Patents by Inventor William Heaton
William Heaton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11915178Abstract: The inventive subject matter herein is directed toward improved scheduling and planning system that detects a problematic event in a workflow. When the event is detected, the system automatically notifies a set of contacts from a hierarchical contact list. The system then automatically notifies other sets of contacts depending upon the response from the first set of contacts. A cascade of different types of notifications could be triggered from a single detected event as each contact responds and provides information that could be used to trigger additional notifications.Type: GrantFiled: September 22, 2015Date of Patent: February 27, 2024Assignee: nMetric, LLCInventors: Tom Carpenter, William Turley, Christine Koski, Ryan Heaton
-
Publication number: 20170024514Abstract: Techniques for assembly of genetic maps including de novo assembly of distance maps using multiple alignment consensus construction. Multiple map alignment can be performed on a defined bundle of fragment maps corresponding to biomolecule fragments to determine consensus events and corresponding locations. Fragment maps in the bundle can be removed when there is no overhang from the consensus events. When the subset of fragment maps in the bundle is less than a predetermined threshold, one or more additional fragment maps can be added based on fragment signatures, a consensus alignment score, and a pairwise alignment score. Techniques for multiple alignment can include generating a graph with edges and vertices representing each pairwise relation. An ordered set of sets of events best representing a multiple alignment reflecting all pairwise alignments can be generated by repeatedly randomly removing edges and combining vertices to identify a min cut of the graph.Type: ApplicationFiled: October 6, 2016Publication date: January 26, 2017Applicant: Nabsys 2.0 LLCInventors: Peter Goldstein, William Heaton, Franco Preparata, Eli Upfal
-
Publication number: 20140278137Abstract: Techniques for assembly of genetic maps including de novo assembly of distance maps using multiple alignment consensus construction. Multiple map alignment can be performed on a defined bundle of fragment maps corresponding to biomolecule fragments to determine consensus events and corresponding locations. Fragment maps in the bundle can be removed when there is no overhang from the consensus events. When the subset of fragment maps in the bundle is less than a predetermined threshold, one or more additional fragment maps can be added based on fragment signatures, a consensus alignment score, and a pairwise alignment score. Techniques for multiple alignment can include generating a graph with edges and vertices representing each pairwise relation. An ordered set of sets of events best representing a multiple alignment reflecting all pairwise alignments can be generated by repeatedly randomly removing edges and combining vertices to identify a min cut of the graph.Type: ApplicationFiled: March 14, 2014Publication date: September 18, 2014Applicant: NABSYS, INC.Inventors: Peter Goldstein, William Heaton, Franco Preparata, Eli Upfal
-
Patent number: 8828474Abstract: Methods and apparatus are disclosed for loading a therapeutic substance or drug within a lumenal space of a hollow wire having a plurality of side openings along a length thereof that forms a hollow drug-eluting stent with a plurality of side drug delivery openings. Loading a drug within the lumenal space of the hollow stent includes a drug filling step, in which the drug is mixed with a solvent or dispersion medium. The lumenal space may be filled with the drug solution or suspension in a reverse fill process and/or a forward fill process. After the drug filling step, a solvent or dispersion medium extracting step is performed to extract the solvent or dispersion medium from within the lumenal space such that only the drug remains within the hollow stent. A stent cleaning step may be performed to an exterior surface of the hollow stent.Type: GrantFiled: September 17, 2010Date of Patent: September 9, 2014Assignee: Medtronic Vascular, Inc.Inventors: James E. Mitchell, William Heaton, Dishuan Chu, Terry Morgan, Justin Peterson, Joseph Traina
-
Publication number: 20140134588Abstract: Systems and methods are disclosed for serving fresh media content while minimizing Internet traffic by periodically checking content freshness between a local server and a remote server; if a stale content exists on the local server, replacing the stale content with a fresh content from the remote server; and serving the fresh content from the local server. The system also tests the student by adaptively modifying the predetermined testing level based on the diagnosis of each testing group and repeating tests at the adaptively modified predetermined testing level for a plurality of sub-tests.Type: ApplicationFiled: January 23, 2013Publication date: May 15, 2014Inventors: Richard William Capone, Allan William Heaton
-
Patent number: 8478185Abstract: Systems and methods are disclosed for serving fresh media content while minimizing Internet traffic by periodically checking content freshness between a local server and a remote server; if a stale content exists on the local server, replacing the stale content with a fresh content from the remote server; and serving the fresh content from the local server.Type: GrantFiled: November 16, 2011Date of Patent: July 2, 2013Inventors: Richard William Capone, Allan William Heaton
