Dr. Dixon III graduated from the University of Virginia School of Medicine in 1997. He works in Prosperity, SC and 1 other location and specializes in Family Medicine. Dr. Dixon III is affiliated with Newberry County Memorial Hospital.
Southwest Surgical 1311 Aston Ave, McComb, MS 39648 (601)6842481 (phone), (601)6842488 (fax)
Education:
Medical School University of Mississippi School of Medicine Graduated: 1992
Procedures:
Bariatric Surgery Breast Biopsy Destruction of Lesions on the Anus Endoscopic Retrograde Cholangiopancreatography (ERCP) Gallbladder Removal Hemorrhoid Procedures Hernia Repair Laparoscopic Appendectomy Laparoscopic Gallbladder Removal Mastectomy Sigmoidoscopy Skin Tags Removal Small Bowel Resection Thyroid Gland Removal Tracheostomy Appendectomy Hallux Valgus Repair Proctosigmoidoscopy Upper Gastrointestinal Endoscopy
Conditions:
Abdominal Hernia Breast Disorders Cholelethiasis or Cholecystitis Gastrointestinal Hemorrhage Hemorrhoids
Languages:
English
Description:
Dr. Dixon graduated from the University of Mississippi School of Medicine in 1992. He works in McComb, MS and specializes in General Surgery. Dr. Dixon is affiliated with Southwest Mississippi Regional Medical Center.
Medical School Medical College of Wisconsin School of Medicine Graduated: 1994
Procedures:
Angioplasty Cardiac Stress Test Abdominal Aortic Aneurysm Cardiac Catheterization Cardioversion Continuous EKG Echocardiogram Electrocardiogram (EKG or ECG) Pacemaker and Defibrillator Procedures
Conditions:
Acute Myocardial Infarction (AMI) Congenital Anomalies of the Heart Angina Pectoris Aortic Regurgitation Aortic Stenosis
Languages:
English
Description:
Dr. Dixon IV graduated from the Medical College of Wisconsin School of Medicine in 1994. He works in Marianna, FL and 1 other location and specializes in Cardiovascular Disease. Dr. Dixon IV is affiliated with Jackson Hospital and Tallahassee Memorial Healthcare Hospital.
SIU Physicians & Surgeons GroupQuincy Family Medicine Of Southern Illinois University 612 N 11 St, Quincy, IL 62301 (217)2249484 (phone), (217)2247950 (fax)
Education:
Medical School University of Missouri, Kansas City School of Medicine Graduated: 2001
Languages:
English Spanish
Description:
Dr. Dixon graduated from the University of Missouri, Kansas City School of Medicine in 2001. He works in Quincy, IL and specializes in Family Medicine. Dr. Dixon is affiliated with Blessing Hospital.
Community Medical Providers Medical GroupCommunity Medical Providers Care Center 1570 E Herndon Ave, Fresno, CA 93720 (559)4377300 (phone), (559)4377159 (fax)
Languages:
English Spanish
Description:
Mr. Dixon works in Fresno, CA and specializes in Urgent Care Medicine. Mr. Dixon is affiliated with Clovis Community Medical Center.
William H. Dixon - Seattle WA Krishna Ganugapati - Redmond WA Abhishek Abhishek - Bellevue WA
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15173
US Classification:
709224, 709202, 709226, 709229, 709244, 713153
Abstract:
A method of network security policy administration for a network client uses a finite state machine to maintain the security policy information of the network client. Security policy information may originate in a remote source such a directory storage as well as, or alternatively, locally in cache and local store locations. The finite state machine has four states, Initial, DS, Cache, and Local, and transitions between states responsive to the availability of security policy information from the various policy information sources. Furthermore, security policy updates occur via a differencing mechanism, wherein only filters that have changed are updated, minimizing impact on unchanged policy filters and the traffic protected by them, and minimizing lulls in policy coverage.
Method And Framework For Integrating A Plurality Of Network Policies
Brian D. Swander - Bellevue WA, US William H. Dixon - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/00
US Classification:
726 13, 726 12, 726 14, 713166, 709232
Abstract:
A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.
Method And Apparatus For Traversing A Translation Device With A Security Protocol
Brian D. Swander - Bellevue WA, US William H. Dixon - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/00
US Classification:
713153, 713171, 709201, 726 14
Abstract:
The invention uses a three phase IKE protocol main mode negotiation to implement a port float algorithm that permits UDP encapsulated ESP traffic to traverse an IPSec-aware NAT. The NAT is connected to a plurality of client computers on a private network and provides an interface between the client computers and a server connected to a public network. In a first phase, a client and the server determine whether both are capable of sending UDP encapsulated ESP packets. In a second phase, the client and server conduct NAT discovery and determine whether the client, server, or both operate behind a NAT. In a third phase, the client and server initiate a port float algorithm, moving a destination UDP port specified in IKE packets from a first port value to a second port value. The server maintains a data structure that allows the server to identify the client sending IKE packets after exiting the second phase and entering the third phase.
Method For Mapping Security Associations To Clients Operating Behind A Network Address Translation Device
A method and system for mapping security parameters to a plurality of network sessions is provided. A responding computer maps the security parameters to the combination of packet parameters and a mapped port value used in each of the plurality of sessions. The packet parameters includes IP source and destination addresses, application source and destination ports and protocol type. The mapped port value is assigned by the responding computer to maintain a unique mapping between each security association and each network session.
Method And Framework For Integrating A Plurality Of Network Policies
Brian D. Swander - Kirkland WA, US William H. Dixon - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 29/06
US Classification:
713166, 713151, 726 12
Abstract:
A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.
Method For Providing User Authentication/Authorization And Distributed Firewall Utilizing Same
William Dixon - Seattle WA, US Gurdeep Pall - Sammamish WA, US Ashwin Palekar - Sammamish WA, US Bernard Aboba - Bellevue WA, US Brian Swander - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L009/00
US Classification:
713/200000, 713/153000
Abstract:
The distributed firewall performs user authentication at a first level to establish a user security context for traffic from that user, and an authority context provides authorization for subsequent traffic. This authority context may be based on an underlying policy for particular types of traffic, access to particular applications, etc. Additionally, the system includes the ability to allow a user/process/application to define its own access control. The linking of the user security context from the traffic to the application is accomplished by enabling IPSec on a socket and forcing the socket to be bound in exclusive mode. The most common policy definitions may be included by default. Extensions of the Internet key exchange protocol (IKE) to provide the desired user authentication plus application/purpose are also provided. The architecture includes pluggable authorization module(s) that are called after IKE has successfully authenticated the peer, but before the connection is allowed to complete.
Method For Providing User Authentication/Authorization And Distributed Firewall Utilizing Same
William Dixon - Seattle WA, US Gurdeep Pall - Sammamish WA, US Ashwin Palekar - Sammamish WA, US Bernard Aboba - Bellevue WA, US Brian Swander - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
726011000
Abstract:
The distributed firewall performs user authentication at a first level to establish a user security context for traffic from that user, and an authority context provides authorization for subsequent traffic. This authority context may be based on an underlying policy for particular types of traffic, access to particular applications, etc. Additionally, the system includes the ability to allow a user/process/application to define its own access control. The linking of the user security context from the traffic to the application is accomplished by enabling IPSec on a socket and forcing the socket to be bound in exclusive mode. The most common policy definitions may be included by default. Extensions of the Internet key exchange protocol (IKE) to provide the desired user authentication plus application/purpose are also provided. The architecture includes pluggable authorization module(s) that are called after IKE has successfully authenticated the peer, but before the connection is allowed to complete.
Jeromy S. Statia - Duvall WA, US Christopher J. Engdahl - Seattle WA, US Lee Walker - Christiansburg VA, US William Dixon - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707 3, 707E17014
Abstract:
A secure DNS query may be made by establishing a secure connection with a specific DNS server to determine an address for a hostname. A client device may have a database that may contain a record of a secure DNS server for one or more hostnames. When a DNS request contains one of the specified hostnames, an authenticated session may be created with the designated secure DNS server and a network address for the hostname is returned using the session. The authenticated session may authenticate a client device to the server as well as authenticate the server to the client. In some embodiments, the secure DNS server may accept connections from authenticated clients and may disregard connection requests from non authenticated clients.
Dixon Law Firm, PLLC 403 Columbia Street Suite 500, Seattle, WA 98104 (206)3300212 (Office), (206)6822451 (Fax)
Licenses:
Washington - Active 1997
Experience:
Founder, Principal at Dixon Law Firm PLLC - 2007-present Founder, Manager at STW Seafoods, Inc. - 2005-2006 Attorney at Short Cressman & Burgess, PLLC - 2000-2004 Associate at Gordon, Thomas, Honeywell, Malanca, Peterson & Daheim - 1996-2000
Education:
University of Washington School of Law Degree - JD - Juris Doctor - Law Graduated - 1996 University of Arizona Degree - BS - Bachelor of Science - Business Graduated - 1992
Specialties:
Personal Injury - 50%, 27 years Medical Malpractice - 25%, 27 years Employment / Labor - 15%, 27 years Defective / Dangerous Products - 10%, 27 years
Associations:
Washington State Association for Justice, Diversity Committee - Co-Chair, 2011-present Washington State Bar Association, Litigation Section - Executive Committee, 2010-present Washington State Association for Justice - Board of Governors, 2009-present Washington State Association for Justice, Awards Committee - Member, 2009-present Washington State Association for Justice - Eagle Member, 2007-present King County Bar Association - Member, 2006-present Washington State Association for Justice - Member, 2006-present United States Court of Appeals For the Ninth Circuit, 1997-present United States District Court for the Western District of Washington, 1997-present Loren Miller Bar Association - Member, 1996-present Washington State Bar Association - Member, 1996-present Washington State Association for Justice, New Member Committee - Member, 2007-2008 National Football League Players Assocation - Member, 2000-2005 Pierce County Bar Association - Member, 1996-2000 Washington State Trial Lawyers Association - Member, 1996-2000
Description:
I founded Dixon Law Firm in 2007 in order to represent victims who have been seriously injured because of another person's negligence.I aggressively protectmy...
William Dixon, a junior at Howard University -- which is in the nation's capitol -- was one of the students who ran to the White House after Obama's win. But unlike most of the people there, he was proudly sporting his Romney-Ryan sweatshirt. As the crowd chanted phrases such as "Four more years!" a
Date: Nov 19, 2012
Category: U.S.
Source: Google
DC's mental health system freed from court supervision
When the lawsuit arose, almost 4,000 patients were housed in a single hospital. Plaintiff and patient William Dixon argued that many of St. Elizabeths patients could live on their own but lacked the community services they needed.
Because of goodwill in Tucson for Giffords and Barber after the shooting, the joint endorsement by Giffords and Kelly stands to help Democrats keep the seat, said William Dixon, a University of Arizona political science professor. "The Republicans are going to have a real hard time with this endors
Date: Feb 09, 2012
Category: U.S.
Source: Google
DC on verge of reclaiming control of its mental health system
The court case that resulted in the oversight dates back to 1974 and St. Elizabeth's Hospital patient William Dixon. At the time, the hospital was the city's only answer for mental health care and housed nearly 4,000 patients -- many of whom did not need hospitalization.