Gladstone
Alexander Gladstone, Weston, FL US
Patent application number | Description | Published |
---|---|---|
20140370836 | System Utilizing A Combination For Including Information Within An Outbound Communications Channel Of A Mobile Telephony-Capable Computing Device - A system and combination for accessing an emergency network through a commercially available off-the-self (COTS) mobile telephony-capable computing device ( | 12-18-2014 |
20140370837 | System for Initiating an Emergency Communication Using a Wireless Peripheral of a Mobile Computing Device - A system for initiating an emergency communication using a commercially available off-the-self (COTS) wireless peripheral of a mobile computing device ( | 12-18-2014 |
David Joseph Gladstone, Norwich, VT US
Patent application number | Description | Published |
---|---|---|
20140114150 | Method And System For Using Cherenkov Radiation To Monitor Beam Profiles And Radiation Therapy - A system for providing monitored radiation therapy has a high energy radiation source, apparatus for excluding uncontrolled ambient light, and apparatus for collecting light emitted from a subject. The system has apparatus for spectrally analyzing the collected light, and a processor for determining oxygenation or other metabolic function of tissue within the subject from spectral analysis of the collected light. The system monitors radiation therapy by providing a beam of high energy radiation; collecting Cherenkov and/or photoluminescent light from the subject, the light generated along the beam; spectrally analyzing the light; and determining oxygenation or metabolic function of tissue from the spectral analysis. Beam profile of the system is calibrated by imaging from multiple angles Cherenkov and/or photoluminescent light emitted by a phantom placed in the beam in lieu of a subject, captured images are analyzed to determine beam profile. | 04-24-2014 |
Garry Gladstone, Incline Village, NV US
Patent application number | Description | Published |
---|---|---|
20110119158 | SYSTEM FOR INCREASING EFFICIENCIES IN DISTRIBUTION OF PRE-OWNED VEHICLES - A system and method for increasing efficiencies in the distribution and sales of pre-owned vehicles utilizing a communications network such as the internet. A purchase order agreement is made between a consumer and a dealer for purchase of one or more vehicles available for sale to dealers, viewed over the communications network. The sale is conditioned upon a selected vehicle first being acquired by the dealer subsequent to entry of the consumer and dealer into the purchase order agreement. The dealer acquires the selected vehicle through an auction limited to dealers. The system may be administered by an organization which is not itself a dealer or auction. | 05-19-2011 |
Garry D. Gladstone, Incline Village, NV US
Patent application number | Description | Published |
---|---|---|
20090254474 | System and Method for Liquefying and Extracting Liquidity fromn Illiquid Assets without Debt or Divestiture. - One embodiment of the present invention includes a system and method of liquefying an illiquid asset for the purpose of extracting liquidity. The asset owner retains ownership, control, possession, and use of the asset for the duration of a contractual period. The extracted liquidity is a portion of the value of the asset and is provided to the asset owner from an asset buyer as an earnest money purchase deposit. During the contract period the asset owner may avoid the completion of the sale of the asset to the asset buyer by various means. According to the present invention, an asset owner incurs no debt burdens, yet obtains liquidity and maintains control of the asset. | 10-08-2009 |
Lloyd Gladstone, New York, NY US
Patent application number | Description | Published |
---|---|---|
20150311733 | SMART PHONE AND/OR CONSUMER ELECTRONICS DEVICE CHARGER SYSTEM - A consumer electronics charging device having a pair of rotatable blades, wherein the blades are rotatable from a deployed position in which ends of the blades are inserted into a standard wall outlet to a retracted position to decrease the overall thickness of the charger. | 10-29-2015 |
Lloyd Gladstone, Boca Raton, FL US
Patent application number | Description | Published |
---|---|---|
20130150134 | Smart Phone and/or Consumer Electronics Device Charger System - A consumer electronics device charging device having a pair of rotatable blades, wherein the blades are rotatable from a deployed position in which ends of the blades are inserted into a standard wall outlet to a retracted position in which the ends of the blades are spread apart from one another and lie flat against the charger to decrease the overall thickness of the charger. | 06-13-2013 |
Mara N. Gladstone, Boulder, CO US
Patent application number | Description | Published |
---|---|---|
20150238562 | BOURVADIN DERIVATIVES AND THERAPEUTIC USES THEREOF - The present invention is directed at bouvardin analogs arid related compounds for the treatment of disorders including cancer. Provided herein are bouvardin analogs and related compounds, pharmaceutical compositions and kits comprising at least one bouvardin analog or related compound, and methods for treating disorders including cancer. In some aspects the compounds inhibit translation elongation at the ribosome. The compounds are used in combination with radiation therapy or with known chemotherapeutic compositions. | 08-27-2015 |
Mara N. Gladstone US
Patent application number | Description | Published |
---|---|---|
