Patents by Inventor David Dodd

David Dodd has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090019697
    Abstract: A method of fabricating a gear is disclosed. The method may include loading a donut blank onto a pallet through a bore in the donut bank. The method may further include loading the pallet and donut blank onto a plurality of different machines and performing a plurality of different machining processes on the donut blank to fabricate a gear.
    Type: Application
    Filed: September 28, 2007
    Publication date: January 22, 2009
    Inventor: Harry David Dodd
  • Patent number: 7353222
    Abstract: A system and method for assigning attributes to XML document nodes to facilitate their storage in relational databases and the subsequent retrieval and re-construction of pertinent nodes and fragments in original document order is provided. Since these queries are performed using relational database query engines, the speed of their execution is significantly faster than that using more exotic systems such as object-oriented databases. Furthermore, this method is portable across all vendor platforms, and so can be deployed at client sites without additional investments in database software.
    Type: Grant
    Filed: December 23, 2003
    Date of Patent: April 1, 2008
    Assignee: Progress Software Corporation
    Inventors: David Dodds, Larry Kuo, Soumitra Sengupta, William D. Lindsey, Nandit Soparkar
  • Patent number: 7340776
    Abstract: Managing the selection and scheduling of security audits run on a computing network. The computer network is surveyed by a security audit system to determine the function and relative importance of the elements in the network. Based on function and priority, a more thorough type of security audit is selected to run against each of the network elements by the security audit system. The security audit can also be automatically scheduled based on the information gathered from the survey. Once the system runs the security audit, a vulnerability assessment can be calculated for each element in the network. The vulnerability assessment can be presented in a format that facilitates interpretation and response by someone operating the system. The vulnerability assessment can also be used to configure and schedule future security audits.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: March 4, 2008
    Assignee: International Business Machines Corporation
    Inventors: Robert David Zobel, Timothy David Dodd, Sharon A. Millar, David Gerald Nesfeder, Jr., Christopher S. Singer
  • Publication number: 20060101320
    Abstract: A system and method for assigning attributes to XML document nodes to facilitate their storage in relational databases and the subsequent retrieval and re-construction of pertinent nodes and fragments in original document order is provided. Since these queries are performed using relational database query engines, the speed of their execution is significantly faster than that using more exotic systems such as object-oriented databases. Furthermore, this method is portable across all vendor platforms, and so can be deployed at client sites without additional investments in database software.
    Type: Application
    Filed: December 23, 2003
    Publication date: May 11, 2006
    Inventors: David Dodds, Larry Kuo, Soumitra Sengupta, William Lindsey, Nandit Soparkar
  • Publication number: 20050238037
    Abstract: A technique for estimating distances and the nature of irregularities and faults on a telephone subscriber line is disclosed. Reflected test signals are measured as a function of frequency. The measurements are compensated for variable propagation velocity and variable line attenuation and then weighted before transformation with the Fourier transform. The amplitude and phase of peaks in the spectral domain identify the distances to the irregularities and the magnitude and phase angle of the reflection coefficients.
    Type: Application
    Filed: April 27, 2004
    Publication date: October 27, 2005
    Inventors: David Dodds, Bernardo Celaya, Terence Monteith
  • Publication number: 20050158051
    Abstract: A transceiver module is configured for insertion within a cage. The cage has a cage latch that retains the transceiver module in the cage. The transceiver module has a housing configured to receive any one of at least two different release mechanisms. Each of the release mechanisms is movable between a first position and a second position, wherein the cage latch is not deflected when the release mechanism is in the first position, and wherein the cage latch is deflected when the release mechanism is in the second position such that the transceiver module can be removed from the cage.
    Type: Application
    Filed: January 16, 2004
    Publication date: July 21, 2005
    Inventor: David Dodds
  • Publication number: 20050157987
    Abstract: A mode indicator for use with a transceiver module includes a colored plastic button having an engagement feature configured for attachment to a corresponding transceiver module engagement feature.
    Type: Application
    Filed: January 16, 2004
    Publication date: July 21, 2005
    Inventors: David Dodds, Paul Winker, Eric Larson
  • Publication number: 20020147803
    Abstract: Calculating risk based on information collected during a security audit of a computing network. The computer network is surveyed to determine the significance of elements in the network and to identify vulnerabilities associated with the elements. Using this information, the security audit system calculates a risk value for each vulnerability. The risk value is a function of the asset value, the probability that the vulnerability will be exploited, and the potential severity of damage to the network if the vulnerability is exploited. The risk value can be adjusted based on the ease with which the vulnerability can be fixed. A network element may have one or more risk values associated with it based on one or more vulnerabilities. The security audit system employs a band calculation method for summing risk values and computing a single security score for the element. The band calculation method can also be used to produce a security score for a group of elements.
