Murray, NC
Brian Murray, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20140204277 | System and Method to Toggle Between Two or More Television Channels - Systems and methods for toggling between television channels that appear on a display. A listing of channels is received from a user, with the channels being prioritized in an order of preference. One or more toggle types are also received from the user, with each toggle type further including a toggle trigger. In use, a channel is displayed on the display until a toggle trigger is detected. Once detected, the channel on the display is changed to another channel from the list of channels. This process may continue with the detection of another toggle trigger causing another changing of the displayed channel. | 07-24-2014 |
Brian J. Murray, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20140082092 | METHOD OF RESOLVING A CONTACT WHILE COMPOSING TEXT AND/OR EMAIL MESSAGE - Some embodiments of the inventive subject matter may include a method for sharing one or more data fields from within a contact in a contact list on an electronic computing device. The method can include receiving first user input requesting retrieval of the contact in the contact list. The method can include retrieving the contact in response to the user input. The method can include determining that the contact contains data fields, wherein the data fields include contact information for the contact. The method can include presenting one or more graphical user interface (GUI) controls for selecting at least one of the data fields within the contact. The method can include receiving, via the one or more GUI controls, second user input indicating selection of one or more of the data fields. The method can include sharing the one or more data fields associated with the contact. | 03-20-2014 |
20140215632 | PREVENTING THE DETECTION AND THEFT OF USER ENTRY ALPHANUMERIC SECURITY CODES ON COMPUTER TOUCH SCREEN KEYPADS - Preventing, discernible patterns of surface marks resulting from the repetitive entry of security codes to computer device touch screen alphanumeric keypads. There is predetermined the number of security code entries after which the positions of the representative keys in the keypad array should be reconfigured. This predetermined number should be the number of security code entries estimated to produce a pattern of distinguishable display surface marks coincident with a users repetitive entry alphanumeric character security code. The number of security code entries is counted. When the count of the predetermined number of security code entries has been reached, the representative keys in the displayed keypad array are reconfigured. This implementation is equally effective against thieves who are visually stealing the security codes over the user's shoulder. | 07-31-2014 |
20150030148 | Key Code for a Conference Operation - Methods, products, apparatuses, and systems may facilitate a conference operation. The conference operation may include conference chaining, conference switching, conference modification, conference announcement, and so on. A collection of authentication data for a plurality of distinct conferences may be performed to chain the conferences. Switching among the distinct conference may be performed in response to a switch key code. The switch key code may include a general key code applicable to each of the conferences and/or a specific key code application to a specific conference. | 01-29-2015 |
Cale E. Murray, Browns Summit, NC US
Patent application number | Description | Published |
---|---|---|
20130058875 | CAPSULE HAVING BROAD COLOR SPECTRUM - The present invention is directed to a capsule comprising a water-soluble compound suitable for the capsule, a non-water soluble excipient suitable for the capsule; and suitable for the capsule, and a mixture of colorant agents, wherein the color of the capsule may be in the range of 1503-07-2013 | |
20130058989 | CAPSULE HAVING BROAD COLOR SPECTRUM - The present invention is directed to a capsule comprising a water-soluble compound suitable for the capsule, and a mixture of colorant agents, wherein the color of the capsule may be in the range of 1503-07-2013 | |
Clare Louise Murray, Chapel Hill, NC US
Patent application number | Description | Published |
---|---|---|
20090069371 | ISOQUINOLINE COMPOUNDS - Isoquinoline compounds with G are provided that influence, inhibit or reduce the action of a G-protein receptor kinase. Pharmaceutical compositions including therapeutically effective amounts of the isoquinoline compounds and pharmaceutically acceptable carriers are also provided. Various methods using the compounds and/or compositions to affect disease states or conditions such as cancer, osteoporosis and glaucoma are also provided. | 03-12-2009 |
20100093790 | ISOQUINOLINE COMPOUNDS - Isoquinoline compounds with G are provided that influence, inhibit or reduce the action of a G-protein receptor kinase. Pharmaceutical compositions including therapeutically effective amounts of the isoquinoline compounds and pharmaceutically acceptable carriers are also provided. Various methods using the compounds and/or compositions to affect disease states or conditions such as cancer, osteoporosis and glaucoma are also provided. | 04-15-2010 |
20140179746 | AMIDO-PYRIDYL ETHER COMPOUNDS AND COMPOSITIONS AND THEIR USE AGAINST PARASITES - The subject matter disclosed herein is directed to amido-pyridyl ether compounds of formula I: | 06-26-2014 |
David W. Murray, Jamestown, NC US
Patent application number | Description | Published |
---|---|---|