-
Publication number: 20120295243Abstract: Systems and methods are disclosed for serving fresh media content while minimizing Internet traffic by periodically checking content freshness between a local server and a remote server; if a stale content exists on the local server, replacing the stale content with a fresh content from the remote server; and serving the fresh content from the local server.Type: ApplicationFiled: November 16, 2011Publication date: November 22, 2012Inventors: Richard William Capone, Allan William Heaton
-
Publication number: 20120070563Abstract: Methods and apparatus are disclosed for loading a therapeutic substance or drug within a lumenal space of a hollow wire having a plurality of side openings along a length thereof that forms a hollow drug-eluting stent with a plurality of side drug delivery openings. Loading a drug within the lumenal space of the hollow stent includes a drug filling step, in which the drug is mixed with a solvent or dispersion medium. The lumenal space may be filled with the drug solution or suspension in a reverse fill process and/or a forward fill process. After the drug filling step, a solvent or dispersion medium extracting step is performed to extract the solvent or dispersion medium from within the lumenal space such that only the drug remains within the hollow stent. A stent cleaning step may be performed to an exterior surface of the hollow stent.Type: ApplicationFiled: September 17, 2010Publication date: March 22, 2012Applicant: Medtronic Vascular, Inc.Inventors: James E. Mitchell, William Heaton, Dishuan Chu, Terry Morgan, Justin Peterson, Joseph Traina
-
Publication number: 20100262045Abstract: The present invention relates to patient monitoring methods and patient monitoring systems for monitoring at least one aspect of a subject patient's motion alone or with one or more additional patient subject related measurements. The patient monitoring method and system can be a useful clinical tool in the monitoring of patients, and in particular, although not exclusively orthopaedic patients, both pre-treatment and post treatment.Type: ApplicationFiled: June 6, 2008Publication date: October 14, 2010Applicant: Activ4Life Healthcare Technologies LimitedInventors: David William Heaton, Joy Margaret Revie, Ian Crawford Revie
-
Patent number: 7579344Abstract: Compounds of the formula (I), and pharmaceutically acceptable salts and in vivo hydrolysable esters thereof are described. Also described are processes for their preparation and their use as medicaments, particularly medicaments for producing a cell cycle inhibitory (anti cell proliferation) effect in a warm blooded animal, such as man.Type: GrantFiled: May 12, 2004Date of Patent: August 25, 2009Assignee: Astrazeneca ABInventors: David William Heaton, Andrew Peter Thomas
-
Publication number: 20090117530Abstract: Systems and methods are disclosed for serving fresh media content while minimizing Internet traffic by periodically checking content freshness between a local server and a remote server; if a stale content exists on the local server, replacing the stale content with a fresh content from the remote server; and serving the fresh content from the local server.Type: ApplicationFiled: November 6, 2007Publication date: May 7, 2009Inventors: Richard William Capone, Allan William Heaton
-
Publication number: 20060229329Abstract: Compounds of the formula (I), and pharmaceutically acceptable salts and in vivo hydrolysable esters thereof are described. Also described are processes for their preparation and their use as medicaments, particularly medicaments for producing a cell cycle inhibitory (anti cell proliferation) effect in a warm blooded animal, such as man.Type: ApplicationFiled: May 12, 2004Publication date: October 12, 2006Inventors: William Heaton, Andrew Thomas
-
Publication number: 20060052345Abstract: Various calcilytic compounds and pharmaceutical compositions containing these compounds are disclosed. Calcilytic compounds are compounds capable of inhibiting calcium receptor activity. Techniques which can be used to obtain calcilytic compounds and uses of calcilyitc compounds as calcium receptor antagonists are also disclosed.Type: ApplicationFiled: November 4, 2003Publication date: March 9, 2006Applicant: NPS Pharmaceuticals, Inc.Inventors: Irina Shcherbakova, Manuel Balandrin, John Fox, William Heaton, Rebecca Conklin, Damon Papac
-
Publication number: 20050204165Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: February 11, 2005Publication date: September 15, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149485Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149486Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Patent number: 6908920Abstract: Compounds of formula (I), wherein R1, p, R2, q, R3 and R4 are defined within, and a pharmaceutically acceptable salts and in vivo hydrolysable esters are described.Type: GrantFiled: July 6, 2001Date of Patent: June 21, 2005Assignee: AstraZeneca ABInventors: Andrew Peter Thomas, Nicholas John Newcombe, David William Heaton
-
Publication number: 20050108525Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 19, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102266Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102264Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton