Patents by Inventor John Easton
John Easton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070016590Abstract: A method for determining a plurality of scheduling endpoints in a grid network, each scheduling endpoint comprising a device for processing job requests communicated across the network, the method comprising the steps of: examining a communication across the network in order to determine a current activity status of a requesting device; identifying an activity history for the requesting device; comparing the current activity status with the activity history to derive a statistical data set; and analysing the statistical data set to derive a time period in which the requesting device is available for processing job requests.Type: ApplicationFiled: June 28, 2006Publication date: January 18, 2007Inventors: Richard Appleby, John Easton
-
Publication number: 20060241108Abstract: The invention provides compositions and methods that modulate the activity of AKT family kinase proteins, including AKT1, AKT2 and AKT3 (also referred to as PKB?, PKB?and PKB?). Specifically, the invention provides a number of phenoxazine and acridone compounds that inhibit AKT phosphorylation and kinase activity. The invention provides compositions for and methods of modulating AKT activity, inhibiting cell growth, treating cancer, treating transplant rejection, and treating coronary artery disease based upon the phenoxazine and acridone compounds of the invention.Type: ApplicationFiled: March 3, 2006Publication date: October 26, 2006Applicant: St. Jude Children's Research HospitalInventors: Peter Houghton, Kuntebommenahalli Thimmaiah, John Easton
-
Publication number: 20060076821Abstract: Disclosed is a milling machine comprising a housing including a frame, a front wheel assembly supporting the housing, at least a first rear wheel assembly and a second rear wheel assembly supporting the housing, a milling drum mounted within the housing and extending below the housing, and an electric motor for providing power to at least one hydraulic system for operating milling machine functions. The first rear wheel assembly is ideally switchable between a first position and a second position to allow the milling machine to reach corners and other tight spaces in a building. The milling machine preferably further includes a dust collection system mounted within the housing to provide dust-free operation. The electric motor is also ideally mounted within the housing to provide a compact, dust-free and emissions-free milling machine for indoor use.Type: ApplicationFiled: October 7, 2004Publication date: April 13, 2006Inventors: Don Troudt, John Easton, Robert Platek, Mark Vesely, Michael Paulick
-
Publication number: 20050204165Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: February 11, 2005Publication date: September 15, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149486Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149485Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050108525Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 19, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102264Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102266Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050086666Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: April 21, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20040032423Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: May 9, 2003Publication date: February 19, 2004Applicant: xSides CorporationInventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
-
Publication number: 20040027387Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: May 9, 2003Publication date: February 12, 2004Applicant: xSides CorporationInventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
-
Patent number: 6677964Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: GrantFiled: November 28, 2000Date of Patent: January 13, 2004Assignee: xSides CorporationInventors: D. David Nason, Mahyar Ghadiali, John Easton
-
Patent number: 6639613Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system monitor. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: GrantFiled: August 4, 1999Date of Patent: October 28, 2003Assignee: xSides CorporationInventors: D David Nason, John Easton, Carson Kaan, Philip Brooks
-
Patent number: 6630943Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: GrantFiled: September 20, 2000Date of Patent: October 7, 2003Assignee: xSides CorporationInventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
-
Patent number: 6492996Abstract: Telephone traffic is displayed on a screen so a message source and a message destination are represented by lines, such as vertical lines, for example, each with a label denoting its location. An arrow joining the location lines points in the same direction as the message and has an associated label indicating message identity. Further message source and destination locations are denoted by further lines, such as vertical lines, for example, only if the location is additional to a location already displayed. Otherwise an already displayed line denotes the relevant location. Further labelled arrows denote further messages. Each successive monitored message is denoted by a further arrow at a lower place on the display than the arrows denoting previous messages so successive items are added in a non-overlapping bottom-down manner.Type: GrantFiled: September 9, 1999Date of Patent: December 10, 2002Assignee: Agilent Technologies, Inc.Inventors: John William Forsyth Macartney, Richard John Easton
-
Patent number: 6376688Abstract: The present invention provides polyunsaturated fatty acid compounds having antimalarial and/or neutrophil stimulatory activity. The polyunsaturated fatty acids contain 18-25 carbons and 1-6 double bonds and are characterized in that they have one or two substitutions selected from the group consisting of &bgr; oxa, &ggr; oxa, &bgr; thia and &ggr; thia. It is also preferred that the polyunsaturated fatty acid compound includes a further substitution selected from the group consisting of hydroxy, hydroperoxy, peroxy, carboxymethyl substitutions or attached to an amino acid.Type: GrantFiled: May 29, 1997Date of Patent: April 23, 2002Assignee: Peptide Technology LimitedInventors: Antonio Ferrante, Alfred Poulos, Christopher John Easton, Michael Joseph Pitt, Thomas Alistair Robertson, Deborah Ann Rathjen
-
Patent number: 6262119Abstract: Method of treating or ameliorating symptoms of T-cell mediated disease wherein a composition comprising a therapeutically effective amount of a polyunsaturated fatty acid and a pharmaceutically acceptable carrier is administered to the patient. The polyunsaturated fatty acid contains 18-25 carbon atoms, 1-6 double bonds and has 1 or 2 substitutions selected from &bgr; oxa, &ggr; oxa, &bgr; thia and &ggr; thia, based on the fatty acid acyl carbon atom, or the polyunsaturated fatty acid contains 16-26 carbon atoms, 3-double bonds and is covalently coupled at the carboxylic acid group to an amino acid.Type: GrantFiled: April 12, 1999Date of Patent: July 17, 2001Assignees: Peptide Technology Limited, Women's and Children's Hospital AdelaideInventors: Antonio Ferrante, Alfred Poulos, Michael Joseph Pitt, Christopher John Easton, Merilyn Joy Sleigh, Deborah Ann Rathjen, Fred Widmer
-
Patent number: 6138839Abstract: A card cage for holding expansion cards and filler panels within a computer system includes a ledge and a pivoted bar which is clamped in place adjacent to the ledge. A number of flexible portions of the pivoted bar clamp end portions of the filler panels and of brackets forming parts of the expansion cards against the ledge, so that these end portions are held in place while being electrically grounded. The bar is preferably pivoted about an axis extending parallel to the surface of the ledge and parallel to a slotted panel forming part of the card cage.Type: GrantFiled: September 11, 1998Date of Patent: October 31, 2000Assignee: International Business Machines CorporationInventors: William V. Cranston, III, John Easton McCloskey, James John Tout, Jr., Frederick Charles Yentz
-
Patent number: 5829534Abstract: A hard surface preparation device for use in the removal of membranes, paving materials, flooring, tiles, roofing materials, and other materials from relatively hard surfaces such as concrete. The device includes two frames; a base frame and a second frame pivotally mounted to the base frame. The base frame is coupled to a small tractor by means of mounting brackets. The mounting brackets are bolted or otherwise secured to a moveable, powered mounting plate which is coupled to the hydraulically powered arms of the tractor, thereby permitting the device to be raised or lowered like any other front-end implement used with such a tractor. A motor or power take off from the tractor drives an eccentric shaft mounted on the base frame. A sleeve fits over the eccentric shaft and transforms the elliptical movement of the shaft into a back and forth motion. A blade mounted to the second frame is also coupled to the sleeve and, therefore oscillates when the motor is turned on.Type: GrantFiled: October 31, 1996Date of Patent: November 3, 1998Assignee: SurfPrep, Inc.Inventors: John Easton, Duane J. Swatck, Dan Jennett, Paul Pederson, Larry Marincic