2012 to Present Bilingual-Spanish Customer Service RepresentativeJames Curtis & Associates, Attorneys at Law Riverside, CA 2006 to 2011 OwnerBROADCAST Los Angeles, CA 2005 to 2005 Host, ECourt TV New York, NY 2001 to 2005 Host/Anchor/Correspondent"Curtis Court" New York, NY 2000 to 2001 Host, King World/CBSRiverside County District Attorney's Office Riverside, CA 1989 to 1999 DeputyLEGISLATIVE San Diego, CA 1983 to 1983 InternOffice of Economic Opportunity Sacramento, CA 1982 to 1983 Executive AssistantLegi-Tech, Inc Sacramento, CA 1982 to 1983 Legislation AnalystDepartment of Finance Sacramento, CA 1981 to 1982 Legislative InternCalifornia State Senate Sacramento, CA 1980 to 1981 Fellow
Education:
California Western School of Law San Diego, CA 1987 J.D.University of California San Diego, CA 1984 B.A. in Spanish Literature
Medical School University of Minnesota Medical School at Minneapolis Graduated: 1984
Description:
Dr. Curtis graduated from the University of Minnesota Medical School at Minneapolis in 1984. He works in Rockport, ME and specializes in Emergency Medicine. Dr. Curtis is affiliated with Penobscot Bay Medical Center.
A rule based compatibility module provides a single unified mechanism for testing rules where testing results depend on various combinations of database queries, computable values, and/or run-string parameters. The testing results may be evaluated within a particular operational environment. The rule based compatibility module encapsulates all versions of compatibility issues, which are highly dependant on the operational context, into one simple mechanism, thereby reducing risks of unexpected behaviors caused by improper or incomplete handling of compatibility issues. In addition, the rule based compatibility module provides a simple mechanism for handling ad-hoc run-string switches used for debugging, or for optional enabling or disabling of features under development.
Method To Detect Unbounded Growth Of Linked Lists In A Running Application
James R. Curtis - Placerville CA, US Eric Hwang - Saratoga CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F009/44
US Classification:
717127, 717162
Abstract:
A method for detecting memory leakage of a linked list in a running program, includes saving current size of the linked list as a new maximum size of the linked list when a new element is added to the linked list that causes the current size of the linked list to exceed a former maximum size of the linked list, determining whether a first pre-determined period of time has elapsed from when the liked list was created, and determining whether the new maximum size of the linked list exceeds the former maximum size of the linked list during a second pre-determined period of time.
Application Container That Allows Concurrent Execution On Multiple Nodes In A Cluster
James R. Curtis - Placerville CA, US Eric M. Soderberg - Mountain View CA, US James M. Nissen - Cupertino CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F011/00
US Classification:
714 4
Abstract:
The present invention provides a process for providing High Availability applications on a Cluster without utilizing a fail-over mechanism. The process utilizes a first instantiation of a Package containing information needed to implement an application on a first Node of a Cluster. Additionally, the process utilizes a second instantiation of the Package on at least one second Node of the Cluster. Upon detection of a fault condition or possible fault condition in an application, a Cluster management system transfers operation of the application from the first Node to the second Node. The second Node utilizing the second instantiation of the Package to immediately implement the application without requiring the Cluster management system to fail-over the application.
Generic Cluster Aware Lock Broker With User Defined Locking Modes
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/173
US Classification:
709225, 709226, 709223, 709238
Abstract:
The present invention provides a process for implementing a generic Cluster wide lock broker that enables Clients attached to a Node on the Cluster to determine whether a lock can be established on a Resource and whether conflicting active locks are already held by another Peer Node. The process utilizes lock request that include a lock name identifying the desired Resource. Each lock request is compared by a lock broker daemon resident on each Node of the Cluster against a Lock Broker Table identifying active locks currently held by any client associated with each specific Peer Node. Additionally, the process enables the use and creation of customized locks by utilizing intent modes, which designate how a Client desires to utilize a Resource, and deny modes, which designate how a Client desires to prevent other Clients from utilizing a Resource. Further, lock requests initially denied because an active lock exists for the desired Resource can be placed in a wait state and re-requested upon releasing of the active lock.