20100055954 | SEALED ELECTRICAL CONNECTOR - A connector assembly is comprised of a connector housing and a terminal position assurance member (TPA). The connector housing has an outer shroud wall which defines a gap between a central body portion of the connector housing. The TPA has an integrally co-molded seal thereon, which is receivable in the gap when the TPA is in position. | 03-04-2010 |
Gary Wayne Murray, Kernersville, NC US
Patent application number | Description | Published |
---|---|---|
20140342625 | Curable Silicone Composition, Cured Material, Manufactured Articles, Methods And Uses - A curable siloxane composition, cured material prepared therefrom, manufactured article prepared therewith, methods of making, and uses thereof, are disclosed. The composition comprises a mixture of ingredients (A) and (B): (A) a curable amount of a reactive group-functional siloxane, which has on average per molecule at least one curing-reactive group; and (B) an effective amount of an isocyanate or an isocyanate donor agent. The isocyanate has an average of at least one —N═C═O moiety per molecule thereof. The isocyanate donor agent produces an isocyanate when the isocyanate donor agent is exposed to a triggering condition. | 11-20-2014 |
James Murray, Durham, NC US
Patent application number | Description | Published |
---|---|---|
20140068057 | Automatic Completeness Checks of Network Device Infrastructure Configurations During Enterprise Information Technology Transformation - A system and an article of manufacture for automatically determining configuration completeness during information technology (IT) transformation from a pre-transformation source environment to a post-transformation target environment include obtaining a record of each of multiple data flows in a source environment, transforming each data flow in the source environment to a transformed data flow that corresponds to a target environment, and automatically determining that each of the transformed data flows is covered by a firewall configuration of one or more interfaces in the target environment. | 03-06-2014 |
20140068698 | Automatically Recommending Firewall Rules During Enterprise Information Technology Transformation - Techniques for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment. A method includes obtaining at least one communication pattern occurring in a pre-transformation source environment, and automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment. | 03-06-2014 |
20140068701 | Automatically Recommending Firewall Rules During Enterprise Information Technology Transformation - A system and computer program product for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment include obtaining at least one communication pattern occurring in a pre-transformation source environment, and automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment. | 03-06-2014 |
20140068747 | Automatic Completeness Checks of Network Device Infrastructure Configurations During Enterprise Information Technology Transformation - Techniques for automatically determining configuration completeness during information technology (IT) transformation from a pre-transformation source environment to a post-transformation target environment. A method includes obtaining a record of each of multiple data flows in a source environment, transforming each data flow in the source environment to a transformed data flow that corresponds to a target environment, and automatically determining that each of the transformed data flows is covered by a firewall configuration of one or more interfaces in the target environment. | 03-06-2014 |
James W. Murray, Durham, NC US
Patent application number | Description | Published |
---|---|---|
20110307573 | OPTIMIZING STORAGE BETWEEN MOBILE DEVICES AND CLOUD STORAGE PROVIDERS - Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g., within a certain time period), the link and billing plan can accommodate the transfer of the file (e.g., determined based on the size of the file), and there is sufficient power to make the file transfer. | 12-15-2011 |
20130227338 | RECONFIGURING INTERRELATIONSHIPS BETWEEN COMPONENTS OF VIRTUAL COMPUTING NETWORKS - Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure. | 08-29-2013 |
20130262250 | Allocation of Application Licenses within Cloud or Infrastructure - A method for allocation of application licenses includes establishing a computing environment comprising a licensed application or service accessed by at least two users, each user having an associated computer system; establishing an ordered list of users for a licensed application or service, in which users have a predefined priority based on a business value or function; establishing at least one user attribute comprising whether a user's virtual machine will be archived and saved for later resumption if the user's license is at least one of suspended, removed, or reallocated; and establishing at least one disqualification threshold for at least one user. | 10-03-2013 |
20150026806 | Mitigating a Cyber-Security Attack By Changing a Network Address of a System Under Attack - In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address. | 01-22-2015 |
James W. Murray, Research Triangle Park, NC US
Patent application number | Description | Published |
---|---|---|
20130279679 | Methods to Improve Fraud Detection on Conference Calling Systems Based on Observation of Participants' Call Time Durations - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds. | 10-24-2013 |
James William Murray, Research Triangle Park, NC US
Patent application number | Description | Published |
---|---|---|
