Patent application number | Description | Published |
20090097651 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 04-16-2009 |
20100095121 | IMPARTING REAL-TIME PRIORITY-BASED NETWORK COMMUNICATIONS IN AN ENCRYPTED COMMUNICATION SESSION - This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values. | 04-15-2010 |
20110302417 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 12-08-2011 |
20120233467 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications, in general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 09-13-2012 |
20120317416 | Imparting Real-Time Priority-Based Network Communications In An Encrypted Communication Session - This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values. | 12-13-2012 |
20140173278 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 06-19-2014 |
Patent application number | Description | Published |
20090049509 | SCOPE-CENTRIC ACCESS CONTROL MODEL - Apparatus, methods, and computer program products are disclosed that maintain an association graph made up of association tuples. Each of the association tuples belongs to an access-control-policy scope that imposes an access control policy. On receipt of a client reference and a supplier reference a scope-defining entity is identified from the client reference. The scope-defining entity has an explicit access control policy. An effective supplier reference is retrieved from a set of the association tuples matching the scope-defining entity and is presented. | 02-19-2009 |
20090063381 | METHOD AND APPARATUS FOR AUTOMATICALLY EXECUTING RULES IN ENTERPRISE SYSTEMS - One embodiment of the present invention provides an enterprise system that automatically executes a rule associated with an event. During operation, the system receives an event object at the enterprise system. Next, the system creates an intermediate event object based on the event object, wherein the intermediate object is an invocation context for the rule. The system also filters a set of rules with the intermediate event object to obtain a subset of rules. The system then selects a rule that is associated with the event from the subset of rules. Finally, the system executes the rule. | 03-05-2009 |
20090064342 | SENSITIVITY-ENABLED ACCESS CONTROL MODEL - Apparatus, methods, and computer program products are disclosed that determine Rights to an entity. The disclosed technology maintains data structures representing a set of entities. These entities include protected-entities and sensitivity-entities. Each of the sensitivity-entities is associated with a respective sensitivity access-control-list. The sensitivity-entities include a first sensitivity-entity that is associated with a first sensitivity-access-control-list. A first protected-entity being one of one or more of the protected-entities associated with the first sensitivity-entity. The technology evaluates Rights to the first protected-entity with respect to the first sensitivity-access-control-list and enables access to the first protected-entity responsive to the Rights evaluation and presents the first protected-entity when access is enabled. | 03-05-2009 |
20090158425 | USER DEFINABLE POLICY FOR GRADUATED AUTHENTICATION BASED ON THE PARTIAL ORDERINGS OF PRINCIPALS - Apparatus, methods, and computer program products are disclosed that determine an actor context of an actor as well as an access environment for an attempted operation responsive to the actor context and a necessary condition. The method also evaluates whether the access environment satisfies the necessary condition and activates a principal responsive to the evaluation and authenticates the actor against the principal. | 06-18-2009 |
20120023129 | ENTERPRISE COLLABORATION WITH REUSABLE CONTENT - Embodiments of the invention provide systems and methods for a collaboration environment in which a number of different workspaces can use the same, reusable content. According to one embodiment, a method of providing collaboration using reusable content can comprise identifying a content item to be included in a first workspace of a plurality of workspaces of a collaboration environment. A first proxy representing the identified content item can be created. The first proxy can have a unique identifier within the first workspace. A mapping table record can be created for the first proxy that links the first proxy to the content item. Additionally, a cross-reference table record can be created for the first proxy. The cross-reference record can identify a relationship of the first proxy to another content item in the first workspace. | 01-26-2012 |
