Patents by Inventor David Shackelford
David Shackelford has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220347323Abstract: A method for detecting or ruling out non-small cell lung cancer (NS-CLC) in a patient comprises: (a) administering to a patient a detectable amount of a compound of formula (I): Formula (I) wherein the compound is targeted to any NSCLC tumor in the patient; and (b) acquiring an image to detect the presence or absence of any NSCLC tumor in the patient, wherein at least one of the atoms in formula (I) is replaced with 11C, 13N, 15O, 18F, 34mCI, 38K, 45Ti, 51Mn, 52Mn, 52Fe, 55Co, 60CU, 61Cu, 62Cu, 64Cu, 66Ga, 68Ga, 71As, 72As, 74As, 75Br, 75Br, 76Br, 82Rb, 86Y, 89Zr, 90Nb, 94mTc, 110mIn, 118Sb, 120I, 121I, 122I, and 124I.Type: ApplicationFiled: September 18, 2020Publication date: November 3, 2022Inventors: David Shackelford, Saman Sadeghi, Milica Momcilovic
-
Publication number: 20160289651Abstract: This disclosure relates to methods and compositions useful for the treatment of cancer and diseases and disorders associated with autophagy.Type: ApplicationFiled: February 24, 2016Publication date: October 6, 2016Applicant: Salk Institute for Biological StudiesInventors: Reuben J. Shaw, Daniel F. Egan, Maria Mihaylova, David Shackelford
-
Publication number: 20130040310Abstract: This disclosure relates to methods and compositions useful for the treatment of cancer and diseases and disorders associated with autophagy.Type: ApplicationFiled: December 15, 2010Publication date: February 14, 2013Applicant: Salk Institute for Biological StudiesInventors: Reuben Shaw, Daniel F. Egan, Maria Mihavlova, David Shackelford
-
Publication number: 20120189544Abstract: The disclosure provides methods for detection, prognosis and diagnosis of gastrointestinal polyps, cancer diseases and disorders.Type: ApplicationFiled: June 11, 2010Publication date: July 26, 2012Applicant: SALK INSTITUTE FOR BIOLOGICAL STUDIESInventors: Reuben J. Shaw, David Shackelford, Debbie Vasquez
-
Publication number: 20070300075Abstract: Disclosed is a system, method, and program for distributing computer software from a first computer system. The first computer system receives a request for software from a second computer system. In response, the first computer system generates a message, encrypts the generated message, and transmits the encrypted message to the second computer system. The first computer system later receives an encrypted response from the second computer system and processes the encrypted response to determine whether the second computer system is authorized to access the software. The second computer system is permitted access to the software after determining that the second computer system is authorized to access the software. To access the computer software with the second computer system, the second computer system transmits a request for the software to the first computer system.Type: ApplicationFiled: September 6, 2007Publication date: December 27, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: David Shackelford
-
Publication number: 20070271410Abstract: One aspect of the invention is a method for restoring data, which for example, includes receiving a request for at least a portion of the data. This example also includes creating a directory entry for the data in a virtual file system, and allocating storage space for the data. This example further includes initializing a block virtualization indicator to a value indicating that the data is not available. This example additionally includes writing a subset of the data to the storage space, and changing the block virtualization indicator to a value indicating that the data is available.Type: ApplicationFiled: August 2, 2007Publication date: November 22, 2007Inventor: David Shackelford
-
Publication number: 20070192454Abstract: Provided are a method, system, and program for consolidating session information for a cluster of sessions in a coupled session environment. Information for each of a plurality of sessions comprising a cluster is stored in a memory of a processor session. Each session associates at least one primary system and at least one secondary system, wherein within each session, updates are copied from the at least one primary system to the at least one secondary system. The session information in the memory for the plurality of sessions is processed to generate consolidated session information for the cluster based on the session information for the sessions in the cluster. The consolidated session information for the cluster is written to a master data set maintaining information for sessions.Type: ApplicationFiled: February 16, 2006Publication date: August 16, 2007Inventors: Donald Blea, Robert Crockett, Gregory McBride, Alan McClure, David Shackelford
-
Publication number: 20070130214Abstract: An apparatus, system, and method are disclosed for continuously protecting data. A mirror module mirrors a primary record set to a base record set. A log module accumulates each record change to the primary record set in a log. A change selection module selects a record change from the log. A change application module applies the selected record change to the base record set to form a recovered record set.Type: ApplicationFiled: December 7, 2005Publication date: June 7, 2007Inventors: Kenneth Boyd, John Flynn, Robert Kern, Gregory McBride, William Micka, David Shackelford
