James Thomas
James Thomas Albamont, Jr., Houston, TX US
Patent application number | Description | Published |
---|---|---|
20100057618 | System, method, and software to manage financial securities via a 3-dimensional landscape - This disclosure involves systems, methods, and software for viewing, managing, or otherwise analyzing financial securities utilizing a three-dimensional display of related data and metrics. This disclosure describes techniques that facilitate the combination of financial data with 3D search technology to provide a user-friendly view and analysis of securities market data. The intuitive visual landscape offers a contextual picture that allows the user to display several layers of information simultaneously. Moreover, the disclosure describes this intuitive mechanism for looking at financial markets and identifying opportunities within a multi-dimensional landscape linked to additional integrated data panes, thus helping enable rapid analysis. The techniques may utilize or facilitate customizable metrics, seamless system compatibility, and integrated portfolio tools. The securities landscape may allow on-the-fly changes to quickly answer user queries. The disclosure further discusses various optimizations that help enable this real-time and intuitive landscape, such as vertex optimizations, color map optimizations, and hypersorting. | 03-04-2010 |
20110187710 | PRESENTING FINANCIAL INFORMATION IN A THREE-DIMENSIONAL LANDSCAPE - Systems, methods, and software for efficiently presenting financial information in a three-dimensional landscape are described. In some aspects, observed market values for multiple sets of future financial payoffs are received. For example, the future financial payoffs can be based on derivatives contracts, bonds, or other types of financial instruments. A three-dimensional landscape of the observed market values is generated. The three-dimensional landscape includes groups of discrete graphical elements representing the sets of future financial payoffs. Each of the discrete graphical elements has a visual attribute that represents the observed market value for one of the future financial payoffs. The discrete graphical elements in each group are positioned in proximity to each other in the three-dimensional landscape to allow visual comparison of the observed market values for the set of future financial payoffs represented by the group. The three-dimensional landscape can be updated in real time based on updated market values. | 08-04-2011 |
20110187711 | Presenting Series Information in a Three-Dimensional Landscape - Systems, methods, and software for efficiently presenting information in a three-dimensional landscape are described. In some aspects, values for multiple series of data points are received. The data points may relate to financial instruments or business intelligence metrics. A three-dimensional landscape of the values is generated. The three-dimensional landscape includes arrays of discrete graphical elements, where each array corresponds to one of the series. Each discrete graphical element has a visual attribute that represents one of the observed market values. The elements in each array are distributed along a first dimension of the three-dimensional landscape and positioned adjacent to one another to allow visual identification of trends within each series. The arrays are spaced apart from each other in a second dimension of the three-dimensional landscape to allow visual comparison of the trends across different series. The three-dimensional landscape can be updated in real time based on updated market values. | 08-04-2011 |
James Thomas Beck US
Patent application number | Description | Published |
---|---|---|
20150103427 | LIGHT WEIGHT SOLAR CONCENTRATOR - A solar concentrator has frame members connected together to form a framework, and a flexible sheet attached to the framework such that the flexible sheet takes a loose shape and can flex in response to shaping forces exerted thereon. The sheet has a reflective surface located between the frame members. A shaping force system is operative, when activated, to exert the shaping forces on the sheet, the shaping forces configured to draw the sheet from the loose shape into a desired shape such that solar rays striking the reflective surface are focused on a target, and a solar energy receiver is attached to the framework at a location corresponding to the target. Thin wall tubing filled with pressurized air can provide strong light frame members. When the shaping force system is deactivated, the flexible sheet reverts substantially to the loose shape. | 04-16-2015 |
James Thomas Beegle, Georgetown, KY US
Patent application number | Description | Published |
---|---|---|