20110135073 | METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF CONFERENCE MODERATOR PASSWORD UTILIZATION FROM A NON-AUTHORIZED DEVICE - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. An authorized device registry is created in an electronic database, wherein the authorized device registry identifies one or more authorized devices permitted to access the conference calling system. A request to access the conference calling system is received from a device; and, a processor determines whether the device is included in the authorized device registry. If the device is included in the authorized device registry, the device is granted access to the conference calling system. If the device is not included in the authorized device registry, however, are performed by the processor. | 06-09-2011 |
20110135080 | METHOD TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTING RE-USE OF CONFERENCE MODERATOR PASSWORDS - An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions. | 06-09-2011 |
20110135081 | METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF NON-TYPICAL USEAGE OF MODERATOR PASSCODE - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more access parameters are received, wherein the access parameters include an authorized day of week parameter, an authorized time of day parameter, and/or an authorized location parameter. One or more requests to access the conference calling system are received, wherein each request includes a user passcode and one or more request parameters. A processor determines whether the request parameters match the access parameters. Access to the conference calling system is granted when the request parameters match the access parameters; however, the processor performs actions when a request parameter does not match an access parameter. | 06-09-2011 |
20110135082 | METHODS TO IMPROVE SECURITY OF CONFERENCE CALLS BY OBSERVATION OF ATTENDEES' ORDER AND TIME OF JOINING THE CALL - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. A threshold period is received, wherein the threshold period indicates the maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call. A monitor detects the entry of the moderator into the conference call and entry of the participants into the conference call. A waiting period is determined for one or more of the participants, wherein the waiting period represents the time period between the entry of the moderator and the entry of the participant. A processor compares the waiting period to the threshold period. If the threshold period exceeds the waiting period, the conference call is allowed to continue. In at least one embodiment, actions are performed with the processor if the waiting period exceeds the threshold period. | 06-09-2011 |
20110135083 | Methods to Improve Fraud Detection on Conference Calling Systems Based on Observation of Participants' Call Time Durations - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds. | 06-09-2011 |
James William Murray, Durham, NC US
Patent application number | Description | Published |
---|---|---|
20140173724 | Tuning of Data Loss Prevention Signature Effectiveness - In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining. | 06-19-2014 |
20140173727 | Tuning of Data Loss Prevention Signature Effectiveness - In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set. | 06-19-2014 |
Joseph Murray, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20100246329 | COMPACT LASER SENSORS AND MONITORING SYSTEMS INCLUDING SUCH SENSORS - Improved laser sensors ( | 09-30-2010 |
Kristen L. Murray, Advance, NC US
Patent application number | Description | Published |
---|---|---|
20110041861 | SEGMENTED SMOKING ARTICLE WITH INSULATION MAT - A cigarette includes lighting and mouth ends. It may include a smokable segment disposed at the lighting end. It also includes a mouth-end segment; an aerosol-generation system disposed between the lighting and mouth ends, which includes (i) a heat-generation segment adjacent the smokable segment, including a heat source configured to be activated by combustion of a smokable material and an insulation layer of a non-glass material that is woven, knit, or both, and (ii) an aerosol-generating segment with aerosol-forming material disposed between, but physically separate from, each of the heat generation segment and the mouth end; a piece of outer wrapping material that provides an overwrap around at least a portion of the aerosol-generating segment, the heat-generation segment, and at least a portion of the smokable segment; those segments being connected together by the overwrap to provide a cigarette rod; that is connected to the cigarette rod using tipping material. | 02-24-2011 |
20130233329 | SEGMENTED SMOKING ARTICLE WITH FOAMED INSULATION MATERIAL - A cigarette includes lighting and mouth ends. It may include a smokable segment disposed at the lighting end. It also includes a mouth-end segment; an aerosol-generation system disposed between the lighting and mouth ends, which includes (i) a heat-generation segment adjacent the smokable segment, including a heat source configured to be activated by combustion of a smokable material and an insulation layer of a non-glass material that is woven, knit, or both, and (ii) an aerosol-generating segment with aerosol-forming material disposed between, but physically separate from, each of the heat generation segment and the mouth end; a piece of outer wrapping material that provides an overwrap around at least a portion of the aerosol-generating segment, the heat-generation segment, and at least a portion of the smokable segment; those segments being connected together by the overwrap to provide a cigarette rod; that is connected to the cigarette rod using tipping material. | 09-12-2013 |
