Patents by Inventor Simon Tyler
Simon Tyler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12002861Abstract: The present invention pro ides a method of providing an electrical contact on a graphene surface, the method comprising: (i) providing a graphene layer structure comprising one or more graphene layers and having a polymer coating on a surface thereof; (ii) contacting one or more portions of the polymer coating with a conductive metal-containing composition comprising a solvent, wherein the polymer coating is soluble in the solvent: and (iii) volatilising the solvent to deposit the conductive metal on the surface of the graphene layer structure.Type: GrantFiled: July 7, 2020Date of Patent: June 4, 2024Assignee: Paragraf LimitedInventors: Hugh Glass, Ivor Guiney, Martin Tyler, Simon Thomas
-
Publication number: 20240157646Abstract: The present disclosure is directed to additive manufacturing systems, components therein, and methods for their use. The additive manufacturing system comprises a powder material handling system comprising a virgin powder inlet. The virgin powder inlet is coupled to a virgin powder drum and configured to receive a virgin powder from the virgin powder drum. The additive manufacturing system further comprises a liquid material handling system comprising a binder inlet. The binder inlet is coupled to a binder drum and configured to receive a binder from the binder drum. The additive manufacturing system also comprises an additive manufacturing machine coupled to the powder material handling system and the liquid material handling system. The additive manufacturing machine receives the virgin powder and the binder from the powder material handling and liquid material handling systems and is configured to manufacture a work product using the virgin powder and the binder.Type: ApplicationFiled: October 23, 2023Publication date: May 16, 2024Applicant: General Electric CompanyInventors: Vadim Bromberg, Victor Fulton, Carlos H. Bonilla, Joshua Tyler Mook, Anthony Charlebois, Ryan William Van Deest, Cassidy C. Shibiya, Timothy Francis Andrews, Alex W. Ariapad, Mathieu Roy, Patrick Leduc, Simon Houle, Jean-Francois Cadorette, Patrick Gauthier, Jay Matthew Lang
-
Publication number: 20240160375Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: January 20, 2024Publication date: May 16, 2024Applicant: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20240158404Abstract: Novel compounds, compositions, and methods of using and preparing the same, which may be useful for treating alpha-1 antitrypsin deficiency (AATD).Type: ApplicationFiled: September 8, 2023Publication date: May 16, 2024Inventors: Ronald Lee Grey, JR., Emily Elizabeth Allen, Michael J. Boyd, Robert F. Fimognari, JR., Simon Giroux, Michelle Lai-Chen, Ales Medek, Mengqi Li, Christopher David Poff, Daniel Tyler Richter, Tony Z. Scott, Kathleen Paige Sokolowsky, Jeffrey Braden Sperry, Charlene Tsay, Xiaoxu Wang, Mariam Zaky, Chenlong Zhang
-
Patent number: 11893265Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: GrantFiled: March 26, 2022Date of Patent: February 6, 2024Assignee: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20230305733Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: March 26, 2022Publication date: September 28, 2023Applicant: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Patent number: 11307978Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: GrantFiled: April 2, 2020Date of Patent: April 19, 2022Assignee: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20200371907Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: April 2, 2020Publication date: November 26, 2020Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Patent number: 10764316Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.Type: GrantFiled: May 11, 2017Date of Patent: September 1, 2020Assignee: Mimecast North America, Inc.Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
-
Patent number: 10621079Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: GrantFiled: November 16, 2018Date of Patent: April 14, 2020Assignee: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20190087320Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: November 16, 2018Publication date: March 21, 2019Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Patent number: 10133658Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: GrantFiled: June 6, 2017Date of Patent: November 20, 2018Assignee: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20180322040Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: June 6, 2017Publication date: November 8, 2018Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20170318049Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.Type: ApplicationFiled: May 11, 2017Publication date: November 2, 2017Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
-
Patent number: 9654492Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.Type: GrantFiled: January 29, 2016Date of Patent: May 16, 2017Assignee: MIMECAST NORTH AMERICA, INC.Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
-
Publication number: 20170078321Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.Type: ApplicationFiled: January 29, 2016Publication date: March 16, 2017Applicant: MIMECAST NORTH AMERICA, INC.Inventors: Jackie MAYLOR, Simon TYLER, Peter BAUER, Gilly BENAMRAM, Paul SOWDEN, Steven MALONE, Wayne VAN RY, Francisco RIBEIRO
-
Patent number: 9467435Abstract: An electronic message threat protection system that incorporates user authorization to ensure that only authorized users receive the benefits of the system's protection. The system protects against threats such as phishing attacks or malware embedded in attached files. References to resources in messages, such as links or attachments, are transformed into protected references that may for example insert a level of indirection between the user and the resource. Use of a protected reference triggers a user authorization check; if the user is an authorized user, the system provides access via a security mechanism that mitigates potential threats. Unauthorized users are denied access. A message recipient may deliberately or inadvertently distribute copies of the message or of the protected references; however, the authorization check ensures that recipients of the copies can only access resources via these copies if they are authorized users.Type: GrantFiled: September 15, 2015Date of Patent: October 11, 2016Assignee: MIMECAST NORTH AMERICA, INC.Inventors: Simon Tyler, Steven Malone, Jackie Maylor, Wayne Van Ry, Francisco Ribeiro
-
Patent number: 9049681Abstract: A router receives from a host service a message which is intended for delivery to a mobile device via a wireless network. The message includes an indication field which includes a return packet indication on whether to send a return packet to the host, an identifier field which includes an identifier which identifies the device, and a payload field which includes a payload of the message. When the indication is set to a first, setting and the message is not being delivered to the device, the router sends to the host a return packet which indicates that the message is not being delivered to the device. When the indication is set to a second setting and the message is not being delivered to the device, the router does not send to the host the return packet which indicates that the message is not being delivered to the device.Type: GrantFiled: January 18, 2013Date of Patent: June 2, 2015Assignee: Blackberry LimitedInventors: Ian Michael Patterson, Allan David Lewis, Alina Kushnir, Simon Tyler Wise
-
Patent number: 8457053Abstract: A router is operative to perform the following actions for each one of a plurality of wireless mobile devices operating in a wireless network. The router transmits to the wireless mobile device a number of data packets matched for a window size. The router changes the window size for the wireless mobile device based on whether a round trip time for communicating the data packets is within a threshold value. The router will update the threshold value based on the round trip times associated with traffic communicated via the router for all of the wireless mobile devices.Type: GrantFiled: July 6, 2012Date of Patent: June 4, 2013Assignee: Research In Motion LimitedInventors: Simon Tyler Wise, Marc Plumb, Ian Michael Patterson, Allan David Lewis
-
Patent number: 8385315Abstract: A router system receives from a host service a message which is intended for delivery to a mobile device via a wireless network. The message includes at least a first field having an identifier which identifies the mobile device, a second field having a payload of the message, and a third field having a return packet indication on whether to return a return packet to the host service. The router system examines the indication in the message and, if the indication is set to a first setting, the router system returns to the host service a return packet which indicates a status associated with the message for delivery to the mobile device. If the indication is set to a second setting, then the router system does not return to the host service the return packet which indicates the status associated with the message for delivery to the mobile device.Type: GrantFiled: April 12, 2012Date of Patent: February 26, 2013Assignee: Research In Motion LimitedInventors: Ian Michael Patterson, Allan David Lewis, Alina Kushnir, Simon Tyler Wise