Patents by Inventor Mary A. Brown
Mary A. Brown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160262585Abstract: A portable frame and toilet system includes a toilet, a bag, and a frame that is positionable around the toilet. The frame allows a user to mount and dismount the toilet and the frame is structured to be disassembled such that the frame is portable. The frame is positioned within the bag when the frame is disassembled.Type: ApplicationFiled: March 9, 2015Publication date: September 15, 2016Inventor: Mary Brown
-
Publication number: 20150366895Abstract: The present invention relates generally to methods and compositions for the treatment of cancers expressing the type 1 insulin-like growth factor receptor (IGF1R) or a constituent of an IGF1R signaling pathway, in particular melanoma, using the microRNA miR-7-5p. Also provided are methods for increasing the sensitivity of such cancers to therapeutic agents.Type: ApplicationFiled: October 18, 2013Publication date: December 24, 2015Inventors: Peter Jeffery LEEDMAN, Keith Michael GILES, Ann Mary BROWN
-
Publication number: 20150342323Abstract: A neck and shoulder protective garment that functions to protect the skin while utilizing a heated grooming device such as a curling iron. A neck protection section is attached to a shoulder protection section. A connection section is attached to the neck protection section and functions to secure the protective garment around the user's neck. In a preferred embodiment the connection section is a Velcro® hook and loop fastening device. Also, in a preferred embodiment the protective garment is fabricated from flexible, fire retardant and fire resistant material.Type: ApplicationFiled: May 31, 2014Publication date: December 3, 2015Inventor: Mary Brown
-
Patent number: 9092155Abstract: A method for performing a write to a volume x in a cascaded architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume, wherein each of the volume x and the child volume have a target bit map (TBM) associated therewith. The method then determines whether the TBMs of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Finding the HS volume includes travelling up the cascaded architecture until the source of the data is found. Once the HS volume is found, the method copies the data from the HS volume to the child volume and performs the write to the volume x. A method for performing a read is also disclosed herein.Type: GrantFiled: March 15, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8892834Abstract: A method for performing a write to a volume x in a cyclic point-in-time-copy architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume. The method then determines whether the target bit maps (TBMs) of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Once the HS volume is found, the method determines whether the HS volume and the child volume are the same volume. If the HS volume and the child volume are not the same volume, the method copies the data from the HS volume to the child volume. The method then performs the write to the volume x.Type: GrantFiled: April 28, 2012Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8850147Abstract: A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A target associated with the relation is then identified. The method then identifies a sibling target that inherits data from the target. Once the target and the sibling target are identified, the method copies the data from the target to the sibling target. The relation between the source and the target is then deleted. A corresponding computer program product is also disclosed and claimed herein.Type: GrantFiled: March 15, 2013Date of Patent: September 30, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8843719Abstract: A method for performing a write to a source volume in a multi-target architecture is described. The multi-target architecture includes a source volume and multiple target volumes mapped thereto. In one embodiment, such a method includes copying data in a track of the source volume to a corresponding track of a target volume (target x). The method enables one or more sibling target volumes (siblings) mapped to the source volume to inherit the data from the target x. When the data is successfully copied to the target x, the method performs a write to the track of the source volume. Other methods for reading and writing data to volumes in the multi-target architecture are also described.Type: GrantFiled: March 15, 2013Date of Patent: September 23, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8782362Abstract: A method for performing a write to a volume x in a cyclic point-in-time-copy architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume. The method then determines whether the target bit maps (TBMs) of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Once the HS volume is found, the method determines whether the HS volume and the child volume are the same volume. If the HS volume and the child volume are not the same volume, the method copies the data from the HS volume to the child volume. The method then performs the write to the volume x. A corresponding computer program product is also described.Type: GrantFiled: March 8, 2011Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8667237Abstract: A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A target associated with the relation is then identified. The method then identifies a sibling target that inherits data from the target. Once the target and the sibling target are identified, the method copies the data from the