20120296914 | TEMPORALLY-CORRELATED ACTIVITY STREAMS FOR CONFERENCES - Techniques are provided for capturing events and activities that occur during a conference, generating metadata related to the events, and correlating the metadata with specific points in time, within the conference, at which the corresponding events occurred. The resulting temporally-correlated event metadata may be stored as part of the conference recording, or separate from the conference recording. Once the temporally-correlated event metadata has been stored for a conference, the conference may be indexed based on the metadata. The index may then be used to not only to locate a conference that satisfies specified search criteria, but to identify the points or snippets, within the conference, that correspond to the search criteria. | 11-22-2012 |
20130066865 | IMPLICIT OR EXPLICIT SUBSCRIPTIONS AND AUTOMATIC USER PREFERENCE PROFILING IN COLLABORATION SYSTEMS - Systems, methods, and other embodiments associated with event processing are described. In one embodiment, a method includes detecting an event. The example method may also include analyzing the event to extract information about the user and processing a subsequent event in accordance with the extracted information about the user. | 03-14-2013 |
20130066866 | BI-TEMPORAL USER PROFILES FOR INFORMATION BROKERING IN COLLABORATION SYSTEMS - Systems, methods, and other embodiments associated with bi-temporal user profiling are described. An event is detected that occurs at a valid event time. In response to the event, a repository is accessed that stores data describing one or more user profiles that include a profile record valid time period specifying a time at which the given profile record is valid. A prior user profile record is retrieved that has a profile record valid time period that overlaps with the valid event time. An updated user profile record is created based, at least in part, on the event. The updated user profile record is saved with the valid event time demarcating the start of a profile valid time period. The prior user profile with the valid event time demarcating the end of the profile record valid time period is also saved for subsequent processing. | 03-14-2013 |
20140310235 | SEASONAL TRENDING, FORECASTING, ANOMALY DETECTION, AND ENDPOINT PREDICTION OF JAVA HEAP USAGE - Data can be categorized into facts, information, hypothesis, and directives. Activities that generate certain categories of data based on other categories of data through the application of knowledge which can be categorized into classifications, assessments, resolutions, and enactments. Activities can be driven by a Classification-Assessment-Resolution-Enactment (CARE) control engine. The CARE control and these categorizations can be used to enhance a multitude of systems, for example diagnostic system, such as through historical record keeping, machine learning, and automation. Such a diagnostic system can include a system that forecasts computing system failures based on the application of knowledge to system vital signs such as thread or stack segment intensity and memory heap usage. These vital signs are facts that can be classified to produce information such as memory leaks, convoy effects, or other problems. Classification can involve the automatic generation of classes, states, observations, predictions, norms, objectives, and the processing of sample intervals having irregular durations. | 10-16-2014 |
20140310285 | KNOWLEDGE INTENSIVE DATA MANAGEMENT SYSTEM FOR BUSINESS PROCESS AND CASE MANAGEMENT - Data can be categorized into facts, information, hypothesis, and directives. Activities that generate certain categories of data based on other categories of data through the application of knowledge which can be categorized into classifications, assessments, resolutions, and enactments. Activities can be driven by a Classification-Assessment-Resolution-Enactment (CARE) control engine. The CARE control and these categorizations can be used to enhance a multitude of systems, for example diagnostic system, such as through historical record keeping, machine learning, and automation. Such a diagnostic system can include a system that forecasts computing system failures based on the application of knowledge to system vital signs such as thread or stack segment intensity and memory heap usage. These vital signs are facts that can be classified to produce information such as memory leaks, convoy effects, or other problems. Classification can involve the automatic generation of classes, states, observations, predictions, norms, objectives, and the processing of sample intervals having irregular durations. | 10-16-2014 |
