Bailey, Jr., US
Albert D. Bailey, Jr., Kenosha, WI US
Patent application number | Description | Published |
---|---|---|
20120279966 | CLOSURE WITH TAMPER-EVIDENT FEATURE - A tamper-evident closure ( | 11-08-2012 |
Donald L. Bailey, Jr., Penn Laird, VA US
Patent application number | Description | Published |
---|---|---|
20140283045 | MANAGING VIRTUAL COMPUTING TESTING - Systems, methods, and interfaces for the management of virtual machine networks and other programmatically controlled networks are provided. Hosted virtual networks are configured in a manner such that a virtual machine manager of the virtual network may monitor activity such as user requests, network traffic, and the status and execution of various virtual machine instances to determine possible security assessments. A security assessment may be performed before, after, or simultaneous to the execution of the activity associated with the security assessment event. The execution of an activity may further be synchronous with the results of the security assessment. The timing of the assessment may correspond to the type of assessment or type of activity that is requested or detected. | 09-18-2014 |
Donald Lee Bailey, Jr., Penn Laird, VA US
Patent application number | Description | Published |
---|---|---|
20140244785 | COMPUTING INFRASTRUCTURE FOR CONFIGURABLE-QUALITY RANDOM DATA - Methods and apparatus for a computing infrastructure for configurable-quality random data are disclosed. A storage medium stores program instructions that when executed on a processor designate some servers of a provider network as members of a pool of producers of random data usable by random data consumers. The instructions, when executed, determine a subset of the pool to be used to supply a collection of random data intended for a random data consumer, and one or more sources of random phenomena to be used to generate the collection of random data. The instructions, when executed, initiate a transmission of the collection of random data directed to the random data consumer. | 08-28-2014 |
20140245425 | CONFIGURABLE-QUALITY RANDOM DATA SERVICE - Methods and apparatus for a configurable-quality random data service are disclosed. A method includes implementing programmatic interfaces enabling a determination of respective characteristics of random data to be delivered to one or more clients of a random data service of a provider network. The method includes implementing security protocols for transmission of random data to the clients, including a protocol for transmission of random data to trusted clients at devices within the provider network. The method further includes obtaining, on behalf of a particular client and in accordance with the determined characteristics, random data from one or more servers of the provider network, and initiating a transmission of the random data directed to a destination associated with the particular client. | 08-28-2014 |
Earl Wayne Bailey, Jr., Cary, NC US
Patent application number | Description | Published |
---|---|---|
20090063447 | UPDATING RETRIEVABILITY AIDS OF INFORMATION SETS WITH SEARCH TERMS AND FOLKSONOMY TAGS - Provided are techniques for updating retrievability aids. A search request including one or more search terms is received. Each of the one or more search terms is captured. A list of topics is provided to a user as search results. User selection of a topic in the list of topics is received. After reviewing the topic, the user adds one or more folksonomy tags to the topic. The one or more folksonomy tags added by the user to the topic are captured. Each of the one or more search terms and each of the one or more folksonomy tags are mapped to the topic. For each of the search terms, based on a number of times that the search term has been used to search for the topic, the search term is added to one or more retrievability aids. For each of the one or more folksonomy tags, based on a number of times that the folksonomy tag has been applied to the topic, the folksonomy tag is added to at least one of the one or more retrievability aids. | 03-05-2009 |
George E. Bailey, Jr., Houston, TX US
Patent application number | Description | Published |
---|---|---|
20130060730 | ADJUSTING ONE OR MORE TRACE FILTERS IN A DATABASE SYSTEM - Methods and systems for adjusting trace filters in a database system are described. During operation, an embodiment may receive, from a user, an indication of a performance problem. Next, the embodiment may determine settings of one or more trace filters based on the indication of the performance problem. The embodiment may then collect trace data based on the one or more trace filters. While the trace data is being collected, the embodiment may perform the following set of operations one or more times: (1) obtain database system performance metrics, (2) analyze the trace data to obtain an analysis result, and (3) adjust the settings of the one or more trace filters based on the database system performance metrics and the analysis result. | 03-07-2013 |
20130060731 | ENUMERATING WMI OBJECT PROPERTIES THROUGH T-SQL - Methods and systems for collecting performance data are described. During operation a database server can receive a set of T-SQL statements, wherein the database server executes on a computer system and provides access to a database. Next, the database server can execute the set of T-SQL statements, thereby causing the database server to: (1) create an external script which, when executed by the computer system, collects performance data in a file; (2) execute the external script on the computer system; (3) wait for the external script to complete execution; and (4) load the performance data from the file into a table in the database. | 03-07-2013 |
