Patents by Inventor John Easton

John Easton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070016590
    Abstract: A method for determining a plurality of scheduling endpoints in a grid network, each scheduling endpoint comprising a device for processing job requests communicated across the network, the method comprising the steps of: examining a communication across the network in order to determine a current activity status of a requesting device; identifying an activity history for the requesting device; comparing the current activity status with the activity history to derive a statistical data set; and analysing the statistical data set to derive a time period in which the requesting device is available for processing job requests.
    Type: Application
    Filed: June 28, 2006
    Publication date: January 18, 2007
    Inventors: Richard Appleby, John Easton
  • Publication number: 20060241108
    Abstract: The invention provides compositions and methods that modulate the activity of AKT family kinase proteins, including AKT1, AKT2 and AKT3 (also referred to as PKB?, PKB?and PKB?). Specifically, the invention provides a number of phenoxazine and acridone compounds that inhibit AKT phosphorylation and kinase activity. The invention provides compositions for and methods of modulating AKT activity, inhibiting cell growth, treating cancer, treating transplant rejection, and treating coronary artery disease based upon the phenoxazine and acridone compounds of the invention.
    Type: Application
    Filed: March 3, 2006
    Publication date: October 26, 2006
    Applicant: St. Jude Children's Research Hospital
    Inventors: Peter Houghton, Kuntebommenahalli Thimmaiah, John Easton
  • Publication number: 20060076821
    Abstract: Disclosed is a milling machine comprising a housing including a frame, a front wheel assembly supporting the housing, at least a first rear wheel assembly and a second rear wheel assembly supporting the housing, a milling drum mounted within the housing and extending below the housing, and an electric motor for providing power to at least one hydraulic system for operating milling machine functions. The first rear wheel assembly is ideally switchable between a first position and a second position to allow the milling machine to reach corners and other tight spaces in a building. The milling machine preferably further includes a dust collection system mounted within the housing to provide dust-free operation. The electric motor is also ideally mounted within the housing to provide a compact, dust-free and emissions-free milling machine for indoor use.
    Type: Application
    Filed: October 7, 2004
    Publication date: April 13, 2006
    Inventors: Don Troudt, John Easton, Robert Platek, Mark Vesely, Michael Paulick
  • Publication number: 20050204165
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: February 11, 2005
    Publication date: September 15, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050149486
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: January 25, 2005
    Publication date: July 7, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050149485
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: January 25, 2005
    Publication date: July 7, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050108525
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: December 10, 2004
    Publication date: May 19, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050102264
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: November 18, 2004
    Publication date: May 12, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050102266
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: December 10, 2004
    Publication date: May 12, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050086666
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: November 18, 2004
    Publication date: April 21, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20040032423
    Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.
    Type: Application
    Filed: May 9, 2003
    Publication date: February 19, 2004
    Applicant: xSides Corporation
    Inventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
  • Publication number: 20040027387
    Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.
    Type: Application
    Filed: May 9, 2003
    Publication date: February 12, 2004
    Applicant: xSides Corporation
    Inventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
  • Patent number: 6677964
    Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.
    Type: Grant
    Filed: November 28, 2000
    Date of Patent: January 13, 2004
    Assignee: xSides Corporation
    Inventors: D. David Nason, Mahyar Ghadiali, John Easton
  • Patent number: 6639613
    Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system monitor. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.
    Type: Grant
    Filed: August 4, 1999
    Date of Patent: October 28, 2003
    Assignee: xSides Corporation
    Inventors: D David Nason, John Easton, Carson Kaan, Philip Brooks
  • Patent number: 6630943
    Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.
    Type: Grant
    Filed: September 20, 2000
    Date of Patent: October 7, 2003
    Assignee: xSides Corporation
    Inventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
  • Patent number: 6492996
    Abstract: Telephone traffic is displayed on a screen so a message source and a message destination are represented by lines, such as vertical lines, for example, each with a label denoting its location. An arrow joining the location lines points in the same direction as the message and has an associated label indicating message identity. Further message source and destination locations are denoted by further lines, such as vertical lines, for example, only if the location is additional to a location already displayed. Otherwise an already displayed line denotes the relevant location. Further labelled arrows denote further messages. Each successive monitored message is denoted by a further arrow at a lower place on the display than the arrows denoting previous messages so successive items are added in a non-overlapping bottom-down manner.