20140310714 | PREDICTIVE DIAGNOSIS OF SLA VIOLATIONS IN CLOUD SERVICES BY SEASONAL TRENDING AND FORECASTING WITH THREAD INTENSITY ANALYTICS - Data can be categorized into facts, information, hypothesis, and directives. Activities that generate certain categories of data based on other categories of data through the application of knowledge which can be categorized into classifications, assessments, resolutions, and enactments. Activities can be driven by a Classification-Assessment-Resolution-Enactment (CARE) control engine. The CARE control and these categorizations can be used to enhance a multitude of systems, for example diagnostic system, such as through historical record keeping, machine learning, and automation. Such a diagnostic system can include a system that forecasts computing system failures based on the application of knowledge to system vital signs such as thread or stack segment intensity and memory heap usage. These vital signs are facts that can be classified to produce information such as memory leaks, convoy effects, or other problems. Classification can involve the automatic generation of classes, states, observations, predictions, norms, objectives, and the processing of sample intervals having irregular durations. | 10-16-2014 |
20140358936 | TEMPORALLY-CORRELATED ACTIVITY STREAMS FOR CONFERENCES - Techniques are provided for capturing events and activities that occur during a conference, generating metadata related to the events, and correlating the metadata with specific points in time, within the conference, at which the corresponding events occurred. The resulting temporally-correlated event metadata may be stored as part of the conference recording, or separate from the conference recording. Once the temporally-correlated event metadata has been stored for a conference, the conference may be indexed based on the metadata. The index may then be used to not only to locate a conference that satisfies specified search criteria, but to identify the points or snippets, within the conference, that correspond to the search criteria. | 12-04-2014 |
20150234869 | SEASONAL TRENDING, FORECASTING, ANOMALY DETECTION, AND ENDPOINT PREDICTION OF JAVA HEAP USAGE - Data can be categorized into facts, information, hypothesis, and directives. Activities that generate certain categories of data based on other categories of data through the application of knowledge which can be categorized into classifications, assessments, resolutions, and enactments. Activities can be driven by a Classification-Assessment-Resolution-Enactment (CARE) control engine. The CARE control and these categorizations can be used to enhance a multitude of systems, for example diagnostic system, such as through historical record keeping, machine learning, and automation. Such a diagnostic system can include a system that forecasts computing system failures based on the application of knowledge to system vital signs such as thread or stack segment intensity and memory heap usage. These vital signs are facts that can be classified to produce information such as memory leaks, convoy effects, or other problems. Classification can involve the automatic generation of classes, states, observations, predictions, norms, objectives, and the processing of sample intervals having irregular durations. | 08-20-2015 |
20150254330 | KNOWLEDGE-INTENSIVE DATA PROCESSING SYSTEM - Embodiments of the invention provide systems and methods for managing and processing large amounts of complex and high-velocity data by capturing and extracting high-value data from low value data using big data and related technologies. Illustrative database systems described herein may collect and process data while extracting or generating high-value data. The high-value data may be handled by databases providing functions such as multi-temporality, provenance, flashback, and registered queries. In some examples, computing models and system may be implemented to combine knowledge and process management aspects with the near real-time data processing frameworks in a data-driven situation aware computing system. | 09-10-2015 |
Patent application number | Description | Published |
20090168586 | CIRCUIT TO CONTROL VOLTAGE RAMP RATE - A programming circuit and method to apply a controlled or predetermined voltage pulse for charge transfer to or from the floating gate of a non-volatile memory cell in an incremental manner to control the overall voltage across the gate oxide. Voltage above a transfer threshold voltage, such as above a tunneling threshold voltage, is applied in a stepwise charge transfer manner to or from the floating gate up to a voltage limit that is below the thin oxide damage threshold. Controlling the overall voltage avoids oxide breakdown and enhances reliability. | 07-02-2009 |
20090295447 | APPARATUS AND METHODS FOR A HIGH-VOLTAGE LATCH - Some embodiments include a device having storage node and a latch circuit coupled to the storage node to latch data provided to the storage node during one of a first mode and a second mode of the device. The latch circuit includes a first transistor, a second transistor, and a third transistor coupled between a first voltage node and a second voltage node. The third transistor is configured to selectively turn on and off in the first and second modes. Other embodiments are described. | 12-03-2009 |