20100142008 | Image Scanning Apparatus and Methods - Method and image scanning apparatus comprising an image capture unit having an illumination assembly for generating input light; a printed circuit board mounted to the image capture unit, a cooling unit generating an airflow which cools the illumination assembly of the image capture unit as well as the critical components mounted on the printed circuit board and the optical components of the image capture unit; and an adjustable baffle member moveably mounted to the frame of the image scanning apparatus for controlling the path of the airflow relative to the lamp. The cooling unit comprises at least one fan with the fan generating airflow for cooling the lamp of image capture unit. The baffle member is adjustable to control the airflow generated by the fan such that the airflow generated by the fan is redirected downward and passes the airflow under the image capture unit, thereby effectively and evenly cooling the lamp and redirecting contaminants to the end of the image scanning apparatus enclosure opposite the image capture unit. | 06-10-2010 |
James Thomas Cargo, Bethlehem, PA US
Patent application number | Description | Published |
---|---|---|
20090029490 | Method of fabricating an electronic device - It has been found that for silicon integrated circuits having capacitor structures or other p-n junctions structure at a technology node of 32 nm or smaller, photovoltaic induced corrosion of copper in the metallization stack is a significant issue. Thus processing conditions or device configurations are employed that preclude such corrosion. In one embodiment photovoltaic induced corrosion is monitored to prevent completion of devices with corrosion defects. | 01-29-2009 |
20100102398 | Material removing processes in device formation and the devices formed thereby - Devices having voids are producible by employing an electrochemical corrosion process. For example, an electrically conductive region is formed to have a surrounding chemically distinct region. Such formation is possible through conventional semiconductor processing techniques such as a copper damascene process. The surrounded conducting material is configured to be in electrical communication with a charge separation structure. The electrically conducting region is contacted with a fluid electrolyte and electromagnetic radiation is made to illuminate the charge separation region to induce separation of electrons and holes. The resulting separated charges are used to drive an electrochemical corrosion process at the conductive material/electrolyte interface resulting in the removal of at least a portion of the electrically conducting material. The induced corrosion leaves a void that is useful, for example, as a highly effective dielectric in integrated circuits, functions to allow component separation such as gear separation in microelectromechanical devices or produces long cavities useful for material separation analogous to the distillation columns used in liquid chromatography. | 04-29-2010 |
James Thomas Carter, Simpsonville, SC US
Patent application number | Description | Published |
---|---|---|
20150115499 | SUMMIT DIAGONAL MATRIX FOR TIRE MANUFACTURE - A standardization system for the manufacture of tires is provided. The same size tire components can be used in the summit of tires having different sizes i.e., tires having different section widths, sidewall heights, and/or aspect ratios. A matrix of tire sizes can be associated with one or more tire summit parameters. The matrix can be used for the manufacture of tires having one or more standardized components by holding substantially constant the value of one or more tire summit parameters across a diagonal of the matrix. | 04-30-2015 |
James Thomas Dunlavey, Bakersfield, CA US
Patent application number | Description | Published |
---|---|---|
20140262225 | OIL EXTRACTION USING RADIO FREQUENCY HEATING - Oil extraction from an oil-bearing formation includes: heating a first portion of the formation containing oil with radio frequency energy; extracting the oil from the first portion of the formation; injecting steam into the first portion of the formation to heat a second portion of the formation containing oil adjacent the first portion; and extracting the oil from the second portion of the formation. | 09-18-2014 |
20140266951 | SUBSURFACE ANTENNA FOR RADIO FREQUENCY HEATING - A subsurface antenna is designed for use below the surface of the Earth. In some configurations the antenna is a dipole antenna, which can be used for radio frequency heating of an oil-bearing formation. | 09-18-2014 |
James Thomas Green, Leesburg, VA US
Patent application number | Description | Published |
---|---|---|
20140278730 | VENDOR MANAGEMENT SYSTEM AND METHOD FOR VENDOR RISK PROFILE AND RISK RELATIONSHIP GENERATION - A vendor management system for calculating risks associated with registered vendors, the system including a processing device including a hardware processor configured to operate a risk calculation module to perform a risk analysis associated with a vendor of the registered vendors, a user terminal for accessing the processing device by a user, the user terminal configured to generate a user interface for the user to select a vendor from a list of registered vendors and to display a result of a risk analysis including a risk score performed by the risk calculation module; and a database access device configured to access data on the registered vendors including an access to a first database entry storing a vendor profile information including risk criteria associated with vendors, a second database entry storing personnel information of the vendors including information on at least one of employees and directors; and a third database entry storing weight factors associated with the risk criteria. | 09-18-2014 |
James Thomas Groce, Crystal Lake, IL US
Patent application number | Description | Published |
---|---|---|
20140230314 | WAX COMPOSITIONS AND THE EFFECT OF METALS ON BURN RATES - A wax composition is disclosed, comprising a hydrogenated natural oil with (i) at least about 50 wt % of a triacylglycerol component having a fatty acid composition from about 14 to about 25 wt % C16:0 fatty acid, about 45 to about 60 wt % C18:1 fatty acid and about 20 to about 30 wt % C18:0 fatty acid, (ii) a nickel content of less than 1 ppm, and (iii) a melt point of about 49° C. to about 57° C. The hydrogenated natural oil is filtered and/or bleached to obtain a nickel content of less than 0.5 ppm. A candle is also disclosed, comprising a wick and the above described wax. | 08-21-2014 |
20160097019 | Wax Compositions and the Effect of Metals on Burn Rates - A wax composition is disclosed, comprising a hydrogenated natural oil with (i) at least about 50 wt % of a triacylglycerol component having a fatty acid composition from about 14 to about 25 wt % C16:0 fatty acid, about 45 to about 60 wt % C18:1 fatty acid and about 20 to about 30 wt % C18:0 fatty acid, (ii) a nickel content of less than 1 ppm, and (iii) a melt point of about 49° C. to about 57° C. The hydrogenated natural oil is filtered and/or bleached to obtain a nickel content of less than 0.5 ppm. A candle is also disclosed, comprising a wick and the above described wax. | 04-07-2016 |
James Thomas Grutta, Draper, UT US
Patent application number | Description | Published |
---|---|---|
20130145528 | SYSTEMS AND METHODS FOR INFLATABLE AVALANCHE PROTECTION WITH REINFLATION - One embodiment of the present invention relates to an avalanche safety system including an inflatable chamber, activation system, inflation system, and a harness. The inflatable chamber is a three-dimensionally, partially enclosed region having an inflated state and a compressed state. The inflated state may form a particular three dimensional shape configured to protect the user from burial and provide flotation during an avalanche. The activation system is configured to receive a user-triggered action to activate the system. The activation system also includes a reinflation algorithm configured to automatically reactivate the inflation system after a period of time to maintain the inflated state of the inflatable chamber. The inflation system may include an air intake, battery, fan, and internal airway channel. The inflation system is configured to transmit ambient air into the inflatable chamber. | 06-13-2013 |
20130145529 | SYSTEMS AND METHODS FOR INFLATABLE AVALANCHE PROTECTION WITH ACTIVE DEFLATION - One embodiment of the present invention relates to an avalanche safety system including an inflatable chamber, activation system, inflation system, and a harness. The inflatable chamber is a three-dimensionally, partially enclosed region having an inflated state and a compressed state. The inflated state may form a particular three dimensional shape configured to protect the user from impact and/or provide inverse segregation during an avalanche. The activation system is configured to receive a user-triggered action to activate the system. The inflation system is configured to transmit gas into and out of the inflatable chamber to transition between the inflated state and compressed state. The inflation system may automatically deflate or transmit the gas from the inflatable chamber external of the system. Automatic deflation of the inflatable chamber may be via a valve corresponding to a particular value such as time or three dimensional position of the user. | 06-13-2013 |