Latondra Alyce Murray, Durham, NC US
Patent application number | Description | Published |
---|---|---|
20090047944 | CELLULAR TELEPHONE SIGNAL MONITORING METHOD AND SYSTEM - A cellular telephone signal monitoring method and system. The method includes receiving and storing by a computing system from a first cellular telephone, a first profile associated with a first user of the first cellular telephone and first monitoring data associated with the first user and the first cellular telephone. The computing system receives and stores from a plurality of cellular telephones, first additional monitoring data associated with a plurality of users and the plurality of cellular telephone. The computing system analyzes the first monitoring data and the first additional monitoring data. The computing system generates a first analysis report based on results of the analyzing. The computing system transmits to the first cellular telephone and the plurality of cellular telephones the first analysis report. | 02-19-2009 |
Matthew J. Murray, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20090072768 | USE OF AN ACCELEROMETER TO CONTROL VIBRATOR PERFORMANCE - A mobile device includes a vibrator, an accelerometer that senses a parameter of rotation, and a processor. The vibrator includes a drive motor and a drive circuit. The accelerometer senses a speed of rotation of the vibrator. The processor analyzes the sensed speed of rotation and generates a drive voltage that is received by the drive circuit to adjust the drive motor to produce a pre-determined, desired rotational speed. In another embodiment, the accelerometer senses an amplitude of a vibration produced by the vibrator. The processor analyzes the sensed amplitude of a vibration and generates a drive voltage that is received by the drive circuit to adjust the drive motor to produce a pre-determined, desired vibration amplitude. The processor may also compare the sensed parameter with a pre-determined desired parameter of rotation and generate a signal responsive to a result of the comparison and based on stored vibrator calibration curves. | 03-19-2009 |
Michael J. Murray, Durham, NC US
Patent application number | Description | Published |
---|---|---|
20120241296 | Modular MOC Driver And Interlock Assembly For Circuit Breaker - A MOC operator structure for a vacuum circuit breaker includes a cam coupled to an operating shaft of the circuit breaker, a follower in engagement with the cam, a first lever coupled with the follower, free-floating spring structure associated with the first lever, a second lever, a linkage structure coupled with the second lever and constructed and arranged to be associated with a breaker-panel interface for moving auxiliary switches, and movable cable structure operatively coupled between the first and second levers. The first lever and spring structure are configured such that when the contacts are closed, movement of the cam via the operating shaft drives the first lever to a maximum position compressing the spring structure, prior to any movement of the cable structure, and wherein force of the spring structure moves the cable structure and thus the second lever, causing movement of the linkage structure. | 09-27-2012 |
Michael P. Murray, Research Triangle Park, NC US
Patent application number | Description | Published |
---|---|---|
20090307040 | NETWORK-BASED SUPPLY CHAIN MANAGEMENT METHOD - An exemplary embodiment of the invention relates to a storage medium having instructions for a method for facilitating supply chain collaboration in a network environment, said supply chain including an enterprise and at least one supplier. The method includes generating and transmitting an unconstrained forecast to a supplier; receiving a supplier capability statement in response and generating a constrained forecast utilizing the supplier capability statement. The constrained forecast is transmitted to the supplier which responds with a formal commitment to product a needed supply indicated in the constrained forecast. The method also includes monitoring inventory levels at a replenishment service center by a supplier based upon a formal commitment, refilling inventory items at the replenishment service center; and facilitating delivery of the inventory items to the enterprise site by transmitting a pull signal to the replenishment service center whereby inventory items are delivered in response to the pull signal. | 12-10-2009 |
20090307063 | NETWORK-BASED SUPPLY CHAIN MANAGEMENT METHOD - An exemplary embodiment of the invention relates to a method for facilitating supply chain collaboration in a network environment, said supply chain including an enterprise and at least one supplier. The method includes generating and transmitting an unconstrained forecast to a supplier; receiving a supplier capability statement in response; and generating a constrained forecast utilizing the supplier capability statement. The constrained forecast is transmitted to the supplier which responds with a formal commitment to product a needed supply indicated in the constrained forecast. The method also includes monitoring inventory levels at a replenishment service center by a supplier based upon a formal commitment, refilling inventory items at the replenishment service center, and facilitating delivery of the inventory items to the enterprise site by transmitting a pull signal to the replenishment service center whereby inventory items are delivered in response to the pull signal. | 12-10-2009 |