    Type: Application
    Filed: January 31, 2002
    Publication date: October 10, 2002
    Inventors: Timothy David Dodd, Nicolas Heinrich
  • Publication number: 20020116371
    Abstract: A system and method for assigning attributes to XML document nodes to facilitate their storage in relational databases and the subsequent retrieval and re-construction of pertinent nodes and fragments in original document order is provided. Since these queries are performed using relational database query engines, the speed of their execution is significantly faster than that using more exotic systems such as object-oriented databases. Furthermore, this method is portable across all vendor platforms, and so can be deployed at client sites without additional investments in database software.
    Type: Application
    Filed: December 5, 2000
    Publication date: August 22, 2002
    Inventors: David Dodds, Larry Kuo, Soumitra Sengupta, William D. Lindsey, Nandit Soparkar
  • Publication number: 20020104014
    Abstract: Managing the selection and scheduling of security audits run on a computing network. The computer network is surveyed by a security audit system to determine the function and relative importance of the elements in the network. Based on function and priority, a more thorough type of security audit is selected to run against each of the network elements by the security audit system. The security audit can also be automatically scheduled based on the information gathered from the survey. Once the system runs the security audit, a vulnerability assessment can be calculated for each element in the network. The vulnerability assessment can be presented in a format that facilitates interpretation and response by someone operating the system. The vulnerability assessment can also be used to configure and schedule future security audits.
    Type: Application
    Filed: January 31, 2002
    Publication date: August 1, 2002
    Applicant: Internet Security Systems, Inc.
    Inventors: Robert David Zobel, Timothy David Dodd, Sharon A. Millar, David Gerald Nesfeder, Christopher S. Singer
  • Patent number: 6276052
    Abstract: An applicator (10) for crimping a terminal (14) onto a conductor and inserting the crimped terminal into the housing (16) of a partially assembled connector (12) includes a seating sensor for assuring that the terminal is fully inserted into the housing. A backup member (56) which is arranged to engage side edges (184) of the electrical terminal for preventing axial movement additionally makes electrical contact therewith. The pusher member includes a projection (188) that makes electrical contact with the end of the terminal only when the housing and terminal are fully seated. Electrical leads (102, 146) are electrically connected to the backup member and the pusher member so that continuity can be verified after the connector housing is fully seated. In the event that continuity is not detected, an error signal is generated indicating a malfunction.
    Type: Grant
    Filed: August 26, 1999
    Date of Patent: August 21, 2001
    Assignee: The Whitaker Corporation
    Inventors: John Avenoso, Michael Stephen Shank, Kerry Joseph Stakem, Robert Allen Dubler, John David Dodds
  • Patent number: 5832522
    Abstract: The data storage system is connected to a local area network and includes a storage server that on a demand basis and/or on a periodically scheduled basis audits the activity on each volume of each data storage device that is connected to the network. Low priority data files are migrated via the network and the storage server to backend data storage media, and the directory resident in the data storage device is updated with a placeholder entry to indicate that this data file has been migrated to backend storage. When the processor requests this data file, the placeholder entry enables the storage server to recall the requested data file to the data storage device from which it originated.
    Type: Grant
    Filed: May 22, 1996
    Date of Patent: November 3, 1998
    Assignee: Kodak Limited
    Inventors: Ronald L. Blickenstaff, Catherine Irlam Brant, Paul David Dodd, Anton H. Kirchner, Jennifer Kay Montez, Brian Eldred Trede, Richard Allen Winter
  • Patent number: 5518127
    Abstract: A mobile workstation for preparation of skewered meat products comprising a mobile food preparation cart, a skewer bracket and a rack member. The cart has a work surface or horizontal supports supported by a plurality of leg supports on wheels and rails for supporting a removable seasoning lug positioned below said work surface. The skewer bracket is mounted on the food preparation cart and receives and positions a skewer in a substantially vertical position for effecting skewering of a meat product thereon. The rack member, which also supports a plurality of skewers or skewers and skewered meat products, is also mounted on the food preparation cart.
