Patents by Inventor David M. Cole
David M. Cole has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250058180Abstract: A golf club head comprising a shaft sleeve with a shaft sleeve coupler set, a sleeve outer wall, and a cap. The shaft sleeve coupler set comprises four couplers protruding from the sleeve outer wall. Each of the four couplers comprises an arcuate surface. The golf club head comprises a hosel bore. The shaft sleeve is configured to be received by the hosel bore. The shaft sleeve and the hosel bore are non-coaxial.Type: ApplicationFiled: August 27, 2024Publication date: February 20, 2025Applicant: KARSTEN MANUFACTURING CORPORATIONInventors: Jacob T. Clarke, Eric J. Morales, Ryan M. Stokke, Evan R. Greer, Eric V. Cole, David S. Kultala
-
Publication number: 20250018258Abstract: Described herein is a golf club head comprising a deflection feature to increase ball speed and launch distance, while producing desirable acoustics and optimized mass distribution. The deflection feature can include any one of or any combination of an insert comprising a gap, an insert comprising voids, a thin uniform sole, a cutout in the top rail, optimized face material, a thin sole, a reinforcement device, or a multi material weight.Type: ApplicationFiled: July 16, 2024Publication date: January 16, 2025Inventors: Eric J. Morales, Ryan M. Stokke, David L. Petersen, Eric V. Cole, Cory S. Bacon, Les J. Bryant
-
Publication number: 20240107113Abstract: Various implementations disclosed herein include devices, systems, and methods that provide video content (e.g., a TV show, a recorded sporting event, a movie, a 3D video, etc.) within a 3D environment using parameters selected based on one or more contextual factors. Such contextual factors may be determined based on an attribute of the content (e.g., its intended purpose or viewing environment), the user (e.g., the user's visual quality, interpupillary distance, etc.), the 3D environment (e.g., current lighting conditions, spatial considerations, etc.), or other context attributes.Type: ApplicationFiled: September 15, 2023Publication date: March 28, 2024Inventors: Danvin Ruangchan, David M. Cole, Joshua J. Taylor, Christopher T. Eubank, Samir Gehani, Travis W. Brown, Shai Messingher Lang
-
Publication number: 20230077410Abstract: Encoding an image stream may include receiving an image stream with an original image resolution; generating a plurality of copies of the image stream with the original image resolution; encoding, for each copy of the plurality of copies of the image stream, the copy of the image stream to generate an encoded copy of the image stream, wherein the encoded copy of the image stream comprises a first region having a first image resolution and a second region having a second image resolution, wherein each encoded copy of the plurality of encoded copies of the image stream has a different first region, and providing, to a playback device, at least one encoded copy of the plurality of encoded copies of the image stream.Type: ApplicationFiled: September 15, 2022Publication date: March 16, 2023Inventors: Matthew J. Yaeger, David M. Cole, Benjamin D. Buckner
-
Patent number: 8774184Abstract: System and method for a full featured network communications protocol that is both memory and processor efficient. A preferred embodiment comprises a method for transmitting information between electronic devices, the method comprising creating a connection between a pair of electronic devices, sending a packet between the pair, acknowledging a receipt of the packet by a receiver of the packet, and dissolving the connection when it is no longer needed. The creating of the connection comprises assigning a port number to the connection at an initiating electronic device and then transmitting a connection request containing the port number to a servicing electronic device. After the transmitting, the creating further comprises receiving a second port number to the connection from the servicing electronic device.Type: GrantFiled: October 13, 2009Date of Patent: July 8, 2014Assignee: Texas Instruments IncorporatedInventors: Sunil Gupta, Tanner R. Andrews, David M. Cole, Sekar Udayamurthy, Corey Brady, Patrick M. Milheron
-
Patent number: 8700767Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 10, 2012Date of Patent: April 15, 2014Assignee: McAfee, Inc.Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
-
Patent number: 8661126Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target parts, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 10, 2012Date of Patent: February 25, 2014Assignee: McAfee, Inc.Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
-
Patent number: 8621073Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 31, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8621060Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 31, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8615582Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 24, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120185945Abstract: A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets.Type: ApplicationFiled: March 28, 2012Publication date: July 19, 2012Inventors: Steven G. Andres, David M. Cole, Thomas Gregory Cummings, Roberto Ramon Garcia, Brian Michael Kenyon, George R. Kurtz, Stuart Cartier McClure, Christopher William Moore, Michael J. O'Dea, Ken D. Saruwatari
-
Publication number: 20120151594Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120151596Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120151595Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8201257Abstract: A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets.Type: GrantFiled: March 31, 2004Date of Patent: June 12, 2012Assignee: McAfee, Inc.Inventors: Steven G. Andres, David M. Cole, Thomas Gregory Cummings, Roberto Ramon Garcia, Brian Michael Kenyon, George R. Kurtz, Stuart Cartier McClure, Christopher William Moore, Michael J. O'Dea, Ken D. Saruwatari
-
Publication number: 20120144476Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 7, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120144494Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target parts, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 10, 2012Publication date: June 7, 2012Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
-
Publication number: 20120144493Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 10, 2012Publication date: June 7, 2012Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
-
Patent number: 8135830Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: June 1, 2009Date of Patent: March 13, 2012Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8135823Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: May 14, 2007Date of Patent: March 13, 2012Assignee: McAfee, Inc.Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso