Thomas, WA
Adam M. Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140365668 | USING A TEMPLATE TO UPDATE A STACK OF RESOURCES - Techniques are described that enable a user to upgrade a stack of resources by providing a template that reflects the desired end state of the stack. Upon receiving a new template, the system automatically detects changes that should be performed and determines the order in which the changes should be performed. The system can also detect if the desired changes to the stack are a result of direct modifications; because parameters to the resources have changed; or the changes are indirectly caused by other dependency/attribute changing. Additionally, the system determines whether the changes require creating new resources or if the changes can be made to the resources live. In case of replacement of resources, the system will first create the new resource, move that new resource into the stack and remove the old resource(s). In case of failures, the system ensures that the stack rolls back to the initial state. | 12-11-2014 |
Alex Thomas, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20140108047 | Methods and systems for medical auto-coding using multiple agents with automatic adjustment - This disclosure is directed to methods and automated documentation and medical-coding systems that combine predictions of clinical decision support or multiple medical-code assignments into a final medical-code assignment, such that the combination is different for different contexts. In certain implementations, each agent receives the same set of terms and phrases extracted from an electronic medical record (“EMR”). Based on the context of the EMR, each agent extracts medical codes from one or more medical codebooks, compares the terms and phrases to the medical codes, and assigns a code to the EMR based on a confidence score. The multiple code assignments are combined to generate a final medical-code assignment based on the confidence scores, context, and each agent's historical performance within the context. The automated system stores and outputs the final medical-code assignment. | 04-17-2014 |
Anil F. Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100192227 | OFFLINE EXTRACTION OF CONFIGURATION DATA - A configuration scanning system is described herein that scans a system configuration database for malware-related information with less impact on other operations that access the system configuration database. The system employs techniques to reduce the impact on other operations that access the configuration database, including parsing a file-based stored version of the configuration database, accessing the configuration database using opportunistic locking, and caching configuration information obtained by scanning the configuration database. In this way, the system is able to respond to requests antimalware programs using cached information without impacting other programs using the configuration database. Thus, the configuration scanning system protects a computer system against malware while reducing the burden on the configuration database and on other programs that access the configuration database. | 07-29-2010 |
20120324197 | MEMORY MANAGEMENT MODEL AND INTERFACE FOR UNMODIFIED APPLICATIONS - A memory management system is described herein that receives information from applications describing how memory is being used and that allows an application host to exert more control over application requests for using memory. The system provides an application memory management application-programming interface (API) that allows the application to specify more information about memory allocations that is helpful for managing memory later. The system also provides an ability to statically and/or dynamically analyze legacy applications to give applications that are not modified to work with the system some ability to participate in more effective memory management. The system provides application host changes to leverage the information provided by applications and to manage memory more effectively using the information and hooks into the application's use of memory. Thus, the system provides a new model for managing memory that improves application host behavior and allows applications to use computing resources more efficiently. | 12-20-2012 |
20130125237 | OFFLINE EXTRACTION OF CONFIGURATION DATA - A configuration scanning system is described herein that scans a system configuration database for malware-related information with less impact on other operations that access the system configuration database. The system employs techniques to reduce the impact on other operations that access the configuration database, including parsing a file-based stored version of the configuration database, accessing the configuration database using opportunistic locking, and caching configuration information obtained by scanning the configuration database. In this way, the system is able to respond to requests antimalware programs using cached information without impacting other programs using the configuration database. Thus, the configuration scanning system protects a computer system against malware while reducing the burden on the configuration database and on other programs that access the configuration database. | 05-16-2013 |
Anil Francis Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100031353 | Malware Detection Using Code Analysis and Behavior Monitoring - Aspects of the subject matter described herein relate to malware detection using code analysis and behavior monitoring. In aspects, an anti-malware engine performs static analysis on program code and monitors behavior of the program code that is exhibited when the program code executes in a virtual and/or non-virtual environment. The anti-malware engine combines the results of both types of malware detection to determine whether the program code includes malware. The anti-malware engine may use feedback from one or more of the malware detection mechanism to direct additional malware detection (e.g., static and/or behavior detection) for the program code. | 02-04-2010 |
20100060925 | Controlling Sensitive Information Leakage in Printing - Aspects of the subject matter described herein relate to controlling sensitive information leakage in printing. In aspects, one or more interception units sit in the print path(s) of a device. The interception unit(s) receives print data that is generated on the device and extract information from the print data. The extracted information is used to determine whether the print data include sensitive information. If the print data includes sensitive information, a policy is applied and the print data may or may not be forwarded towards a printer. Otherwise, the print data is forwarded towards a printer without applying a policy. | 03-11-2010 |
20100192222 | MALWARE DETECTION USING MULTIPLE CLASSIFIERS - A method of identifying a malware file using multiple classifiers is disclosed. The method includes receiving a file at a client computer. The file includes static metadata. A set of metadata classifier weights are applied to the static metadata to generate a first classifier output. A dynamic classifier is initiated to evaluate the file and to generate a second classifier output. The method includes automatically identifying the file as potential malware based on at least the first classifier output and the second classifier output. | 07-29-2010 |
20110067109 | SYSTEM AND METHOD OF CACHING DECISIONS ON WHEN TO SCAN FOR MALWARE - In accordance with this invention, a system, method, and computer-readable medium that selectively scans files stored on a computing device for malware is provided. One aspect of the present invention includes identifying files that need to be scanned for malware when a software update that includes a malware signature is received. More specifically, attributes of the new malware are identified by searching metadata associated with the malware. Then, the method searches a scan cache and determines whether each file with an entry in the scan cache is the type that may be infected by the malware. If a file is the type that may be infected by the malware, the file is scanned for malware when a scanning event such as an I/O request occurs. Conversely, if the file is not the type that may be infected by the malware, the file may be accessed without a scan being performed. | 03-17-2011 |
20110209219 | Protecting User Mode Processes From Improper Tampering or Termination - In one embodiment, a malware protection system may protect a computing system from a malware event. A data storage device | 08-25-2011 |
20110307711 | DEVICE BOOTING WITH AN INITIAL PROTECTION COMPONENT - Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner. | 12-15-2011 |
20120144489 | Antimalware Protection of Virtual Machines - The subject disclosure is directed towards protecting virtual machines on guest partitions from malware in a resource-efficient manner. Antimalware software is divided into lightweight agents that run on each malware-protected guest partition, a shared scanning and signature update mechanism, and a management component. Each agent provides the scanning mechanism with files to scan for malware, such as by running a script, and receives results from the scanning mechanism including possible remediation actions to perform. The management component provides the scanning mechanism with access to virtual machine services, such as to pause, resume, snapshot and rollback guest partitions as requested by the scanning mechanism. | 06-07-2012 |
20120297488 | Discovering Malicious Input Files and Performing Automatic and Distributed Remediation - The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file. | 11-22-2012 |
20120317644 | Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries - The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt. | 12-13-2012 |
20120323829 | GRAPH-BASED CLASSIFICATION BASED ON FILE RELATIONSHIPS - A reliable automated malware classification approach with substantially low false positive rates is provided. Graph-based local and/or global file relationships are used to improve malware classification along with a feature selection algorithm. File relationships such as containing, creating, copying, downloading, modifying, etc. are used to assign malware probabilities and simultaneously reduce the false positive and false negative rates on executable files. | 12-20-2012 |
