactional data for maintaining session state is described. In a session, a server instance receives, from a client, a request to execute transactional commands and non-transactional commands. The server instance sends at least one first directive executable at the client to store, in a first set of information, one or more first items representing one or more particular transactional commands that are open but not yet committed. The first set of information is maintained separately from a second set of information including one or more second items representing one or more particular non-transactional commands that have been processed. Based on committing one or more particular transactional commands, the server instance sends at least one second directive executable at the client to purge, from the first set of information, the one or more first items without purging, from the second set of information, the one or more second items. | 11-12-2015 |
Patent application number | Description | Published |
20120126106 | Neutron Detection Using a Shielded Gamma Detector - A tool having a neutron source, a gamma ray detector, and a photomultiplier tube is provided. The gamma ray detector and the photomultiplier tube are at least partially surrounded by a layer of boron. The tool is used to make measurements, and the number of prompt gamma rays emitted by the boron is determined from the measurements. The number of neutrons detected may be inferred using the determined number of prompt gamma rays. The tool may also have a layer of neutron absorbing material different from boron or a layer of heavy metal at least partially surrounding the boron. The tool may be a logging tool used to delineate a porous formation and to determine its porosity. The tool may have a plurality of gamma ray detector/photomultiplier tube pairs and those pairs may be used to determine a formation hydrogen index and/or a borehole hydrogen index. | 05-24-2012 |
20130134304 | METHOD AND APPARATUS FOR GAIN REGULATION IN A GAMMA DETECTOR - Methods and systems to determine and regulate the gain of gamma-ray detectors in tools equipped with neutron sources are provided. Gain regulation may be based on the gamma ray background generated in the tool by interaction of neutrons with the nuclei of some elements constituting the tool structure. Some chemical elements that are used in construction of the tool's mechanical parts and structure result in characteristic gamma ray lines in a measured energy spectrum. These lines can be used to calibrate the energy scale of the response of the detector, without any added calibration radio isotopic source. | 05-30-2013 |
20130206972 | NEUTRON DETECTION BASED ON A BORON SHIELDED GAMMA DETECTOR - A method is provided to detect neutrons using a boron-shielded gamma-ray detector, which will detect the 0.48-MeV prompt gamma ray due to the | 08-15-2013 |
20140001350 | Gas Detection And Quantification Method Using A Pulsed Neutron Logging Tool | 01-02-2014 |
20140005945 | Method For Estimation Of Borehole And Formation Properties From Nuclear Logging Measurements | 01-02-2014 |
20140042311 | Neutron Porosity Based On One Or More Gamma Ray Detectors And A Pulsed Neutron Source - A method for pulsed neutron well logging of a subsurface formation, includes irradiating the formation with a plurality of bursts of neutrons of a group of selected durations; detecting gamma rays resulting from interaction of the neutrons during a group of selected time gates which contains at least some early and late gamma ray counts. The gamma rays are detected at at least two axially spaced apart locations from a position of the irradiating. A weighted sum of the numbers of gamma rays detected in each of the time gates is calculated. A ratio of the weighted sum of detected gamma rays at a first axial spacing to the weighted sum at a second axial spacing is determined. The ratio is used to determine a hydrogen index of the subsurface formation. | 02-13-2014 |
20140339410 | Borehole Fluid Effect Correction For Pulsed Neutron Porosity Measurements - A method for characterizing wellbore response of a pulsed neutron instrument includes inserting a pulsed neutron instrument into a plurality of simulated wellbores each filled with materials representing gas and liquid and measuring response of the pulsed neutron instrument in the simulated wellbores. | 11-20-2014 |
20140343856 | Borehole Fluid Effect Correction For Pulsed Neutron Porosity Measurements - A method for determining formation hydrogen index includes using as input to a computer measurements of numbers of burst gamma rays (gamma rays detected during operation of a pulsed neutron source) and numbers of thermal neutron capture gamma rays made at two different axial spacings from the pulsed neutron source. A ratio of the numbers of burst gamma rays and a ratio of the numbers of thermal neutron capture gamma rays is determined. A corrected ratio of the numbers of thermal neutron capture gamma rays using the ratio of numbers of burst gamma rays is determined. The formation hydrogen index is determined from the corrected ratio. | 11-20-2014 |
20150247948 | Compensated Sigma From Measurements Made By A Pulsed Neutron Instrument - A method for determining a formation thermal neutron decay rate from measurements of radiation resulting from at least one burst of high energy neutrons into formations surrounding a wellbore includes determining a first apparent neutron decay rate in a time window beginning at a first selected time after an end of the at least one burst, a second apparent decay rate from a time window beginning at a second selected time after the burst and a third apparent decay rate from a third selected time after the burst. The second time is later than the first time. A thermal neutron capture cross section of fluid in the wellbore is determined. A decay rate correction factor is determined based on the first and second apparent decay rates and a parameter indicative of the wellbore capture cross-section. The correction factor is applied to the third apparent decay rate to determine the formation thermal neutron decay rate. | 09-03-2015 |
20150268376 | METHOD FOR USING NEUTRON INTERACTION CROSS SECTION TO INTERPRET NEUTRON MEASUREMENTS - A method for determining a petrophysical property of a formation includes detecting radiation events resulting from imparting neutrons into the formation at an energy level of at least 1 MeV. The petrophysical property is determined from an elastic scattering cross section of the formation. The elastic scattering cross-section related to a number of detected radiation events. | 09-24-2015 |
