Larry L. Lu - Great Falls VA, US Eric O'Laughlen - Aldie VA, US John Crowley - Bethesda MD, US
Assignee:
AOL LLC - Dulles VA
International Classification:
G06F 15/173
US Classification:
709224, 709206, 715743
Abstract:
A report card provides a supervisor or master account holder (e. g. , a parent) with information about the activities of an individual or sub-account user (e. g. , a child). For example, the report card may include a list of sites (e. g. , content identifiers and/or uniform resource locators) that an individual has visited or attempted to visit. Other information (e. g. , e-mail and address book activity and instant messaging and contact list activity) also may be provided in addition to tools that allow the master account holder to access information about the activities and to adjust parental controls for the activities.
Larry L. Lu - Great Falls VA, US Eric O Laughlen - Aldie VA, US John Crowley - Bethesda MD, US
Assignee:
AOL Inc. - Dulles VA
International Classification:
G06F 15/16 G06F 3/00
US Classification:
709224, 709206, 715743
Abstract:
A report card provides a supervisor or master account holder (e. g. , a parent) with information about the activities of an individual or sub-account user (e. g. , a child). For example, the report card may include a list of the sites (e. g. , content identifiers and/or uniform resource locators) that an individual has visited or attempted to visit. Other information (e. g. , e-mail and address book activity and instant messaging and contact list activity) also may be provided in addition to tools that allow the master account holder to access information about the activities and to adjust parental controls for the activities.
Method, System, And Medium For The Analysis Of Information System Security
John Crowley - Rockville MD, US Jerry Dowless - Herndon VA, US James Ellis - Arlington VA, US
International Classification:
H04L 9/32
US Classification:
726006000
Abstract:
A method, system, and medium for performing a security analysis of a system, which is comprised of components and paths wherein a user identifies the components and paths of a system, associates a set of predetermined requirements to the components and paths of a system, and wherein the user selects security services to satisfy the requirements of the paths and components of the system. In at least some embodiments of the invention, the method comprises the publication of reports detailing the components, paths, requirements, and security services of a system as well as the rationale that a security service satisfies the requirements mapped to the components and paths of the system.
A dual function orthodontic appliance which permits the orthodontist a wide variety of treatment options in repositioning the teeth to achieve the most orthodontically desirable positions and in maintaining the repositioned teeth in the desired positions is provided. The orthodontic appliance of the present invention includes a palatal overlay molded to conform to the contours of the patient's hard plate and to fit securely against the gingival edge of the lingual surface of the teeth, a pair of posteriorly positioned opposed clasps, and a pair of opposed, spaced retaining and positioning wires which cross over the anterior teeth for a distance necessary to achieve the desired positioning or retaining effect. The orthodontic appliance of the present invention may be adapted to treat the lower teeth by providing in place of the palatal overlay a gingival overlay molded to conform to the periodontal structures on the lingual side of the lower teeth. An additional embodiment provided includes a single continuous substantially horizontal retaining wire having at least one preferably centrally positioned inverted U-shaped adjustment loop which may be clipped to convert the single wire appliance of this embodiment to the more versatile double wire configuration appliance.
John J. Crowley - Rockville MD Michael J. Wickham - Vienna VA
Assignee:
TECSEC, Incorporated - Vienna VA
International Classification:
H04L 900
US Classification:
380 9
Abstract:
A portable voice and data encryption device designed to be used with normal wideband telephone and cellular telephones, computers and facsimile machines to transmit voice and data in encrypted form. The V/DED comprises a voice and data encryption module, an encryption and control module, and a modem module. The modem module can adapt its data rate to account for the changes in the signal strength between the sending and receiving sites. The encryption and control module senses the change in data rate of the modem module during transmission and synchronizes the activities of the voice and data module so that the amount of data being produced for encryption and transmission matches the data rate being experienced by the modem module. The V/DED very simply connects to the wall jack of a normal PSTN with the computer, telephone, or facsimile machine plugging directly into the V/DED.
Edward M. Seheidt - McLean VA John J. Crowley - Rockville MD
Assignee:
TECSEC, Incorporated - Vienna VA
International Classification:
H04L 908 H04L 928
US Classification:
380 21
Abstract:
A system for the secure communication of a message from a transmitting user to a receiving user using a split key scheme. Each user generates a key component using a cryptographic engine. The key component is a pseudorandom sequence of bits with an appended error detection field which is mathematically calculated based on the pseudorandom sequence. This key component is then sent out on a communications channel from the transmitting user to the receiving user. The receiving user also sends its key component to the transmitting user. Each location performs a mathematical check on the key component received from the other location. If the key component checks pass at both locations, the transmit key component and the receive key component, including the error detection fields, are combined at both locations, forming identical complete keys at both locations. The identical complete keys are then used to initiate the cryptographic engines at both locations for subsequent encryption and decryption of messages between the two locations.
Edward M. Seheidt - McLean VA John J. Crowley - Rockville MD
Assignee:
TECSEC Incorporated - Vienna VA
International Classification:
H04L 908 H04L 928
US Classification:
380 21
Abstract:
A system for the secure communication of a message from a transmitting user to a receiving user using a split key scheme. Each user generates a key component using a cryptographic engine. The key component is a pseudorandom sequence of bits with an appended error detection field which is mathematically calculated based on the pseudorandom sequence. This key component is then sent out on a communications channel from the transmitting user to the receiving user. The receiving user also sends its key component to the transmitting user. Each location performs a mathematical check on the key component received from the other location. If the key component checks pass at both locations, the transmit key component and the receive key component, including the error detection fields, are combined at both locations, forming identical complete keys at both locations. The identical complete keys are then used to initiate the cryptographic engines at both locations for subsequent encryption and decryption of messages between the two locations.