-
Publication number: 20060294162Abstract: Provided are a method, system, and program for processing a transaction. Transaction data is transmitted from one primary storage site to a plurality of secondary storage sites. A transaction request is received at one secondary storage site and processed to include transaction data from the secondary storage site that was transmitted from the primary storage site. The processed transaction request including transaction data is transmitted from the secondary storage site to the primary storage site to approve the transaction. The transaction request at the primary storage site is approved if the transaction data included in the received transaction request is consistent with the transaction data maintained at the primary storage site.Type: ApplicationFiled: August 10, 2006Publication date: December 28, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tarek Makansi, Gregory McBride, David Shackelford
-
Publication number: 20060294110Abstract: Provider are a method, system, and program for maintaining data in a distributed computing environment. Data is stored at a primary storage site. A data structure is processed indicating an association of data sets in the stored data, secondary storage sites, and update frequencies. In response to processing the data structure, a determination is made of one of a plurality of secondary storage sites and a determination is made of at least one data set to transmit to the determined secondary storage site at an update frequency. The determined data set is transmitted to the determined secondary storage site according to the update frequency.Type: ApplicationFiled: August 10, 2006Publication date: December 28, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tarek Makansi, Gregory McBride, David Shackelford
-
Publication number: 20060112242Abstract: Techniques are provided for distributing data. It is determined that a source storage device is becoming a bottleneck. One or more blocks to be moved from the source storage device to one or more other storage-devices are identified. The one or more other storage devices are selected. Copy services are used to move the blocks from the source storage device to the one or more other storage devices. A metadata store is updated with locations of the blocks that have been moved.Type: ApplicationFiled: November 19, 2004Publication date: May 25, 2006Inventors: Gregory McBride, Cuong Le, David Shackelford
-
Publication number: 20060112140Abstract: Techniques are provided for processing a request. When the request is to read a data unit, information regarding the closest physical block locations is returned. When the request is to write to the data unit, information regarding one or more source block locations is returned, wherein the write is applied to one or more source blocks of the data unit. When a number of requests for the data unit exceed a threshold level and at least one quality of a service policy is not being met, a copy of the one or more source blocks of the data unit is created at a location selected based on proximity to at least one client computer from which the number of requests are high.Type: ApplicationFiled: November 19, 2004Publication date: May 25, 2006Inventors: Gregory McBride, Cuong Le, David Shackelford
-
Publication number: 20060112243Abstract: Techniques are provided for locating data. Mapping information for blocks associated with a file is provided. It is determined that a copy service has copied source blocks to target blocks. It is determined whether the mapping information should be updated to refer to the target blocks. Then, updated mapping information is provided in response to determining that the mapping information should be updated to refer to the target blocks. Techniques are also provided for accessing a copy of data when a source of the data is inaccessible. It is determined that source blocks are unavailable. Target blocks that are a copy of the unavailable source blocks are located using data in a metadata store. Indicators pointing to the source blocks are switched to point to the target blocks. Mapping information is updated at one or more client computers to access the target blocks instead of the source blocks.Type: ApplicationFiled: November 19, 2004Publication date: May 25, 2006Inventors: Gregory McBride, Cuong Le, David Shackelford
-
Publication number: 20060004889Abstract: Techniques are provided for resolving a collision between two copy services. A policy associated with a new copy service request is retrieved. Characteristics of an existing copy service request are determined. The effects of the new copy service request are determined. A resolution for the collision is identified based on the policy, the determined characteristics, and the determined effects.Type: ApplicationFiled: June 2, 2004Publication date: January 5, 2006Inventor: David Shackelford
-
