- Seattle WA, US Roland B. Walter - Seattle WA, US Andre Lieber - Seattle WA, US Chang Li - Seattle WA, US
Assignee:
Fred Hutchinson Cancer Center - Seattle WA University of Washington - Seattle WA
International Classification:
C12N 15/113 C12N 5/00 C12N 5/0789 C12N 9/22
Abstract:
Systems and methods to selectively protect therapeutic cells by reducing CD33 expression in the therapeutic cells using base editors and targeting non-therapeutic cells with an anti-CD33 therapy are described. The selective protection results in the enrichment of the therapeutic cells while simultaneously targeting any diseased, malignant and/or non-therapeutic CD33 expressing cells within a subject.
Recombinant Ad35 Vectors And Related Gene Therapy Improvements
The present disclosure provides, among other things, helper-dependent adenoviral serotype 35 (Ad35) vectors. In various embodiments, helper-dependent Ad35 vectors can be used to deliver a therapeutic payload to a subject in need thereof. Exemplary payloads can encode replacement proteins, antibodies, CARs, TCRs, small RNAs, and genome editing systems. In certain embodiments, a helper-dependent Ad35 vector is engineered for integration of a payload into a host cell genome. The present disclosure further includes methods of gene therapy that include administration of a helper-dependent Ad35 vector to a subject in need thereof.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 9/40 H04W 12/06 H04W 12/48 H04W 12/088
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
Location Based Security In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. A system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06 H04W 12/06 H04W 12/00 H04W 12/08
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
- Palo Alto CA, US Aaron Sekhri - Palo Alto CA, US Andreja Kogovsek - London, GB Benjamin Dawes - Claverley, GB Brandon Burr - San Francisco CA, US Chang Li - Palo Alto CA, US Elizabeth Caudill - San Francisco CA, US Zachary Romanow - Washington DC, US
International Classification:
G01C 21/34 G01C 21/36 G06Q 10/08
Abstract:
Systems and methods are provided for event-based route planning. Information of events taking place in a predetermined geographic area is received. An origin and at least one destination are determined. One or more first routes for traveling from the origin to the destination are determined from the predetermined geographic area. One or more segments in each of the first routes are determined based on the received information, each segment being associated with a corresponding recommendation for travelling via the segment.
Location Based Security In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06 H04W 12/06
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
Name / Title
Company / Classification
Phones & Addresses
Chang Quan Li
KIJI STEAKHOUSE INC
Chang Li Manager
Nakamura Realty Co Inc Subdivider/Developer Real Estate Agent/Manager
2554 Martn Lthr Kg Jr Way, Berkeley, CA 94704 2554 Martin Luther King Jr Way, Berkeley, CA 94704 (510)8482750, (510)8482724, (510)8482813
Queens Eye Center 6010 Main St FL 1, Flushing, NY 11355 (718)6618800 (phone), (718)4609351 (fax)
Languages:
Chinese English Korean Spanish
Description:
Dr. Li works in Flushing, NY and specializes in Optometry. Dr. Li is affiliated with New York Presbyterian Hospital Weill Cornell Medical Center and Queens Hospital Center.