20130086683 | SELECTIVELY SCANNING OBJECTS FOR INFECTION BY MALWARE - Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects are infected by malware). For instance, metadata that is associated with the objects may be reviewed to determine whether update(s) have been made with regard to the objects since a determination was made that the objects were not infected by malware. An update may involve increasing a number of the objects, modifying one of the objects, etc. Objects that have been updated (e.g., added and/or modified) since the determination may be scanned. Objects that have not been updated since the determination need not necessarily be scanned. For instance, an allowance may be made to perform operations with respect to the objects that have not been updated since the determination without first scanning the objects for infection by malware. | 04-04-2013 |
20130332988 | Aggregating The Knowledge Base Of Computer Systems To Proactively Protect A Computer From Malware - Techniques for aggregating a knowledge base of a plurality of security services or other event collection systems to protect a computer from malware are provided. In embodiments, a computer is protected from malware by using anti-malware services or other event collection systems to observe suspicious events that are potentially indicative of malware. A determination is made as to whether a combination of the suspicious events is indicative of malware. If the combination of suspicious events is indicative of malware, a restrictive security policy designed to prevent the spread of malware is implemented. | 12-12-2013 |
20140089273 | LARGE SCALE FILE STORAGE IN CLOUD COMPUTING - Storing and retrieving files based on hashes for the files. One method for storing files includes: identifying a file; identifying a hash calculated based on the file; renaming the file based on the hash based on the file; and storing the file in a particular location based on the hash calculated based on the file. Another method for retrieving files includes: identifying a hash for a given file; using the hash, traversing a hierarchical file structure to find a location where the given file should be stored; determining that the file is at the location; and as a result, retrieving the file. | 03-27-2014 |
20140129817 | DEVICE BOOTING WITH AN INITIAL PROTECTION COMPONENT - Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner. | 05-08-2014 |
Brandon Thomas, Camano Island, WA US
Patent application number | Description | Published |
---|---|---|
20100198849 | METHOD AND APPARATUS FOR FAULT-TOLERANT MEMORY MANAGEMENT - A device and method for providing a fault-tolerant file system. The fault-tolerant file system attempts to minimize the number of writes used when updating file system data structures. In one embodiment, file system data, including file system metadata, is stored in a fault-tolerant tree including a working state and a transacted state. In one embodiment, a change list is used to track blocks that have been updated, instead of cascading updates to leaf nodes up the tree, and a delta block is used to further minimize block updates when adding or removing nodes from the tree. In one embodiment, a Q-Block is used to prevent cycles when adding and removing free blocks from an allocation tree. Metadata values are stored in the tree in a way that allows certain metadata values to be inferred when not present in the tree, thus conserving space and lowering query time. | 08-05-2010 |
20140025635 | METHOD AND APPARATUS FOR FAULT-TOLERANT MEMORY MANAGEMENT - A device and method for providing a fault-tolerant file system. The fault-tolerant file system attempts to minimize the number of writes used when updating file system data structures. In one embodiment, file system data, including file system metadata, is stored in a fault-tolerant tree including a working state and a transacted state. In one embodiment, a change list is used to track blocks that have been updated, instead of cascading updates to leaf nodes up the tree, and a delta block is used to further minimize block updates when adding or removing nodes from the tree. In one embodiment, a Q-Block is used to prevent cycles when adding and removing free blocks from an allocation tree. Metadata values are stored in the tree in a way that allows certain metadata values to be inferred when not present in the tree, thus conserving space and lowering query time. | 01-23-2014 |
20140032586 | METHOD AND APPARATUS FOR FAULT-TOLERANT MEMORY MANAGEMENT - A device and method for providing a fault-tolerant file system. The fault-tolerant file system attempts to minimize the number of writes used when updating file system data structures. In one embodiment, file system data, including file system metadata, is stored in a fault-tolerant tree including a working state and a transacted state. In one embodiment, a change list is used to track blocks that have been updated, instead of cascading updates to leaf nodes up the tree, and a delta block is used to further minimize block updates when adding or removing nodes from the tree. In one embodiment, a Q-Block is used to prevent cycles when adding and removing free blocks from an allocation tree. Metadata values are stored in the tree in a way that allows certain metadata values to be inferred when not present in the tree, thus conserving space and lowering query time. | 01-30-2014 |
Charles William Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140116610 | Composite Tool Having Vacuum Integrity and Method of Making the Same - A composite tool for vacuum bag processing composite parts comprises a plurality of laminated composite plies, including a facesheet adapted to have a composite part placed thereon. A gas impermeable barrier layer sandwiched between the composite plies prevents air leaks through the tool. | 05-01-2014 |
20140231022 | Elastomeric Bladder System - A method for and apparatus for forming a bladder system. A bladder with an open end is formed. The open end of the bladder is placed into an interior of a fitting. The open end of the bladder is connected to the interior of the fitting. | 08-21-2014 |
Charles William Thomas, Issaquah, WA US
Patent application number | Description | Published |
---|---|---|
20150090005 | Leak Detection in Composite Structures - A leak through the thickness of a structure is detected from one side of the structure using a leak detection layer. The leak detection layer exhibits visually observable changes when exposed to an air leak. | 04-02-2015 |
Christopher Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140052563 | Apparatus, Article of Manufacture and Methods for Customized Design of a Jewelry Item - Apparatus, article of manufacture and method for designing a jewelry setting that comprise displaying on a display a plurality of components. Each component corresponds to a section of a jewelry setting. A selection of at least one component that corresponds to a first section of the jewelry setting is received. An electronic template of the jewelry setting is generated. The electronic image comprises the at least one selected component. The electronic template is transmitted to a remote device. | 02-20-2014 |
Edward Eric Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090282020 | AUTO-SELECTION OF MEDIA FILES - Apparatus and methods to control selection of media content provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 11-12-2009 |
20090282050 | SYNCHRONIZING MEDIA FILES AVAILABLE FROM MULTIPLE SOURCES - Apparatus and methods for synchronizing media files available from multiple sources provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 11-12-2009 |
20090282057 | MANAGING MEDIA FILES FROM MULTIPLE SOURCES - Apparatus and methods to manage media files from multiple sources provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 11-12-2009 |
20090282077 | MANAGING MEDIA FILES USING METADATA INJECTION - Apparatus and methods to manage media files using metadata injection provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 11-12-2009 |
20090282078 | UNIFIED MEDIA FILE ARCHITECTURE - Apparatus and methods for a unified media file architecture provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 11-12-2009 |
20090282088 | SYSTEMS AND METHODS FOR SPACE MANAGEMENT IN FILE SYSTEMS - Apparatus and methods for space management in file systems provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 11-12-2009 |
20120096056 | MANAGING MEDIA FILES USING METADATA INJECTION - Apparatus and methods to manage media files using metadata injection provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 04-19-2012 |
20140222972 | Systems and Methods for Space Management in File Systems - Apparatus and methods for space management in file systems provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 08-07-2014 |
Glen Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120205436 | SYSTEM FOR ENHANCED BARCODE DECODING AND IMAGE RECOGNITION AND METHOD THEREFOR - A system for enhanced barcode decoding and image recognition and method therefor. Target image data and ancillary image data are received at a server from a client device. Using the target image data and the ancillary image data, enhancement parameters are chosen to augmenting and/or enhanced the target image data. A code database is queried using the augmented/enhanced image data to identify codes that that match the target image. When multiple possible matching codes are returned in response to the query, a trending pattern associated with at least one of the target image data and the ancillary image is identified and is used to select the most probable match from the multiple possible matches. | 08-16-2012 |
Glenn Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110264527 | Apparatuses, Methods and Systems for a Code-Mediated Content Delivery Platform - The present disclosure details apparatuses, methods, and systems for a code-mediated content delivery platform comprising a Graphical Code-Serving Interface and a Code Triggered Information Server (“GCSI/CTIS”). The GCSI/CTIS connects information encoding symbologies to graphical interface elements, thus expanding the useful information content and interactivity of graphical displays, advertisements, publications, broadcasts, and/or the like. GCSI/CTIS components facilitate wide ranging functionality, including generation of robust encoding symbologies, error-correction, media sampling and purchasing, social networking, and sales promotion programs. | 10-27-2011 |
