Walter, CA
Annette Walter, Mill Valley, CA US
Patent application number | Description | Published |
---|---|---|
20080255120 | SUBSTITUTED 2,5-HETEROCYCLIC DERIVATIVES - The present invention relates to new substituted five-membered compounds and pharmaceutically acceptable salts, esters or prodrugs thereof, compositions of the new compounds together with pharmaceutically acceptable carriers, and uses of the new compounds. The compounds of the invention have the following general formula: | 10-16-2008 |
20090258016 | Substituted imidazole derivatives - The present invention relates to new substituted imidazole compounds and pharmaceutically acceptable salts, esters or prodrugs thereof, compositions of the new compounds together with pharmaceutically acceptable carriers, and uses of the new compounds. The compounds of the invention have the following general formula: | 10-15-2009 |
20120208815 | PIM KINASE INHIBITORS AND METHODS OF THEIR USE - New compounds, compositions and methods of inhibition of kinase activity associated with tumorigenesis in a human or animal subject are provided. In certain embodiments, the compounds and compositions are effective to inhibit the activity of at least one serine/threonine kinase or receptor tyrosine kinase. The new compounds and compositions may be used either alone or in combination with at least one additional agent for the treatment of a serine/threonine kinase- or receptor tyrosine kinase-mediated disorder, such as cancer. | 08-16-2012 |
20130017196 | SUBSTITUTED IMIDAZOLE DERIVATIVES - The present invention relates to new substituted imidazole compounds and pharmaceutically acceptable salts, esters or prodrugs thereof, compositions of the new compounds together with pharmaceutically acceptable carriers, and uses of the new compounds. The compounds of the invention have the following general formula: | 01-17-2013 |
20140249135 | PIM KINASE INHIBITORS AND METHODS OF THEIR USE - New compounds, compositions and methods of inhibition of kinase activity associated with tumorigenesis in a human or animal subject are provided. In certain embodiments, the compounds and compositions are effective to inhibit the activity of at least one serine/threonine kinase or receptor tyrosine kinase. The new compounds and compositions may be used either alone or in combination with at least one additional agent for the treatment of a serine/threonine kinase- or receptor tyrosine kinase-mediated disorder, such as cancer. | 09-04-2014 |
Annette O. Walter, Mill Valley, CA US
Patent application number | Description | Published |
---|---|---|
20080200462 | SUBSTITUTED PYRAZOLE AND TRIAZOLE COMPOUNDS AS KSP INHIBITORS - Disclosed are new substituted pyrazole and triazole compounds of Formula (I) and pharmaceutically acceptable salts, esters or prodrugs thereof, compositions of the derivatives together with pharmaceutically acceptable carriers, and uses thereof: | 08-21-2008 |
20080317744 | Indole and Benzimidazole Derivatives - The present invention relates to new indole and benzimidazole compounds and pharmaceutically acceptable salts, esters or prodrugs thereof, compositions of the new compounds together with pharmaceutically acceptable carriers, and uses of the new compounds. The compounds of the invention have the following general formula: | 12-25-2008 |
20100034813 | SUBSTITUTED PYRAZOLE AND TRIAZOLE COMPOUNDS AS KSP INHIBITORS - Disclosed are new substituted pyrazole and triazole compounds of Formula (I) and pharmaceutically acceptable salts, esters or prodrugs thereof, compositions of the derivatives together with pharmaceutically acceptable carriers, and uses thereof: | 02-11-2010 |
Annette Olga Walter, Mill Valley, CA US
Patent application number | Description | Published |
---|---|---|
20130012560 | KINESIN INHIBITORS AS CANCER THERAPEUTICS - The invention provides novel compounds having a substituted imidazole ring, and methods of using such compounds for the treatment of certain disorders such as hematological cancers and solid tumors. The compounds of the invention are tri-substituted imidazole derivatives that inhibit KSP. These compounds are also useful for the treatment of drug resistant tumors, such as solid tumors that express elevated levels of P-glycoprotein. | 01-10-2013 |
Annette Olga Walter, Emeryville, CA US
Patent application number | Description | Published |
---|---|---|
20090239922 | Kinesin inhibitors as cancer therapeutics - The invention provides novel compounds having a substituted imidazole ring, and methods of using such compounds for the treatment of certain disorders such as hematological cancers and solid tumors. The compounds of the invention are tri-substituted imidazole derivatives that inhibit KSP. These compounds are also useful for the treatment of drug resistant tumors, such as solid tumors that express elevated levels of P-glycoprotein. | 09-24-2009 |
Benjamin P. Walter, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20150133185 | DYNAMIC CONFIGURATION OF WIRELESS CIRCUITRY TO MITIGATE INTEFERENCE AMONG COMPONENTS IN A COMPUTING DEVICE - Methods and apparatus to mitigate coexistence interference among multiple wireless subsystems and wired connection ports of a computing device are described. A processor obtains configurations for at least two wireless subsystems and for a connection state of at least one wired connection port. When the first and second wireless subsystem configurations or the connection state of the at least one wired connection port indicate potential or actual coexistence interference, the processor is configured to adjust wireless circuitry of the first and second wireless subsystems. The first wireless subsystem is configured based on frequency bands used by the first and second wireless subsystems, while the second wireless subsystem is configured based on the connection state. In an embodiment, the first wireless subsystem operates in accordance with a wireless personal area network protocol, and the second wireless subsystem operates in accordance with a wireless local area network protocol. | 05-14-2015 |
Brian Walter, Aliso Viejo, CA US
Patent application number | Description | Published |
---|---|---|
