Lisa H Magee

age ~66

from Pittsboro, NC

Also known as:
  • Lisa Hayes Magee
  • Lisa Leigh Magee
  • Lisa L Magee
  • Lisa Hayes Plymale
  • Lisa L Hayes
  • Lisa Leigh Hayes
  • Lisa L Plymale
  • Magee Magee
  • Lisa E
  • Magee Lisa Hayes

Lisa Magee Phones & Addresses

  • Pittsboro, NC
  • Dallas, NC
  • Reseda, CA
  • Boone, NC
  • 604 Walcott Way, Morrisville, NC 27513 • 9194813268 • 9194699568
  • Cary, NC
  • Key West, FL

License Records

Lisa B. Magee

License #:
PST.013635 - Active
Issued Date:
Aug 21, 1984
Expiration Date:
Dec 31, 2017
Type:
Pharmacist

Us Patents

  • Method And System For Distributing A Nested Electronic Communication To A Plurality Of Recipients

    view source
  • US Patent:
    7487215, Feb 3, 2009
  • Filed:
    Dec 17, 2004
  • Appl. No.:
    11/015309
  • Inventors:
    Erich S. Magee - Cary NC, US
    Lisa H. Magee - Cary NC, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 15/16
  • US Classification:
    709206, 709204, 709205, 709207, 358 115
  • Abstract:
    A computer system and associated method to distribute an electronic communication object. The electronic communication object comprises a main communication and a first sub-communication object. The first sub-communication object is embedded within a main communication object. The main communication object comprises a first set of attributes and a first addressee. The first sub-communication object comprises a second set of attributes and a second addressee. A hierarchal relationship exists between the main communication object and the first sub-communication object such that the first sub-communication object inherits one or more of the first set of attributes from the main communication object if said one or more of the second set of attributes is not specified in the first sub-communication object. The main communication object and a first outline of the first sub-communication object is sent to the first addressee. The first sub-communication object is sent to the second addressee.
  • Monitoring System And Method

    view source
  • US Patent:
    7523357, Apr 21, 2009
  • Filed:
    Jan 24, 2006
  • Appl. No.:
    11/338510
  • Inventors:
    Annette Garland Irby - Clover VA, US
    Richard Philip Lacks - Raleigh NC, US
    Lisa Hayes Magee - Cary NC, US
    Timothy Wayne Owings - Lake Worth FL, US
    Tarn Martin Rosenbaum - Raleigh NC, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 11/00
  • US Classification:
    714 47, 714 25, 714 39, 714 48
  • Abstract:
    A monitoring system and method. The monitoring system receives specified rules related to at least one component within a computing system. The monitoring system receives first data comprising information related to at least one component within a computing system. The monitoring system comprises a repository. The first data is stored within the repository. The first data is analyzed by the monitoring system using specified rules to determine a first health status of the at least one component. The monitoring server indicates for a user the first health status.
  • Source Code Repair Method For Malicious Code Detection

    view source
  • US Patent:
    7640587, Dec 29, 2009
  • Filed:
    Mar 29, 2005
  • Appl. No.:
    11/093476
  • Inventors:
    James Edward Fox - Apex NC, US
    Erich Shannon Magee - Cary NC, US
    Lisa Hayes Magee - Cary NC, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 11/00
  • US Classification:
    726 24, 726 22
  • Abstract:
    A repair mechanism within a code management library system for repairing build code that is infected with malicious code. When a virus pattern is detected in a component of a source code, other components in the source code containing dependencies upon the first component are identified. This identification may be based on rules defined from relationships between the infected component and the other components in the source code. The component and the other components that are identified as having dependencies upon the infected component are retracted from the software product build. The infected component and the other identified components are then replaced with a previous archive of the code build. The software product build of the source code may then be performed.
  • Source Code Management Method For Malicious Code Detection

    view source
  • US Patent:
    7725735, May 25, 2010
  • Filed:
    Mar 29, 2005
  • Appl. No.:
    11/093548
  • Inventors:
    James Edward Fox - Apex NC, US
    Erich Shannon Magee - Cary NC, US
    Lisa Hayes Magee - Cary NC, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 11/30
    G06F 11/00
  • US Classification:
    713188, 713187, 726 22, 726 24
  • Abstract:
    A system and method enhancing source code management with existing virus detection methods in a library management system to detect potentially malicious code. Malicious code that is introduced into a software product may be detected before the code is able to damage stored data and other software by preventing a product build with the malicious code. Source code received at a code management library system from a set of software developers in a collaborative development environment is moved into a staging area. A determination is made in the staging area as to whether malicious code exists in the source code. If malicious code exists, the library management system does not forward the source code to the software product build and notifies a system administrator of the presence of the malicious code.
  • Electronic Communication Distribution System

    view source
  • US Patent:
    7876891, Jan 25, 2011
  • Filed:
    Nov 20, 2008
  • Appl. No.:
    12/274377
  • Inventors:
    Erich S. Magee - Cary NC, US
    Lisa H. Magee - Cary NC, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 15/16
  • US Classification:
    379206, 709206, 715752
  • Abstract:
    A computer system and associated method to distribute an electronic communication object. The electronic communication object comprises a main communication and a first sub-communication object. The first sub-communication object is embedded within a main communication object. The main communication object comprises a first set of attributes and a first addressee. The first sub-communication object comprises a second set of attributes and a second addressee. A hierarchal relationship exists between the main communication object and the first sub-communication object such that the first sub-communication object inherits one or more of the first set of attributes from the main communication object if said one or more of the second set of attributes is not specified in the first sub-communication object. The main communication object and a first outline of the first sub-communication object is sent to the first addressee. The first sub-communication object is sent to the second addressee.
  • Statistically-Triggered Heuristics

    view source
  • US Patent:
    20030177225, Sep 18, 2003
  • Filed:
    Mar 14, 2002
  • Appl. No.:
    10/097953
  • Inventors:
    Kyle Brown - Apex NC, US
    James Fox - Apex NC, US
    Robert Leah - Cary NC, US
    Lisa Magee - Morrisville NC, US
    Erich Magee - Morrisville NC, US
    Steven Miller - Apex NC, US
    Mark Weitzel - Durham NC, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F015/173
    G06F015/16
    G06F009/44
  • US Classification:
    709/224000, 709/315000, 709/203000
  • Abstract:
    Methods, systems, and computer program products for providing a heuristics service using a generically-consumable, reusable heuristics manager object. This heuristics manager object provides a “black box” approach to statistically-triggered heuristics, and eliminates the need to write application-specific code for compiling statistics and performing complicated analysis of those statistics within each application program. In one embodiment, the heuristics manager object is provided as a web-accessible service, which may be registered in a network-accessible registry such as a UDDI registry. Enterprises may subscribe to this service for monitoring and analyzing statistics pertaining to one or more of the enterprise's applications, thereby providing a novel method of doing business for the provider of the heuristics service.
  • Source Code Classification Method For Malicious Code Detection

    view source
  • US Patent:
    20060230288, Oct 12, 2006
  • Filed:
    Mar 29, 2005
  • Appl. No.:
    11/093059
  • Inventors:
    James Fox - Apex NC, US
    Erich Magee - Cary NC, US
    Lisa Magee - Cary NC, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04L 9/32
  • US Classification:
    713188000
  • Abstract:
    A classification mechanism within the source code management system for customizing malicious code searches. This classification mechanism is used to limit the number of searches that are performed on incoming source code, as some malicious code searches may only need to be performed on particular modules, classes, components, etc. of the software product. When a library system is being set up to receive new source code, security classifications are created for the source code. Upon receiving the source code from a software developer, each component in the source code is associated to a security classification. A virus check is then performed on the components in the source code based on the associated security classifications. In this manner, only certain components may need to be checked for certain virus patterns, and other components may be checked for other virus patterns.

Googleplus

Lisa Magee Photo 1

Lisa Magee

Lisa Magee Photo 2

Lisa Magee

Lisa Magee Photo 3

Lisa Magee

Lisa Magee Photo 4

Lisa Magee

Lisa Magee Photo 5

Lisa Magee

Lisa Magee Photo 6

Lisa Magee

Lisa Magee Photo 7

Lisa Magee

Lisa Magee Photo 8

Lisa Magee

Facebook

Lisa Magee Photo 9

Lisa Magee Roman

view source
Lisa Magee Photo 10

Louis N Lisa Magee

view source
Lisa Magee Photo 11

Lisa Magee

view source
Lisa Magee Photo 12

Lisa Magee

view source
Lisa Magee Photo 13

Lisa Magee

view source
Lisa Magee Photo 14

Lisa Magee

view source
Lisa Magee Photo 15

Lisa Magee

view source
Lisa Magee Photo 16

Lisa Magee Ward

view source

Youtube

Lisa McGee On Derry Girls Season 3 & Movie Pl...

Red Carpet News TV VIP guests and winners at the Sky Women In Film & T...

  • Duration:
    2m 49s

Lisa McGee Winner Best Writer Comedy/Soap 'De...

Lisa McGee wins the Best Writer Comedy/Soap Award for 'Derry Girls' at...

  • Duration:
    2m 31s

Rare Everyday Hero Lisa Magee 1

At a time when society has lost sight of its real heroes and material ...

  • Duration:
    1m 47s

Derry Girls Creator Lisa McGee Discusses Seri...

#FandomWire FandomWire, LLC Lisa McGee Talks Derry Girls | FandomWire...

  • Duration:
    24m 49s

Exploitation Charges, Lisa Magee

  • Duration:
    26s

Other Social Networks

Lisa Magee Photo 17

from Lisa Magee

view source
Network:
Bebo
Tagline: ICE ICE BABY - nols; Me, Myself, and I: :.: .Lisaaa hey to my wee jerry n tom lol luv yas! (n to sorcha llf) "take a picture im on the wee mans bk" lol ...

Myspace

Lisa Magee Photo 18

Lisa Magee (Lisa Magee) ...

view source
Lisa Magee (Lisa Magee)'s profile on Myspace, the leading social entertainment destination powered by the passion of our fans.

Get Report for Lisa H Magee from Pittsboro, NC, age ~66
Control profile