- New York NY, US Charles Douglas Cosman - Boulder CO, US Thomas Evenson - Longmont CO, US Eric Smith - Louisville CO, US Calvin Legh - Lafayette CO, US Thomas Shields - Hillsborough CA, US Aaron Martin - Arvada CO, US
Assignee:
Xandr Inc. - New York NY
International Classification:
G06Q 10/08
Abstract:
Techniques are disclosed for advantageously forecasting an inventory of a product having a particular duration (e.g., video content). The technique can include determining the particular configuration (e.g., maximum number of impressions, maximum amount of time permitted) of breaks identified within an impression log. Based on the number of breaks and the configurations of the breaks, the technique can forecast a future inventory of the product. In some implementations, the disclosed technique can identify an amount of a previous break that was not filled with video content. These forecasts can enable product sellers to better communicate with their customers, negotiate supply contracts, price their products, plan for business operations, etc.
- New York NY, US Charles Douglas Cosman - Boulder CO, US Thomas Evenson - Longmont CO, US Eric Smith - Louisville CO, US Calvin Legh - Lafayette CO, US Thomas Shields - Hillsborough CA, US Aaron Martin - Arvada CO, US
Assignee:
Xandr Inc. - New York NY
International Classification:
G06Q 10/08
Abstract:
Techniques are disclosed for advantageously forecasting an inventory of a product having a particular duration (e.g., video content). The technique can include determining the particular configuration (e.g., maximum number of impressions, maximum amount of time permitted) of breaks identified within an impression log. Based on the number of breaks and the configurations of the breaks, the technique can forecast a future inventory of the product. In some implementations, the disclosed technique can identify an amount of a previous break that was not filled with video content. These forecasts can enable product sellers to better communicate with their customers, negotiate supply contracts, price their products, plan for business operations, etc.
- New York NY, US Charles Douglas Cosman - Boulder CO, US Thomas Evenson - Longmont CO, US Eric Smith - Louisville CO, US Calvin Legh - Lafayette CO, US Thomas Shields - Hillsborough CA, US Aaron Martin - Arvada CO, US
International Classification:
G06Q 10/08
Abstract:
Techniques are disclosed for advantageously forecasting an inventory of a product having a particular duration (e.g., video content). The technique can include determining the particular configuration (e.g., maximum number of impressions, maximum amount of time permitted) of breaks identified within an impression log. Based on the number of breaks and the configurations of the breaks, the technique can forecast a future inventory of the product. In some implementations, the disclosed technique can identify an amount of a previous break that was not filled with video content. These forecasts can enable product sellers to better communicate with their customers, negotiate supply contracts, price their products, plan for business operations, etc.
System And Method For Deterring Malicious Network Attacks
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
System And Method For Determining Malicious Network Attacks
- Washington DC, US Thomas Clay SHIELDS - Potomac MD, US
Assignee:
GEORGETOWN UNIVERSITY - Washington DC
International Classification:
H04L 29/06
Abstract:
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
Bombardier, (Precision) Wichita, KS Apr 2013 to Nov 2013 BFTC Methods EngineerAeroTek Jacksonville, FL Nov 2012 to Mar 2013 Manufacturing/Tooling EngineerBell Helicopter,(GCT) Hurst, TX May 2012 to Aug 2012 Manufacturing EngineerBombardier, (TDM) Montral, QC Sep 2011 to Jan 2012 Methods EngineerAdecco Riverside, CA Feb 2011 to Aug 2011 Manufacturing Engineer LiaisonGulfstream,(JSG) Tulsa, OK Oct 2010 to Jan 2011 Assembly InspectorThe Boeing Company (Comforce) Tukwila, WA Jun 2009 to May 2010 Manufacturing PlannerVought Aircraft Industries Charleston, SC May 2009 to Jun 2009 Contract Quality Assurance ConsultantGKN (Entegee) Tallassee, AL Feb 2009 to May 2009 Contract Quality Assurance ConsultantVought Aircraft Industries Nashville, TN Sep 2008 to Jan 2009 Contract Quality Assurance ConsultantEclipse Aviation Inc Albuquerque, NM Sep 2006 to Aug 2008 ButlerHamilton Aerospace Technologies Tucson, AZ Nov 2004 to Jan 2006 Contract Quality Assurance ConsultantL-3 Communications San Diego, CA Apr 2004 to Sep 2004 Contract Structures Technician
Education:
Houston Community College Aug 2014 to Dec 2014 Petroleum EngineeringNorthlake College Irving, TX DesignAustin Community College Austin, TX
"I've always been a fan of ('Star Wars' films). I've watched them since I was a little kid," said Thomas Shields, of Joliet, who was the first in line for the 8 p.m. showing. He had been waiting in the cold since 4 p.m. but said the excitement was well worth it.
Date: Dec 17, 2015
Source: Google
Council Bluffs to pay $6 million to settle lawsuit
Details of the settlement, initially sealed Friday by Magistrate Judge Thomas Shields, were ordered unsealed Tuesday by Judge Robert Pratt after The Associated Press filed a freedom of information request under Iowa's open records law. Pratt said in the order there was no compelling reason to justif
Thomas Shields, 13, gives President Obama a demonstration in robotics. The team from Theodore, Ala., created a robot named Vator (short for Ele-Vator), which was designed to mimic space elevators by carrying cargo up a 10-foot pole.
Lochte then joined the U.S. team of Matthew Grevers, Kevin Cordes and Thomas Shields to win the 400-meter medley relay in 3:21.03, with Russia second and Australia third. Lochte's time of 45.22 seconds was the fastest on the team.
Date: Dec 17, 2012
Source: Google
Judge calls mistrial in U. Iowa liberal bias trial
U.S. Magistrate Judge Thomas Shields called the mistrial in the case of Teresa Wagner after jurors reported they were deadlocked after three days of deliberations. Shields told jurors the move means the case will have to be retried or resolved some other way, such as a settlement.