Mechanism For Nested Expansion Of Data Collection From One Computer To Multiple Computers
James R. Curtis - Placerville CA, US Eric M. Soderberg - Mountain View CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/173
US Classification:
709225, 709223, 719313, 719316
Abstract:
A system and a process is provided for requesting and obtaining information about Resources on a Cluster. The system utilizes a Multiplex Provider, that may be provided on every Node of the Cluster. The Multiplex Provider facilitates the communication of requests to various Nodes without requiring Providers, at such Nodes, to be Cluster-aware and without requiring a Client to directly communicate the request to every Node. The present invention also includes a scope, specifying a range for which any request may be applied. The scope may be determined utilizing a discovery process, wherein each Node on a Cluster identifies the Providers and Resources associated with the Node. The process also entails capturing the results of a request for information in a tabular format. The tabulation may be specified to include all results of the query, unique results of the query and/or based upon any other desired tabulation.
Server For Authenticating Clients Using File System Permissions
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/16
US Classification:
709228, 709229, 726 21
Abstract:
A computer system comprises a server that serves a plurality of clients and performs client authentication and authorization during client login to the server using file system permissions specified for domain sockets. The server creates a domain socket file for individual users during initialization which sets permissions enabling user access to the domain socket file, monitors file descriptors for received connection requests from client processes, and either opens a requesting client process with permission-enabled user access or denies access to an unauthorized client process.
Associating A Monitoring Manager With An Executable Service In A Virtual Machine Migrated Between Physical Machines
Richard Mark Stern - Saratoga CA, US James R. Curtis - Placerville CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 11/00
US Classification:
714 471, 714 41, 714 411, 714 412
Abstract:
A virtual machine is migrated from a source physical machine to a target physical machine, where the virtual machine has an executable service and a monitoring agent for monitoring the executable service. In response to the migrating, a monitoring manager is started that issues a command to start the executable service. It is determined whether the command is for the executable service that is already running in the migrated virtual machine. In response to such determining, the started monitoring manager is associated with the already running executable service, where the monitoring manager cooperates with the monitoring agent to detect fault of the executable service.
Providing Information About A System Using Scripts
James R. Curtis - Placerville CA, US Eric Soderberg - Mountain View CA, US Morris Lee - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/16
US Classification:
709203
Abstract:
Methods and systems for providing information a client requested about a system using scripts are described. In one embodiment, one or more scripts request information about a computer system. A translator receives the information about the system from the scripts. The translator stores the information about the system in readily accessible data structures.
Sabina, OHDangerous Goods/Radiation Safety Specialist at AST... Married to Kaci Wiget Curtis. I have six, yes that's right, six children, 1 girl, 5 boys. A basketball team and a cheerleader. Currently living in Sabina OH.
PrestonSoftware Licensing Specialist at DSGI Business Past: Product Specialist at HKW Information Services, Software Licensing Specialist at dabs.com...
The dam unblocked, the deluge followed. Berahino, playing in the hole, passed the ball in to the feet of Anichebe who rolled his man, James Curtis, with some ease before turning to shoot home his second goal of the season.
Date: Jan 03, 2015
Category: Sports
Source: Google
Ex-Atlantic City casino security manager accused of obstructing prostitution ...
James Curtis of Brigantine was recently indicted on charges of promoting prostitution and obstructing the administration of law. He was arrested in May 2012, but that was not made public until details on the indictment were disclosed Friday, two days after an Atlantic County grand jury issued the in
Date: May 25, 2013
Category: Business
Source: Google
Youtube
Kevin thorn vs james curtis
Category:
Entertainment
Uploaded:
01 Dec, 2007
Duration:
5m 22s
1982 (Statik Selektah & Termanology) "The Rad...
itunes.apple.com Directed By James Curtis www.TheGorillaFL...
Category:
Music
Uploaded:
30 Jan, 2011
Duration:
3m 15s
Evan Bourne vs James Curtis
Evan Bourne vs James Curtis with Bam Neely at ringside and Chavo Guerr...
Category:
Sports
Uploaded:
23 Jul, 2008
Duration:
8m 33s
"Good Bye" Breezy Ft. C-Scharp Directed by Ja...
Good By Directed by James Curtis & Dadii Lane HD videos Preformed by C...
Category:
Music
Uploaded:
03 Nov, 2010
Duration:
4m 5s
KEVIN THORN VS JAMES CURTIS
All Copyright Materials Are Exclusive Property Of World Wrestling Ente...