Patents by Inventor David Shackelford

David Shackelford has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220347323
    Abstract: A method for detecting or ruling out non-small cell lung cancer (NS-CLC) in a patient comprises: (a) administering to a patient a detectable amount of a compound of formula (I): Formula (I) wherein the compound is targeted to any NSCLC tumor in the patient; and (b) acquiring an image to detect the presence or absence of any NSCLC tumor in the patient, wherein at least one of the atoms in formula (I) is replaced with 11C, 13N, 15O, 18F, 34mCI, 38K, 45Ti, 51Mn, 52Mn, 52Fe, 55Co, 60CU, 61Cu, 62Cu, 64Cu, 66Ga, 68Ga, 71As, 72As, 74As, 75Br, 75Br, 76Br, 82Rb, 86Y, 89Zr, 90Nb, 94mTc, 110mIn, 118Sb, 120I, 121I, 122I, and 124I.
    Type: Application
    Filed: September 18, 2020
    Publication date: November 3, 2022
    Inventors: David Shackelford, Saman Sadeghi, Milica Momcilovic
  • Publication number: 20160289651
    Abstract: This disclosure relates to methods and compositions useful for the treatment of cancer and diseases and disorders associated with autophagy.
    Type: Application
    Filed: February 24, 2016
    Publication date: October 6, 2016
    Applicant: Salk Institute for Biological Studies
    Inventors: Reuben J. Shaw, Daniel F. Egan, Maria Mihaylova, David Shackelford
  • Publication number: 20130040310
    Abstract: This disclosure relates to methods and compositions useful for the treatment of cancer and diseases and disorders associated with autophagy.
    Type: Application
    Filed: December 15, 2010
    Publication date: February 14, 2013
    Applicant: Salk Institute for Biological Studies
    Inventors: Reuben Shaw, Daniel F. Egan, Maria Mihavlova, David Shackelford
  • Publication number: 20120189544
    Abstract: The disclosure provides methods for detection, prognosis and diagnosis of gastrointestinal polyps, cancer diseases and disorders.
    Type: Application
    Filed: June 11, 2010
    Publication date: July 26, 2012
    Applicant: SALK INSTITUTE FOR BIOLOGICAL STUDIES
    Inventors: Reuben J. Shaw, David Shackelford, Debbie Vasquez
  • Publication number: 20070300075
    Abstract: Disclosed is a system, method, and program for distributing computer software from a first computer system. The first computer system receives a request for software from a second computer system. In response, the first computer system generates a message, encrypts the generated message, and transmits the encrypted message to the second computer system. The first computer system later receives an encrypted response from the second computer system and processes the encrypted response to determine whether the second computer system is authorized to access the software. The second computer system is permitted access to the software after determining that the second computer system is authorized to access the software. To access the computer software with the second computer system, the second computer system transmits a request for the software to the first computer system.
    Type: Application
    Filed: September 6, 2007
    Publication date: December 27, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: David Shackelford
  • Publication number: 20070271410
    Abstract: One aspect of the invention is a method for restoring data, which for example, includes receiving a request for at least a portion of the data. This example also includes creating a directory entry for the data in a virtual file system, and allocating storage space for the data. This example further includes initializing a block virtualization indicator to a value indicating that the data is not available. This example additionally includes writing a subset of the data to the storage space, and changing the block virtualization indicator to a value indicating that the data is available.
    Type: Application
    Filed: August 2, 2007
    Publication date: November 22, 2007
    Inventor: David Shackelford
  • Publication number: 20070192454
    Abstract: Provided are a method, system, and program for consolidating session information for a cluster of sessions in a coupled session environment. Information for each of a plurality of sessions comprising a cluster is stored in a memory of a processor session. Each session associates at least one primary system and at least one secondary system, wherein within each session, updates are copied from the at least one primary system to the at least one secondary system. The session information in the memory for the plurality of sessions is processed to generate consolidated session information for the cluster based on the session information for the sessions in the cluster. The consolidated session information for the cluster is written to a master data set maintaining information for sessions.
    Type: Application
    Filed: February 16, 2006
    Publication date: August 16, 2007
    Inventors: Donald Blea, Robert Crockett, Gregory McBride, Alan McClure, David Shackelford
  • Publication number: 20070130214
    Abstract: An apparatus, system, and method are disclosed for continuously protecting data. A mirror module mirrors a primary record set to a base record set. A log module accumulates each record change to the primary record set in a log. A change selection module selects a record change from the log. A change application module applies the selected record change to the base record set to form a recovered record set.
    Type: Application
    Filed: December 7, 2005
    Publication date: June 7, 2007
    Inventors: Kenneth Boyd, John Flynn, Robert Kern, Gregory McBride, William Micka, David Shackelford
  • Publication number: 20060294162
    Abstract: Provided are a method, system, and program for processing a transaction. Transaction data is transmitted from one primary storage site to a plurality of secondary storage sites. A transaction request is received at one secondary storage site and processed to include transaction data from the secondary storage site that was transmitted from the primary storage site. The processed transaction request including transaction data is transmitted from the secondary storage site to the primary storage site to approve the transaction. The transaction request at the primary storage site is approved if the transaction data included in the received transaction request is consistent with the transaction data maintained at the primary storage site.
    Type: Application
    Filed: August 10, 2006
    Publication date: December 28, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tarek Makansi, Gregory McBride, David Shackelford
  • Publication number: 20060294110
    Abstract: Provider are a method, system, and program for maintaining data in a distributed computing environment. Data is stored at a primary storage site. A data structure is processed indicating an association of data sets in the stored data, secondary storage sites, and update frequencies. In response to processing the data structure, a determination is made of one of a plurality of secondary storage sites and a determination is made of at least one data set to transmit to the determined secondary storage site at an update frequency. The determined data set is transmitted to the determined secondary storage site according to the update frequency.
    Type: Application
    Filed: August 10, 2006
    Publication date: December 28, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tarek Makansi, Gregory McBride, David Shackelford
  • Publication number: 20060112242
    Abstract: Techniques are provided for distributing data. It is determined that a source storage device is becoming a bottleneck. One or more blocks to be moved from the source storage device to one or more other storage-devices are identified. The one or more other storage devices are selected. Copy services are used to move the blocks from the source storage device to the one or more other storage devices. A metadata store is updated with locations of the blocks that have been moved.
    Type: Application
    Filed: November 19, 2004
    Publication date: May 25, 2006
    Inventors: Gregory McBride, Cuong Le, David Shackelford
  • Publication number: 20060112140
    Abstract: Techniques are provided for processing a request. When the request is to read a data unit, information regarding the closest physical block locations is returned. When the request is to write to the data unit, information regarding one or more source block locations is returned, wherein the write is applied to one or more source blocks of the data unit. When a number of requests for the data unit exceed a threshold level and at least one quality of a service policy is not being met, a copy of the one or more source blocks of the data unit is created at a location selected based on proximity to at least one client computer from which the number of requests are high.
    Type: Application
    Filed: November 19, 2004
    Publication date: May 25, 2006
    Inventors: Gregory McBride, Cuong Le, David Shackelford
  • Publication number: 20060112243
    Abstract: Techniques are provided for locating data. Mapping information for blocks associated with a file is provided. It is determined that a copy service has copied source blocks to target blocks. It is determined whether the mapping information should be updated to refer to the target blocks. Then, updated mapping information is provided in response to determining that the mapping information should be updated to refer to the target blocks. Techniques are also provided for accessing a copy of data when a source of the data is inaccessible. It is determined that source blocks are unavailable. Target blocks that are a copy of the unavailable source blocks are located using data in a metadata store. Indicators pointing to the source blocks are switched to point to the target blocks. Mapping information is updated at one or more client computers to access the target blocks instead of the source blocks.
    Type: Application
    Filed: November 19, 2004
    Publication date: May 25, 2006
    Inventors: Gregory McBride, Cuong Le, David Shackelford
  • Publication number: 20060004889
    Abstract: Techniques are provided for resolving a collision between two copy services. A policy associated with a new copy service request is retrieved. Characteristics of an existing copy service request are determined. The effects of the new copy service request are determined. A resolution for the collision is identified based on the policy, the determined characteristics, and the determined effects.