20130060762 | RANKING ANALYSIS RESULTS BASED ON USER PERCEIVED PROBLEMS IN A DATABASE SYSTEM - Methods and systems for ranking analysis results based on user perceived problems of a database system are described. During operation, an embodiment may receive a designation of a perceived database system performance problem from a user, wherein the problem is associated with one or more database system metrics. Next, the embodiment may determine a set of recommendations for alleviating the perceived database system performance problem. The embodiment may then analyze the set of recommendations to determine, for each recommendation in the set of recommendations, an impact the recommendation is expected to have on the one or more database system metrics. Finally, the embodiment may rank the set of recommendations according to the impact each recommendation is expected to have on the perceived database performance problem. | 03-07-2013 |
20130060782 | DETERMINING INDEXES FOR IMPROVING DATABASE SYSTEM PERFORMANCE - Methods and systems for identifying one or more indexes are described. A system can collect a set of database operations that were performed during a given time window. Next, the system can partition the set of database operations based on a set of database tables that were accessed by the set of database operations. Then, for each database table in the set of database tables, the system can determine a set of indexes that are candidates for improving database system performance. Next, based on the candidate indexes, the system can identify one or more indexes, one or more combinations of indexes, and/or a consolidated index that improve overall database system performance. | 03-07-2013 |
George Eddie Bailey, Jr., Houston, TX US
Patent application number | Description | Published |
---|---|---|
20110004586 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CREATING A VIRTUAL DATABASE - A virtual database is attached to a server database management system (“DBMS”) such that the DBMS believes it needs to recover the database to a last known point of consistency. In order to perform this recovery, the DBMS requests the transaction log file entries to be read from what it believes is the database's transaction log file. However, the requests are intercepted and translated (unbeknownst to the DBMS) instead into requests to read the transaction log portion of the backup file. The DBMS then uses the transaction log records to bring the database to a point of transactional consistency, unaware that the log records are actually being sourced from the transaction log portion of the backup file. All changes made to the data during the recovery phase and later during the execution of any TSQL statements which insert, update, or delete data are routed into a cache file. Accordingly, a “virtual” database is created and used by the server DBMS engine as if it were a real database. | 01-06-2011 |
Jeffrey S. Bailey, Jr., Troutdale, OR US
Patent application number | Description | Published |
---|---|---|
20140352605 | METHOD FOR MAKING BARIUM-DOPED CRUCIBLE AND CRUCIBLE MADE THEREBY - Making a barium-doped silica crucible includes forming a crucible by introducing into a rotating crucible mold bulk silica grains to form a bulky wall. After heating the interior of the mold to fuse the bulk silica grains, an inner silica grain, doped with barium, is introduced into the crucible. Residual heat or additional heat at least partially melts the inner silica grain, allowing the barium-doped silica layer to fuse to the wall of the crucible to form a glossy inner layer. Next, at least a part of the barium-doped silica layer is roughened. Also described are the crucible made thereby as well as silicon ingots made using the crucibles as described herein. | 12-04-2014 |
Rouse R. Bailey, Jr., New Park, PA US
Patent application number | Description | Published |
---|---|---|
20140166324 | Power Tool User Interface - A power tool has a housing, a motor disposed in the housing, a tool holder driven by the motor, a control circuit for controlling the motor, a rotary input rotatable relative to the housing, and a rotational sensor for sensing the rotational position of the rotary input relative to the housing. The rotary input can be a thumbwheel or a handle that rotates relative to the housing. The control circuit receives input from the rotational sensor for controlling motor speed, rotational direction, etc. Other user interface mechanisms are disclosed as well. | 06-19-2014 |
Rouse Roby Bailey, Jr., Parkton, MD US
Patent application number | Description | Published |
---|---|---|
20110090726 | PORTABLE ALTERNATING CURRENT INVERTER HAVING REDUCED IMPEDANCE LOSSES - A portable power supply apparatus is provided having reduced impedance losses. The portable power supply apparatus is comprised of: a portable housing; a battery system residing in the housing; and an inverter circuit residing in the housing. The battery system generates a direct current (DC) voltage having a magnitude greater than or equal to a peak value of a desired alternating current (AC) voltage. The inverter circuit receives the DC voltage directly from the battery system, converts the DC voltage to an AC output voltage and outputs the AC output voltage to one or more outlets exposed on an exterior surface of the portable housing. | 04-21-2011 |
Rouse Roby Bailey, Jr., New Park, MD US
Patent application number | Description | Published |
---|---|---|
20080309285 | Battery pack identification system - A control module is included in a battery charger that is adapted to charge a plurality of battery packs of different types or a power tool that is adapted to be powered by at least one of the battery packs. The control module includes a remote sensing module that communicates remotely with one of the battery packs. The control module also includes a battery pack connection module that determines that the one of the battery packs is in electrical communication with at least one of the battery charger and the power tool. The control module also includes a battery pack identification (ID) module that determines a first type of the battery pack based on remote sensing module signals. The control module also includes a charge control module that determines at least one of a charge setting and a discharge setting for the battery pack based on the first type. | 12-18-2008 |
20130335014 | POWER TOOL BATTERY PACK WIRELESS CHARGER - A power tool system includes a power tool, a power tool battery pack and a battery pack charger. The power tool battery pack is separable from and attachable to the power tool, and electrically connectable to the power tool electrical terminals when attached to the power tool. The power tool battery pack has at least one battery cell, a receiver coil, and a control circuit for controlling the amount of power that is provided to the at least one battery cell. The battery pack charger has at least one transmitter coil for generating a magnetic field which induces a voltage in the receiver coil, and a control circuit for controlling the amount of power that is provided to the transmitter coil. | 12-19-2013 |
20140262398 | Concrete Anchor Setting Tool - An anchor setting tool includes a housing having a nozzle portion formed in an upper end thereof. A motor and a rotary-linear motion transmission mechanism are arranged in the housing and the rotary-linear transmission mechanism functions to couple an output shaft of the motor to a striking rod disposed in the nozzle portion to thereby move the striking rod in a reciprocating manner. A bias device exerts a force on the striking rod towards the outside of the housing along a longitudinal direction of the striking rod. | 09-18-2014 |
R. Roby Bailey, Jr., New Park, PA US
Patent application number | Description | Published |
---|---|---|
20080315834 | Battery pack chargers and charging method - A method of charging a battery pack is provided. The method includes: electronically connecting a battery pack to a charger; detecting information regarding the battery pack; determining an appropriate charging regime based on the detected information; and applying the charging regime to the battery pack. A battery charger may also provided. The battery charger includes: a first terminal for connecting to a battery pack; a second terminal for connecting to a battery pack, a microprocessor operatively connected to the terminals and configured to receive a signal from at least one terminal regarding a battery pack connected to the terminal and control the charger to select and apply a charging regime to the battery pack according to the signal. | 12-25-2008 |
Samuel A. Bailey, Jr., Boca Raton, FL US
Patent application number | Description | Published |
---|---|---|
20110016513 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ADAPTING THE SECURITY MEASURES OF A COMMUNICATION NETWORK BASED ON FEEDBACK - An adaptable network security system includes trust mediator agents that are coupled to each network component. Trust mediator agents continuously detect changes in the security characteristics of the network and communicate the detected security characteristics to a trust mediator. Based on the security characteristics received from the trust mediator agents, the trust mediator adjusts security safeguards to maintain an acceptable level of security. Trust mediator also uses predetermined rules in determining whether to adjust security safeguards. Despite inevitable changes in security characteristics, an acceptable level of security and efficient network operation are achieved without subjecting users of the network to over burdensome security safeguards. | 01-20-2011 |
20110154034 | DYNAMICALLY REACTING POLICIES AND PROTECTIONS FOR SECURING MOBILE FINANCIAL TRANSACTIONS - A secure mobile financial transaction is provided by receiving a list of protection methods from an external terminal over a communication network. A matrix of protection methods corresponding to the external terminal is created based on the identified protection methods. Security-related information is received from one or more trust mediator agents over the communication network. Rules corresponding to the received security related information are retrieved, and at least one protection method is selected from the matrix of protection methods based on the retrieved rules. The selected protection method is transmitted to the trust mediator agents for implementation. | 06-23-2011 |