20160003025 | Casing Inspection Using Pulsed Neutron Measurements - A method for evaluating wellbore conduit condition includes using measurements of at least one of (i) inelastic gamma rays made during emission a burst of neutrons into the conduit from within the conduit at at least one spaced apart location from a position of the emission and (ii) epithermal neutrons or capture gamma rays therefrom detected at at least two spaced apart locations from the position of the emission within a selected time after the emission. The at least one of the measurements of inelastic gamma rays and epithermal neutron or capture gamma ray counts are characterized to estimate an amount of loss of iron in the conduit. | 01-07-2016 |
20160003969 | Pulsed Neutron Well Logging Method For Determining Multiple Formation Parameters - A method for well logging includes emitting a plurality of bursts of high energy neutrons into a wellbore and formations surrounding the wellbore. During and for a selected duration after at least one of the plurality of bursts, gamma rays are detected at at least one location spaced apart from the emitting and characterizing an energy of the detected gamma rays. After the last burst, gamma rays are detected and energy spectrum and rates of detection with respect to time thereof are determined. The foregoing is repeated for a selected number of times. After the selected number of times background gamma rays are measured. At least one of the numbers of detected gamma rays during a selected time interval and an energy spectrum of the detected gamma rays during the selected time interval is used to determine selected formation properties. | 01-07-2016 |
20160077234 | Compensated Sigma Calculation Based On Pulsed Neutron Capture Tool Measurements - A method for determining thermal neutron decay constant for a formation includes counting radiation events corresponding to numbers of thermal neutrons with respect to time (decay spectrum) after irradiating the formation with neutrons. At least one moment of a first order of the decay spectrum or a single exponential curve to fit the decay spectrum is determined. A first apparent decay constant from the at least one moment or the single exponential curve. A second apparent decay constant is determined either by repeating the calculating a moment or exponential curve for different time segments of the decay spectrum or by using radiation events detected by at least a second radiation detector at a different spacing from a position of the irradiating than the at least a first radiation detector to determine a second apparent decay constant. A wellbore corrected thermal neutron decay constant is determined from the first and second apparent decay constants. | 03-17-2016 |
Patent application number | Description | Published |
20130177143 | Voice Transcription - Methods, systems, computer readable media, and apparatuses for voice data transcription are provided. Packets that include voice data may be received and for each time that a threshold amount of voice data is received, a segment of voice data may be created and transcribed to text. A message that includes the transcribed text may then be transmitted to an intended recipient of the voice data, to allow the intended recipient to view the message prior to transcription of the remaining segments of the voice data. Additionally, subsequent to transmission of the message, another message may be transmitted that includes text transcribed from a different segment of the voice data. | 07-11-2013 |
20130210391 | Method And System For Anonymous Operation Of A Mobile Node - A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous operation when roaming, the mobile node identifies itself with a coded identifier instead of a public identifier. The coded identifier used at a given time includes the time-based code that is valid for that given time. To authenticate the mobile node, a serving system receives authentication information from the mobile node and forwards the authentication information to a home system. The authentication information includes the current time-based code and a timestamp. The home system identifies the mobile node from the current time-based code and the timestamp. The home system then uses the authentication information to authenticate the mobile node. | 08-15-2013 |
20130210476 | Method Of Requesting A Communication Session Using Segmented Signaling Messages - An originating mobile station seeks to establish a push-to-talk (PTT) communication session with a destination mobile station. To do this, the originating mobile station transmits a first request message that requests the PTT session. Before receiving a predefined indication that the requested PTT session has been accepted, the originating mobile station transmits a first continuation message that includes first session description information to facilitate establishment of the PTT session. A PTT server receives the first request message and, before receiving the first continuation message, transmits to the destination mobile station a second request message that requests the PTT session. The PTT server then transmits a second continuation message that includes second session description information. The destination mobile station receives the second request message and, before receiving the second continuation message, transmits an acceptance message indicating acceptance of the requested PTT session. | 08-15-2013 |
20140233713 | Voice Transcription - Methods, systems, computer readable media, and apparatuses for voice data transcription are provided. Packets that include voice data may be received and for each time that a threshold amount of voice data is received, a segment of voice data may be created and transcribed to text. A message that includes the transcribed text may then be transmitted to an intended recipient of the voice data, to allow the intended recipient to view the message prior to transcription of the remaining segments of the voice data. Additionally, subsequent to transmission of the message, another message may be transmitted that includes text transcribed from a different segment of the voice data. | 08-21-2014 |
20160072951 | Voice Transcription - Methods, systems, computer readable media, and apparatuses for voice data transcription are provided. Packets that include voice data may be received and for each time that a threshold amount of voice data is received, a segment of voice data may be created and transcribed to text. A message that includes the transcribed text may then be transmitted to an intended recipient of the voice data, to allow the intended recipient to view the message prior to transcription of the remaining segments of the voice data. Additionally, subsequent to transmission of the message, another message may be transmitted that includes text transcribed from a different segment of the voice data. | 03-10-2016 |