20130258783 | Method and Apparatus for Logic Read in Flash Memory - The timing of logic read operations in a Flash memory device may be improved by a pad serial output circuit which receives a pre-decoded instruction signal and pre-fetched logic data prior to the last command clock, and which performs a fast resolution of the command in the pad serial output circuit on the last clock of the command input sequence. In one illustratively implementation, instruction pre-decode and data pre-fetch may be done on the seventh clock during command input. In another illustrative implementation, a first instruction pre-decode and data pre-fetch may be done on the fourth clock during command input, and a second instruction pre-decode may be done on the seventh clock during command input. Both serial protocol interface, including dual and quad I/O SPI, and quad peripheral interface are supported. | 10-03-2013 |
20140036596 | Sense Amplifier for Flash Memory - A sense amplifier has a reference cell current branch in which a reference cell determines a reference cell current, a column load converts the reference cell current to a reference voltage, and a feedback circuit to maintain the reference cell drain voltage. The sense amplifier also has a main cell current branch in which a main cell operationally selected from an array of flash memory cells determines a main cell current, a column load converts the main cell current to a main voltage, and a feedback circuit to maintain the main cell drain voltage. A differential amplifier compares the reference voltage with the main voltage and furnishes a logical level at its output depending on the relative values. A boost circuit has a pull up section coupled across the column load and a pull down section coupled across the main cell for accelerating the logical zero sensing time. | 02-06-2014 |
20140050041 | DATA STORAGE DEVICE AND CONTROL METHOD FOR NON-VOLATILE MEMORY - A data storage device having a non-volatile memory and a controller and a control method for the non-volatile memory are disclosed. The non-volatile memory has a plurality of blocks for data storage and each block provides a plurality of sectors. The controller allocates erase marker bits in each of the sectors to record the progress of an erase operation performed on the non-volatile memory for resumption of the erase operation when required. | 02-20-2014 |
20140177343 | MEMORY DEVICE WITH HIGH-SPEED READING FUNCTION AND METHOD THEREOF - A method includes steps of: providing a first memory cell array including a plurality of first word lines, wherein a plurality of first data are stored in the first memory cell array; providing a second memory cell array including a plurality of second word lines, wherein the second memory cell array is separated from the first memory cell array, and a plurality of second data are stored in the second memory cell array; selecting one of the first word lines and one of the second word lines at a same time or an overlapping time; alternately selecting a first address of the first memory cell array and a second address of the second memory cell array to alternately read a first corresponding portion of the first data and a second corresponding portion of the second data from the first memory cell array and the second memory cell array. | 06-26-2014 |
20150226785 | SEMICONDUCTOR WAFERS, AND TESTING METHODS THEREOF - The invention provides a semiconductor wafer with a die area and a scribe area, and the semiconductor wafer includes a die and a testing circuit. The die is formed on the die region of the semiconductor wafer, and the die includes a main circuit. The testing circuit is disposed on the scribe area of the semiconductor wafer, and is electrically connected to the die for testing the main circuit. | 08-13-2015 |
20150332747 | Methods of and Apparatus for Determining Unique Die Identifiers for Multiple Memory Die Within a Common Package - Respective die IDs are determined for a plurality of memory die commonly packaged as a memory device based on their respective Unique Identifiers (“UIDs”). An external controller initiates an internal Die ID (“DID”) determination process in which each die eventually asserts a signal on its inter-die signaling pin after a number of clocks as determined by its UID, and assigns itself a Die ID based on the number of signals asserted by other die prior to its own signaling response. Each die keeps track of the number of signals asserted by the other die prior to its own signaling response, as well as, optionally, the total number of signals on the signaling pin to determine the package die count for the device. | 11-19-2015 |
Patent application number | Description | Published |
20110075779 | PREAMBLE ACQUISITION WITHOUT SECOND ORDER TIMING LOOPS - A clock is adjusted by obtaining a first plurality of samples and a second plurality of samples associated with a preamble portion of a data packet. The first plurality of samples and the second plurality of samples are sampled using a clock. A first intermediate value is determined based at least in part on the first plurality of samples and a second intermediate value is determined based at least in part on the second plurality of samples. An ending value associated with an end of the preamble portion is determined based at least in part on the first intermediate value and the second intermediate value. The clock is adjusted based at least in part on the ending value without use of a second order timing loop. | 03-31-2011 |
20120019950 | PAD BIT INJECTION DURING READ OPERATION TO IMPROVE FORMAT EFFICIENCY - Injecting pad bits during a read operation to improve format efficiency is disclosed. In some embodiments, a pad sequence associated with error correction is not stored in a sector on a disk. Instead, the pad sequence is merged at a read channel with data stored in a sector that is accessed by the read channel. | 01-26-2012 |
20120117414 | PREAMBLE ACQUISITION WITHOUT SECOND ORDER TIMING LOOPS - A clock is adjusted by obtaining a first plurality of samples and a second plurality of samples associated with a preamble portion of a data packet. The first plurality of samples and the second plurality of samples are sampled using a clock. A first intermediate value is determined based at least in part on the first plurality of samples and a second intermediate value is determined based at least in part on the second plurality of samples. An ending value associated with an end of the preamble portion is determined based at least in part on the first intermediate value and the second intermediate value. The clock is adjusted based at least in part on the ending value without use of a second order timing loop. | 05-10-2012 |
20130027801 | INTER-TRACK INTERFERENCE CANCELATION IN THE PRESENCE OF FREQUENCY OFFSET - An initial phase offset between a center track and a side track is determined. An initial side track pulse shape is determined using the initial phase offset and side track interference. The initial side track pulse shape minimizes a contribution of the side track interference to a center track bit. The contribution of the side track interference is removed from the center track bit using the initial side track pulse shape and the side track interference. | 01-31-2013 |
20130154686 | Method and Apparatus for Facilitating Communication Between Programmable Logic Circuit and Application Specific Integrated Circuit with Clock Adjustment - A logic processing device, containing an application specific integrated circuit (“ASIC”) and field programmable gate array (“FPGA”), capable of automatically interfacing between ASIC and FPGA is disclosed. The logic processing device, in one aspect, includes a phase adjustment circuit, ASIC, and configurable logic circuit (“CLC”) wherein the CLC can be an FPGA. While ASIC is able to perform a specific function in accordance with an ASIC clock domain, the CLC is capable of performing a programmable logic function in accordance with an FPGA clock domain. The phase adjustment circuit is used to automatically facilitate a communication between the ASIC and the CLC in accordance with the ASIC clock domain and the FPGA clock domain. | 06-20-2013 |
20160065396 | Receiver for High Speed Communication Channel - A receiver for data recovery from a channel signal of a communications channel. The receiver includes a quantization circuit to generate a quantized code corresponding to the channel signal. A first decision circuit recovers, in a first signal processing mode, digital data for the channel signal based on the quantized representation of the channel signal. A second decision circuit recovers, in a second signal processing mode, the digital data for the channel signal based on the quantized representation of the channel signal. A controller selects between the first signal processing mode and the second signal processing mode based on a parameter indicative of a signal quality of the channel signal. | 03-03-2016 |
Patent application number | Description | Published |
20120245169 | CERTAIN CHEMICAL ENTITIES, COMPOSITIONS AND METHODS - Chemical entities that modulate PI3 kinase activity, pharmaceutical compositions containing the chemical entities, and methods of using these chemical entities for treating diseases and conditions associated with PI3 kinase activity are described herein. | 09-27-2012 |
20130029982 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein. | 01-31-2013 |
20130029984 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein. | 01-31-2013 |
20130035324 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Heterocyclic entities that modulate PI3 kinase activity, pharmaceutical compositions containing the heterocyclic entities, and methods of using these chemical entities for treating diseases and conditions associated with PI3 kinase activity are described herein. | 02-07-2013 |
20130053362 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including P13 kinase activity, are described herein. | 02-28-2013 |