Glynn Michael Thomas, Mill Creek, WA US
Patent application number | Description | Published |
---|---|---|
20090206209 | SYSTEMS AND METHODS FOR PROVIDING DIFFERENTIAL MOTION TO WING HIGH LIFT DEVICE - Systems and methods for providing differential motion to wing high lift devices are disclosed. A system in accordance with one embodiment of the invention includes a wing having a leading edge, a trailing edge, a first deployable lift device with a first spanwise location, and a second deployable lift device with a second spanwise location different than the first. The wing system can further include a drive system having a drive link operatively coupleable to both the first and second deployable lift devices, and a control system operatively coupled to the drive system. The control system can have a first configuration for which the drive link is operatively coupled to the first and second deployable lift devices, and activation of at least a portion of the drive link moves the first and second deployable lift devices together. In a second configuration, the drive link is operatively coupled to at least the first deployable lift device and operatively decoupled from the second deployable lift device, so that actuation of at least a portion of the drive link moves the first deployable lift device relative to the second deployable lift device. | 08-20-2009 |
Gomer Thomas, Ne Arlington, WA US
Patent application number | Description | Published |
---|---|---|
20100162307 | Method for receiving a broadcast signal and broadcast receiver - A method of receiving a broadcast signal including a Non-Real-Time (NRT) service and a broadcast receiver are disclosed herein. A method of receiving a broadcast signal including an NRT service, method comprises receiving a broadcast signal including first signaling information and second signaling information, identifying the NRT service based on the first signaling information, identifying an Internet Protocol (IP) address of an NRT service signaling data based on the first signaling information and the second signaling information, receiving the NRT service signaling data by accessing the IP address, and downloading a desired NRT service based on the NRT service signaling data. | 06-24-2010 |
20100162334 | Method for receiving a broadcast signal - A method of receiving a broadcast signal including a Non-Real-Time (NRT) service and a broadcast receiver are disclosed herein. A method of receiving a broadcast signal including a Non-Real-Time (NRT) service, the method comprises receiving a broadcast signal including an NRT content and NRT service guide information, the NRT service guide information including a content fragment, identifying a File Delivery over Unidirectional Transport (FLUTE) session delivering the NRT content from the broadcast signal, detecting a first content identification information from a File Description Table (FDT) of the FLUTE session, and detecting a second content identification information of the content fragment matched with the first content identification information. | 06-24-2010 |
20130024900 | METHOD AND APPARATUS FOR PROCESSING NON-REAL-TIME BROADCAST SERVICE AND CONTENT TRANSMITTED BY BROADCAST SIGNAL - The present invention relates to a method and an apparatus for delivering an NRT service or NRT content through a broadcast signal. According to one embodiment of the present invention, the method for processing the NRT broadcast service comprises the steps of: receiving a broadcast signal including an IP multicast stream transmitted through a particular Internet protocol (IP) address; parsing a service map table (SMT) for signaling a non-real-time (NRT) service from the IP multicast stream included in the received broadcast signal; parsing a language information descriptor indicative of language information of an element associated with the NRT service at the parsed service map table; parsing, in the parsed language information descriptor, a language type field indicative of the type of language used in the NRT service and an element type field indicative of the type of element associated with the NRT service; and identifying that the language indicated by the language type field is used in the element associated with the NRT service indicated by the parsed element type field, wherein said element type field identifies one of elements which are associated with the NRT service and include a caption element of the NRT service and a text element of the NRT service. | 01-24-2013 |
Grant Brian Thomas, Lake Stevens, WA US
Patent application number | Description | Published |
---|---|---|
20140103162 | Method And Apparatus For Attaching An Aircraft Fuselage Frame To A Wing Box - The present disclosure is generally directed to an aircraft body including a fuselage skin on an outboard member of the aircraft body and a wing box extending through a member of the aircraft body. The wing box being enclosed and capable of being pressurized is fixedly attached at an outer surface to at least one pair of an attachment member and an attachment link member that is fixedly attached to the aircraft body. | 04-17-2014 |
Greg Thomas, Bellingham, WA US
Patent application number | Description | Published |
---|---|---|
20120091811 | Uninterruptible Power Supply Systems and Methods for Communications Systems - An uninterruptible power supply for supply electrical power to a load, comprises a connection to a primary source for supplying primary power, a battery system for storing battery power, an inverter, and a controller. The controller controls the inverter to operate in a first mode, a second mode, and in a third mode. In the first mode, power is supplied to the primary load and the battery system based on primary power. In the second mode, power is supplied to the primary load based on battery power. In the third mode, power is supplied to the primary source based on battery power. | 04-19-2012 |
Hugh William Thomas, Moses Lake, WA US
Patent application number | Description | Published |
---|---|---|
20120227941 | EXTERNAL HEAT EXCHANGER FOR STOVES - A heat exchanger takes existing hot gases from a stove exit and removes heat from these hot exhaust gases. The heat exchanger makes the stove more efficient. The exhaust gases may go through a conductive material core, such as an aluminum core, where forced air passing through pipes through the heat exchanger warms up by radiation, conduction and convection. | 09-13-2012 |
Jacob Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20080201493 | Determining authorized use of a software application - A user may enable features of a software application installed on a processing device only when the processing device is at a location for which the processing device is authorized to use the software application. If the processing device is offline, the processing device may refer to data in a component of the processing device to determine whether the data includes an authorized value. If processing device determines that the data has the authorized value, then the features of the installed software application may be enabled. In some embodiments, data with respect to unauthorized use of the software application may be recorded. In other embodiments, a determination may be made regarding whether a processing device, associated with an entity, violates a license agreement of the entity with respect to an installed software application. If the license agreement of the entity is determined to be violated, then information may be recorded. | 08-21-2008 |
James E. Thomas, Issaquah, WA US
Patent application number | Description | Published |
---|---|---|
20130043885 | ANTENNA SYSTEM FOR ELECTROMAGNETIC COMPATIBILITY TESTING - An antenna system for electromagnetic compliance testing within a frequency range includes a driven element mounted on a boom and including opposed first and second length-adjustable conductors. A length-adjustable passive element is mounted on the boom and spaced apart from the driven element and including opposed third and fourth length-adjustable conductors. An RF input connector is coupled between a feed path to a feed end of each length-adjustable conductors in the driven element. The feed path is configured to minimize stray reactances and stub effects within the frequency range. | 02-21-2013 |
James J. Thomas, Richland, WA US
Patent application number | Description | Published |
---|---|---|
20090271406 | SEQUENTIAL PATTERN DATA MINING AND VISUALIZATION - One or more processors ( | 10-29-2009 |
20090273602 | DYNAMIC VISUALIZATION OF DATA STREAMS - One embodiment of the present invention includes a data communication subsystem to receive a data stream, and a data processing subsystem responsive to the data communication subsystem to generate a visualization output based on a group of data vectors corresponding to a first portion of the data stream. The processing subsystem is further responsive to a change in rate of receipt of the data to modify the visualization output with one or more other data vectors corresponding to a second portion of the data stream as a function of eigenspace defined with the group of data vectors. The system further includes a display device responsive to the visualization output to provide a corresponding visualization. | 11-05-2009 |
20110179093 | Storing and Managing Information Artifacts Collected by Information Analysts Using a Computing Device - Systems and computer-implemented processes for storage and management of information artifacts collected by information analysts using a computing device. The processes and systems can capture a sequence of interactive operation elements that are performed by the information analyst, who is collecting an information artifact from at least one of the plurality of software applications. The information artifact can then be stored together with the interactive operation elements as a snippet on a memory device, which is operably connected to the processor. The snippet comprises a view from an analysis application, data contained in the view, and the sequence of interactive operation elements stored as a provenance representation comprising operation element class, timestamp, and data object attributes for each interactive operation element in the sequence. | 07-21-2011 |
Jamie Ann Thomas, Maple Valley, WA US
Patent application number | Description | Published |
---|---|---|