20100217150 | INTERCAVERNOSAL PRESSURE MEASURING INSTRUMENT AND METHOD - A user measures the intercavernosal pressure of a penis using an instrument held in one hand and axially pressing the instrument against a glans of a penis for a predetermined period. The instrument provides a visual readout indicating the intercavernosal pressure of the penis at the end of this period and includes an exterior display to indicate the measured intercavernosal pressure of the tested penis. The instrument and glans of the penis are disengaged when the readout is provided by the instrument. A control circuit for the display includes a pressure-measuring device within an interior of the instrument that interacts with an internal portion of a contact member upon the internal portion contacting the pressure-measuring device upon axially pressing an external portion of the contact member against the glans of the penis being tested. | 08-26-2010 |
Dale Lee Walter, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140334882 | Hand tool that digs a shallow trench and places drip irrigation tubing - A hand tool that digs a shallow trench and places drip irrigation tubing, cable, or electrical wire is disclosed. The invention simplifies the process of laying drip irrigation tubing, cable, or wire requires less labor, fewer materials, and is not as costly. The tool has a rubber handle, a steel tube shaft, a hard metal claw for slicing through dirt, and polyethylene flexible tubing for guiding irrigation hose or electrical cable into the dirt. It also has a small cylinder and set screw for holding the tubing, and easy replacement when it wears out. | 11-13-2014 |
David J. Walter, Downey, CA US
Patent application number | Description | Published |
---|---|---|
20100013665 | MEASUREMENT OF CURRENT AND VOLTAGE OF AN IN-ORBIT SOLAR ARRAY - An apparatus comprises switches, a measurement unit, and a telemetry subsystem. The switches connect the current sources to a power bus when in a first position and to the measurement unit when the switches are in a second position. The measurement unit generates a ramp signal to control the solar strings from an open circuit state to a short circuit state linearly in a short duration and provides continuous current and voltage telemetry data at the output while the set of switches is in the second position. The telemetry subsystem is pre-set to a dwell mode and samples a large amount of voltage and current telemetry data. The telemetry subsystem transmits this data to ground directly to eliminate the need for processing and storage resources in the spacecraft. The telemetry data is used to plot I-V curve for health monitoring. | 01-21-2010 |
Diane P. Walter, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20100121163 | Optical Microneedle-Based Spectrometer - Optical microneedles are adapted for near-infrared or mid-infrared in vivo spectroscopic sensing; and provide a MEMS-based spectrometer for continuous lactate and glucose monitoring by means of a near-infrared or mid-infrared optical microneedle array in a transdermal patch. | 05-13-2010 |
Edward Walter, Coronado, CA US
Patent application number | Description | Published |
---|---|---|
20110278814 | PERSONAL TRANSPORTATION DEVICE - A personal transportation device comprises a riding platform supported by one or more wheels, a steering mechanism at least partially embedded in the riding platform and a drive wheel assembly. A first wheel may be steerable while a second wheel is a slave wheel. The steering mechanism may be foot-operated. The drive wheel may be hand-propelled and non-steerable. The drive wheel is operatively connected to a drive sprocket and chain and is coupled to the riding platform by a platform frame. The personal transportation device may comprise one or more track arm assemblies coupled to the drive wheel assembly such that movement of the track arm assemblies operates the drive wheel assembly and rotates a drive wheel to propel the vehicle. | 11-17-2011 |
Erik Walter, Woodland Hills, CA US
Patent application number | Description | Published |
---|---|---|
20130254701 | UNLOCKING DIGITAL CONTENT USING IMAGE RECOGNITION - An electronic book system prompts a user to provide an image, for instance by taking a picture using a camera integrated on a smart phone. The user provides the image, the image is sent for processing by an image search facility and a check is made to see whether the image matches the prompt. If so, content is unlocked for access by the user. Advertising material may also be provided relating to the prompt. | 09-26-2013 |
Gregory S. Walter, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20090106470 | HOST BUS ADAPTER WITH MULTIPLE HOSTS - A multi-host host bus adapter (HBA) can be connected to multiple host devices to allow the multiple host devices to communicate on a SAN fabric. More specifically, the multi-host HBA provides an interface for multiple SAN hosts without necessitating an HBA on each host, eliminating the need for an on-board HBA on each SAN host. The multi-host HBA interfaces to memory in each SAN host to which it is connected using PCI-Express (or a similar protocol), and communicates with other devices on the SAN fabric using Fibre Channel ports. The multi-host HBA communicates by receiving a command from a connected host, forwarding the command to a processor in the multi-host HBA, and sending the command to a device on a SAN. When the multi-host HBA receives a response from the device on the SAN, the multi-host HBA associates the response with the process and sends the response to the host. | 04-23-2009 |
Howard Walter, Foothill Ranch, CA US
Patent application number | Description | Published |
---|---|---|
20120323711 | VIRTUAL HYBRID PRINTER SYSTEM - A virtual hybrid printer that provides the capabilities and function of a physical hybrid printer with fewer physical devices. The virtual hybrid printer employs virtual controls for additional devices so that applications can directly employ the virtual hybrid printer in a manner that simulates all desired hybrid printer capabilities without the need for all physical devices corresponding to those capabilities. | 12-20-2012 |
James J. Walter, Torrance, CA US
Patent application number | Description | Published |
---|---|---|
