Patents by Inventor David Probert
David Probert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8933008Abstract: A disinfectant solution comprising: an aldehyde; a polyol; one or more acetal derivatives formed by reaction of said aldehyde with said polyol; one or more surfactants selected from the general classes anionic, cationic, or non-ionic; one or more pH buffering agents selected from the group consisting of monosodium phosphate, disodium phosphate, trisodium phosphate, sodium tetraborate, sodium bicarbonate, sodium citrate, phosphoric acid, boric acid and citric acid. The invention also relates to a process of producing the disinfectant solution, and a method of disinfecting and/or sterilizing heat sensitive medical devices comprising treating the medical devices with the disinfectant solution of the invention.Type: GrantFiled: April 27, 2011Date of Patent: January 13, 2015Assignee: Whiteley Corporation Pty. Ltd.Inventors: Gregory Stuart Whiteley, Reginald Keith Whiteley, Graeme David Probert, Trevor Owen Glasbey
-
Publication number: 20130203845Abstract: A disinfectant solution comprising: an aldehyde; a polyol; one or more acetal derivatives formed by reaction of said aldehyde with said polyol; one or more surfactants selected from the general classes anionic, cationic, or non-ionic; one or more pH buffering agents selected from the group consisting of monosodium phosphate, disodium phosphate, trisodium phosphate, sodium tetraborate, sodium bicarbonate, sodium citrate, phosphoric acid, boric acid and citric acid. The invention also relates to a process of producing the disinfectant solution, and a method of disinfecting and/or sterilizing heat sensitive medical devices comprising treating the medical devices with the disinfectant solution of the invention.Type: ApplicationFiled: April 27, 2011Publication date: August 8, 2013Applicant: WHITELEY CORPORATION PTY LTD.Inventors: Gregory Stuart Whiteley, Reginald Keith Whiteley, Graeme David Probert, Trevor Owen Glasbey
-
Patent number: 8312463Abstract: This patent application pertains to urgency-based resource management in computing scenarios. One implementation can identify processes competing for resources on a system. The implementation can evaluate an urgency of individual competing processes. The implementation can also objectively allocate the resources among the competing processes in a manner that reduces a total of the urgencies of the competing processes.Type: GrantFiled: March 30, 2010Date of Patent: November 13, 2012Assignee: Microsoft CorporationInventors: Burton J. Smith, David Probert, Abhishek Singh, Douglas Burger, David Wecker
-
Publication number: 20110247001Abstract: This patent application pertains to urgency-based resource management in computing scenarios. One implementation can identify processes competing for resources on a system. The implementation can evaluate an urgency of individual competing processes. The implementation can also objectively allocate the resources among the competing processes in a manner that reduces a total of the urgencies of the competing processes.Type: ApplicationFiled: March 30, 2010Publication date: October 6, 2011Applicant: Microsoft CorporationInventors: Burton J. Smith, David Probert, Abhishek Singh, Douglas Burger, David Wecker
-
Publication number: 20070006152Abstract: Code information is marked by tags and tags are embedded into pieces of code or files called “codetags” that map tags to pieces of code. These tags can then be updated, searched, sorted, recombined, and tracked, among many other feedback mechanisms. These tags and their feedback mechanisms help to illuminate the engineering metadata and business metadata of pieces of code so as to help engineering management and business management of companies to better guide their software resources.Type: ApplicationFiled: June 29, 2005Publication date: January 4, 2007Applicant: Microsoft CorporationInventors: Shakil Ahmed, Anthony Jones, David Christiansen, David Probert, Naveen Sethuraman, Lisa Grayson, Mark Wodrich, Rajesh Munshi, Valerie Moore
-
Publication number: 20060218389Abstract: A system and method for identity decisions and invalidation. Modified objects (e.g., files, executables, etc.) are flagged for reevaluation. Privileges associated with the object are only persisted if the modifications are determined to be authorized (e.g., updates and patches). In one embodiment, a tagging system registers to be notified of all writes, renames, truncations, moves, deletions, or any other relevant modifications to objects. If the tagging system detects a modification operation targeting the object, it invalidates all identity decisions cached with the object. The next time the object runs, the system does not recognize the object and it is forced to reevaluate its identity. Thus, patching and other write operations are still permitted, but the system detects the changed object and reevaluates the identity.Type: ApplicationFiled: March 22, 2005Publication date: September 28, 2006Applicant: Microsoft CorporationInventors: Eric Li, John Rector, Genevieve Fernandes, David Probert
-
Publication number: 20060190482Abstract: The present invention manages resources in a computing device to facilitate the allocation of resources amongst competing clients operating on the device. A hierarchy of budgets is constructed to encode restrictions on the aggregated use of a resource allocated by a resource provider to one or more clients. A resource manager validates and arbitrates requests to allocate resources to the one or more clients by resource providers in accordance with the budgets comprising the hierarchy. The resource manager notifies clients of availability and shortages of resources to promote compliance with the restrictions encoded in the budgets of the hierarchy.Type: ApplicationFiled: February 22, 2005Publication date: August 24, 2006Applicant: Microsoft CorporationInventors: Arun Kishan, David Probert