20090136647 | Method of making mashable potatoes - A method of making frozen, reheatable and mashable potato pieces includes fully cooking potato pieces such that the potato pieces maintain structural integrity, dewatering the potato pieces, and freezing the potato pieces and packaging the frozen potato pieces in a reheatable container to form frozen, reheatable, and mashable potato pieces. | 05-28-2009 |
Justin Thomas, Everett, WA US
Patent application number | Description | Published |
---|---|---|
20090128557 | METHOD AND APPARATUS FOR GENERATING DATA FOR THREE-DIMENSIONAL MODELS FROM X-RAYS - A computer implemented method, apparatus, and computer usable program code for generating a three-dimensional model of an object of interest in an aircraft. In response to transmitting a plurality of x-rays from a set of transmission points into the aircraft, backscatter x-ray data is received. The object identified from a two-dimensional diagram of the backscatter data. Points for the object are created from the identification of the object in the received data. The points are placed at a first distance from the transmission points to form a first curve. The points are placed at a second distance from the transmission points to form a second curve. A first surface is formed from the first and second curves. A second surface is formed that intersects the first surface to form an intersection. Three-dimensional data is generated for the three-dimensional model of the object from the intersection. | 05-21-2009 |
Kapenda Thomas, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20140280745 | Probabilistic Method For Scoring and Segmenting Online Personalities - The present invention relates to a system, method, or a computer program product that uses third-party data sources for the verification and profiling of identifier information including, for example, email address identifiers. The present invention uses identifier information to gather, aggregate, and record identifier-related data which is then sorted and scored based on user-determined criteria and source biased weighting. The score that is obtained can relate to identifier verification and/or profiling of the identifier for various purposes, and also may be used to detect the potential of fraud associated with the identifier. | 09-18-2014 |
Kent Thomas, Camac, WA US
Patent application number | Description | Published |
---|---|---|
20100242304 | FOOTWEAR WITH A SHANK SYSTEM - An aspect of the present invention includes a footwear assembly comprising: an upper and a sole assembly connected to the upper. The sole assembly has a footwear assembly comprising a sole assembly connected to an upper. The sole assembly has a midsole made of a first material and having a forefoot portion, an arch portion, a heel portion, and a sidewall extending around a lateral side, a medial side, and a heel side of the midsole. A stiffener is connected to the midsole. The stiffener is made of a second material stiffer than the first material. The stiffener has a base portion adjacent to the arch portion and at least one of the forefoot portion and the heel portion of the midsole. The stiffener has a side stabilizer and a heel wrap coupled to the base portion. The side stabilizer is adjacent to the sidewall in at least one of the arch portion and forefoot portion. The heel wrap is adjacent to the heel side and at least one of the lateral side and medial side of the midsole's sidewall. | 09-30-2010 |
Kent Thomas, Camas, WA US
Patent application number | Description | Published |
---|---|---|
20120023775 | FOOTWEAR WITH A SHANK SYSTEM - An aspect of the present invention includes a footwear assembly comprising: an upper and a sole assembly connected to the upper. The sole assembly has a footwear assembly comprising a sole assembly connected to an upper. The sole assembly has a midsole made of a first material and having a forefoot portion, an arch portion, a heel portion, and a sidewall extending around a lateral side, a medial side, and a heel side of the midsole. A stiffener is connected to the midsole. The stiffener is made of a second material stiffer than the first material. The stiffener has a base portion adjacent to the arch portion and at least one of the forefoot portion and the heel portion of the midsole. The stiffener has a side stabilizer and a heel wrap coupled to the base portion. The side stabilizer is adjacent to the sidewall in at least one of the arch portion and forefoot portion. The heel wrap is adjacent to the heel side and at least one of the lateral side and medial side of the midsole's sidewall. | 02-02-2012 |
Kevin Thomas, Bainbridge Island, WA US
Patent application number | Description | Published |
---|---|---|
20100153201 | SYSTEM AND METHOD FOR PROVIDING FOOD AND GROCERY MULTI-MEDIA CONTENT TO CONSUMERS USING WIDGETS - A system and method ( | 06-17-2010 |
Kevin T. Thomas, Bainbridge Island, WA US
Patent application number | Description | Published |
---|---|---|
20100153209 | SYSTEM AND METHOD FOR CALCULATING CANDIDATE RECIPES FOR CONSUMERS USING WIDGETS BASED ON CONSUMER TARGET DATA - A system and method ( | 06-17-2010 |
Lisa C. Thomas, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20120209468 | INTEGRATED ELECTRONIC CHECKLIST DISPLAY SYSTEM - A method and apparatus for electronic checklist display system. A checklist display device is connected to a number of display screens. A display screen within the number of display screens displays an integrated electronic checklist within a checklist display window on the display screen. The integrated electronic checklist comprises a number of checklist items associated with a vehicle system, systems information for the vehicle system, and graphics representing a current status of a number of components of the vehicle system. | 08-16-2012 |
20130338445 | METHOD AND SYSTEM FOR THE AUTOMATED ASSESSMENT OF FATIGUE MITIGATION STRATEGIES - A method, system, and computer program product are provided to automatically assess a plurality of fatigue mitigation strategies. In the context of a method, fatigue information is received for a subject and determination is made as to whether the subject is fatigued. In an instance in which the subject is fatigued, the method determines an estimated effectiveness of each of a plurality of fatigue mitigation strategies based upon fatigue information for the subject and one or more constraints and characteristics of a respective fatigue mitigation strategy. The determination of the estimated effectiveness of each of the plurality of fatigue mitigation strategies may also be based upon at least one of a time to become effective, a duration of the effectiveness and a side effect. The method also identifies at least one fatigue mitigation strategy to address fatigue of the subject. | 12-19-2013 |
Mark A. Thomas, Pullman, WA US
Patent application number | Description | Published |
---|---|---|
20130322500 | Thermal Management of a Communication Transceiver in an Electrical Communication Device - Disclosed herein are various systems and methods relating to communication devices that include modular transceivers, such as small form pluggable transceivers. According to one embodiment, a communication device may include a chassis defining an interior and an exterior of the communication device. The chassis includes a top, a bottom, and a plurality of sides that together with the top and the bottom form an enclosure. One of the sides may include a first segment disposed in a first plane and a second segment disposed in a second plane. The second segment includes an outwardly extending communication transceiver housing configured to receive a communication transceiver. The communication transceiver may extend through an aperture in the second segment and into interior of the communication device to contact an electrical connector, while a second portion of the communication transceiver in the communication transceiver housing remains on the exterior of the communication device. | 12-05-2013 |
Mary Thomas, Edmonds, WA US
Patent application number | Description | Published |
---|---|---|
20120282829 | TSUNAMI SURVIVAL SHELTER - Technology is disclosed for tsunami survival shelters. In various embodiments, a tsunami survival shelter comprises a vertical support column designed to withstand forces exerted by anticipated tsunamis and accompanying debris field; a buoyant inflatable survival life raft removably attached near a top portion of the vertical support column and capable of floating free from the vertical support column, and thereby protecting the occupants in the event of failure or overtopping of the support column; and adornments and coloring to allow the vertical support column and survival raft to blend with their surroundings by imitating trees indigenous to the area. | 11-08-2012 |
Michael W. Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090199207 | PRIORITY MESSAGING AND PRIORITY SCHEDULING - Systems and methods that set priority levels to messaging systems initiated between end points (e.g., two SQL point services) thru service brokers. A priority component can apply priority at a session level to add priority capabilities on top of service brokers, and enable setting priority for all the messages in a session or conversation. Such priority can further affect the order in which messages from different conversations are sent and the order in which they are received. | 08-06-2009 |
20090307137 | MANAGING PROVENANCE OF DIGITALLY SIGNED DATA IN USER EDITABLE RECORDS - A system and method for managing health information. The system may include a server configured to execute an account interface module enabling a user to access a user account, wherein a plurality of healthcare record items are stored on a server, via a user client device. The server may also be configured to execute an upload module that is configured to receive a digitally signed, original version of a healthcare record item from a content supplier, and an editor module configured to enable a user to make a user edit, thereby producing an updated version of the healthcare record item. The server may also be configured to execute a provenance module to determine whether the user edit affects the digitally signed data, and accordingly remove or replace the digital signature, and a download module to download the updated version of the healthcare record item to a content recipient. | 12-10-2009 |