San Francisco, CaliforniaVice President at CA International, LLC Past: President and CEO at New England Classic, Director Innovative Construction Technology...
Warners knew The Goldfinch, directed by John Crowley, was in trouble at least six months ago and subsequently decided to trim back dramatically on its marketing spend. "This is the kind of story that is probably more appropriate for a series on streaming," says one studio executive. Two other source
Date: Sep 16, 2019
Category: Entertainment
Source: Google
‘Hustlers’ Tops Box Office With Record $13 Million Friday, But ‘The Goldfinch’ Bombs
oldfinch (review). Suffering from mostly negative reviews out of Toronto and existing in a profoundly challenging theatrical environment for dramas, director John Crowley and screenwriter Peter Straughans adaptation of Donna Tartts acclaimed epic novel played to mostly empty theaters yesterday. The
Date: Sep 14, 2019
Category: Entertainment
Source: Google
Oscar Race Begins: Fall Festivals Bring Moment of Truth for ‘Joker,’ ‘Jojo Rabbit’ and Many More
Also debuting at TIFF: John Crowleys adaptation of The Goldfinch, with Ansel Elgort, Nicole Kidman and Sarah Paulson; Kasi Lemmons Harriet, starring Cynthia Erivo as slave-turned-abolitionist Harriet Tubman; Destin Daniel Crettons Just Mercy, with Michael B. Jordan and Jamie Foxx in the sto
Date: Aug 27, 2019
Category: Entertainment
Source: Google
Joaquin Phoenix’s Joker movie gets title, 2019 release date
That date adds to an already crowded month, which also promises Ang Lees Will Smith starrer Gemini Man; Dwayne The Rock Johnsons Disney ride movieJungle Cruise; John Crowleys adaptation of the Pulitzer Prize-winningThe Goldfinch; and Joe Wrights adaptation of The Woman in the Window. Thats
Date: Jul 18, 2018
Category: Headlines
Source: Google
Archive: Father uses business saavy to fight his kids' rare disease
He arrives at his Cranbury office just a few minutes late, offering coffee, water, an apology and an explanation. All four are unnecessary, but John Crowley politely reveals this: There was an issue with Megan.Hollywood treatment Friday, when "Extraordinary Measures" hits theaters nationwide. The film, which stars Harrison Ford, Keri Russell as Crowleys wife, Aileen (pronounced EYE-leen), and Brendan Fraser as John Crowley, is an inspired-by-real-events document of Crowley's quest to save his children.One method of treatment is enzyme replacement therapy. In his book "Chasing Miracles," John Crowley writes that his children are not producing as much of a critical enzyme as other children. "Their bodies produce that one enzyme," Crowley writes, "but about 99 percent of it is discarded by the quali
What's most surprising about John Crowley's expertly calibrated production is how funny it is, while remaining true to themes of disillusionment, class breakdown and unfulfilled love that would find more articulate expression in Chekhov's later, better plays. It also exemplifies the "Chekhov's gun"
Date: Jan 08, 2017
Category: Entertainment
Source: Google
Cate Blanchett, Richard Roxburgh star in 'The Present': review
Par for the course in Chekhov, this Sydney Theatre Company production written by Blanchetts husband Andrew Upton and directed by John Crowley (Brooklyn) is filled with lost souls, regrets, an uncertain future and pistols. The action, set in Russia in the mid-1990s, signalled with maxi dres
Date: Jan 08, 2017
Category: Entertainment
Source: Google
Comcast Gigabit Internet Service Trial Kicks Off In Chicago, But It Costs Double The Usual Price
"Our commitment to providing customers with a great experience is front and center with this announcement, and we're proud that Comcast's Chicago area customers will be among the first in the world to have access to this new Gigabit technology," says John Crowley, senior vice president of Comcast Gr
Date: Aug 19, 2016
Category: Sci/Tech
Source: Google
Flickr
Googleplus
John Crowley
Work:
Bath Simple - Founder (2009) CA International - VP Development (2005-2009) New England Classic - CEO (1998-2005) JSC Associates - President (1989-1998) MIT - Faculty - Research Asociate (1988-1997) NVR - Ryan Homes - Research and Development Manager (1983-1988) National Housing Research Center - NAHB - Project Manager (1980-1983)
Education:
Massachusetts Institute of Technology - Architecture and Planning, University of New Hampshire - BA
Tagline:
Entrepreneur, Business Developer, Investor, Dad, Inventor
John Crowley
Work:
National Defense University STAR-TIDES - Analyst (contractor) Harvard Humanitarian Initiative - Research Fellow Corporate Executive Board - Executive Inquiry Research Associate Harvard University Center for Public Leadership - Web Developer (contractor)
Education:
Harvard University John F. Kennedy School of Government - MPA/MA, Boston University College of Fine Arts - Cello and Music History, The University Professors Program at Boston University - MA, Music and History of Ideas