20110243364 | Structure of loudspeaker for reducing thickness and mounting depth - A structure of a loudspeaker is designed to decrease a thickness or height thereof, thereby reducing a mounting depth of the loudspeaker on a mounting panel or wall. The loudspeaker includes a speaker frame, a diaphragm connected to the speaker frame in a manner capable of vibration, a voice coil connected to the diaphragm through a coil bobbin to receive an electric signal to vibrate the diaphragm, a spider connected to the speaker frame and to the diaphragm for supporting the diaphragm and the voice coil in a flexible manner, a magnetic assembly including a top plate, a permanent magnet and a pole piece for creating a magnetic circuit for interaction with the voice coil inserted in an air gap, and a plurality of cut-outs formed on a top of the magnetic assembly at an outside thereof to receive therein corresponding suspension elements of the spider. | 10-06-2011 |
20130108099 | LOUDSPEAKER HAVING IMPROVED COOLING SYSTEM INTEGRALLY FORMED ON SPEAKER FRAME | 05-02-2013 |
Jason Walter, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20120278887 | REPORTING COMPROMISED EMAIL ACCOUNTS - The claimed subject matter provides a method for detecting compromised accounts. The method includes receiving a communication from a sender's account to a recipient. The sender's account is associated with a sender. The method also includes presenting a compromised account reporting interface to the recipient based on specific conditions. Further, the method includes receiving a selection by the recipient indicating the sender's account is compromised. The method also includes determining that the sender's account is compromised based on the selection. Additionally, the method includes generating, in response to a selection by the recipient, a report indicating that the account is compromised. | 11-01-2012 |
20130086181 | IDENTIFYING FIRST CONTACT UNSOLICITED COMMUNICATIONS - Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One representative technique includes identifying electronic messages originating from a sender that are first contact electronic messages between the sender and targeted recipients. The sender of the electronic messages may be designated as a source of unsolicited messages if heuristics involving the first contact electronic messages indicate a distribution of unsolicited messages by the sender. | 04-04-2013 |
20140156776 | IDENTIFYING FIRST CONTACT UNSOLICITED COMMUNICATIONS - Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One representative technique includes identifying electronic messages originating from a sender that are first contact electronic messages between the sender and targeted recipients. The sender of the electronic messages may be designated as a source of unsolicited messages if heuristics involving the first contact electronic messages indicate a distribution of unsolicited messages by the sender. | 06-05-2014 |
Jason D. Walter, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090006531 | CLIENT REQUEST BASED LOAD BALANCING - A method for balancing load in a network system, having a plurality of clients initiating transactions with a plurality of servers. For each transaction a host name associated with one or more servers capable of completing the transaction is specified. The client initiates a request to resolve the host name and a plurality of IP addresses are returned. The client randomly communicates with one of the IPs identified as capable of completing the transaction and reports on the success of the transaction. If multiple attempts to the same IP fail, the IP is removed from service by the client. | 01-01-2009 |
20100174788 | HONORING USER PREFERENCES IN EMAIL SYSTEMS - In a distributed email system, user preferences respected more effectively by presenting messages marked for deletion to secondary messaging servers having access to user preferences. Messages marked for deletion by inbound servers are presented to secondary level servers having access to user white lists and the choice of whether to delete the suspect message is made by the secondary server. | 07-08-2010 |
20100175103 | REACTIVE THROTTLING OF INBOUND MESSAGES AND RANGES - A method for throttling inbound email messages in an enterprise email system including a plurality of inbound mail servers and at least one management server is provided. Policies defining message event limits for each unique sender are applied to messaging events from the unique sender at each inbound server. Feedback from each of the inbound mail servers to the management server is provided. When events from a unique sender exceed a threshold, as determined by the management server using the feedback, an alert is generated and a new, more restrictive policy for the unique sender is created. The more restrictive policy is broadcast the more restrictive policy to each of the inbound mail servers. | 07-08-2010 |
20100205259 | EMAIL MANAGEMENT BASED ON USER BEHAVIOR - Methods for assisting email users manage email messages received in an email account. An event is triggered by an action performed by an email user with respect to an email message in an email account. The event identifies an entity associated with the email message (e.g., sender address, domain, keyword, etc.). A determination is made whether to assist the user manage their email based on a heuristic. The heuristic assigns weights based on prior events associated with the same entity to determine whether the user is interested in receiving emails from the sender. Based on the heuristics, the method may add the sender to the user's block-list or unsubscribe the user from a mailing list. | 08-12-2010 |
20100251362 | DYNAMIC SPAM VIEW SETTINGS - A method of displaying email messages to a user is provided. Spam classification information and meta data is associated with email messages received for a user. Email message summary information is displayed in a user interface based on whether the meta data associated with the message meets or exceeds a threshold display level for the summary information. The user provides input via the user interface which is an indication to change the threshold display level and the change is dynamically displayed. | 09-30-2010 |