20100235410 | DISTRIBUTED DATA STORAGE - In one example, data may be divided into blocks, and the blocks may be stored in various storage resources. Data to be stored may be provided to a data divider. The data divider may divide the data into blocks. Redundancy may be introduced into the blocks to allow the original data to be reconstructed at some point in the future, even if fewer than all of the original blocks are available. The blocks may be sent to a data shuffler, which may shuffle the blocks, and may provide a key that describes how to reconstruct the original data from the blocks. The key may be provided to the owner of the data. When the original data is to be retrieved, the key may be provided to a reassembler, which retrieves the blocks from the various storage resources and reconstructs the data using the key. | 09-16-2010 |
Mike Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20140306994 | PERSONAL HOLOGRAPHIC BILLBOARD - Methods for generating and displaying personalized virtual billboards within an augmented reality environment are described. The personalized virtual billboards may facilitate the sharing of personalized information between persons within an environment who have varying degrees of acquaintance (e.g., ranging from close familial relationships to strangers). In some embodiments, a head-mounted display device (HMD) may detect a mobile device associated with a particular person within an environment, acquire a personalized information set corresponding with the particular person, generate a virtual billboard based on the personalized information set, and display the virtual billboard on the HMD. The personalized information set may include information associated with the particular person such as shopping lists and classified advertisements. The HMD may share personalized information associated with an end user of the HMD with the mobile device based on whether the particular person is a friend or unknown to the end user. | 10-16-2014 |
Myron C. Thomas, Newcastle, WA US
Patent application number | Description | Published |
---|---|---|
20080232561 | Advertising funded data access services - Techniques for using advertising to fund the use of client-side or network-side data access services by a user of a personal electronic device are discussed. Digital advertising content is associated with data items accessible via a particular data access service at a variety of processing locations, using a variety of techniques. An account having an account balance is used to record exchanges of consideration between the user and the data access service. When the user uses the personal electronic device to access data items via the data access service, the account balance is adjusted to reflect a consideration provided by the data access service. When the user consumes digital advertising content, the account balance is adjusted to reflect consideration provided by the user. In this manner, the account serves as a medium for the advertising source to fund the use of the data access service. | 09-25-2008 |
20090077138 | DATA-DRIVEN SYNCHRONIZATION - Synchronization is bound to data and optionally a set of synchronization behaviors as opposed to a particular application and/or endpoint. As a result, synchronization amongst endpoints need not require creation of customized synchronization solutions or rely on vendor and/or application specific mechanisms. In one instance, standard data and/or synch schemas can be subscribed to and utilized to dynamically configure synchronization across endpoints. | 03-19-2009 |
Myron Clifford Thomas, Newcastle, WA US
Patent application number | Description | Published |
---|---|---|
20090119688 | Switching of Media Presentation - A system and method for switching presentation of media between two or more processes without interruption is described. This system and method can enable a user to enjoy media presented in a process and then switch the presentation of that media to another process without interruption in the media. Further, this system and method can enable a user to switch back and forth between media presentation within one application and another application without interruption. | 05-07-2009 |
20100269043 | TASKBAR MEDIA PLAYER - A system and method for controlling media through a user interface integrated within a taskbar is described. This system and method enable a user to control media while a user interface of another application remains in perspective. Further, this system includes a taskbar media player, which can play media and enable a user to control the play of that media from within a taskbar. | 10-21-2010 |
20120254756 | TASKBAR MEDIA PLAYER - A system and method for controlling media through a user interface integrated within a taskbar is described. This system and method enable a user to control media while a user interface of another application remains in perspective. Further, this system includes a taskbar media player, which can play media and enable a user to control the play of that media from within a taskbar. | 10-04-2012 |
Nathan Bartholomew Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140136782 | Dynamic Selection of Storage Tiers - An operating system is configured to receive a request to store an object that does not specify the location at which the object should be stored. The request might also include an optimization factor and one or more object location factors. The operating system might also generate object location factors or retrieve object location factors from one or more external locations. Object location factors might also be utilized that are based upon properties of the object to be stored. Utilizing the object location factors, and the optimization factor if provided, the operating system dynamically selects an appropriate storage tier for storing the object. The tiers might include a local storage tier, a local network storage tier, a remote network storage tier, and other types of storage tiers. The object is then stored on the selected storage tier. The object may be retrieved from the storage tier at a later time. | 05-15-2014 |
Perkins S. Thomas, Renton, WA US
Patent application number | Description | Published |
---|---|---|
20150068691 | MULTILAYER AIRCRAFT SHADE MATERIAL - In one aspect, a multilayer material comprises a first layer formed from a thermoplastic elastomeric material, a second layer formed from a fabric and secured to a first side of the first layer, and a third layer formed from a fabric secured to a second side of the first layer. The multilayer material may be incorporated into a window shade for use in a vehicle, e.g., an aircraft or the like. | 03-12-2015 |
Renjit Tom Thomas, Vancouver, WA US
Patent application number | Description | Published |
---|---|---|
20100030901 | Methods and Systems for Browser Widgets - Aspects of the present invention are related to systems and methods for providing and managing browser widgets in systems with limited user interface capabilities or computational power. | 02-04-2010 |
20130007586 | Method and system for creating and using web feed display templates - Web feed display templates are created and used to reduce the time and cost to conform web feeds to device constraints and content provider display guidelines. A web feed display template is customized for a particular type of device and a particular web feed. The display template is created by administrative input of values for predefined display parameters. The values are selected to conform the web feed to the constraints of the device and content provider display guidelines for the web feed. When a user of the device subscribes to the web feed, the display template is used to dynamically create web pages containing web feed items that conform to the constraints of the device and the content provider display guidelines. | 01-03-2013 |
20130007869 | Method and system for automatic recovery from lost security token on embedded device - Automatic recovery from loss of a security token on an embedded device is achieved by having a service provider (SP) server send to a device server a backup copy of the security token in conjunction with sending to an embedded device a primary copy of the security token, and retrieving from the device server and sending to the embedded device the backup copy of the security token upon detecting that the primary copy of the security token has been lost. The method and system obviate the need for a user to have to re-input on the embedded device a credential that is represented by the security token in the event the primary copy of the security token is erased from the embedded device or otherwise becomes inaccessible to the embedded device. | 01-03-2013 |
20140289470 | Computing Device Having Optimized File System and Methods for Use Therein - A computing device having an optimized file system and methods for use therein. File system optimizations include sector-aligned writes, anchored cluster searches, anchored index searches, companion caches dedicated to particular file management data types and predictive cache updates, all of which expedite processing on the computing device. The file system optimizations are especially advantageous for data collection systems where an embedded device is tasked with logging to a target memory data received in a continuous data stream and where none of the streamed data is deleted until after the target memory has been offloaded to another device. | 09-25-2014 |
Robert Thomas, Brier, WA US
Patent application number | Description | Published |
---|---|---|
20140031988 | WIRELESS SENSOR DEVICE WITH WIRELESS REMOTE PROGRAMMING - The disclosure relates generally to wireless sensor devices, and more particularly, to remote programming of wireless sensor devices. A wireless sensor device wirelessly may receive messages from a remotely located device to a wireless sensor device. The wireless sensor device may be programmed via the receive messages. In one example, a building controller may be programmed to wirelessly send one or more messages to a wireless sensor device in order to change the behavior of the wireless sensor device, even while the wireless sensor device and building controller are on-line and actively controlling a building control system. In some instances, a technician or installer may use a diagnostic or setup tool to send one or more messages to a wireless sensor device to change the behavior of the wireless sensor device. These are just some examples. | 01-30-2014 |
Robert B. Thomas, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20130126103 | WATER ACCUMULATION PREVENTION SYSTEMS, DEVICES AND METHODS FOR AWNING STRUCTURES - A rain shedding accessory for retractable awnings is provided. The rain shedding accessory includes a bow system for coupling between a pair of arm members of an awning structure in a mounting region located beneath an area corresponding to a leading portion of an awning sheet thereof. A bow member of the bow system is aligned generally parallel to a lead member of the awning structure and is upwardly curved to elevate a portion of the awning sheet when the awning is in a deployed configuration to prevent the accumulation of water or debris thereon. Other accessory devices and methods of preventing the accumulation of water or debris on retractable awning structures using bow systems and other prop devices are also provided. | 05-23-2013 |
Robert J. Thomas, Brier, WA US
Patent application number | Description | Published |
---|---|---|
20090115604 | SYSTEM AND METHODS FOR USING A WIRELESS SENSOR IN CONJUNCTION WITH A HOST CONTROLLER - Systems and methods for using a wireless sensor in conjunction with a host controller are described. An illustrative system can include a host controller, a wireless sensor device, and a decoder in communication with the wireless sensor device and the host controller. The host controller may include a remote sensor input that normally would be connected to a wired remote sensor having an expected sensor characteristic. The decoder may receive a wireless signal from the wireless sensor device, and may provide an output signal to the remote sensor input of the host controller that replicate or mimic signals that would be provided by a wired remote sensor having the expected sensor characteristic. | 05-07-2009 |
20090134927 | DIGITAL POTENTIOMETER SYSTEM - A system or circuit for simulating a potentiometer, thermistor, or the like. A pulse stream, having a duty cycle which is varied as a changing pulse width or as a differing number of time slices per time period, may be input to the system. The pulse stream to a transistor or switch-like mechanism may allow a controlled connection of a fixed value resistor to a reference voltage or ground to provide various resultant values of impedance or resistance. A measuring circuit connected to the output of the system may determine a value which is of the fixed value resistor divided by the duty cycle of the pulse train effectively controlling the connection of the resistor to ground. One or more additional circuits may be connected in parallel to achieve greater accuracy. | 05-28-2009 |
20090259342 | SURROGATE-BASED CONTROL SYSTEM - A system for surrogate control of a space that incurs an ineffective sensor connection with its controller for running environmental conditioning equipment to maintain the space at one or more certain environmental parameters such as temperature. A selection of a surrogate space from which the surrogate control is obtained, may be made by correlation of data over time and specifications of other spaces in a building complex. The surrogate control may be from the controller of the space selected for control of the space having the ineffective sensor connection. The surrogate space may be a construct of one or more spaces. It may be based on a virtual space that combines behaviors of other spaces for a good match. Diagnostics may be effected from information about spaces in the system. | 10-15-2009 |
20120246524 | DEBUGGING AID FOR SECURE WIRELESS SYSTEMS - In an encrypted wireless system, when a wireless node detects that it is having problems, it may be programmed to transmit one or more diagnostic messages without encryption, or with reduced encryption. The transmitted diagnostic messages may be received and interpreted by a technician troubleshooting the system. Once the technician troubleshoots and repairs the system, the affected wireless node may detect that it is operating normally, and may cease transmitting the unencrypted, or reduced-encryption, diagnostic messages. In most cases, the wireless system does not need any particular input to initiate the unencrypted, or reduced-encryption, diagnostic message transmissions. | 09-27-2012 |
Robin Thomas, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20120198019 | WEB SERVICE SUPPORT FOR BULK ITEM EXPORT/IMPORT - A method for migrating, archiving, or backing-up data between a first device and a second device hosting a communication application in a networked computing environment. The method includes retrieving mailbox data from the second device, the mailbox data includes messaging data and configuration data of the communication application associated with the mailbox data. The method also includes mapping the mailbox data from a first data format to a second data format, and transferring the mapped mailbox data to the first device as a first file. | 08-02-2012 |
20130191465 | FACILITATING MESSAGE SERVICES USING MULTI-ROLE SYSTEMS - Systems, methods, and software are provided for facilitating a message service. A multi-role system is identified based on where an active message database associated with a user identity resides. Service communications generated by a messaging client associated with the user identity are directed from an entry system to the multi-role system for handling in the multi-role system by a messaging server and a content server to provide the message service. | 07-25-2013 |
Robin Michael Thomas, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20130086381 | MULTI-SERVER AUTHENTICATION TOKEN DATA EXCHANGE - A client is authenticated by a server receiving an initial request from the client at the beginning of a session. The server receiving the initial request generates an authentication token and returns the authentication token to the client in response to the client being authenticated. The user's credentials used to authenticate the client are stored in the authentication token along with other information. After receiving the authentication token from the server that generated the authentication token, the client passes the authentication token with each of the future requests to the pool of servers. Using the client to pass the transferrable authentication token, the servers share the user's identity/credentials in a decentralized manner. Any server from the shared pool of servers that receives a subsequent client request is able to decrypt the token and re-authenticate the user without having to prompt the client for authentication credentials again. | 04-04-2013 |
Ryan Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20120059652 | METHODS AND SYSTEMS FOR OBTAINING LANGUAGE MODELS FOR TRANSCRIBING COMMUNICATIONS - A method for transcribing a spoken communication includes acts of receiving a spoken first communication from a first sender to a first recipient, obtaining information relating to a second communication, which is different from the first communication, from a second sender to a second recipient, using the obtained information to obtain a language model, and using the language model to transcribe the spoken first communication. | 03-08-2012 |
20120059653 | METHODS AND SYSTEMS FOR OBTAINING LANGUAGE MODELS FOR TRANSCRIBING COMMUNICATIONS - A method for producing speech recognition results on a device includes receiving first speech recognition results, obtaining a language model, wherein the language model represents information stored on the device, and using the first speech recognition results and the language model to generate second speech recognition results. | 03-08-2012 |
Ryan Paul Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20150095026 | SPEECH RECOGNIZER WITH MULTI-DIRECTIONAL DECODING - In an automatic speech recognition (ASR) processing system, ASR processing may be configured to process speech based on multiple channels of audio received from a beamformer. The ASR processing system may include a microphone array and the beamformer to output multiple channels of audio such that each channel isolates audio in a particular direction. The multichannel audio signals may include spoken utterances/speech from one or more speakers as well as undesired audio, such as noise from a household appliance. The ASR device may simultaneously perform speech recognition on the multi-channel audio to provide more accurate speech recognition results. | 04-02-2015 |
Ryan Russell Thomas, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20130254111 | SYSTEM AND METHOD FOR FORMULA CALCULATION AND PAYMENT AUTHORIZATION WITH ELECTRONIC SIGNATURES - Techniques for electronic signature processes are described. Some embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of electronic signature documents. The ESS may facilitate payment processing via an electronic signature document that includes or is associated with a payment form. When the signature document is presented to a user for signature, the payment form collects payment data (e.g., card type, account number, name) that is used by the ESS to process payment upon completion of the signing process. | 09-26-2013 |
Satish Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20150081572 | AUTOMATICALLY RECOMMENDING UPDATES BASED ON STORED LIFECYCLE INFORMATION - Lifecycle information indicative of a configuration and update state of a computer system are stored. Updates to the computer system are automatically recommended based on the lifecycle information. | 03-19-2015 |
20150082291 | UPDATE INSTALLER WITH TECHNICAL IMPACT ANALYSIS - An update installer generates an update display for a user that allows a user to select updates in an identified environment. The update installer accesses the objects and layers in the identified environment and displays an impact display identifying portions of the identified environment that will be affected by the selected updates, before the updates are installed. | 03-19-2015 |
20150082292 | AUTOMATICALLY RESOLVING CONFLICTS AFTER INSTALLATION OF SELECTED UPDATES IN A COMPUTER SYSTEM - An update installer generates an update display for a user that allows the user to select updates to be applied to a computer system. Conflicts that arise because of application of the updates to the computer system are automatically resolved and the results of the conflict resolution are displayed. | 03-19-2015 |