Michael Van Alen Murray, Chapel Hill, NC US
Patent application number | Description | Published |
---|---|---|
20110003976 | REMOVAL OF LIPOPOLYSACCHARIDES FROM PROTEIN-LIPOPOLYSACCHARIDE COMPLEXES BY NON FLAMMABLE SOLVENTS - During the production of recombinant proteins from gram negative bacteria, lipopolysaccharides (LPS, endotoxin) are released along with the protein of interest. In many instances, LPS will copurify with the target protein due to specific or non-specific protein-ILPS interactions. We have investigated the ability of alkanediols to effect the separation of LPS from protein-LPS complexes while the complexes are immobilized on anion or cation exchange chromatographic media. Alkanediols provide a safer alternative to the use of other organics such as alcohols or acetonitrile due to their lower toxicity and decreased flammability. In addition, they are less costly than many of the detergents that have been used for such purposes. LPS removal efficiency increased with increasing alkane chain length. 1,2-alkanediols were more effective than terminal alkanediols in the separation of LPS from protein LPS complexes. | 01-06-2011 |
20130267691 | Removal of Lipopolysaccharides from Protein-Lipopolysaccharide Complexes by Non Flammable Solvents - During the production of recombinant proteins from gram negative bacteria, lipopolysaccharides (LPS, endotoxin) are released along with the protein of interest. In many instances, LPS will copurify with the target protein due to specific or non-specific protein-ILPS interactions. We have investigated the ability of alkanediols to effect the separation of LPS from protein-LPS complexes while the complexes are immobilized on anion or cation exchange chromatographic media. Alkanediols provide a safer alternative to the use of other organics such as alcohols or acetonitrile due to their lower toxicity and decreased flammability. In addition, they are less costly than many of the detergents that have been used for such purposes. LPS removal efficiency increased with increasing alkane chain length. 1,2-alkanediols were more effective than terminal alkanediols in the separation of LPS from protein LPS complexes. | 10-10-2013 |
Nancy Welsh Murray, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20100042423 | SYSTEM AND METHOD FOR BUILDING A GREEN COMMUNITY - Embodiments of the present invention relate a system and method for building a green community construction. The system and method may comprise preparing a site for green community construction, acquiring housing for the site, wherein the housing is acquired below assessed value, moving the housing to the site, and remodeling the housing at the site to form the green community. | 02-18-2010 |
Neal Scott Murray, Charlotte, NC US
Patent application number | Description | Published |
---|---|---|
20150185133 | APPARATUS AND METHOD FOR ASSESSING SUBGRADE CORROSION - An apparatus and method for assessing subgrade corrosion is disclosed. The apparatus is configured to assess soil corrosivity and subgrade corrosion of a structure without disturbing the site where the structure resides and includes a probe having a plurality of electrodes and sensors configured to conduct environmental and corrosion measurements at the site, and a controller having a potentiostat contained therein to determine a corrosion rate at the site, wherein the corrosion rate provides an indicator of the amount of corrosion of the structure over time. | 07-02-2015 |
20150185145 | APPARATUS AND METHOD FOR EVALUATING POWER TRANSMISSION CONDUCTORS - An apparatus and method for evaluating power transmission conductors is disclosed. The apparatus is configured to evaluate a charged power transmission conductor at a distance and includes a telescope assembly configured to transmit light to the conductor and receive a reflected light, in response to the transmitted light, from the conductor. The apparatus further includes control electronics configured to analyze the reflected light and determine a ratio based on two pre-determined frequencies, wherein the ratio is correlated with levels of iron oxide corrosion to confirm the presence of oxides that have leached through strands of the conductor. | 07-02-2015 |
Paul Thomas Murray, Horse Shoe, NC US
Patent application number | Description | Published |
---|---|---|
20140268570 | POWER POLE ISOLATED HEAT PIPE INVERTER ASSEMBLY - A power pole inverter is provided. The power pole inverter includes a housing assembly, a capacitor assembly, a number of arm assemblies, a number of heat sinks, and a support assembly. The housing assembly includes a number of sidewalk. The housing assembly sidewalls defining an enclosed space. The capacitor assembly is coupled to the housing assembly. Each arm assembly includes a plurality of electrical components and a number of electrical buses. Each the electrical bus includes a body with terminals, each the terminal structured to be coupled to, and in electrical communication with, the capacitor assembly, each arm assembly including a neutral terminal. Each arm assembly is coupled to, and in electrical communication with, the capacitor assembly. The support assembly includes a non-conductive frame assembly. The support assembly is structured to support each the heat sink in isolation. | 09-18-2014 |
Robert Murray, Matthews, NC US
Patent application number | Description | Published |
---|---|---|
