Ranum
Dan Ranum, Golden Valley, MN US
Patent application number | Description | Published |
---|---|---|
20140180382 | IMPLANT HAVING HIGH FATIGUE RESISTANCE, DELIVERY SYSTEM, AND METHOD OF USE - According to one aspect of the present invention, a fatigue resistant stent comprises a flexible tubular structure having an inside diameter, an outside diameter, and a sidewall therebetween and having apertures extending through the sidewall. According to other aspects of the invention, processes for making a fatigue resistant stent are disclosed. According to further aspects of the invention, delivery systems for a fatigue resistant stent and methods of use are provided. | 06-26-2014 |
Laura Ranum, Gainesville, FL US
Laura P.w. Ranum, St. Paul, MN US
Patent application number | Description | Published |
---|---|---|
20100317015 | SPINOCEREBELLAR ATAXIA TYPE 8 AND METHODS OF DETECTION - The present invention provides an isolated nucleic acid molecule containing a repeat region of an isolated spinocerebellar ataxia type 8 (SCA8) coding sequence, the coding sequence located within the long arm of chromosome 13, and the complement of the nucleic acid molecule. Diagnostic methods based on identification of this repeat region are also provided. | 12-16-2010 |
20120094299 | NUCLEOTIDE REPEAT EXPANSION-ASSOCIATED POLYPEPTIDES AND USES THEREOF - Isolated polypeptides that are endogenously expressed from nucleotide repeat expansions are disclosed. In some cases, the polypeptides include polypeptide repeats. In some cases, the polypeptide repeats include at least five contiguous repeats of a single amino acid. In other cases, the repeats include at least six contiguous amino acids of a tetra- or penta-amino acid repeat block. | 04-19-2012 |
20130115603 | NUCLEOTIDE REPEAT EXPANSION-ASSOCIATED POLYPEPTIDES AND USES THEREOF - Isolated polypeptides that are endogenously expressed from nucleotide repeat expansions are disclosed. In some cases, the polypeptides include polypeptide repeats. In some cases, the polypeptide repeats include at least five contiguous repeats of a single amino acid. In other cases, the repeats include at least six contiguous amino acids of a tetra- or penta-amino acid repeat block. | 05-09-2013 |
Laura P.w. Ranum, Gainesville, FL US
Patent application number | Description | Published |
---|---|---|
20140322711 | SPINOCEREBELLAR ATAXIA TYPE 8 AND METHODS OF DETECTION - The present invention provides an isolated nucleic acid molecule containing a repeat region of an isolated spinocerebellar ataxia type 8 (SCA8) coding sequence, the coding sequence located within the long arm of chromosome 13, and the complement of the nucleic acid molecule. Diagnostic methods based on identification of this repeat region are also provided. | 10-30-2014 |
Laura P. W. Ranum, St. Paul, MN US
Patent application number | Description | Published |
---|---|---|
20130029335 | SPINOCEREBELLAR ATAXIA TYPE 8 AND METHODS OF DETECTION - The present invention provides an isolated nucleic acid molecule containing a repeat region of an isolated spinocerebellar ataxia type 8 (SCA8) coding sequence, the coding sequence located within the long arm of chromosome 13, and the complement of the nucleic acid molecule. Diagnostic methods based on identification of this repeat region are also provided. | 01-31-2013 |
20130230849 | SPINOCEREBELLAR ATAXIA TYPE 8 AND METHODS OF DETECTION - The present invention provides an isolated nucleic acid molecule containing a repeat region of an isolated spinocerebellar ataxia type 8 (SCA8) coding sequence, the coding sequence located within the long arm of chromosome 13, and the complement of the nucleic acid molecule. Diagnostic methods based on identification of this repeat region are also provided. | 09-05-2013 |
Marcus Ranum, Morrisdale, PA US
Patent application number | Description | Published |
---|---|---|
20130227714 | SYSTEM AND METHOD FOR USING FILE HASHES TO TRACK DATA LEAKAGE AND DOCUMENT PROPAGATION IN A NETWORK - The system and method described herein may use file hashes to track data leakage and document propagation in a network. For example, file systems associated with known reference systems and various user devices may be compared to classify the user devices into various groups based on differences between the respective file systems, identify files unique to the various groups, and detect potential data leakage or document propagation if user devices classified in certain groups include any files that are unique to other groups. Additionally, various algorithms may track locations, movements, changes, and other events that relate to normal or typical activity in the network, which may be used to generate statistics that can be compared to subsequent activities that occur in the network to detect potentially anomalous activity that may represent potential data leakage or document propagation. | 08-29-2013 |
20140283083 | SYSTEM AND METHOD FOR CORRELATING LOG DATA TO DISCOVER NETWORK VULNERABILITIES AND ASSETS - The system and method described herein relates to a log correlation engine that may cross-reference or otherwise leverage existing vulnerability data in an extensible manner to support network vulnerability and asset discovery. In particular, the log correlation engine may receive various logs that contain events describing observed network activity and discover a network vulnerability in response to the logs containing at least one event that matches a regular expression in at least one correlation rule associated with the log correlation engine that indicates a vulnerability. The log correlation engine may then obtain information about the indicated vulnerability from at least one data source cross-referenced in the correlation rule and generate a report that the indicated vulnerability was discovered in the network, wherein the report may include the information about the indicated vulnerability obtained from the at least one data source cross-referenced in the correlation rule. | 09-18-2014 |
Marcus J. Ranum, Morrisdale, PA US
Patent application number | Description | Published |
---|---|---|
20140013434 | SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING - The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network. | 01-09-2014 |
20150281259 | SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING - The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network. | 10-01-2015 |
Odd Ranum, Dals Rostock SE
Patent application number | Description | Published |
---|---|---|
20090134593 | MOUNTING SYSTEM FOR A V-STAY IN A LARGE VEHICLE - A mounting system for securing a first vehicle component to a second vehicle component, where the first vehicle component is provided with first and second mounting bosses and the second vehicle component is provided with corresponding first and second mounting brackets, where the first vehicle component is secured to the second vehicle component by first and second threading members and mounting holes included in the first and second brackets and in the first and second bosses, wherein the bosses and the brackets are provided with mating contact surfaces that are tapered around the mounting holes. Besides absorbing impacts and relieving the stress on the threading members, the fastening member is easily mountable in the bosses on the axle casing by a mounting system according to the invention, since the tapered contact surfaces are self-centering and the two parts are thereby easily correctly positioned and secured by two threading members. | 05-28-2009 |
20100270719 | RUBBER SPRING FOR A VEHICLE WHEEL AXLE SUSPENSION - A rubber spring ( | 10-28-2010 |
Steven Mark Ranum, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20100170633 | Method and Apparatus for Making a Tubular Composite Structure - A tool for making a composite tubular structure, such as the inner skin of an acoustic liner, includes a base on which are mounted a plurality of sectors, each having an outer panel provided with a predetermined shaped surface. The predetermined shaped surface corresponds to a portion of the contour of the tubular structure to be formed. At least one of the sectors is fixed relative to the base while the remaining sectors are movable in a radial direction and separable from all the other sectors. The sectors are provided with air bearings to facilitate movement along a radial direction. Splice plates are used to form a joint between the outer panels of adjacent sectors. After composite material is applied on the outer panels, a vacuum bag is formed to surround the composite material and also the joint areas on the inner surface of the tool. The entire tool may be placed in an autoclave for curing. The thus-formed composite tubular structure may be remounted on the tool for bonding to additional exterior layers. | 07-08-2010 |