Publication number: 20050193239Abstract: One aspect of the invention is a method for restoring data, which for example, includes receiving a request for at least a portion of the data. This example also includes creating a directory entry for the data in a virtual file system, and allocating storage space for the data. This example further includes initializing a block virtualization indicator to a value indicating that the data is not available. This example additionally includes writing a subset of the data to the storage space, and changing the block virtualization indicator to a value indicating that the data is available.Type: ApplicationFiled: February 13, 2004Publication date: September 1, 2005Inventor: David Shackelford
-
Publication number: 20050185597Abstract: Disclosed is a technique for performing configuration checking of a network. A network data store is scanned for at least one transaction. At least one event is generated for said transaction. At least one configuration policy is associated with said event. Said configuration policy is compared with configuration data associated with said event. It is determined whether said configuration policy has been violated based on the comparison. Also disclosed is a technique for performing proactive configuration checking of a network. A hypothetical network scenario is received. At least one transaction is generated based on the hypothetical network scenario. A network data store is populated with configuration data for said transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated.Type: ApplicationFiled: February 20, 2004Publication date: August 25, 2005Inventors: Cuong Le, David Shackelford, Gregory McBride, James Ratliff, Kaladhar Voruganti, Sandeep Gopisetty, Robert Basham, Dinesh Verma, Kang-Won Lee, Dakshi Agrawal, Brent Yardley, Khalid Filali-Adib
-
Publication number: 20050154786Abstract: Provided are a method, system, and article of manufacture, wherein in certain embodiments a plurality of updates from at least one host are received by at least one storage unit, and wherein a received update includes a first indicator that indicates an order in which the received update was generated by a host. A second indicator is associated with the received update based on an order in which the received update was received by a storage unit. The plurality of updates received by the at least one storage unit are aggregated. The aggregated updates are ordered, wherein the ordered updates can be consistently copied.Type: ApplicationFiled: January 9, 2004Publication date: July 14, 2005Inventor: David Shackelford
-
Publication number: 20050154845Abstract: Provided are a method, system, and article of manufacture for copying storage, wherein a first unit receives data updates from a second unit. The data updates are stored in a plurality of physical storage locations associated with the first unit. Links are generated to at least one of the plurality of physical storage locations to achieve consistent data between the first unit and the second unit.Type: ApplicationFiled: January 9, 2004Publication date: July 14, 2005Inventors: David Shackelford, Gregory McBride
-
Publication number: 20050108565Abstract: The invention automatically selects a copy function according to a policy associated with data to be copied. The apparatus comprises an identification module configured to identify available copy functions in response to a data copy request that includes a predefined copy policy, a comparison module configured to compare each copy function of a storage device to attributes of the predefined copy policy, a selection module configured to automatically select a copy function that satisfies the predefined copy policy, and a relationship module configured to establish a copy relationship between the determined copy function and the data copy request. A policy generation module may be included and configured to read a set of required attributes from an application and to establish the predefined copy policy based on the set of required attributes from the application.Type: ApplicationFiled: November 14, 2003Publication date: May 19, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Blea, Mary Burton, Gregory McBride, David Shackelford
-
Publication number: 20050081006Abstract: A computer program for automatically pairing target resources 20 such as volumes or logical units to source resources 20 containing data to be copied. Available target pools 48, 50, 52, 54 of target volumes are determined eligible for copying based on a technical compatibility and a user-defined metric such as recovery point or recovery time. User defined metrics and a policy to implement the metrics may be stored in a medium and selected by a user. The source volumes are prioritized, and progressively larger segments of the eligible target pools are searched for a target volume that satisfies the technical compatibility and user-defined metric. Where subgroups such as nested volumes are present in the source volumes, subgroups are also prioritized for searching. Where no target volume can be paired, the corresponding source volume is marked as processed and a search begins for the next source volume.Type: ApplicationFiled: October 10, 2003Publication date: April 14, 2005Inventors: David Shackelford, Gregory McBride, David Blea, Errol Calder, Todd Schlomer, Jimmie Brundidge