20100332601 | REAL-TIME SPAM LOOK-UP SYSTEM - A system and method of managing unsolicited email sent to an email system over a network. Email messages are received at an message at an inbound mail transfer agent. A determination is made as to whether the email message is suspected to be an unsolicited suspect message. One or more queries for additional information on one or more characteristics of the message is initiated. Determinations are made based on replies to the queries before issuing a message accepted for delivery indication to a sending server. | 12-30-2010 |
20110138062 | RECIPROCAL PUBLIC TRUST RELATIONSHIP - Publicly accessible linking information is to establish a trusted relationship between reciprocally linked entities controlling web resources, such as websites or web logs. A method of establishing a trust relationship between two entities identifying a user-installed link to a second web resource in a first web resource. Next, the method determines when a reciprocal link is made in the second web resource directed to the first web resource and creates a trust relationship between the entities based on the reciprocal link. | 06-09-2011 |
20110191832 | RESCUING TRUSTED NODES FROM FILTERING OF UNTRUSTED NETWORK ENTITIES - Network entities controlling a set of nodes may vary by trustworthiness, such as tolerance for nodes that send spam, distribute malware, or perform denial-of-service attacks. A device receiving such activities may identify a trust rating of the network entity and apply appropriately stringent filtering (such as spam evaluation) to activities received from nodes controlled by the network entity. However, a poor trust rating of a network entity may subject a legitimate node controlled by the network entity to inefficiently or unfairly stringent activity filtering. Instead, the device may evaluate the activities of a particular node, assign a trust rating to the node, and if the trust rating of the node is higher than the trust rating of the network entity, apply less stringent activity filtering to the activities of the node, thereby “rescuing” the node from the more stringent activity filtering applied to the other nodes of the network entity. | 08-04-2011 |
20110191847 | ACTIVITY FILTERING BASED ON TRUST RATINGS OF NETWORK ENTITIES - The filtering of activities generated by nodes of a network while interacting with a device may be performed by evaluating the desirability of the activities (e.g., a spam or not-spam determination of email messages sent by the node) and assigning a trust rating to the node. However, nodes are often identified by network address, and an operator of a node sending undesirable activities may reassign the network address of the node in order to avoid heavy filtering. Instead, nodes may be identified as being controlled by a network entity (e.g., an autonomous system identified in a border gateway protocol routing table.) The network entity is assigned a network entity trust rating based on the trust ratings of the nodes controlled thereby, and an appropriate level of activity filtering based on the network entity trust rating may be selected for subsequent activities received from all nodes controlled by the network entity. | 08-04-2011 |
20110246583 | Delaying Inbound And Outbound Email Messages - A computer implemented system and method to enable protection of email users from unsolicited bulk email using a message delivery delay based on characteristics detected in selected messages. Messages are evaluated for characteristics resembling unsolicited bulk email. A determination is made whether a message passing through the email system exhibits such characteristics and whether to delay the message. Suspect messages may be delayed for a period of time, the delay period being dependent on the characteristics giving rise to a determination to delay. Following the period, additional information received during the delay period characterizing the message is used to determine whether to dispose or deliver the message. Messages evaluated can be inbound to the email system, outbound to other email systems, or moving within the email system. | 10-06-2011 |
20110246584 | Personalized Email Interactions Applied To Global Filtering - A computer implemented method for filtering unwanted bulk email in an email system and providing a positive user experience is provided. The method enables protection of email users from unsolicited bulk email using user-provided data on user interactions at both a user storage level and a global level with an email system. Metadata on user interactions with messages is collected. Messages are received by the system and evaluated using a global filter which assigns a score resulting in a message action. The action may be message delivery, message non-delivery or message routing, based on a score assigned by the global filter. When the message is delivered to user storage, the message may be examined relative to the metadata, and may alter the message action to an action different than the message action resulting from the score. Metadata for a plurality of users is returned to the global filter for use in making filtering future messages and modifies the global filter. | 10-06-2011 |
20110296003 | USER ACCOUNT BEHAVIOR TECHNIQUES - User account behavior techniques are described. In implementations, a determination is made as to whether interaction with a service provider via a user account deviates from a model. The model is based on behavior that was previously observed as corresponding to the user account. Responsive to a determination that the interaction deviates from the model, the user account is flagged as being potentially compromised by a malicious party. | 12-01-2011 |
20110296524 | Campaign Detection - Campaign detection techniques are described. In implementations, a signature is computed for each of a plurality of emails to be communicated by a service provider to respective intended recipients. A determination is made that two or more of the plurality of emails is similar based on the respective signatures. Responsive to a finding that a number of similar emails exceeds a threshold, an indication is output that the similar emails have a likelihood of being involved in a spam campaign. | 12-01-2011 |
20120246720 | USING SOCIAL GRAPHS TO COMBAT MALICIOUS ATTACKS - Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified. | 09-27-2012 |
20120259929 | GEO-DATA SPAM FILTER - Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery. | 10-11-2012 |