20110154497 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR COLLECTING AND REPORTING SENSOR DATA IN A COMMUNICATION NETWORK - A system for collecting and reporting sensor data in a communication network includes a microprocessor coupled to a memory and an electronic storage device. The microprocessor receives sensor data from sensors, and stores the sensor data for each sensor in the electronic storage device. The microprocessor also receives, via the communication network, a data reporting instruction defining a data reporting technique corresponding to the sensor data associated with one or more of the sensors. The data reporting instruction is stored in the electronic storage device, and the microprocessor transmits, to a trust mediator over the communication network, at least a portion of the sensor data based on the data reporting instruction. The trust mediator maintains an acceptable level of security for data throughout the communication network by adjusting security safeguards based on the sensor data. | 06-23-2011 |
20110178933 | DYNAMICALLY REACTING POLICIES AND PROTECTIONS FOR SECURING MOBILE FINANCIAL TRANSACTION DATA IN TRANSIT - A secure mobile financial transaction is provided by receiving, over a communication network, a list of protection mechanisms available for implementation by an external terminal. Security-related data is received from one or more sensors and an attack signature is computed based on the security-related data. An appropriate security policy is selected from multiple security policies stored in a database based on the list of protection mechanisms and the attack signature. A secure communication session is established between the external terminal and an internal network component according to the selected security policy. A data message associated with a mobile financial transaction is communicated over the communication network during the communication session. | 07-21-2011 |
20110313925 | DYNAMIC PAIRING SYSTEM FOR SECURING A TRUSTED COMMUNICATION CHANNEL - A system for securing a trusted communications channel for a mobile financial transaction is provided by receiving, from a user via an external terminal, a request for an access control entitlement to complete a financial transaction. A total risk level associated with the financial transaction is computed. A required trust score is determined based on the total risk level. User identification data associated with the user is received from one or more data sources. The user identification data is validated. A user trust score associated with the user is computed based on the validated identification data. The user trust score is compared to the required trust score. The access control entitlement is transmitted to the user via the external terminal if the user trust score is greater than or equal to the required trust score. | 12-22-2011 |
20110313930 | DYNAMICALLY ADAPTIVE POLICY MANAGEMENT FOR SECURING MOBILE FINANCIAL TRANSACTIONS - A system for securing a mobile financial transaction using an adaptive security policy is provided by presenting, via an external terminal, an input request associated with a vertex of the security policy. User input is received via the external terminal in response to the input request. A rule associated with the vertex is retrieved from a database. An edge is selected from a plurality of edges associated with the vertex according to the retrieved rule. A communication session of the external terminal is routed to a subsequent vertex via the selected edge. | 12-22-2011 |
20110314529 | ADAPTIVE POLICIES AND PROTECTIONS FOR SECURING FINANCIAL TRANSACTION DATA AT REST - A system for challenge-response authentication is provided by receiving, from an external terminal over a communication network, a request for access to a service. A plurality of objects is presented to a user via a display. A plurality of codes is received over the communication network, each of the plurality of codes corresponding to one of the plurality of objects. The plurality of codes are matched to a plurality of alphanumeric characters according to a predetermined table. An alphanumeric string is generated from the plurality of alphanumeric characters and the alphanumeric string is compared to a user identifier stored in a database. Based on the comparing, a determination is made as to whether to grant the user access to the service. | 12-22-2011 |
20140115707 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR COLLECTING AND REPORTING SENSOR DATA IN A COMMUNICATION NETWORK - A system for collecting and reporting sensor data in a communication network includes a microprocessor coupled to a memory and an electronic storage device. The microprocessor receives sensor data from sensors, and stores the sensor data for each sensor in the electronic storage device. The microprocessor also receives, via the communication network, a data reporting instruction defining a data reporting technique corresponding to the sensor data associated with one or more of the sensors. The data reporting instruction is stored in the electronic storage device, and the microprocessor transmits, to a trust mediator over the communication network, at least a portion of the sensor data based on the data reporting instruction. The trust mediator maintains an acceptable level of security for data throughout the communication network by adjusting security safeguards based on the sensor data. | 04-24-2014 |
20140156515 | DYNAMICALLY REACTING POLICIES AND PROTECTIONS FOR SECURING MOBILE FINANCIAL TRANSACTION DATA IN TRANSIT - A secure mobile financial transaction is provided by receiving, over a communication network, a list of protection mechanisms available for implementation by an external terminal. Security-related data is received from one or more sensors and an attack signature is computed based on the security-related data. An appropriate security policy is selected from multiple security policies stored in a database based on the list of protection mechanisms and the attack signature. A secure communication session is established between the external terminal and an internal network component according to the selected security policy. A data message associated with a mobile financial transaction is communicated over the communication network during the communication session. | 06-05-2014 |
