General Corporate Law and Commercial Transactions Mergers & Acquisitions Real Estate Law Labor and Employment Law
ISLN:
905041900
Admitted:
1973, Missouri 1991, Colorado
University:
Dartmouth College, Hanover, New Hampshire, A.B., cum laude, 1969
Law School:
Vanderbilt University School of Law, Nashville, Tennessee, J.D., 1972
Links:
Site
Biography:
Matthew M. McCarthy has substantial experience in providing legal advice to businesses on a wide variety of contractual and operational issues. Business clients range in size from sole proprietorships...
Emergency Medicine PhysicianEmergency Medicine Physicians 232 W 25 St, Erie, PA 16544 (855)6870618 (phone), (330)4928489 (fax)
Education:
Medical School Midwestern University/ Chicago College of Osteopathic Medicine Graduated: 1986
Languages:
English
Description:
Dr. McCarthy graduated from the Midwestern University/ Chicago College of Osteopathic Medicine in 1986. He works in Erie, PA and specializes in Emergency Medicine. Dr. McCarthy is affiliated with Saint Vincent Hospital.
Dr. Mccarthy graduated from the Duke University School of Medicine in 2009. He works in Drexel Hill, PA and specializes in Pediatrics. Dr. Mccarthy is affiliated with Delaware County Memorial Hospital and Riddle Hospital.
JUNIPER VALLEY ANIMAL HOSPITAL, PC Veterinary Services
63-08B 69 Pl, Middle Village, NY 11379 63-08 69 Pl, Middle Village, NY 11379 6308 69 Pl, Flushing, NY 11379 36 Slocum Cres, Forest Hills, NY 11375 (718)4187330, (718)4180029
Matthew Mccarthy
OHIO BUG KILLER LLC
Matthew D. Mccarthy
DIVERSIFIED CONTRACTING LLC
Matthew William Mccarthy
Matthew Mccarthy MD Internist
910 W End Ave APT 15B, New York, NY 10025 (407)7617115
Us Patents
Contemporaneous Facial Gesture And Keyboard Entry Authentication
- Armonk NY, US Neal KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CY, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew WYSKIDA - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.
Contextual Contemporaneous Gesture And Keyboard Entry Authentication
- Armonk NY, US Neal KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CY, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew WYSKIDA - Fishkill NY, US
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.
Keyboard Entry As An Abbreviation To A Contemporaneous Gesture Authentication
- Armonk NY, US Neal KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CY, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew WYSKIDA - Fishkill NY, US
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.
Contemporaneous Gesture And Keyboard For Different Levels Of Entry Authentication
- Armonk NY, US Neal KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CY, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew WYSKIDA - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.
- Armonk NY, US Neal M. Keller - Pleasantville NY, US James R. Kozloski - New Fairfield CT, US Matthew A. McCarthy - Holly Springs NC, US Clifford A. Pickover - Yorktown Heights NY, US Andrew P. Wyskida - Fishkill NY, US
International Classification:
H04L 12/58
Abstract:
Technical solutions are described to arbitrarily order and access email messages based on text analysis and social network analysis. One general aspect includes a system that includes an email server and an email client. The email server generates a topic map of email messages stored on the email server. The email server also generates a social map of users with accounts on the email server. The email server receives an email message from a first user, the email message directed to a second user. The email server sends the email message to a third user in response to determining that the email message is relevant to the third user. The present document further describes examples of other aspects such as methods, computer products.
- Armonk NY, US Neal M. KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CT, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew P. WYSKIDA - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 12/24 G06F 17/30 H04W 16/22
Abstract:
Various embodiments manage computing networks. In one embodiment, a set of network management data associated with one or more users is analyzed. The set of network management data includes at least electronic scheduling information associated with the one or more users. A concentration of users is predicted for a given location based on the analyzing. At least one network characteristic associated with the given location is performed based on at least the predicted concentration of users.
- Armonk NY, US Neal M. KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CT, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew P. WYSKIDA - Fishkill NY, US
International Classification:
H04L 12/24 G06F 17/30 H04W 16/22
Abstract:
Various embodiments manage computing networks. In one embodiment, a set of network management data associated with one or more users is analyzed. The set of network management data includes at least electronic scheduling information associated with the one or more users. A concentration of users is predicted for a given location based on the analyzing. At least one network characteristic associated with the given location is performed based on at least the predicted concentration of users.
Contemporaneous Gesture And Keyboard Entry Authentication
- Armonk NY, US Neal KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CT, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew WYSKIDA - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.
May 2011 to Jun 2012 Reporter/SecretaryBecker CPA Review New York, NY Sep 2011 to May 2012 Campus AmbassadorVITA/TCE
2010 to 2012 Volunteer and AdministratorHofstra's Tax Society
Sep 2010 to May 2011 Vice President
Education:
Frank G. Zarb School of Business at Hofstra University Hempstead, NY Dec 2011 Bachelor in Business AdministrationFrank G. Zarb School of Business at Hofstra University Hempstead, NY M.S. in Taxation
Youtube
Father Matthew McCarthy's vocation story | Or...
Father Matthew McCarthy was ordained as a priest for the Archdiocese o...
Duration:
1m 22s
How doctors really decide who lives and who d...
The challenge of being a medical ethicist is bringing "airy" concepts ...
Duration:
6m 13s
Fr. Matthew McCarthy's Violin Cover
Here's a Sunday treat from Fr. Matthew McCarthy. Can you name that tune?
Duration:
2m 14s
PeteyLeaks: Matt McCarthy
How much does Pete really know about one of his best friends? Not much...
Duration:
3m 44s
CH Live: NYC - Matt McCarthy
Matt McCarthy shares his thoughts on St. Patrick's Day and suicide not...