20130149924 | SYSTEMS AND METHODS FOR INFLATABLE AVALANCHE PROTECTION WITH SYSTEM DIAGNOSTIC - One embodiment of the present invention relates to an avalanche safety system including an inflatable chamber, activation system, inflation system, diagnostic system and a harness. The inflatable chamber is a three-dimensionally, partially enclosed region having an inflated state and a compressed state. The inflated state may form a particular three dimensional shape configured to protect the user from burial and provide flotation during an avalanche. The activation system is configured to receive a user-triggered action to activate the system. The inflation system may include an air intake, battery, fan, and internal airway channel. The inflation system is configured to transmit ambient air into the inflatable chamber. The diagnostic system includes a at least one sensor configured to measure a parameter corresponding to the inflation system and a display configured to visually, audibly, and/or tactilely display the parameter | 06-13-2013 |
20160015094 | SYSTEMS AND METHODS FOR MODULAR INFLATABLE AVALANCHE PROTECTION - One embodiment of the present invention relates to an avalanche safety system including an inflatable chamber, activation system, inflation system, harness, and a container. The inflatable chamber is a three-dimensionally, partially enclosed region having an inflated state and a compressed state. The inflated state may form a particular three dimensional shape configured to protect the use from impact and/or provide flotation during an avalanche. The inflation system is configured to transmit ambient air into the inflatable chamber. The harness may be a backpack that enables a user to transport the system while engaging in activities that may be exposed to avalanche risk. The container is releasably coupled to the harness including a coupled and a separate state. The container independently includes a container chamber that is selectively enclosable by a container opening. The releasable coupling between the container and the harness may include a periphery zipper type coupling. | 01-21-2016 |
James Thomas Grutta, Sandy, UT US
Patent application number | Description | Published |
---|---|---|
20130146175 | SYSTEMS AND METHODS FOR INFLATABLE AVALANCHE PROTECTION - One embodiment of the present invention relates to a method for inflating a chamber within an inflatable avalanche safety system. The method includes providing an inflatable avalanche safety system including an inflatable chamber; receiving a user-triggered action intended to activate the avalanche safety system; transmitting ambient air from an external region to within the inflatable chamber; and inflating the inflatable chamber entirely with the transmitted external ambient air to a particular internal pressure and shape configured to protect the user from burial during an avalanche. The transmission of ambient air within the inflatable chamber may be accomplished with a fan or an electrical component. | 06-13-2013 |
20130149923 | SYSTEMS AND METHODS FOR INFLATABLE AVALANCHE PROTECTION - One embodiment of the present invention relates to an avalanche safety system including an inflatable chamber, activation system, inflation system, and a harness. The inflatable chamber is a three-dimensionally, partially enclosed region having an inflated state and a compressed state. The inflated state may form a particular three dimensional shape configured to protect the user from burial and provide flotation during an avalanche. The activation system is configured to receive a user-triggered action to activate the system. The inflation system may include an air intake, battery, fan, and internal airway channel. The inflation system is configured to transmit ambient air into the inflatable chamber. The harness may be a backpack that enables a user to transport the system while engaging in activities that may be exposed to avalanche risk. The harness may include hip straps, shoulder straps, internal compartments, etc. | 06-13-2013 |
James Thomas Hindel, Tallmadge, OH US
Patent application number | Description | Published |
---|---|---|
20130284856 | AIRCRAFT ICE PROTECTION OPTIMIZATION BASED ON ICE-DETECTION INPUT - An aircraft ice protection system ( | 10-31-2013 |
James Thomas Holmes, Goodyear, AZ US
Patent application number | Description | Published |
---|---|---|
20140360418 | Hem Hook Bustlers - This invention comprises a device designed to enable a temporary solution to holding of fabric or materials. The device includes a clipping device with teeth that will snap onto the outermost layer of material. This clip is then attached to the middle section which is a piece of elastic which can vary in length from 1″-12″ to allow for the flexibility of the item as to not cause damage to the material when tension is applied. The elastic is then attached to a hook that will then pierce the fabric and hook it up to the desired length pr position. The hook can vary in size determined by the type of material used to hold. | 12-11-2014 |
James Thomas Hudson, Jr., Grapevine, TX US
Patent application number | Description | Published |
---|---|---|