    Type: Grant
    Filed: June 20, 1994
    Date of Patent: May 21, 1996
    Assignee: KFC Corporation
    Inventors: John L. Warmack, Frederick W. Henderson, David A. Dodds
  • Patent number: 4755928
    Abstract: A host connected outboard back-up and recovery system has a tape drive connected to a plural port solid-state cache memory which, in turn, is connected to a disk drive. Data to be backed-up can first be copied from the disk drive to the cache and then from the cache to the tape drive in back-up operations, so that the relative speeds of the disk drive and the tape need not be matched. An outboard controller controls flow of the data between the disk drive and the tape drive and additionally controls storage of the data on the tape, so that host computer involvement is avoided.
    Type: Grant
    Filed: March 5, 1984
    Date of Patent: July 5, 1988
    Assignee: Storage Technology Corporation
    Inventors: Billy D. Johnson, P. David Dodd, Dean P. Kinard
  • Patent number: 4536836
    Abstract: A method for detection of a sequential data stream which can be performed in a data storge subsystem without host computer intervention is disclosed featuring examination of the channel program processed during a read operation for signals indicative that the data is not part of a sequential data stream, for example, embedded seek instructions. If a particular channel program for does not contain such indications, the successive record or records may then be staged to a faster access memory device such as a solid-state cache. The invention is described in a plug-compatible, software-transparent configuration.
    Type: Grant
    Filed: November 15, 1982
    Date of Patent: August 20, 1985
    Assignee: Storage Technology Corporation
    Inventors: P. David Dodd, Ronald L. Blickenstaff, Richard L. Coulson, Robert J. Moreno, Brian E. Trede
  • Patent number: 4503501
    Abstract: A method of operation of a memory array for storage of records of differing predetermined sizes is disclosed which features division of the array into domains which are substantially integral multiples of the predetermined record sizes. In a preferred embodiment the domain allocation may be varied adaptively in accordance with usage so as to enable more efficient use of the array.
    Type: Grant
    Filed: November 15, 1982
    Date of Patent: March 5, 1985
    Assignee: Storage Technology Corporation
    Inventors: Richard L. Coulson, Ronald L. Blickenstaff, P. David Dodd, Robert J. Moreno, Dean P. Kinard
  • Patent number: 4476526
    Abstract: A buffered cache memory subsystem is disclosed which features a solid-state cache memory connected to a storage director which interfaces a host channel with a control module controlling operation of a long-term data storage device such as a disk drive. The solid-state cache memory is connected to plural directors which in turn may be connected to differing types of control modules, whereby the cache is usable with more than one type of long-term data storage means within a given system. The cache memory may be field-installed in a preexisting disk drive storage system and is software transparent to the host computer, while providing improvements in overall operating efficiency. In a preferred embodiment, data is only cached when it is expected to be the subject of a future host request.
    Type: Grant
    Filed: November 27, 1981
    Date of Patent: October 9, 1984
    Assignee: Storage Technology Corporation
    Inventor: P. David Dodd
  • Patent number: 4468730
    Abstract: A method for detection of a sequential data stream which can be performed without host computer intervention is disclosed featuring examination of a data record and channel program during read operations for signals indicative that the data is not part of a sequential data stream, for example, embedded seek instructions. If a particular sought for record does not contain such indications, the successive record or records may then be staged to a faster access memory device such as a solid-state cache. The invention is described in a plug-compatible, software-transparent configuration.
    Type: Grant
    Filed: November 27, 1981
    Date of Patent: August 28, 1984
    Assignee: Storage Technology Corporation
    Inventors: P. David Dodd, Ronald L. Blickenstaff, Richard L. Coulson, Robert J. Moreno, Brian E. Trede
  • Patent number: 4430712
    Abstract: A method of operation of a memory array for storage of records of differing predetermined sizes is disclosed which features division of the array into domains which are substantially integral multiples of the predetermined record sizes. In a preferred embodiment the domain allocation may be varied adaptively in accordance with usage so as to enable more fully efficient use of the array.
    Type: Grant
    Filed: November 27, 1981
    Date of Patent: February 7, 1984
    Assignee: Storage Technology Corporation
    Inventors: Richard L. Coulson, Ronald L. Blickenstaff, P. David Dodd, Robert J. Moreno, Dean P. Kinard