    Type: Grant
    Filed: September 9, 1999
    Date of Patent: December 10, 2002
    Assignee: Agilent Technologies, Inc.
    Inventors: John William Forsyth Macartney, Richard John Easton
  • Patent number: 6376688
    Abstract: The present invention provides polyunsaturated fatty acid compounds having antimalarial and/or neutrophil stimulatory activity. The polyunsaturated fatty acids contain 18-25 carbons and 1-6 double bonds and are characterized in that they have one or two substitutions selected from the group consisting of &bgr; oxa, &ggr; oxa, &bgr; thia and &ggr; thia. It is also preferred that the polyunsaturated fatty acid compound includes a further substitution selected from the group consisting of hydroxy, hydroperoxy, peroxy, carboxymethyl substitutions or attached to an amino acid.
    Type: Grant
    Filed: May 29, 1997
    Date of Patent: April 23, 2002
    Assignee: Peptide Technology Limited
    Inventors: Antonio Ferrante, Alfred Poulos, Christopher John Easton, Michael Joseph Pitt, Thomas Alistair Robertson, Deborah Ann Rathjen
  • Patent number: 6262119
    Abstract: Method of treating or ameliorating symptoms of T-cell mediated disease wherein a composition comprising a therapeutically effective amount of a polyunsaturated fatty acid and a pharmaceutically acceptable carrier is administered to the patient. The polyunsaturated fatty acid contains 18-25 carbon atoms, 1-6 double bonds and has 1 or 2 substitutions selected from &bgr; oxa, &ggr; oxa, &bgr; thia and &ggr; thia, based on the fatty acid acyl carbon atom, or the polyunsaturated fatty acid contains 16-26 carbon atoms, 3-double bonds and is covalently coupled at the carboxylic acid group to an amino acid.
    Type: Grant
    Filed: April 12, 1999
    Date of Patent: July 17, 2001
    Assignees: Peptide Technology Limited, Women's and Children's Hospital Adelaide
    Inventors: Antonio Ferrante, Alfred Poulos, Michael Joseph Pitt, Christopher John Easton, Merilyn Joy Sleigh, Deborah Ann Rathjen, Fred Widmer
  • Patent number: 6138839
    Abstract: A card cage for holding expansion cards and filler panels within a computer system includes a ledge and a pivoted bar which is clamped in place adjacent to the ledge. A number of flexible portions of the pivoted bar clamp end portions of the filler panels and of brackets forming parts of the expansion cards against the ledge, so that these end portions are held in place while being electrically grounded. The bar is preferably pivoted about an axis extending parallel to the surface of the ledge and parallel to a slotted panel forming part of the card cage.
    Type: Grant
    Filed: September 11, 1998
    Date of Patent: October 31, 2000
    Assignee: International Business Machines Corporation
    Inventors: William V. Cranston, III, John Easton McCloskey, James John Tout, Jr., Frederick Charles Yentz
  • Patent number: 5829534
    Abstract: A hard surface preparation device for use in the removal of membranes, paving materials, flooring, tiles, roofing materials, and other materials from relatively hard surfaces such as concrete. The device includes two frames; a base frame and a second frame pivotally mounted to the base frame. The base frame is coupled to a small tractor by means of mounting brackets. The mounting brackets are bolted or otherwise secured to a moveable, powered mounting plate which is coupled to the hydraulically powered arms of the tractor, thereby permitting the device to be raised or lowered like any other front-end implement used with such a tractor. A motor or power take off from the tractor drives an eccentric shaft mounted on the base frame. A sleeve fits over the eccentric shaft and transforms the elliptical movement of the shaft into a back and forth motion. A blade mounted to the second frame is also coupled to the sleeve and, therefore oscillates when the motor is turned on.
    Type: Grant
    Filed: October 31, 1996
    Date of Patent: November 3, 1998
    Assignee: SurfPrep, Inc.
    Inventors: John Easton, Duane J. Swatck, Dan Jennett, Paul Pederson, Larry Marincic