20100191691 | Method for computer-aided decision-making system and method that utilizes product, services and/or venue values and personality value matching, incorporating groups and outside values - A computer-aided decision-making system and method that is applicable to a variety of applications such as, but not limited to, Booking and Reservations systems or Automated Real Estate services or Broker Monitoring systems. The computer-aided decision-making system provides immediate, useful, and relevant information to a person in a decision-making context, overcoming problems that do not allow one to see all the possibilities while making decisions, and enabling consumer purchases, or management guidance, in an on-line sales environment. This system is also able to quantify the concept of “Fun, Risk or other Human concepts” that were otherwise unable to be quantified earlier. The system allows for the creation and evaluation of individuals and groups as well as the incorporation of outside values/standards, as opposed to just internal values/standards, that may have an application to the Product, Service or Venue. | 07-29-2010 |
20110283351 | How to stop external and most internal network "Hacking"attacks by utilizing a dual appliance/server arrangement that allows for the use of peering servers and/or client software running on said peering servers or on proxy servers, web servers, or other legacy equipment - Method and system that allows for the input of secure data through a non-secure means and preventing the accessing of the secure data through electronic subterfuge (i.e. Hacking). When this patent is utilized with the current state-of-the-art network security systems, it will be possible to preventing external and most internal accessing of secure computer systems, aka “Hacking.” The method and system can allow access to approved users and either prevents the access of secure information from users that do not have access and/or “kill” the processes of said users. The method and system is capable of detecting unauthorized access to systems and should an attack reach certain thresholds can allow the system to recover and prevent access beyond the specific boundary set. The method and system is also capable of apportioning data to users who may not have the necessary privileges for all of the information but who do need a portion of it. The system is also capable of identifying the individuals who removed the data from secure storage and can track the chain of possession of the electronic document. This is a not a traditional network-centric approach to network data access and as a result is much more effective in handling security issues. This system does not address DoS (Denial of Service) attacks. | 11-17-2011 |
James Thomas Kindley, Charleston County, SC US
Patent application number | Description | Published |
---|---|---|
20120091083 | Horizontal knife holder - A knife holder for placement into a drawer is disclosed. It includes a plurality of substantially rectangular leaf members secured near one end but unsecured at the opposite end, and an open top box which fits completely into a drawer. When the plurality of substantially rectangular leaf members are placed into the knife section of the box with the secured end placed nearest the end of the cutlery section of the box, knives can be placed in the cutlery section of the box with the free ends of their blades held between the unsecured ends of the leaf members, so that the knives are held on their edges by the plurality of leaf members and each knife is accessible by a user without removing other knives. In one arrangement, each leaf of the plurality of leaf members forms a hole at the point where the leaf members are secured, and a dowel rod secures the plurality of leaf members by tightly fitting through the holes formed by the leaf members. In another arrangement, a knife holder for holding knives in substantially horizontal positions, includes only a plurality of substantially rectangular leaf members, and means for securing the plurality of leaf members near one end, leaving the plurality of leaf members unsecured at the opposite end. | 04-19-2012 |
James Thomas Martin, Burbank, CA US
Patent application number | Description | Published |
---|---|---|
20090313581 | Non-Mouse Computer Input Method and Apparatus - A system and method which may allow a user to interact with a computer without having to use a mouse. If a user presses a hot key, e.g., Control+Alt+J, a user interactive control unit may look at a screen the user is currently working on, determine what on the screen may be clicked on by a mouse, assign a key to each of the clickable part, and display the name of an assigned key close to its corresponding clickable part on the screen. If the user presses a displayed key, a second screen may be presented, and the user interactive control unit may look at the second screen and determine what on the second screen is clickable by a mouse. The process may continue until the user interactive control unit determines that the user has hit his final destination and performed the operation he is interested in. Consequently, a user may use his mouse less but still be able to click on certain things. This method may save users, especially typists, considerable time. | 12-17-2009 |