20110216608 | TECHNIQUES FOR READING FROM AND/OR WRITING TO A SEMICONDUCTOR MEMORY DEVICE - Techniques for reading from and/or writing to a semiconductor memory device are disclosed. In one particular exemplary embodiment, the techniques may be realized as an apparatus including a first memory cell array having a first plurality of memory cells arranged in a matrix of rows and columns and a second memory cell array having a second plurality of memory cells arranged in a matrix of row and columns. The apparatus may also include a data sense amplifier latch circuitry having a first input node and a second input node. The apparatus may further include a first bit line input circuitry configured to couple the first memory cell array to the first input node of the data sense amplifier latch circuitry and a second bit line input circuitry configured to couple the second memory cell array to the second input node of the data sense amplifier latch circuitry. | 09-08-2011 |
Robert Van Murray, Fuquay-Varina, NC US
Patent application number | Description | Published |
---|---|---|
20140137853 | COMBUSTION CONVECTION OVEN WITH VARIABLE EXHAUST DAMPER - A combustion convection oven has improved energy efficiency. The oven includes a moveable exhaust damper that selectively closes off the exhaust plenum so as to inhibit the escape of heated air from the oven's cooking cavity. The exhaust damper is open when the oven is in a heating mode with the burners on, but closed when the oven is in a heated mode where the burners are off. Thus, airflow through the oven is significantly reduced or eliminated when the burners are off. That damper, or another damper, may have a degree of openness that is controlled to be inverse to the speed of the oven's fan. | 05-22-2014 |
20150122242 | COMBUSTION CONVECTION OVEN WITH VARIABLE EXHAUST DAMPER - A combustion convection oven has improved energy efficiency. The oven includes a moveable exhaust damper that selectively closes off the exhaust plenum so as to inhibit the escape of heated air from the oven's cooking cavity. The exhaust damper is open when the oven is in a heating mode with the burners on, but closed when the oven is in a heated mode where the burners are off. Thus, airflow through the oven is significantly reduced or eliminated when the burners are off. The damper may have a degree of openness that is controlled to be inverse to the speed of the oven's fan. | 05-07-2015 |
Samuel Murray, Charlotte, NC US
Patent application number | Description | Published |
---|---|---|
20140373269 | SPLASH GUARD FOR SINK - A splash guard includes a central base having a first linear margin and a second linear margin parallel to the first linear margin, a first wall connected to the central base along the first linear margin, the first wall having an upper portion extending upward from the central base to define a splash shield and having a lower portion extending downward from the central base to engage a host structure, and a second wall connected to the central base along the second linear margin, the second wall extending downward from the central base such that a channel for engaging a host structure is defined by the central base, the lower portion of the first wall, and the second wall. | 12-25-2014 |
Scott Murray, Charlotte, NC US
Patent application number | Description | Published |
---|---|---|
20150026136 | Automated Data Validation - According to some embodiments, logic executing on a processor receives a request to compare a first file and a second file. Each file comprises records, attributes, and attribute values. An attribute value is a value that a record associates with a corresponding attribute. The logic receives a mapping file indicating a key and one or more selected attributes for comparison. The logic compares each record in the first file to its corresponding record in the second file, the corresponding record determined according to the key. For records that fail to match, the logic determines which of the selected attributes are unmatched. The logic communicates a report indicating a result of comparing the first file and the second file. | 01-22-2015 |
Scott Murray, Hampstead, NC US
Patent application number | Description | Published |
---|---|---|
20130146623 | Armband Beverage Container Holder - A portable beverage container holder having a straw retainer. The beverage container is secured to an adjustable elastic armband that removably secures to a user's upper arm. A beverage container is included that fits snuggly within the beverage container holder. The container has a removable lid and a flexible straw that extends through the lid so that one end is enclosed within the beverage container and the upper end is exposed to the outside air. A straw-retainer is disposed along the exterior of the beverage container holder and removably retains a flexible straw in a pre-positioned orientation. This allows users to drink from the beverage container without using their hands to hold or position the straw. | 06-13-2013 |
Scott Samuel Murray, Charlotte, NC US
Patent application number | Description | Published |
---|---|---|
20150128112 | Automated Build and Deploy System - A system includes a memory and a processor communicatively coupled to the memory. The processor accesses a particular build schedule from one or more build schedules stored in the memory. The processor accesses, according to the particular build schedule, one or more artifacts and a label associated with the one or more artifacts stored in one or more data repositories. The label associated with the one or more artifacts corresponds to a particular software environment. The processor builds a software package using the one or more artifacts and deploys the software package to the software environment corresponding to the label of the one or more artifacts. | 05-07-2015 |