20120290712 | Account Compromise Detection - Techniques for account compromise detection are described. In one or more implementations, a usage pattern is established for a user account of a service provider, where the service provider is configured to provide a plurality of web services for access via a network and the usage pattern describes interaction with one or more of the plurality of web services. A deviation is detected in subsequent activity associated with the user account from the usage pattern and a determination is made as to whether compromise the user account is likely based at least in part on the detection. | 11-15-2012 |
20130086180 | Message Classification and Management - Message management and classification techniques are described. In one or more implementations, a message received from a sender for delivery via a user account is examined to extract one or more features of the message. A determination is then made as to whether the message corresponds to one or more categories based on the extracted features, the categories usable to enable features to be applied to the message in a user interface. | 04-04-2013 |
20130185791 | VOUCHING FOR USER ACCOUNT USING SOCIAL NETWORKING RELATIONSHIP - Trusted user accounts of an application provider are determined. Graphs, such as trees, are created with each node corresponding to a trusted account. Each of the nodes is associated with a vouching quota, or the nodes may share a vouching quota. Untrusted user accounts are determined. For each of these untrusted accounts, a trusted user account that has a social networking relationship is determined. If the node corresponding to the trusted user account has enough vouching quota to vouch for the untrusted user account, then the quota is debited, a node is added for the untrusted user account to the graph, and the untrusted user account is vouched for. If not, available vouching quota may be borrowed from other nodes in the graph. | 07-18-2013 |
20140108578 | Geo-Data Spam Filter - Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery. | 04-17-2014 |
20140289428 | Dynamic Intervals for Synchronizing Data - In embodiments of dynamic intervals for synchronizing data, the data is periodically synchronized between computing devices, such as between server devices, client devices, and/or between client and server devices. A polling optimization service can assess heuristics that are associated with the data synchronizations between the computing devices, and determine optimal dynamic intervals to periodically synchronize the data based on the heuristics. The polling optimization service can then iterate to further assess the heuristics that are associated with subsequent data synchronizations and determine updates of the optimal dynamic intervals. The polling optimization service updates the heuristics based on the subsequent and ongoing data synchronizations, and iterates to update the optimal dynamic intervals based on the updated heuristics. | 09-25-2014 |
Jeryle Walter, Valencia, CA US
Patent application number | Description | Published |
---|---|---|
20090259280 | ELECTRICAL STIMULATION LEAD WITH BIOERODIBLE ANCHORS AND ANCHOR STRAPS - An apparatus includes a coupling portion, a bioerodible anchor portion and a bioerodable retainer. The coupling portion is configured to be coupled to an electrical conductor. The bioerodible retention portion is adjacent to the coupling portion and is moveable from a collapsed configuration to an expanded configuration. The bioerodible retention portion is configured to anchor the electrical conductor with respect to body tissue when the bioerodible retention portion is in its expanded configuration. The bioerodible anchor portion is formulated to erode when disposed within the body tissue at a first rate. The bioerodible retainer is coupled to the bioerodible anchor portion and is configured to inhibit movement of the bioerodible anchor portion from the collapsed configuration to the expanded configuration. The bioerodible retainer is formulated to erode when disposed within the body tissue at a second rate greater than the first rate. | 10-15-2009 |
20090281409 | REINFORCED MEDICAL DEVICE - An apparatus and method for a medical implant having a reinforced medical implant body. In an embodiment of the invention, an apparatus includes a sheath, a conductive element, a distal electrode and a length limiting element. The conductive element has a proximal end and a distal end. The distal electrode can be coupled to the distal end of the conductive element. The sheath has a distal end, a proximal end and a length defined between the distal end and the proximal end. The sheath of the apparatus is configured to enclose at least a portion of the conductive element. The length limiting element has a distal end and a proximal end. The distal end of the length limiting element can be coupled to the distal end of the sheath and the proximal end of the length limiting element can be coupled to the proximal end of the sheath. | 11-12-2009 |
20100240240 | FLEXIBLE CONNECTOR FOR IMPLANTABLE ELECTRICAL STIMULATION LEAD - In some embodiments, an apparatus includes an electrical connector having a side wall defining a lumen and an elongate opening. The lumen is configured to receive at least a conductive portion of an electronic implant. The elongate opening divides the side wall into a first portion and a second portion. The first portion of the side wall is configured to move relative to the second portion of the side wall between a first position and a second position. The first portion of the side wall is electrically conductive and includes a protrusion. The protrusion is configured to contact the conductive portion of the electronic implant such that the conductive portion of the electronic implant is electrically coupled to the first portion of the side wall when the first portion of the side wall is in the second position. | 09-23-2010 |
Jeryle L. Walter, Valencia, CA US
Patent application number | Description | Published |
---|---|---|
20130008026 | ELECTRODE ARRANGEMENTS FOR TISSUE STIMULATION AND METHODS OF USE AND MANUFACTURE - A lead has a paddle body with a non-conductive material and multiple electrodes disposed within the nonconductive material. At least one of the electrodes includes one or more anchoring arrangement, such as opening(s) through the electrode through which the non-conductive material can pass; anchors that extend away from the electrode and into the non-conductive material of the paddle body; or flow-through anchors attached to the electrode with an opening through which the non-conductive material may pass. | 01-10-2013 |