20150082293 | UPDATE INSTALLER WITH PROCESS IMPACT ANALYSIS - An update installer generates an update display for a user that displays available updates. The user can select updates, and the update installer accesses the business processes corresponding to the user's project and displays an impact analysis indicating the impact that the selected updates will have on the processes in the system. | 03-19-2015 |
20150082296 | AUTOMATIC INSTALLATION OF SELECTED UPDATES IN MULTIPLE ENVIRONMENTS - An update installer generates an update display for a user that allows the user to select updates be applied to a first environment. An export display allows the user to export the selected updates so they can be saved for installation in another environment. | 03-19-2015 |
Satish J. Thomas, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20100318494 | CONVERSION OF AN APPLICATION DATABASE TO MINIMIZE TIME IN SINGLE-USER ACCESS MODE - A method and system for converting source tables of a database of the application to target tables of a new version of the database while reducing the amount of time that the database needs to be open in single-user access mode is provided. A conversion system divides the conversion into a multi-user phase and a single-user phase. During the multi-user phase, the conversion system can perform most of the conversions while the database is opened in multi-user access mode. The conversion system stores the converted data in auxiliary tables, rather than updating the source tables. During the single-user phase, the conversion system performs the remaining conversions and copies data from the source tables and the converted data from the auxiliary tables to the target tables. | 12-16-2010 |
20150106152 | CONTINUOUSLY TRACING ISSUES THROUGH THE LIFECYCLE PHASES OF A PROJECT - A set of lifecycle services are employed to identify tasks and other worklist items. The worklist items are aggregated into a unified worklist that is synchronized to a product management system so the status of the worklist items can be traced throughout a project lifecycle. | 04-16-2015 |
Satish Joseph Thomas, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20140108975 | PORTAL FOR SUBMITTING BUSINESS METADATA FOR SERVICES - A user interface display provides access to an analysis portal that receives customized code for a business data system. The code is provided through the user interface display to a cloud based service that analyzes the customized code based on the types of services requested by the user. A report is generated, based on the analysis, and displayed to the user. | 04-17-2014 |
20140114879 | SYSTEMS AND METHODS FOR PROVIDING INVESTING OPPORTUNITIES - The present invention is directed toward systems and methods for providing investment opportunities to a communication device carried by a user. The method is implemented by a computer-implemented system in communication with the communication device via a communication network. The systems and methods include collecting location information and/or receiving graphical images from the user, identifying investment options corresponding to the collected location information or the received graphical images, providing the identified investment options to the communication device carried by the user, and enabling the user to invest in the identified investment options for their investment related needs by providing an investment platform capable of being used by the user for transacting in stocks related to the investment options. | 04-24-2014 |
20140344184 | SYSTEMS AND METHODS FOR PROVIDING INVESTMENT OPPORTUNITIES - The present invention is directed toward systems and methods for providing investment opportunities to a communication device carried by a user. The method is implemented by a computer-implemented system in communication with the communication device via a communication network. The systems and methods include collecting location information and/or receiving graphical images from the user, identifying investment options corresponding to the collected location information or the received graphical images, providing the identified investment options to the communication device carried by the user, and enabling the user to invest in the identified investment options for their investment related needs by providing an investment platform capable of being used by the user for transacting in stocks related to the investment options. | 11-20-2014 |
Sean C. Thomas, Everett, WA US
Patent application number | Description | Published |
---|---|---|
20150104289 | METHODS AND APPARATUS TO ADJUST BLEED PORTS ON AN AIRCRAFT ENGINE - Methods and apparatus to adjust bleed ports on an aircraft engine are disclosed. An example apparatus for bleeding air from a multi-stage compressor of an aircraft engine includes a compressor case having a plurality of bleed ports. A first bleed port is associated with a first stage of a compressor, and a second bleed port is associated with a second stage of the compressor. The apparatus includes a plenum connected to the compressor case to define a plenum cavity. The plenum fluidly coupling the first and second bleed ports to a fluid conduit for providing bleed air to one or more systems of an aircraft. The apparatus also includes a bleed port selection mechanism located within the plenum cavity. The bleed port selection mechanism including a first portion proximate the first bleed port and operable to prevent fluid flow through the first bleed port. | 04-16-2015 |
Shawn Thomas, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20140122726 | UPDATING SERVICES DURING REAL-TIME COMMUNICATION AND SHARING-EXPERIENCE SESSIONS - Disclosed herein are representative embodiments of tools and techniques for updating services in sharing-experience sessions during communications calls. According to one exemplary technique, a first computing device initiates a communications call and receives capability information for a second computing device. The capability information for the second computing device includes information indicating attributes of a service supported by the second computing device. Additionally, the first computing device evaluates the capability information to determine that the service is supported by the first and second computing devices. The first computing device initiates a sharing-experience session that includes the service. An update message comprising update information for the service is received, and based on the received update information, content of the service is updated. | 05-01-2014 |
Shawn Thomas, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20100180041 | SERVICE FOR POLICY RULE SPECIFICATION EVALUATION AND ENFORCEMENT ON MULTIPLE COMMUNICATION MODES - Policy rules for a particular communication mode are adapted and implemented for other communication modes in a dynamic and/or automated manner. Organization level and/or personal policies for one communication mode are evaluated and modified as necessary for other communication modes, which may be integrated with each other or distinctly managed. Rules may be adapted based on user, groups, or policy types. | 07-15-2010 |
20110196931 | MODERATING ELECTRONIC COMMUNICATIONS - A method for moderating an electronic message includes intercepting the electronic message at a server computing device, and evaluating content of the electronic message at the server computing device to determine if the electronic message is required to enter a moderation workflow prior to delivering the electronic message to at least one recipient. The method also includes sending an approval request message from the server computing device to at least one moderator device, receiving a first moderation decision message at the server computing device from the at least one moderator, sending an update message from the server computing device to the at least one moderator to update the approval request message to include one or more properties of the first moderation decision, and removing the approval request message from the moderation workflow. | 08-11-2011 |
Shawn M. Thomas, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130227431 | PRIVATE INTERACTION HUBS - In embodiments of private interaction hubs, a mobile device has memory storage to maintain hub data that is associated with a private interaction hub, where the hub data includes multiple types of displayable data that is editable by different types of device applications. The memory storage at the device also maintains private data that is displayable and is viewable with one of the device applications. The mobile device also includes a display device to display the multiple types of the hub data in a hub user interface of a hub application. The display device can also display the private data and a subset of the hub data that are both associated with a device application in a device application user interface. | 08-29-2013 |
20130295872 | MOBILE DEVICE EMERGENCY SERVICE - Mobile device emergency service techniques are described. In embodiments, a client device includes one or more modules implemented at least partially in hardware and configured to implement an emergency service. The emergency service configured to support operations including generating a user interface for display on a display device, receiving one or more inputs usable to form an emergency contacts list that includes a plurality of emergency contacts, and causing the emergency contacts list to be communicated to one or more other client devices for use in generating a message to be communicated automatically and without user intervention to the emergency contacts in the emergency contacts list responsive to a trigger. | 11-07-2013 |
20130298037 | HUB COORDINATION SERVICE - In implementations of a hub coordination service, a device includes a communication interface for communication coordination with one or more associated devices of the device, and the associated devices correspond to hub members. A hub manager is implemented to receive a task input to create a task for one or more of the hub members to complete. The hub manager can register the task in a hub that is a private, shared space of the hub members, and then initiate communication of the task to respective associated devices of the one or more hub members for notification of the task to be completed. | 11-07-2013 |