20130261102 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Heterocyclic entities that modulate PI3 kinase activity, pharmaceutical compositions containing the heterocyclic entities, and methods of using these chemical entities for treating diseases and conditions associated with PI3 kinase activity are described herein. | 10-03-2013 |
20130267521 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein. | 10-10-2013 |
20130345216 | CERTAIN CHEMICAL ENTITIES, COMPOSITIONS AND METHODS - Chemical entities that modulate PI3 kinase activity, pharmaceutical compositions containing the chemical entities, and methods of using these chemical entities for treating diseases and conditions associated with PI3 kinase activity are described herein. | 12-26-2013 |
20140030256 | BENZOXAZOLE KINASE INHIBITORS AND METHODS OF USE - The present invention provides chemical entities or compounds and pharmaceutical compositions thereof that are capable of modulating certain protein kinases such as mTor, tyrosine kinases, and/or lipid kinases such as PI3 kinase. Also provided in the present invention are methods of using these compositions to modulate activities of one or more of these kinases, especially for therapeutic applications. | 01-30-2014 |
20140088099 | CHEMICAL COMPOUNDS, COMPOSITIONS AND METHODS FOR KINASE MODULATION - Chemical compounds that modulate kinase activity, including PI3 kinase activity, and chemical compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including P13 kinase activity, are described herein. | 03-27-2014 |
20140100214 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including P13 kinase activity, are described herein. | 04-10-2014 |
20140128390 | COMPOUNDS AND METHODS FOR KINASE MODULATION, AND INDICATIONS THEREFOR - Compounds active on c-kit protein kinases or mutant c-kit protein kinases having any mutations are described, as well as methods of making and using such compounds to treat diseases and conditions associated with aberrant activity of the c-kit protein kinases and mutant c-kit protein kinases. | 05-08-2014 |
20140128599 | BENZOXAZOLE KINASE INHIBITORS AND METHODS OF USE - The present invention provides chemical entities or compounds and pharmaceutical compositions thereof that are capable of modulating certain protein kinases such as mTor, tyrosine kinases, and/or lipid kinases such as PI3 kinase. Also provided in the present invention are methods of using these compositions to modulate activities of one or more of these kinases, especially for therapeutic applications. | 05-08-2014 |
20140206684 | CERTAIN CHEMICAL ENTITIES, COMPOSITIONS AND METHODS - Chemical entities that modulate PI3 kinase activity, and chemical entities, pharmaceutical compositions, and methods of treatments of diseases and conditions associated with P13 kinase activity are described herein. | 07-24-2014 |
20140206685 | HETEROCYCLIC KINASE INHIBITORS - The present invention provides heterocyclic compounds for use as kinase inhibitors and in other applications. Also provided are pharmaceutical compositions and methods of treatments of diseases and conditions associated with P13 kinase activity. | 07-24-2014 |
20140213554 | COMPOUNDS AND METHODS FOR KINASE MODULATION, AND INDICATIONS THEREFOR - Compounds active on c-kit protein kinases or mutant c-kit protein kinases having any mutations are described, as well as methods of making and using such compounds to treat diseases and conditions associated with aberrant activity of the c-kit protein kinases and/or mutant c-kit protein kinases. | 07-31-2014 |
20140288048 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including P13 kinase activity, are described herein. | 09-25-2014 |
20140341894 | CERTAIN CHEMICAL ENTITIES, COMPOSITIONS AND METHODS - Chemical entities that modulate PI3 kinase activity, pharmaceutical compositions containing the chemical entities, and methods of using these chemical entities for treating diseases and conditions associated with P13 kinase activity are described herein. | 11-20-2014 |
20150031672 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein. | 01-29-2015 |
20150105385 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein. | 04-16-2015 |
20150126506 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein. | 05-07-2015 |
20150133400 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Heterocyclic compounds of formula (I), methods for their preparation, pharmaceutical compositions containing such a compound and their therapeutic uses. | 05-14-2015 |
20150246932 | HETEROCYCLIC COMPOUNDS AND USES THEREOF - Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein. | 09-03-2015 |
20160031886 | CERTAIN CHEMICAL ENTITIES, COMPOSITIONS AND METHODS - Chemical entities that modulate PI3 kinase activity, pharmaceutical compositions containing the chemical entities, and methods of using these chemical entities for treating diseases and conditions associated with PI3 kinase activity are described herein. | 02-04-2016 |