    Type: Application
    Filed: June 2, 2004
    Publication date: January 5, 2006
    Inventor: David Shackelford
  • Publication number: 20050193239
    Abstract: One aspect of the invention is a method for restoring data, which for example, includes receiving a request for at least a portion of the data. This example also includes creating a directory entry for the data in a virtual file system, and allocating storage space for the data. This example further includes initializing a block virtualization indicator to a value indicating that the data is not available. This example additionally includes writing a subset of the data to the storage space, and changing the block virtualization indicator to a value indicating that the data is available.
    Type: Application
    Filed: February 13, 2004
    Publication date: September 1, 2005
    Inventor: David Shackelford
  • Publication number: 20050185597
    Abstract: Disclosed is a technique for performing configuration checking of a network. A network data store is scanned for at least one transaction. At least one event is generated for said transaction. At least one configuration policy is associated with said event. Said configuration policy is compared with configuration data associated with said event. It is determined whether said configuration policy has been violated based on the comparison. Also disclosed is a technique for performing proactive configuration checking of a network. A hypothetical network scenario is received. At least one transaction is generated based on the hypothetical network scenario. A network data store is populated with configuration data for said transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated.
    Type: Application
    Filed: February 20, 2004
    Publication date: August 25, 2005
    Inventors: Cuong Le, David Shackelford, Gregory McBride, James Ratliff, Kaladhar Voruganti, Sandeep Gopisetty, Robert Basham, Dinesh Verma, Kang-Won Lee, Dakshi Agrawal, Brent Yardley, Khalid Filali-Adib
  • Publication number: 20050154786
    Abstract: Provided are a method, system, and article of manufacture, wherein in certain embodiments a plurality of updates from at least one host are received by at least one storage unit, and wherein a received update includes a first indicator that indicates an order in which the received update was generated by a host. A second indicator is associated with the received update based on an order in which the received update was received by a storage unit. The plurality of updates received by the at least one storage unit are aggregated. The aggregated updates are ordered, wherein the ordered updates can be consistently copied.
    Type: Application
    Filed: January 9, 2004
    Publication date: July 14, 2005
    Inventor: David Shackelford
  • Publication number: 20050154845
    Abstract: Provided are a method, system, and article of manufacture for copying storage, wherein a first unit receives data updates from a second unit. The data updates are stored in a plurality of physical storage locations associated with the first unit. Links are generated to at least one of the plurality of physical storage locations to achieve consistent data between the first unit and the second unit.
    Type: Application
    Filed: January 9, 2004
    Publication date: July 14, 2005
    Inventors: David Shackelford, Gregory McBride
  • Publication number: 20050108565
    Abstract: The invention automatically selects a copy function according to a policy associated with data to be copied. The apparatus comprises an identification module configured to identify available copy functions in response to a data copy request that includes a predefined copy policy, a comparison module configured to compare each copy function of a storage device to attributes of the predefined copy policy, a selection module configured to automatically select a copy function that satisfies the predefined copy policy, and a relationship module configured to establish a copy relationship between the determined copy function and the data copy request. A policy generation module may be included and configured to read a set of required attributes from an application and to establish the predefined copy policy based on the set of required attributes from the application.
    Type: Application
    Filed: November 14, 2003
    Publication date: May 19, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Blea, Mary Burton, Gregory McBride, David Shackelford
  • Publication number: 20050081006
    Abstract: A computer program for automatically pairing target resources 20 such as volumes or logical units to source resources 20 containing data to be copied. Available target pools 48, 50, 52, 54 of target volumes are determined eligible for copying based on a technical compatibility and a user-defined metric such as recovery point or recovery time. User defined metrics and a policy to implement the metrics may be stored in a medium and selected by a user. The source volumes are prioritized, and progressively larger segments of the eligible target pools are searched for a target volume that satisfies the technical compatibility and user-defined metric. Where subgroups such as nested volumes are present in the source volumes, subgroups are also prioritized for searching. Where no target volume can be paired, the corresponding source volume is marked as processed and a search begins for the next source volume.
    Type: Application
    Filed: October 10, 2003
    Publication date: April 14, 2005
    Inventors: David Shackelford, Gregory McBride, David Blea, Errol Calder, Todd Schlomer, Jimmie Brundidge