Tessaro
Marco Tessaro, Zurich CH
Patent application number | Description | Published |
---|---|---|
20130101700 | PROCESS FOR UPGRADING FRESH MEAT - The process for upgrading fresh meat is effected by adding the mold fungus | 04-25-2013 |
Michael Tessaro, Caledonia CA
Patent application number | Description | Published |
---|---|---|
20140329271 | SCREENING FOR NITROGEN FIXATION - An essentially glutamine-free medium comprising a whole-cell glutamine biosensor, comprising a glutamine auxotrophic | 11-06-2014 |
Nicola Tessaro, Arco IT
Patent application number | Description | Published |
---|---|---|
20150377333 | HYDROSTATIC AND DIRECT DRIVE TRANSMISSION - A hydrostatic driveline is provided. The hydrostatic driveline comprises a power source, a hydrostatic pump, a hydrostatic motor, a direct drive link, and a transmission portion. The power source is drivingly engaged with an input member. The hydrostatic pump is in driving engagement with the input member. The hydrostatic motor is in fluid communication with the hydrostatic pump. The direct drive link is in driving engagement with the input member. The transmission portion is in driving engagement with a vehicle output and at least one of the hydrostatic motor and the direct drive link The transmission portion includes at least one engagement device and a drive ratio. The hydrostatic pump, the hydrostatic motor, and the transmission portion form a first power path for the hydrostatic driveline and the direct drive link forms a second power path for the hydrostatic driveline. | 12-31-2015 |
William E. Tessaro, Lake Worth, FL US
Patent application number | Description | Published |
---|---|---|
20090319786 | Electronic data security system and method - A security system capable of providing seamless access to, and encryption of, electronic data. The security system integrates into an operating environment and intercepts calls between the operating environment and one or more Productivity Applications within the operating environment, thereby ensuring security policies are properly applied to all sensitive data wherever the data travels or resides. | 12-24-2009 |