target to the sibling target. The relation between the source and the target is then deleted. A corresponding computer program product is also disclosed and claimed herein.Type: GrantFiled: March 8, 2011Date of Patent: March 4, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8606767Abstract: A method for invalidating metadata associated with a target count-key-data (CKD) volume is disclosed. The method initially receives a command for a target CKD volume. The command is either an “establish” command for establishing a point-in-time copy relationship, or a “withdraw” command for withdrawing a point-in-time copy relationship. The method determines a track range, spanning a number of data tracks in the CKD volume, associated with the command. Each data track in the track range is associated with a metadata track. For each metadata track whose associated data tracks are fully contained in the track range, the method performs a first procedure. For each metadata track whose associated data tracks are not fully contained in the track range, the method performs a second procedure different from the first procedure. A corresponding apparatus and computer program product are also disclosed.Type: GrantFiled: February 8, 2012Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Theresa Mary Brown, Nedlaya Yazzie Francisco, Beth Ann Peterson, Suguang Li
-
Patent number: 8458134Abstract: A method for providing rolling continuous data protection of source data is disclosed. In one embodiment, such a method includes enabling a user to select source data and establish a first interval when point-in-time copies of the source data are generated. The method further enables the user to specify a first number of point-in-time copies to retain at the first interval. The method further enables the user to specify a second number of point-in-time copies to retain at a second interval, wherein the second interval is a (n?2) multiple of the first interval. The method further enables the user to specify a third number of point-in-time copies to retain at a third interval, wherein the third interval is a (n?2) multiple of the second interval. A corresponding apparatus and computer program product are also disclosed.Type: GrantFiled: March 30, 2011Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren, Gail Andrea Spear
-
Patent number: 7363629Abstract: Provided are a method, system, and program for managing resources in which a local processor sends remote operation requests to be executed by a remote processor having multiple resources. In the illustrated embodiment, the local processor and the remote processor each have a resource manager, each of which maintains a control set for each resource of the remote processor. Each control set of the remote processor resource manager includes a queue for queuing remote operation requests awaiting execution in connection with the resource associated with the control set. Each control set of the local processor resource manager includes a credit counter which keeps track of permissible outstanding remote operation requests. Each local processor control set credit counter is decremented for each remote operation request for the associated resource sent to the remote processor and is incremented for each acknowledgment received from the remote processor.Type: GrantFiled: June 19, 2003Date of Patent: April 22, 2008Assignee: International Business Machines CorporationInventors: James Alan Springer, Sr., Thomas Charles Jarvis, Gail Andrea Spear, Sam Clark Werner, Richard Kenneth Martinez, Matthew Sanchez, Theresa Mary Brown
-
Publication number: 20080013942Abstract: The present invention relates to a photographic information logging device for recording photographic information. The photographic information logging device includes a logging sheet that is removably attachable to a camera and further includes a transparent cover to protect information recorded on the logging sheet. The logging sheet includes pre-printed lines to facilitate the recording of photographic information.Type: ApplicationFiled: July 13, 2006Publication date: January 17, 2008Inventor: Mary Brown
-
Publication number: 20070150999Abstract: A cycling glove having a number of pads on the palmar surface, two of the pads forming a groove approximately over and protecting the carpal tunnel nerve. The glove also has a fast release mechanism for removing the glove from the hand.Type: ApplicationFiled: January 3, 2007Publication date: July 5, 2007Applicant: Fulcrum Health Products, LLCInventor: Mary Brown
-
Patent number: 7124128Abstract: Provided are a method, system, and program for managing data. A data request is received to a target track in a relationship, wherein the relationship associates a source track with the target track. A destage request to destage the source track is submitted in response to the data request to the target track, wherein executing the data request to the target track is conditioned on receiving a completion response to the destage request. If the source track is not in cache, then a complete response is returned to the destage request. If the source track was in cache when the relationship was established, then the destage request is added to an Input/Output (I/O) queue for the source track. After the source track is destaged in response to processing the destage request in the I/O queue, the complete response is returned to the destage request.Type: GrantFiled: June 17, 2003Date of Patent: October 17, 2006Assignee: International Business Machines CorporationInventors: James Alan Springer, Sr., Matthew Sanchez, Theresa Mary Brown, Richard Kenneth Martinez, Gail Andrea Spear, Sam Clark Werner, Thomas Charles Jarvis, Thomas John Creath
-
Patent number: 7124323Abstract: Disclosed is a technique for processing interruption of an operation that transfers data between a source and a target. An indication that a reverse restore operation has been interrupted is received. It is determined whether designation of at least one of an original source and an original target has been reversed. The settings of one or more relation indicators are also determined. Processing to be performed is identified based on the determinations of whether designations have been reversed and based on the settings of the one or more relation indicators.Type: GrantFiled: June 18, 2003Date of Patent: October 17, 2006Assignee: International Business Machines CorporationInventors: Matthew Sanchez, Theresa Mary Brown, Sam Clark Werner, Gail Andrea Spear
-
Patent number: 7000145Abstract: Disclosed is a technique for applying changes back to an original copy of data to reduce an amount of data transferred. A first indicator is maintained for each block of data in a first storage to indicate whether the block of data has been updated in the first storage since the block of data was last transferred to a second storage. A second indicator is maintained for each block of data in the second storage to indicate whether the block of data has been updated in the second storage since the block of data in the second storage was overwritten by a corresponding block of data in the first storage.Type: GrantFiled: June 18, 2003Date of Patent: February 14, 2006Assignee: International Business Machines CorporationInventors: Sam Clark Werner, William Frank Micka, Dalit Tzafrir, Matthew Sanchez, Sivan Tal, Ifat Nuriel, Sheli Rahav, Gail Andrea Spear, Warren K. Stanley, Thomas Charles Jarvis, Amiram Hayardeny, Shachar Fienblit, Rivka Mayraz Matosevich, Svetlana Shukevich, Theresa Mary Brown
-
Patent number: 6996586Abstract: Disclosed is a technique for reducing an amount of data transferred. A first indicator is maintained for each source block of data to indicate whether the source block of data has been updated in source storage since the source block of data was last transferred to target storage. A second indicator is maintained for each target block of data in target storage to indicate whether the target block of data has been updated in target storage since the target block of data was overwritten by a corresponding source block of data. When transferring data from the source storage to the target storage, each source block of data for which a first indicator has been set to indicate that the source block of data has been updated is transferred and each source block of data that corresponds to a target block of data for which a second indicator has been set to indicate that the target block of data has been updated is transferred.Type: GrantFiled: June 18, 2003Date of Patent: February 7, 2006Assignee: International Business Machines CorporationInventors: Warren K. Stanley, William Frank Micka, Sam Clark Werner, Sivan Tal, Gail Andrea Spear, Theresa Mary Brown, Matthew Sanchez, Sheli Rahav, Thomas Charles Jarvis, Amiram Hayardeny, Dalit Tzafrir, Shachar Fienblit, Rivka Mayraz Matosevich, Svetlana Shukevich, Ifat Nuriel
-
Publication number: 20050084567Abstract: A dough and a filling for making a toaster pastry and a method for making same. A method of forming the dough for the toaster pastry, comprises forming a blend of ingredients comprising wheat flour of from about 25 to about 44% by weight of ingredients for the dough, wheat farina of from about 13 to about 35% by weight of ingredients for the dough, shortening of from about 1.5 to about 2.5% by weight of ingredients for the dough, and water of from about 25 to about 35% by weight of ingredients for the dough; adding puff pastry shortening in the form of cubes such that the amount of puff pastry shortening is in the range of from about 5 to about 15% by weight of the ingredients for the pastry; and blending the ingredients such that a heterogeneous mixture of the cubes of shortening in the remainder of the ingredients is obtained.Type: ApplicationFiled: November 1, 2004Publication date: April 21, 2005Inventors: Mary Brown, Amanda Mitchell-Hanna, Derry-Anne Perog, Sandra Zabarchuk, Harinder Shah
-
Publication number: 20040267706Abstract: Provided are a method, system, and program for managing data. A data request is received to a target track in a relationship, wherein the relationship associates a source track with the target track. A destage request to destage the source track is submitted in response to the data request to the target track, wherein executing the data request to the target track is conditioned on receiving a completion response to the destage request. If the source track is not in cache, then a complete response is returned to the destage request. If the source track was in cache when the relationship was established, then the destage request is added to an Input/Output (I/O) queue for the source track. After the source track is destaged in response to processing the destage request in the I/O queue, the complete response is returned to the destage request.Type: ApplicationFiled: June 17, 2003Publication date: December 30, 2004Applicant: International Business Machines CorporationInventors: James Alan Springer, Matthew Sanchez, Theresa Mary Brown, Richard Kenneth Martinez, Gail Andrea Spear, Sam Clark Werner, Thomas Charles Jarvis, Thomas John Creath