Jessica M. Walter, Albany, CA US
Patent application number | Description | Published |
---|---|---|
20110256605 | CELLS WITH NON-NATURAL PHYSIOLOGIES DERIVED BY EXPRESSING LIGHT-POWERED PROTON PUMPS IN ONE OR MORE MEMBRANES - Methods and procedures for designing and constructing microbes with the ability to harvest light energy are described. In certain embodiments, these methods and procedures are used to construct a photosynthetic yeast based on proteorhodopsin (PR) expression. Proteorhodopsin is a light powered proton pump used by some ocean bacteria to scavenge light energy. By illuminating single yeast cells expressing PR, controlled amounts of energy can be delivered to these cells. A light-harvesting yeast is a unique bioenergetics research platform for investigating the interplay of biofuel production, cellular ATP levels, and the proton-motive-force (pmf). Also, a strain of yeast with light-boosted biomass to biofuel conversion efficiency possesses direct industrial and commercial utility. | 10-20-2011 |
Kay Walter, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20130340114 | METHODS AND COMPOSITIONS INVOLVING ALS VARIANTS WITH NATIVE SUBSTRATE PREFERENCE - Compositions and methods comprising polynucleotides and polypeptides having ALS activity and tolerance to at least one ALS inhibitor are provided. In specific embodiments, the sequence has an increased preference for 2-ketobutyrate, when compared to an appropriate control, such as for example, HRA, and/or a preference for 2-ketobutyrate similar to a native ALS. Further provided are nucleic acid constructs, plants, plant cells, explants, seeds and grain having the ALS inhibitor tolerant sequences. Various methods of employing the ALS inhibitor tolerant sequences are provided. Such methods include methods for producing an ALS inhibitor tolerant plant, plant cell, explant or seed and methods of controlling weeds in a field containing a crop employing the plants and/or seeds disclosed herein. | 12-19-2013 |
Kay L. Walter, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20130254944 | Herbicide Tolerant Soybeans and Methods of Use - Soybean plants, germplasm, and seed comprising a mutant acetolactate synthase gene conferring improved herbicide tolerance, molecular markers useful for identifying and, optionally, selecting soybean plants displaying tolerance, improved tolerance, or susceptibility to a herbicide, and methods of their use are provided. Also provided are isolated polynucleotides, probes, kits, systems, and the like, useful for carrying out the methods described herein. | 09-26-2013 |
Kenneth Walter, Carlsbad, CA US
Patent application number | Description | Published |
---|---|---|
20090093545 | PHENOXYALKYCARBOXYLIC ACID DERIVATIVES IN THE TREATMENT OF IRRITABLE BOWEL SYNDROME OR ULCERATIVE COLITIS - A method of treating irritable bowel syndrome, ulcerative colitis, and other inflammatory conditions, comprising: administering to a patient in need thereof an effective amount of a compound selected from compound 1, its metabolite 2 and pharmaceutically acceptable salts or prodrugs thereof: | 04-09-2009 |
Kevin C. Walter, Aliso Viejo, CA US
Patent application number | Description | Published |
---|---|---|
20080213503 | Life Extension Of Chromium Coatings And Chromium Alloys - Substrates comprising a surface comprising chromium, said surface being adapted to exhibit reduced coefficient of friction and/or increased hardness. | 09-04-2008 |
Kevin Carl Walter, Aliso Viejo, CA US
Patent application number | Description | Published |
---|---|---|
20100100997 | ELECTRICAL GARMENT AND ELECTRICAL GARMENT AND ARTICLE ASSEMBLIES - Electrical garments and components for use in electrical garments are provided. A communication medium of various forms is integrated into a garment seam that is used to join two or more portions of a garment. The communication media can be used to provide electrical or other electromagnetic connection for coupling among a plurality of electrical devices associated with the garment. Accordingly, the electrical garment can be configured for a plurality of uses, applications and environments, depending on the electrical devices associated therewith. The electrical devices can be configured to be attached to or integrated with the garment in a releasable fashion or in a more permanent configuration. The electrical devices can be chosen for their desired functionality and interconnected with the communication media, which is at least partially integrated within the garment seams. Additional embodiments provide an electronic connector suitable for use with seams incorporating electronic wiring. The connector provides additional flexibility in constructing the electric garment as additional items may be incorporated into the electronic capabilities of the garment. | 04-29-2010 |
20110049684 | ANTICOUNTERFEITING SYSTEM AND METHOD FOR INTEGRATED CIRCUITS - An integrated circuit die comprises a device layer comprising a plurality of semiconductor devices; an interconnect layer comprising a plurality of interconnect paths connecting the semiconductor devices and embedded in a dielectric material; and a plurality of hard nanoparticles embedded in the dielectric material of the interconnect layer, the hard nanoparticles having a hardness greater than a hardness of the dielectric material and of a hardness of the interconnect paths. | 03-03-2011 |
Kimberly Walter, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20130084287 | DIAGNOSTIC MARKERS - The present invention provides methods for determining epithelial and mesenchymal phenotype of tumors and predicting whether tumor growth will be sensitive or resistant to treatment with an EGFR inhibitor. | 04-04-2013 |
Mark Walter, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20080212901 | System and Method for Correcting Low Confidence Characters From an OCR Engine With an HTML Web Form - A character based system and method for correcting low confidence characters from an OCR system facilitates operator review, editing and correction of character and field level data generated by an OCR system without the need for an application that is installed at the operator workstation. The system creates a data structure of OCR information and provides that information to an operator through an HTML interface that is rendered using HTML and JavaScript. The data structure includes an OCR confidence level for each character and/or field and the operator is prompted to review only those characters/fields that meet a predetermined threshold for the confidence level. The operator can use an input key (e.g., TAB or ENTER) to navigate to each character/field with a low confidence level and thereby correct or validate each low confidence character/field as appropriate. | 09-04-2008 |
Mark Walter, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20140207774 | Virtual Building Browser Systems and Methods - Systems and methods are provided for a virtual building browser with a viewing module displaying images of visible elements and hidden elements, a searchable, relational database configured in a (COBie) compliant format, a query module, and an interface tool for accessing building information management (BIM) data in real-time, monitoring systems to manage facility assets, integration applications linking the searchable database with associated databases, peripheral devices, and user devices. In one embodiment, user devices are iPad® tablet devices with GPS. A computer implemented apparatus for a virtual tour system is also included. Steps for providing a virtual building browser, a virtual tour, and for linking LEED data to a virtual location are included plus computer-implemented methods with computer-usable readable storage medium having computer-readable program code embodied therein for causing a computer system to perform steps for a virtual tour, displaying building information management images of locations are included. | 07-24-2014 |
Martin Walter, Livermore, CA US
Patent application number | Description | Published |
---|---|---|
20150195252 | CREDENTIALS MANAGEMENT IN LARGE SCALE VIRTUAL PRIVATE NETWORK DEPLOYMENT - Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in large scale VPN deployment includes generating a public/private key pair and a certificate signing request at a satellite device; automatically communicating the certificate signing request to a portal over a public, untrusted network to authenticate the satellite device using a serial number associated with the satellite device, in which the certificate signing request and the serial number are verified by the portal; and receiving a certificate from the portal for using to establish VPN connections and configuration information for the satellite device, in which the certificate includes a credential signed by a trusted certificate authority, and the configuration information includes gateway configuration information identifying a plurality of gateways to which the satellite device is configured to connect using VPN connections. | 07-09-2015 |
Peter Walter, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20100021912 | Methods of Modulating Lipid Concentrations in Eukaryotic Cells - The present invention is based on the discovery of a set of genes that are involved in lipid-droplet formation and regulation. Accordingly, the present invention provides methods of increasing or decreasing lipid concentrations in eukaryotic cells by decreasing or increasing expression of one of these genes. Increased lipid concentrations may be useful, for example, in the generation of biofuels. Decreased lipid concentration may be useful in the treatment of diseases characterized by excessive lipid storage. In addition, the invention provides methods of identifying markers of diseases characterized by excessive lipid storage. | 01-28-2010 |
20110319436 | Methods and Compositions for Modulating IRE1, SRC, and ABL Activity - Disclosed herein are, inter alia, compositions for modulating Ire1, Src, or Abl, methods for identifying modulating activity in test compounds, and methods for treating diseases caused by the activity or inactivity of Ire1, Src, or Abl. | 12-29-2011 |
20120322814 | METHODS OF INHIBITING IRE1 - Disclosed herein are, inter alia, methods for inhibiting Ire1 activity. | 12-20-2012 |
Richard A. Walter, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090185678 | METHOD AND APPARATUS FOR COMPRESSION OF DATA ON STORAGE UNITS USING DEVICES INSIDE A STORAGE AREA NETWORK FABRIC - The capability to encrypt or compress the traffic over network links, thus improving the security of the link on the performance of the links, and the capability to encrypt/decrypt data stored on the storage devices without requiring specialized hosts or storage devices. In a first embodiment, traffic to be routed over a selected link needing encryption and/or compression is routed to hardware which performs the encryption and/or compression and returned for transmission over the link. A complementary unit at the second end of the link routes the received frames to complementary hardware to perform the decryption and/or decompression. The recovered frames are then routed to the target device in a normal fashion. In a variation of this first embodiment the hardware is developed using an FPGA. This allows simple selection of the desired feature or features present in the switch. The switch can be easily configured to perform encryption, compression or both, allowing great flexibility to a system administrator. In a second embodiment frames can be encrypted by a switch and then provided to the storage device in this encrypted manner. The frames from the storage device are decrypted before provision to the requesting host. By performing the encryption and decryption in the switch, conventional hosts and storage devices can be utilized. | 07-23-2009 |
Sarah Walter, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20090023652 | POLYCATIONIC CALCIUM MODULATOR PEPTIDES FOR THE TREATMENT OF HYPERPARATHYROIDISM AND HYPERCALCEMIC DISORDERS - The present invention provides methods and kits for treating hyperparathyroidism, bone disease and/or hypercalcemic disorders. In particular, methods for lowering serum PTH and serum calcium using polycationic calcium modulator peptides are provided. The calcium modulator peptides can be used to treat subjects having, for example: primary, secondary or tertiary hyperparathyroidism; hypercalcemia of malignancy; metastatic bone disease; or osteoporosis. | 01-22-2009 |
20110098224 | PROTEIN KINASE C PEPTIDE MODULATORS OF ANGIOGENESIS - The present invention provides peptides for inhibiting various protein kinase C isozymes. The peptide can be directed to any region of the protein kinase C isozyme, and in one embodiment, is directed to the V5 domain. The peptide can be conjugated to a carrier, in a releasable or non-releasable manner. The peptides can be used to inhibit angiogenesis and/or vascular permeability. The peptides can be used to treat subjects having, for example, cancer, diabetic blindness, macular degeneration, rheumatoid arthritis, or psoriasis. | 04-28-2011 |
20140315809 | CALCIMIMETICS AND METHODS FOR THEIR USE - Methods for treating subjects suffering from chronic kidney disease-mineral and bone disorder or other disorders resulting in primary or secondary hyperparathyroidism are described. The methods are effective in reducing serum parathyroid hormone (PTH) levels and calcium levels in patients who undergo hemodialysis. The methods described herein are also effective in slowing the progression of kidney disease and preserving kidney function. Compositions used in the described methods are also provided and comprise calcimimetics which function as agonists of the calcium sensing receptor (CaSR). | 10-23-2014 |
Todd Walter, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20140089311 | SYSTEM. METHOD, AND COMPUTER-READABLE MEDIUM FOR CLASSIFYING PROBLEM QUERIES TO REDUCE EXCEPTION PROCESSING - A system, method, and computer-readable medium that facilitate classification of database requests as problematic based on estimated processing characteristics of the request are provided. Estimated processing characteristics may include estimated skew including central processing unit skew and input/output operation skew, central processing unit duration per input/output operation, and estimated memory usage. The estimated processing characteristics are made on a request step basis. The request is classified as problematic responsive to determining one or more of the estimated characteristics of a request step exceed a corresponding threshold. In this manner, mechanisms for predicting bad query behavior are provided. Workload management of those requests may then be more successfully provided through workload throttles, filters, or even a more confident exception detection that correlates with the estimated bad behavior. | 03-27-2014 |
Todd Walter, Poway, CA US
Patent application number | Description | Published |
---|---|---|
20090132536 | Dynamic control and regulation of critical database resources using a virtual memory table interface - A computer-implemented apparatus, method, and article of manufacture provide the ability to manage a plurality of database systems. A domain contains the database systems, and a database in one of the systems has segmented global memory partitions. A virtual monitor partition provides logon access to the segmented global memory partitions in a form of a virtual database. Open application programming interfaces (API) enable logon access to the virtual monitor partition to access data in the virtual database. A multi-system regulator manages the domain and utilizes the open APIs to access data in the virtual data base. | 05-21-2009 |
20090132602 | Virtual data maintenance - A computer-implemented apparatus, method, and article of manufacture manage a plurality of database systems and perform data maintenance tasks in a data warehouse system. A domain includes a plurality of database systems. A virtual regulator manages the domain, detects a request to invoke a data maintenance task on a first system in the domain, routes the data maintenance task, for execution, to a second system in the domain, and applies results from the data maintenance task (executed by the second system) to the first system. | 05-21-2009 |
Tony Walter, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20120084288 | CRIMINAL RELATIONSHIP ANALYSIS AND VISUALIZATION - Systems and methods of organizing a set of information associated with a record in a centralized database are disclosed. The record may be associated with a criminal investigation and/or a person of interest (POI). In one embodiment, the method includes creating a profile for the record and a corresponding set of data associated with the profile. The method also includes graphically clustering the set of information associated with the profile. In another embodiment, the method includes linking a data associated with a particular profile to another data associated with another profile based on a set of predetermined association factors. The method also includes generating a set of links and connections between a particular profile and a set of other profiles in the database. The method further includes visually representing the set of connections to a user of the system. | 04-05-2012 |
Willam Walter, San Clemente, CA US
Patent application number | Description | Published |
---|---|---|
20140255908 | APPARATUS, SYSTEMS, AND METHODS FOR PROCESSING PLATELETS AND CONTAMINATED BLOOD - One aspect of the present disclosure relates to a bag for storing platelets or contaminated blood previously withdrawn from a subject. The bag can comprise a flexible, closed container and at least one removable heat transfer member adhered to an outer surface portion of the container. The container can include an inlet therein that forms part of the container. The inlet can be adapted for fluid-tight connection to a tube member through which the platelets or contaminated blood are caused to flow. | 09-11-2014 |
William Walter, San Clemente, CA US
Patent application number | Description | Published |
---|---|---|
20140255909 | APPARATUS, SYSTEMS, AND METHODS FOR MINIMIZING HEMOLYSIS - One aspect of the present disclosure relates to a bag for storing blood previously withdrawn from a subject. The bag can comprise a flexible, closed container and at least one removable heat transfer member adhered to an outer surface portion of the container. The container can include an inlet therein that forms part of the container. The inlet can be adapted for fluid-tight connection to a tube member through which the blood is caused to flow. | 09-11-2014 |