James Thomas Nesbitt, Iii, New Orleans, LA US
Patent application number | Description | Published |
---|---|---|
20140367942 | SUSPENSION SYSTEM - A vehicle suspension system includes a spring, a neck assembly, and a rod. The neck assembly has an outer shell housing a hollow stem having an upper end and a lower end. The stem is rotatable respect to outer shell. The upper end is coupled to an upper bracket having a control arm pivotally coupled thereto. The lower end is coupled to a lower bracket having a linkage pivotally connected thereto. The rod has a first end coupled to the spring and a second end coupled to the linkage. The rod extends through the hollow stem. The linkage is further coupled to a wheel assembly. | 12-18-2014 |
20150137476 | Steering and Suspension Systems - A vehicle suspension system includes a spring, a neck assembly, and a rod. The neck assembly has an outer shell housing a hollow stem having an upper end and a lower end. The stem is rotatable respect to outer shell. The upper end is coupled to an upper bracket having a control arm pivotally coupled thereto. The lower end is coupled to a lower bracket having a linkage pivotally connected thereto. The rod has a first end coupled to the spring and a second end coupled to the linkage. The rod extends through the hollow stem. The linkage is further coupled to a wheel assembly. | 05-21-2015 |
James Thomas Peters, Iii, Lawrence Park, PA US
Patent application number | Description | Published |
---|---|---|
20160059707 | METHOD AND APPARATUS FOR CONTROLLING ELECTRICAL CURRENTS IN A VEHICLE - An embodiment of the present invention relates to an apparatus. The apparatus includes a head portion, a body portion having a distal end opposite the head portion, a brush extending from the distal end of the body portion. The brush is configured to electrically contact an axle shaft of a vehicle. | 03-03-2016 |
James Thomas Rates, Port Orange, FL US
Patent application number | Description | Published |
---|---|---|
20130057401 | EMERGENCY INFORMATION COMMUNICATOR - Provided is a system and device for transmitting unencrypted information regarding a structure for use by first responders. The system and device includes an alarm housing and a WLAN housing, which may be in a single unit or in separate units. Upon detection of an emergency event, the alarm housing will sound an alarm and the WLAN housing will begin transmitting information about the structure, which may be detected using established first responder infrastructure, such as computers equipped in emergency responder vehicles. | 03-07-2013 |
James Thomas Richards, Willoughby Hills, OH US
Patent application number | Description | Published |
---|---|---|
20140316231 | ECG ELECTRODE FOR USE IN X-RAY ENVIRONMENTS - An ECG electrode is provided which can be placed within the direct path of x-rays during an imaging scan without inducing an x-ray induced erroneous current. The ECG electrode has a support element with a conductive post on one side electrically connected to a conductive plate on the other side. A dissipative anti-static element in or near the ECG electrode dissipates static electricity which forms on the surfaces of the insulating components in the ECG electrode. The dissipative anti-static element may be, for example, a slightly conductive property of the bulk material used to make the insulating material, or a conductive coating added to the insulating material surfaces. The dissipative anti-static element may also be incorporated in the clamp attached to the conductive post. In a further embodiment, an ion blower aimed at the ECG electrode may be used to remove static electricity. | 10-23-2014 |
James Thomas Smith, Boulder, CO US
Patent application number | Description | Published |
---|---|---|
20160117552 | AUTOMATED METRIC INFORMATION NETWORK - A Metric Information Network (MIN) with a plurality of Ground Control Points (GCPs) that are selected in an automated fashion. The GCP selection includes clustering algorithms as compared to prior art pair-wise matching algorithms. Further, the image processing that takes place in identifying interest points, clustering, and selecting tie points to be GCPs is all performed before the MIN is updated. By arranging for the processing to happen in this manner, the processing that is embarrassingly parallel (identifying interest points, clustering, and selecting tie points) can be performed in a distributed fashion across many computers and then the MIN can be updated. | 04-28-2016 |
James Thomas Smith Ii, Boulder, CO US
