MR. JAMES LEONARD WHITTAKER, PHARMACIST
Pharmacy at Eau Gallie Blvd, Melbourne, FL

License number
Florida PS19608
Category
Pharmacy
Type
Pharmacist
Address
Address
270 E Eau Gallie Blvd, Melbourne, FL 32937
Phone
(321) 773-2915
(321) 773-7494 (Fax)

Personal information

See more information about JAMES LEONARD WHITTAKER at radaris.com
Name
Address
Phone
James Whittaker, age 90
508 Pine Bark Ct, Kissimmee, FL 34758
(407) 935-1631
James Whittaker, age 48
4711 Lambing Rd, Jacksonville, FL 32210
James Whittaker, age 61
5614 Perkin Dr, New Prt Rchy, FL 34652
(727) 815-9382
James Whittaker, age 67
578 13Th St N, Naples, FL 34102
(239) 898-8850
James Whittaker
3721 Crawfordville Rd, Tallahassee, FL 32305
(850) 380-5677

Professional information

James Whittaker Photo 1

Method And Apparatus For Preemptive Monitoring Of Software Binaries By Instruction Interception And Dynamic Recompilation

US Patent:
7162715, Jan 9, 2007
Filed:
Mar 17, 2003
Appl. No.:
10/390397
Inventors:
James A. Whittaker - Indialantic FL, US
Rahul Chaturvedi - Melbourne FL, US
John R. Wagner - Melbourne FL, US
Assignee:
I-Squared, Inc. - Melbourne FL
International Classification:
G06F 9/44
US Classification:
717127, 717130
Abstract:
A method of executing a program in a controlled environment includes initiating execution of an operating system with which the program is adapted to execute, inserting redirection logic at the beginning of the program, and executing the program such that the redirection logic is executed. A current instruction pointer is stored, and execution control is redirected to a program loader. The program loader selects a first block of instructions of the program, based at least in part on the stored current instruction pointer. This selected block of instructions is manipulated to provide a first phantom instruction block, which is executed in the controlled environment. This manipulation includes copying at least a portion of the selected first block to form the first phantom instruction block.


James Whittaker Photo 2

Method And Apparatus For Preemptive Monitoring Of Software Binaries By Instruction Interception And Dynamic Recompilation

US Patent:
2007002, Feb 1, 2007
Filed:
Sep 27, 2006
Appl. No.:
11/528982
Inventors:
James Whittaker - Indialantic FL, US
Rahul Chaturvedi - Melbourne FL, US
John Wagner - Melbourne FL, US
International Classification:
G06F 9/44
US Classification:
717162000, 717166000
Abstract:
A method of executing a program in a controlled environment includes initiating execution of an operating system with which the program is adapted to execute, inserting redirection logic at the beginning of the program, and executing the program such that the redirection logic is executed. A current instruction pointer is stored, and execution control is redirected to a program loader. The program loader selects a first block of instructions of the program, based at least in part on the stored current instruction pointer. This selected block of instructions is manipulated to provide a first phantom instruction block, which is executed in the controlled environment. This manipulation includes copying at least a portion of the selected first block to form the first phantom instruction block.


James Whittaker Photo 3

Method And System For Protecting Against Malicious Mobile Code

US Patent:
2002017, Nov 28, 2002
Filed:
Sep 12, 2001
Appl. No.:
09/952208
Inventors:
James Whittaker - West Melbourne FL, US
Andres De Vivanco - Palm Bay FL, US
Rahul Chaturvedi - Melbourne FL, US
Assignee:
Harris Corporation - Melbourne FL
International Classification:
G06F011/30
US Classification:
713/200000
Abstract:
A host computer including an operating system and at least one local resource controlled thereby is protected from malicious mobile code based upon a protective program stored therein. The protective program identifies mobile code received by the host computer, and modifies the operating system for monitoring access of the local resource by the mobile code. The protective program further includes transferring control of the local resource to the protective program if the mobile code calls the local resource, and determining whether the mobile code is malicious. If the mobile code is malicious, the protective program blocks access to the local resource by the mobile code. If the protective program can not determine if the mobile code is malicious or benign, the mobile code is allowed to execute while changes made to the host system by the mobile code are recorded so that if the user later determines that the mobile code is malicious, the host system can be restored to an initial condition based upon the recorded changes.