20140310815 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ADAPTING THE SECURITY MEASURES OF A COMMUNICATION NETWORK BASED ON FEEDBACK - An adaptable network security system includes trust mediator agents that are coupled to each network component. Trust mediator agents continuously detect changes in the security characteristics of the network and communicate the detected security characteristics to a trust mediator. Based on the security characteristics received from the trust mediator agents, the trust mediator adjusts security safeguards to maintain an acceptable level of security. Trust mediator also uses predetermined rules in determining whether to adjust security safeguards. Despite inevitable changes in security characteristics, an acceptable level of security and efficient network operation are achieved without subjecting users of the network to over burdensome security safeguards. | 10-16-2014 |
20140379581 | DYNAMIC PAIRING SYSTEM FOR SECURING A TRUSTED COMMUNICATION CHANNEL - A system, method, and computer-readable medium for securing a mobile financial transaction are provided. A table matches each one of a plurality of transaction risk levels to a corresponding one of a plurality of required user trust scores, correspondingly. A financial transaction risk level associated with a financial transaction is computed. A user trust score associated with the user is computed based on user identification data associated with the user. The financial transaction risk level is matched to a corresponding one of the plurality of transaction risk levels stored in the table. The one of the plurality of required trust scores that corresponds to the corresponding one of the plurality of transaction risk levels stored in the table is identified. If the user trust score is greater than or equal to the identified one of the plurality of required trust scores, then the financial transaction is authorized. | 12-25-2014 |
Walter F. Bailey, Jr., Washington, DC US
Patent application number | Description | Published |
---|---|---|
20140083936 | METHOD AND APPARATUS FOR WATER TREATMENT USING SCREENS - An apparatus and method for selecting, retaining or bioaugmenting solids in an activated sludge process for improving wastewater treatment using screens. The screens can be used to separate and retain solids based on size, compressibility or shear resistance. The screens are used to separate and select slow growing organisms, faster settling organisms, or materials added to absorb, treat or remove constituents in the activated sludge process. A swapping screen arrangement provides another means of selecting various particles. The exposed shear rate or time, particle compression, or SRTs can be adjusted manually and/or automatically in response to detected readings from an instrument such as a spectrophotometer or other optical approaches to optimize selection of organisms. The present disclosure may be configured as an activated sludge system operated at different solids residence times (SRT) for different solids fractions allowing slow growing organisms to get established in competition with faster growing organisms or aggregates thereof. | 03-27-2014 |
William Robert Bailey, Jr., Irving, TX US
Patent application number | Description | Published |
---|---|---|
20080313099 | METHOD AND SYSTEM FOR PROVIDING DOWNSIDE PROTECTION OF STOCK MARKET INVESTMENTS - A method and system for providing downside protection of stock market investments. The present invention allows stock prices to be expressed as a stop loss percentage of the high value the stock price attains rather that a fixed or “hard entered” number. The stop loss percentage of the high value allows stock prices the freedom to increase in price while protecting gains that are being made and still providing downside protection for market declines. The system receives security information input from the user and also data link information of current stock information, the system determines new high values and calculates a sell threshold price based on the stop loss percentage and the high value of the security. When the market price is less than the sell threshold price, the system notifies the user or automatically sells the security. | 12-18-2008 |
Wilson Edward Bailey, Jr., Forest Hill, MD US
Patent application number | Description | Published |
---|---|---|
20110005031 | Anchor and alignment device for carpet tiles - An anchor for a carpet tile includes a cross-shaped base having four arms extending from a vertex. The arms form a planar top surface and a planar bottom surface. A vertical blade centered on the base rises to engage the backing of a carpet tile when a corner of the carpet tile is placed near the vertex. The blade is preferably made of bendable and resilient material. Preferably, the anchor is used with a pedestal head of a raised-flooring system and has a nub extending from the bottom surface of each of the arms of the base to fit within holes in the pedestal head and thereby secure the anchor to the pedestal head. An alternative anchor includes a plate for the base and the blade in the shape of a cross rises from the plate. The plate may have a hole in each quadrant defined by the blade. | 01-13-2011 |