Patent application number | Description | Published |
---|---|---|
20130326067 | DECENTRALIZED RESOURCE ALLOCATION - The disclosure is directed to routing service requests over a network ( | 12-05-2013 |
20140219514 | AUTOMATED METRIC INFORMATION NETWORK - A Metric Information Network (MIN) with a plurality of Ground Control Points (GCPs) that are selected in an automated fashion. The GCP selection includes clustering algorithms as compared to prior art pair-wise matching algorithms. Further, the image processing that takes place in identifying interest points, clustering, and selecting tie points to be GCPs is all performed before the MIN is updated. By arranging for the processing to happen in this manner, the processing that is embarrassingly parallel (identifying interest points, clustering, and selecting tie points) can be performed in a distributed fashion across many computers and then the MIN can be updated. | 08-07-2014 |
James Thomas Southworth, London GB
Patent application number | Description | Published |
---|---|---|
20120275755 | ENTERTAINMENT DEVICE AND METHOD - An entertainment device for generating augmented reality environments comprises an input for a captured video signal, an image analyser to detect a predetermined marker object location within the captured video signal, a graphics generator to generate a graphics object for integration with the video signal at a selected position to generate an augmented reality image, a controller to positionally couple the graphics object to the detected marker object location within the captured video signal, and a detection failure logic to signal when the image analyser cannot adequately detect the marker object's location within the captured signal. If the logic signals the image analyser cannot detect the location of the marker object within the captured video signal, then the controller positionally decouples the graphics object from the last detected location of the marker object within the video signal, and instructs the graphics generator to modify a characteristic of the graphics object. | 11-01-2012 |
20150321103 | IMAGE CAPTURE METHOD AND APPARATUS - A method of stereoscopic panoramic image capture of a virtual environment is provided. The method includes pausing the state of a virtual environment being implemented by an application. For each of a plurality of positions in the virtual environment, the method includes rendering in turn plural images collectively encompassing a panoramic view. The method also includes capturing in turn each of the plural rendered images and capturing distance data describing the distance between a respective position in the virtual environment and surfaces in the virtual environment visible at that respective position. The plural positions in the virtual environment form vertices of a bounding space within which left and right viewpoints of a stereoscopic image can be formed. | 11-12-2015 |
James Thomas Swantek, Canton, GA US
Patent application number | Description | Published |
---|---|---|
20100226486 | METHOD OF INFORMING A TELECONFERENCE PARTICIPANT THAT A PERSON-OF-INTEREST HAS BECOME ACTIVE WITHIN THE TELECONFERENCE - A computer implemented method, a computer program product, and a data processing system inform a teleconference participant that a person-of-interest has become active within the teleconference. A user is identified. A person-of-interest, an alert condition, and a notification method are received from the user. The identification, the alert condition, and the notification method are then stored in a person-of-interest data structure. When a user connects to a teleconference, the person-of-interest data structure is retrieved. The teleconference is then monitored for the occurrence of the alert condition. Upon the occurrence of the alert condition, the notification is delivered to the user according to the notification method. | 09-09-2010 |
20110135073 | METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF CONFERENCE MODERATOR PASSWORD UTILIZATION FROM A NON-AUTHORIZED DEVICE - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. An authorized device registry is created in an electronic database, wherein the authorized device registry identifies one or more authorized devices permitted to access the conference calling system. A request to access the conference calling system is received from a device; and, a processor determines whether the device is included in the authorized device registry. If the device is included in the authorized device registry, the device is granted access to the conference calling system. If the device is not included in the authorized device registry, however, are performed by the processor. | 06-09-2011 |
20110135080 | METHOD TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTING RE-USE OF CONFERENCE MODERATOR PASSWORDS - An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions. | 06-09-2011 |