20130305319 | HUB KEY SERVICE - In embodiments of a hub key service, a device includes a communication interface for communication coordination with one or more associated devices of the device, and the associated devices correspond to hub members. A hub manager is implemented to generate an electronic key that includes access permissions, which are configurable to enable controlled access for the hub members, such as to a building, vehicle, media device, or location. The hub manager can then correlate the electronic key with the device to enable access to the building, vehicle, media device, or location with the device utilized as the electronic key. | 11-14-2013 |
20130305354 | RESTRICTED EXECUTION MODES - In embodiments of restricted execution modes, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface is without receiving a PIN code entered on the device lock screen. The mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated. The restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated. | 11-14-2013 |
20140068755 | MOBILE DEVICE CHILD SHARE - In embodiments of mobile device child share, a mobile device can display a default device lock screen on an integrated display device, and receive an input effective to transition from the default device lock screen to display a child lock screen without receiving a PIN code entered on the default device lock screen. The mobile device can receive a second input effective to transition from the child lock screen to display a child space. The mobile device implements a device share service that activates a child share mode of the mobile device, and restricts functionality of device applications and access to device content based on designated restriction limits. | 03-06-2014 |
Shawn M. Thomas, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20100179997 | MESSAGE TRACKING BETWEEN ORGANIZATIONS - Architecture that facilitates cross-boundary message tracking based on a trust relationship in existence between a sender network and a recipient network. A tracking service is deployed in each network as a proxy to obtain message events for each hop that passes the message on to the recipient. Tracking can include a search task and a get task. Messages can be found in reports that match message search criteria. The search task returns an array of search results objects, each object identifying a single tracking report. A selected object is pipelined into the get task to return the detailed tracking report for the selected message. | 07-15-2010 |
20120108221 | AUGMENTING COMMUNICATION SESSIONS WITH APPLICATIONS - Embodiments include applications as participants in a communication session such as a voice call. The applications provide functionality to the communication session by performing commands issued by the participants during the communication session to generate output data. Example functionality includes recording audio, playing music, obtaining search results, obtaining calendar data to schedule future meetings, etc. The output data is made available to the participants during the communication session. | 05-03-2012 |
20130111356 | INBOUND AND OUTBOUND COMMUNICATIONS AGGREGATED BY GROUP | 05-02-2013 |
Shawn M. Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090113001 | PRE-SEND EVALUATON OF E-MAIL COMMUNICATIONS - A system for identifying attributes associated with content of an e-mail message and alerting a user includes a client device programmed to allow a user to create an e-mail message including at least one recipient and a message content, a server programmed to check an attribute of the e-mail message, and to send the e-mail message, and one or more information stores in communication with the server, the information stores including information about the e-mail message. The server is programmed to query the information stores to obtain information about the e-mail message as the message is being composed by the user, and the server sends a mail tip to the client regarding the e-mail message. The client is programmed to provide the mail tip to the user, the mail tip being formatted and positioned by the client so that it is integrated within a header section of the e-mail message. | 04-30-2009 |
20130339462 | Pre-Send Evaluation of E-Mail Communications - A system for identifying attributes associated with content of an e-mail message and alerting a user includes a client device programmed to allow a user to create an e-mail message including at least one recipient and a message content, a server programmed to check an attribute of the e-mail message, and to send the e-mail message, and one or more information stores in communication with the server, the information stores including information about the e-mail message. The server is programmed to query the information stores to obtain information about the e-mail message as the message is being composed by the user, and the server sends a mail tip to the client regarding the e-mail message. The client is programmed to provide the mail tip to the user, the mail tip being formatted and positioned by the client so that it is integrated within a header section of the e-mail message. | 12-19-2013 |
Terrance L. Thomas, Covington, WA US
Patent application number | Description | Published |
---|---|---|
20090117322 | MULTIFUNCTIONAL ELECTROMAGNETIC SHIELDING - A method of manufacturing a multifunctional shielding mat for an interior of a vehicle is provided. The method includes providing at least one sheet of dampening material, coupling at least one sheet of electromagnetic shielding material to the at least one sheet of dampening material, and configuring the multifunctional shielding mat to cover a predetermined area of the vehicle. | 05-07-2009 |
20100063754 | WIRE FAULT ILLUMINATION AND DISPLAY - A computer implemented method, apparatus, and computer usable program product for illuminating faults in a wiring system. The wiring system is monitored for a fault during operation of the wiring system. In response to detecting the fault, a location of the fault within the wiring system is estimated. A wiring diagram is presented for the wiring system with an indication of the location of the fault within the wiring system. | 03-11-2010 |
20110153235 | Wire System Assessment - The advantageous embodiments provide a method, a computer program product, and an apparatus for monitoring a wiring system. A number of responses to signals transmitted in a portion of the wiring system are measured to form a measured signature. Design data for the portion of the wiring system is retrieved. A number of expected responses for the signals in the portion of the wiring system are identified using the design data to form a computed signature. The measured signature is compared with the computed signature. | 06-23-2011 |
20140300363 | In-situ Battery Monitoring System - The present disclosure provides a system, method, and apparatus for battery monitoring. In one or more embodiments, the disclosed method involves injecting at least one test signal into a battery, and receiving at least one response signal from the battery. In one or more embodiments, the response signal(s) comprises at least one reflected signal. The method further involves comparing, with at least one processor, the response signal(s) with at least one baseline signal to produce at least one comparison signal. Also, the method involves detecting, with at least one processor, at least one anomaly within the battery by using the comparison signal(s). Further, the method involves determining, with at least one processor, a location at least one anomaly within the battery by using the comparison signal(s). | 10-09-2014 |
20150103447 | Modular Equipment Center Distributed Independent Protections - Distributed electronic protections and control architecture enabling simultaneous fault clearance without conflicting fault isolation logic. A plurality of modular equipment centers (MECs) is spatially distributed throughout a vehicle to service equipment loads with power and data. In one embodiment, protective functions are embedded on integrated protection chipsets (IPCs) within the distributed architecture of the vehicle. The IPCs implement a plurality of protective functions where coordinated or independent fault assessments are performed. | 04-16-2015 |
20150103457 | Modular Equipment Center Solid State Primary Power Switching Network - A solid state primary power switching network for modular equipment centers (MECs) distributing primary power throughout a vehicle. The solid state primary power switching network includes multiple primary power switch network devices (PPSNDs) of a MEC for controlling and distributing primary power to other MECs spatially distribute throughout a vehicle. In one or more configurations, the PPSNDs have a universal structure in that each includes a common power input source and a plurality of common power outputs. In one or more configurations, primary power sources to the vehicle are switched without a perceivably visible break in power. | 04-16-2015 |
Thomas Benjamin Sanjay Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130003085 | METHOD, APPARATUS AND SYSTEM FOR RENDERING AN OBJECT ON A PAGE - A method of rendering a graphical object (e.g., | 01-03-2013 |
Wendy Thomas, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090325259 | USE OF ADHESION MOLECULES AS BOND STRESS-ENHANCED NANOSCALE BINDING SWITCHES - Methods, compositions and devices are provided based on changing the binding strength of an adhesion molecule to a ligand by changing the force exerted on the bound complex between adhesion molecule and ligand, for example by changing the shear stress acting on the complex. The adhesion molecules and their ligands of this invention bind more tightly when a force-activated bond stress, such as shear force, applied to the adhesion molecules is increased, and bond less tightly when the stress is decreased. The adhesion molecules can be isolated from their sources in nature or can remain attached to their natural sources. They can be engineered, e.g., by altering their amino acid sequences or by binding to antibodies or other particles, to alter their binding properties. They can be attached to a wide range of substrates including particles and device surfaces to form adhesive systems which are capable of sticking to other particles and/or device surfaces to which ligands for the adhesion molecules have been attached. The adhesion molecules and ligands described herein can be used to control binding and release of components of an adhesive system by increasing or decreasing the force-activated bond stresses applied to the adhesion molecules. | 12-31-2009 |