-
Publication number: 20060137694Abstract: An electronic device with emergency instructions to instruct a user how to handle a variety of medical as well as non-medical emergencies, and the instructions are electronically resident on the electronic device. The electronic device will generally be a device generally used for many different tasks such as telecommunication or planning. Finally the instructions may be installed during the device's manufacture or after the device's manufacture. The instructions may be accessed at any time and anywhere because they are resident upon the device.Type: ApplicationFiled: December 23, 2004Publication date: June 29, 2006Inventors: David Probert, Gabriel Chino
-
Publication number: 20050251637Abstract: The present invention is directed to improving the usage of kernel mode memory in computing environments. The invention is useful in offsetting the effects of abandonment of kernel mode memory objects. Objects in kernel mode memory space are identified and a determination is made whether all references to particular kernel objects are known by examining an object container referring to each kernel object. If all references to a kernel object are known, a determination is made whether the kernel object should be classified as a moveable object. Kernel objects classified as movable are retrievably moved to a new memory location and all references to the kernel object are updated to the new memory location. Retrievably moving kernel objects allows abandoned kernel objects to be readily detected.Type: ApplicationFiled: June 28, 2005Publication date: November 10, 2005Applicant: Microsoft CorporationInventors: Adrian Marinescu, David Probert
-
Publication number: 20050091214Abstract: Granting an executable object (e.g., an application program, thread, or process) access to a namespace object (e.g., a named object, resource, file, or folder). A request by the executable object for the namespace object is intercepted and processed to determine whether a local namespace associated with the executable object, user, or session stores a copy of the requested namespace object. If the copy exists in one of the local namespaces, the request is granted and allowed to operate on that local namespace. If the requested namespace object exists only in a global namespace, the namespace object is copied to a local namespace. The request is then granted and allowed to operate on the copy of the namespace object in the local namespace. Protecting the namespace objects stored in the global namespace from modification improves the stability of the application program and operating system.Type: ApplicationFiled: September 10, 2004Publication date: April 28, 2005Applicant: Mircrosoft CorporationInventors: David Probert, Eric Li, Dragos Sambotin, Genevieve Fernandes, John Rector, Edward Praitis, Valeriy Tsuryk
-
Publication number: 20050091192Abstract: Tracking creation of one or more files by an application program or operating system. A method of the invention dynamically maintains a list of files or other resources associated with a particular application program or operating system. The method maintains the list by detecting creation of a file, determining an identity for the file, identifying a list associated with the file identity, and adding the file to the list.Type: ApplicationFiled: October 12, 2004Publication date: April 28, 2005Applicant: Microsoft CorporationInventors: David Probert, Eric Li, John Rector
-
Publication number: 20050091535Abstract: Managing the installation, execution, and removal of application programs by an operating system via an application identity associated with each application program. A method of the invention assigns the application identity to each application program and a resource identity to each resource associated with each application program. The method relates the assigned application identity and resource identity to enable manipulation of the application program and its resources.Type: ApplicationFiled: June 15, 2004Publication date: April 28, 2005Applicant: Microsoft CorporationInventors: Jude Kavalam, Timothy Noonan, Valeriy Tsuryk, Adam Stritzel, David Probert, Eric Li, John Rector, Dragos Sambotin
-
Publication number: 20050091655Abstract: Maintaining a set of runtime objects. A method of the invention detects creation of a runtime object by an application program or operating system. The method evaluates a predicate for a set associated with the runtime object to determine membership of the runtime object in the set. Further, one or more properties of the set may be applied to the determined runtime object members of the set (e.g., to control access to a resource).Type: ApplicationFiled: September 10, 2004Publication date: April 28, 2005Applicant: Microsoft CorporationInventors: David Probert, Eric Li, John Rector
-
Publication number: 20050091658Abstract: Granting an application program access to a resource as a function of a privilege associated with the application program. An embodiment of the invention employs a persistent, individual identity associated with the components of an application program or a group of application programs to allow an operating system to identify and differentiate between different application programs or groups of application programs installed on a computing system. The identity associated with each component of an application program enables the identification and removal or uninstallation of the application program. The identity also enables isolation of resources of the application program and protection of operating system resources.Type: ApplicationFiled: June 15, 2004Publication date: April 28, 2005Applicant: Microsoft CorporationInventors: Jude Kavalam, Timothy Noonan, Valeriy Tsuryk, RoseMarie FitzSimons, Jonathan Lew, Freddie Aaron, Edward Praitis, David Probert, Eric Li, John Rector, Dragos Sambotin, Genevieve Fernandes