20110135081 | METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF NON-TYPICAL USEAGE OF MODERATOR PASSCODE - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more access parameters are received, wherein the access parameters include an authorized day of week parameter, an authorized time of day parameter, and/or an authorized location parameter. One or more requests to access the conference calling system are received, wherein each request includes a user passcode and one or more request parameters. A processor determines whether the request parameters match the access parameters. Access to the conference calling system is granted when the request parameters match the access parameters; however, the processor performs actions when a request parameter does not match an access parameter. | 06-09-2011 |
20110135082 | METHODS TO IMPROVE SECURITY OF CONFERENCE CALLS BY OBSERVATION OF ATTENDEES' ORDER AND TIME OF JOINING THE CALL - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. A threshold period is received, wherein the threshold period indicates the maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call. A monitor detects the entry of the moderator into the conference call and entry of the participants into the conference call. A waiting period is determined for one or more of the participants, wherein the waiting period represents the time period between the entry of the moderator and the entry of the participant. A processor compares the waiting period to the threshold period. If the threshold period exceeds the waiting period, the conference call is allowed to continue. In at least one embodiment, actions are performed with the processor if the waiting period exceeds the threshold period. | 06-09-2011 |
20110135083 | Methods to Improve Fraud Detection on Conference Calling Systems Based on Observation of Participants' Call Time Durations - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds. | 06-09-2011 |
20140173724 | Tuning of Data Loss Prevention Signature Effectiveness - In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining. | 06-19-2014 |
20140173727 | Tuning of Data Loss Prevention Signature Effectiveness - In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set. | 06-19-2014 |
20150356445 | DATA LOSS PREVENTION TO REMOVE FALSE POSITIVES - A method includes a computing device receiving data traffic flow and initializing a subroutine to assess alerts for the received data traffic flow; the computer device determining a collection of rules which produce more than a threshold of false positive alerts and more than a threshold of true positive alerts for the assessed alerts; the computer device determining a logical condition and an atomic rule element to add to the collection of rules; and the computer device implementing the added logical condition and atomic rule element if the number of assessed alerts are decreased below a value. | 12-10-2015 |
James Thomas Theodoras, Ii, Milpitas, CA US
Patent application number | Description | Published |
---|---|---|
20090257754 | FORM FACTOR ADAPTER MODULE - Various example embodiments are disclosed. According to one example embodiment, a form factor adapter module may include a small form factor (SFF) host connector, an X2 or XENPAK edge finger connector, and a serial to XAUI transceiver. The SFF host connector may be configured receive a small form factor pluggable (SFP or SFP+) module and to transmit and receive data according to a Serial Gigabit Media Independent Interface (SGMII) or Serializer-deserializer Framer Interface (SFI) protocol. The X2 or XENPAK edge finger connector may be configured to mate with an X2 or XENPAK edge finger socket and to transmit and receive data according to a Ten Gigabit Ethernet Attachment Unit Interface (XAUI) protocol. The serial to XAUI transceiver may be coupled to both the SFF host connector and the X2 or XENPAK edge finger connector. The serial to XAUI transceiver may be configured to convert data between the SGMII or SFI protocol and the XAUI protocol. | 10-15-2009 |
James Thomas Vandergrift, Ii, Jacksonville, FL US
Patent application number | Description | Published |
---|---|---|
20130075453 | Methods, Systems, and Products for Welding Grounding Rods - Methods, systems, apparatuses, and products are disclosed for welding ground wires to a grounding rod. A jig retains the ground wires to the grounding rod. The jig has a first horseshoe oriented to a second horseshoe to form a crucifix. Each horseshoe has a pair of legs supporting the jig from earth and providing electrical ground to the earth. A central passage bisects each horseshoe through which the grounding rod inserts. Means are included for clamping a ground wire to at least one of the legs, such that the ground wire is retained for welding to the grounding rod. | 03-28-2013 |