20150238562 | BOURVADIN DERIVATIVES AND THERAPEUTIC USES THEREOF - The present invention is directed at bouvardin analogs arid related compounds for the treatment of disorders including cancer. Provided herein are bouvardin analogs and related compounds, pharmaceutical compositions and kits comprising at least one bouvardin analog or related compound, and methods for treating disorders including cancer. In some aspects the compounds inhibit translation elongation at the ribosome. The compounds are used in combination with radiation therapy or with known chemotherapeutic compositions. | 08-27-2015 |
Matthew Gladstone, Buckinghamshire GB
Patent application number | Description | Published |
---|---|---|
20100166411 | MAST ASSEMBLY - A camera mast assembly comprising two or more sections movable with respect to one another from an unextended to an extended configuration, and a carriage attached to one of the sections for mounting a camera on the assembly, wherein the carriage is continuously movable in a substantially uniform manner from a first position wherein the sections are in the unextended configuration to a second position wherein the sections are in the extended configuration. | 07-01-2010 |
Patricia L. Gladstone, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20080261892 | Acid Addition Salts of Ac-Phscn-Nh2 - Acid addition salts of Ac—PHSCN—NH | 10-23-2008 |
20110151022 | THIOTUNGSTATE ANALOGUES AND USES THEREOF - The current invention provides novel thiotungstate derivatives, methods of making novel thiotungstate derivatives, pharmaceutical compositions of novel thiotungstate derivatives, methods of using novel thiotungstate derivatives to treat diseases associated with aberrant vascularization, copper metabolism disorders and obesity and methods of using pharmaceutical compositions of thiotungstate derivatives to treat diseases associated with aberrant vascularization, copper metabolism disorders, neurodegenerative disorders, obesity or NF-κB dysregulation. | 06-23-2011 |
Paul Gladstone, New York, NY US
Patent application number | Description | Published |
---|---|---|
20150248722 | WEB BASED INTERACTIVE MULTIMEDIA SYSTEM - A web based interactive multimedia platform that provides web based commercial activity is provided. The web based interactive multimedia platform includes a core structure and one or more modules installed on top of the core structure and interconnected to each other and the core structure via a common interface. The core structure facilitates the playing of video within the platform on a web browser page, and the displaying other media within the platform on a web browser page platform. The core structure is to be embedded within the code base of a web browser having built-in multimedia processes. The one or more modules provide additional functionality, interactivity, and/or shoppability to enhance user shopping experience. | 09-03-2015 |
Peter D. Gladstone, Arlington, MA US
Patent application number | Description | Published |
---|---|---|
20140103040 | BEVERAGE DELIVERY CAN - A beverage delivery can may comprise various configurations. Such configurations may comprise various aperture shapes, sizes, and configurations and various shapes, textures, configurations, and dimensions of the lid and surface of the can. A beverage can may comprise various exterior shapes such as a tapered shape, a faceted shape, a pint glass shape and the like. In embodiments, the beverage can may comprise various types of nucleation devices. A beverage can may comprise a vertical portion of the can, a continuous lip indentation comprising an upper lip, a waist pinch, and a shoulder and the like. In embodiments, various external packaging may be used with one or more beverage delivery cans. | 04-17-2014 |
20140190971 | BEVERAGE DELIVERY CAN - A beverage delivery can may comprise various configurations, including various aperture shapes, sizes, and configurations and various shapes, textures, configurations, and dimensions of the lid and surface of the can. A beverage can may comprise various exterior shapes such as a tapered shape, a faceted shape, a pint glass shape and the like. In embodiments, the beverage may comprise various types of nucleation devices. A beverage can may comprise a vertical portion of the can, a continuous lip indentation comprising an upper lip, a waist pinch, and a shoulder and the like. In embodiments, various external packaging may be used with one or more beverage delivery cans. | 07-10-2014 |
Philip Gladstone, Carlisle, MA US
Patent application number | Description | Published |
---|---|---|
20090309955 | AD HOC TELEPRESENCE MANAGER - In one embodiment, a method for managing ad hoc telepresence sessions is described. The method includes sensing a presence of a user in an ad hoc telepresence zone. The method also includes managing a list of contacts associated with the user. The method also includes determining an availability of a remote user at a remote telepresence zone. The remote user is selected from the list of contacts associated with the user. The method also includes displaying a list of available remote users. The method also includes initiating a telepresence session between the user and the remote user according to an input from the user to select the remote user from the list of available users. | 12-17-2009 |
Philip John Steuart Gladstone, Carlisle, MA US
Patent application number | Description | Published |
---|---|---|
20100211799 | Protecting Digital Data such as Images on a Device with Image Acquisition Capabilities - Digital data, such as images on a digital camera, is typically protected (e.g., encrypted and/or authenticated) based on a master key stored off the device. The original master key can be acquired in a number of different ways, including being generated by the device or by another device. A one-way, progressive series of keys are derived from the master key such that only images or data of a same session can be authenticated or decrypted for viewing, export or manipulation of the decrypted image/data. In order to decrypt images or data of a previous session on the device, the master key must be imported to the device, such as by, but not limited to, taking a picture of a representation of the key and interpreting the image to reacquire the master key. | 08-19-2010 |
20110154477 | DYNAMIC CONTENT-BASED ROUTING - Systems and methods for redirecting network traffic include a policy server configured to be in communication with a policy database and a client disposed on a remote device. The policy server is configured to receive an inquiry from the client regarding a universal resource locator (URL) request and, based on a policy obtained from the policy database, cause the client to control the remote device such that network traffic associated with the URL request is routed (tunneled) via a particular interface, e.g., a virtual private network (VPN) connection, when so required by the policy, and network traffic associated with the URL request is routed over a different VPN connection or a non-VPN connection when so required by the policy. | 06-23-2011 |
20120198519 | Restricting Network Access While Connected to an Untrusted Network - In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing logic coupled with the interface. The processing logic determines whether the interface is connected directly to a predefined network. The processing logic restricts access to the interface responsive to determining the interface is connected to a network other than the predefined network. The processing logic does not restrict access to the interface while the interface is directly connected with the predefined network. | 08-02-2012 |
20120233674 | SECURITY FOR REMOTE ACCESS VPN - Techniques are disclosed for improving security in virtual private network. In one embodiment, key information is generated for a virtual private network (VPN) connection between a first device and a second device. A plurality of shares is then generated based on the key information. A first set of one or more shares is stored on a dongle that is paired to the first device. A second set of one or more shares is stored on the first device. In response to a request to resume the VPN connection, the first set of shares is retrieved from the dongle. The key information is reconstructed based on the first set of shares and the second set of shares. The reconstructed key information may then be used to resume the VPN connection. | 09-13-2012 |
20140351925 | SECURITY FOR REMOTE ACCESS VPN - Techniques are disclosed for improving security in virtual private network. In one embodiment, key information is generated for a virtual private network (VPN) connection between a first device and a second device. A plurality of shares is then generated based on the key information. A first set of one or more shares is stored on a dongle that is paired to the first device. A second set of one or more shares is stored on the first device. In response to a request to resume the VPN connection, the first set of shares is retrieved from the dongle. The key information is reconstructed based on the first set of shares and the second set of shares. The reconstructed key information may then be used to resume the VPN connection. | 11-27-2014 |
20150074579 | SECURITY RISK MANAGEMENT - Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities. | 03-12-2015 |
Philip J.s. Gladstone, Carlisle, MA US
Patent application number | Description | Published |
---|---|---|
20120066759 | SYSTEM AND METHOD FOR PROVIDING ENDPOINT MANAGEMENT FOR SECURITY THREATS IN A NETWORK ENVIRONMENT - An example method is provided and includes monitoring activity within an endpoint, and identifying a source associated with a particular data segment received by the endpoint. The method also includes monitoring an antivirus mechanism within the endpoint. The antivirus mechanism is configured to identify the particular data segment as being associated with malware. The source associated with the particular data segment can be communicated to any suitable next destination. | 03-15-2012 |
20130097318 | SYSTEM AND METHOD FOR MANAGING ACCESS FOR TRUSTED AND UNTRUSTED APPLICATIONS - A method is provided in one example embodiment and includes identifying a network location of an endpoint, which is attempting to initiate an application; identifying whether the endpoint is operating in an enterprise environment; determining whether the application is trusted based on metadata associated with the application; and provisioning a tunnel for data traffic associated with the application. In more detailed implementations, the tunnel can be provisioned if the application is trusted and the endpoint is outside of an enterprise environment. In addition, the tunnel can be provisioned if the application is untrusted and the endpoint is within an enterprise environment. | 04-18-2013 |
20140082692 | Stateful Reference Monitor - A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request. | 03-20-2014 |
20140351942 | METHODS AND APPARATUS PROVIDING AUTOMATIC SIGNATURE GENERATION AND ENFORCEMENT - A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack. | 11-27-2014 |
Philip J. S. Gladstone, Carlisle, MA US
Patent application number | Description | Published |
---|---|---|
20100225451 | METHOD AND APPARATUS TO REDUCE DATA LOST ON PERSONAL MOBILE DEVICES - Methods and apparatus for providing security for mobile devices are disclosed. In one embodiment, a method includes maintaining responsibility for a first item when the first item is in a first range of a first container. Maintaining responsibility for the first item includes monitoring a locator tag associated with the first item when the locator tag is within the first range. The method also includes determining when the first item is in the first range, determining if the first item is in a second range associated with a second container when the first item is not in the first range, and determining if the second container is trusted with respect to the first container if the first item is in the second range. Additionally, the method includes transferring responsibility for the first item to the second container if the second container is trusted with respect to the first container. | 09-09-2010 |
20130312104 | METHODS AND APPARATUS PROVIDING AUTOMATIC SIGNATURE GENERATION AND ENFORCEMENT - A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack. | 11-21-2013 |
Richard Gladstone, Houston, TX US
Patent application number | Description | Published |
---|---|---|
20120109596 | Method and Apparatus For Optimization of Floor Covering And System For User Configuration and Real Time Pricing Information - A method and system for optimizing surface coverings having user input representative of a construction project, floor plans representative of the project including optional configurations of the plans, user input for selection from a plurality of the plans and options and creating data points representative of one of the plans, merging the plan and options into a set of data points representative of a final plan set, determining room surface selections from user input, deriving contiguity data from the surface areas representative of the surface selections; and optimizing price of floor materials for selected criteria based on pre-determined rules. The system and method weights traffic flow based on room configurations and determines optimal cuts of materials to minimize seams. Further, the system packs the cut materials optimally to fit standard sheet material such as carpet and vinyl. | 05-03-2012 |
20150088681 | Method and Apparatus for Optimization of Floor Covering and System For User Configuration and Real Time Pricing Information - A method and system for optimizing surface coverings having user input representative of a construction project, floor plans representative of the project including optional configurations of the plans, user input for selection from a plurality of the plans and options and creating data points representative of one of the plans, merging the plan and options into a set of data points representative of a final plan set, determining room surface selections from user input, deriving contiguity data from the surface areas representative of the surface selections; and optimizing price of floor materials for selected criteria based on pre-determined rules. The system and method weights traffic flow based on room configurations and determines optimal cuts of materials to minimize seams. Further, the system packs the cut materials optimally to fit standard sheet material such as carpet and vinyl. | 03-26-2015 |
Sam M. Gladstone, Buford, GA US
Patent application number | Description | Published |
---|---|---|
20140158777 | System, Method & Apparatus for Matrix-Less Inlay Design - According to at least one exemplary embodiment, a system, method and apparatus for a matrix-less inlay design may be described. The system, method and apparatus can include the formation of an inlay with a pattern, such as a starburst pattern, surrounding an antenna that can be formed during laser ablation process. The starburst pattern may be utilized to provide for the efficient generation of inlays of varying sizes. | 06-12-2014 |
Samuel Gladstone, Jacksonville, FL US
Patent application number | Description | Published |
---|---|---|
20150272608 | POWERED SURGICAL HANDPIECE HAVING A SURGICAL TOOL WITH AN RFID TAG - A powered surgical handpiece includes a housing comprising a motor, and a surgical tool removably coupled to the housing and configured to be driven by the motor. The surgical tool includes a radio frequency identification (RFID) tag. The handpiece includes an antenna for wirelessly transmitting RF energy, and a coupler that is electrically isolated from the antenna and the RFID tag and that is configured to guide the transmitted RF energy to the RFID tag. | 10-01-2015 |
Stephen M. Gladstone, Stamford, CT US
Patent application number | Description | Published |
---|---|---|
20090179182 | Fencing for residential and commercial use - The fence provides for a plurality of wires that are twisted together in pairs at a plurality of spaced elongated windings and spread to form openings. The spaced elongated windings lie in spaced parallel lines extending longitudinally in the mesh fence. The fence also includes a plurality of spaced apart parallel wires, wherein each of the plurality of spaced apart parallel wires extend through the spaced elongated windings lying in a line. Ones of the plurality of spaced apart parallel wires are conductive wires that are coupled to a connector to supply electricity to at least one electrical device. | 07-16-2009 |