Patents by Inventor George Hicken
George Hicken has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240069884Abstract: A computer-implemented method, computer-readable medium and computer system to execute containerized applications includes initiating a Supervisor Cluster on top of a SDDC to support execution of containerized applications. A supervisor cluster namespace is created on the Supervisor Cluster. A storage policy is attached to the supervisor cluster namespace. Then, a control plane is bootstrapped, and containerized applications are executed in a virtual machine cluster using vSphere pods as the worker nodes in the virtual machine cluster.Type: ApplicationFiled: August 23, 2022Publication date: February 29, 2024Inventors: Anubhab Majumdar, Harsh Kumar, George Hicken
-
Patent number: 11611540Abstract: This disclosure describes a process for securely instantiating a virtual machine on a server cluster. The virtual machine just after instantiation has access to persistent storage that includes an encrypted region and lacks access to an encryption key configured to provide access to data stored within the encrypted region. The virtual machine receives a communication from a management server associated with the server cluster that includes the encryption key configured to provide access to the data stored within the encrypted region. After the virtual machine receives the encryption key, the server cluster runs services that depend upon the data stored within the encrypted region to operate after receiving the communication from the management server.Type: GrantFiled: July 1, 2020Date of Patent: March 21, 2023Assignee: VMware, Inc.Inventors: Michal A. Jankowski, Benjamin J. Corrie, George Hicken, Christian Lita
-
Publication number: 20220006792Abstract: This disclosure describes a process for securely instantiating a virtual machine on a server cluster. The virtual machine just after instantiation has access to persistent storage that includes an encrypted region and lacks access to an encryption key configured to provide access to data stored within the encrypted region. The virtual machine receives a communication from a management server associated with the server cluster that includes the encryption key configured to provide access to the data stored within the encrypted region. After the virtual machine receives the encryption key, the server cluster runs services that depend upon the data stored within the encrypted region to operate after receiving the communication from the management server.Type: ApplicationFiled: July 1, 2020Publication date: January 6, 2022Applicant: VMware, Inc.Inventors: Michal A. JANKOWSKI, Benjamin J. CORRIE, George HICKEN, Christian LITA
-
Patent number: 10079856Abstract: Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.Type: GrantFiled: August 20, 2015Date of Patent: September 18, 2018Assignee: International Business Machines CorporationInventors: George Hicken, Adam Pilkington
-
Publication number: 20170371693Abstract: One example relates to a computer system that includes a plurality of host computers each executing a hypervisor. The computer system further includes a virtualization manager having an application programming interface (API) configured to manage the hypervisor on each of the plurality of host computers, the virtualization manager configured to create a virtual container host within a resource pool that spans the plurality of host computers. The computer system further includes a plurality of container virtual machines (VMs) in the virtual container host configured to consume resources in the resource pool. The computer system further includes a daemon appliance executing in the virtual container host configured to invoke the API of the virtualization manager to manage the plurality of container VMs in response to commands from one or more clients.Type: ApplicationFiled: June 23, 2016Publication date: December 28, 2017Inventors: Benjamin J. CORRIE, George HICKEN, Aaron SWEEMER, Zee YANG
-
Patent number: 9727355Abstract: A distributed computing application is described that provides a highly elastic and multi-tenant platform for Hadoop applications and other workloads running in a virtualized environment. Multiple instances of a distributed computing framework, such as Hadoop, may be executed concurrently. A centralized manager detects when contention for computing resources, such as memory and CPU, causes tasks to run slower on VMs executing on a given host, and scales up or scales down a cluster based on the detected resource contention.Type: GrantFiled: June 23, 2014Date of Patent: August 8, 2017Assignee: VMware, Inc.Inventors: Anne Holler, Jayanth Gummaraju, Kinshuk Govil, Benjamin J. Corrie, George Hicken
-
Patent number: 9652273Abstract: A virtualized computing system supports the execution of a plurality of virtual machines, where each virtual machine supports the execution of applications therein. Each application executes within a container that isolates the application executing therein from other processes executing on the computing system. A hierarchy of virtual machine templates is created by instantiating a parent virtual machine template, the parent virtual machine template having a guest operating system and a container. An application to be run in a container is determined, and, in response, the parent virtual machine template is forked to create a child virtual machine template, where the child virtual machine template includes a replica of the container, and where the guest operating system of the parent virtual machine template overlaps in memory with a guest operating system of the child virtual machine template. The application is then installed in the replica of the container.Type: GrantFiled: October 2, 2014Date of Patent: May 16, 2017Assignee: VMware, Inc.Inventors: Scott Howard Davis, Aaron Sweemer, Clint Greenwood, Benjamin J. Corrie, George Hicken, Zhenhua Yang
-
Publication number: 20160098285Abstract: A virtualized computing system supports the execution of a plurality of virtual machines, where each virtual machine supports the execution of applications therein. Each application executes within a container that isolates the application executing therein from other processes executing on the computing system. A hierarchy of virtual machine templates is created by instantiating a parent virtual machine template, the parent virtual machine template having a. guest operating system and a container. An application to be run in a container is determined, and, in response, the parent virtual machine template is forked to create a child virtual machine template, where the child virtual machine template includes a replica of the container, and where the guest operating system of the parent virtual machine template overlaps in memory with a guest operating system of the child virtual machine template. The application is then installed in the replica of the container.Type: ApplicationFiled: October 2, 2014Publication date: April 7, 2016Inventors: Scott Howard DAVIS, Aaron SWEEMER, Clint GREENWOOD, Benjamin J. CORRIE, George HICKEN, Zhenhua YANG
-
Publication number: 20150365434Abstract: Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.Type: ApplicationFiled: August 20, 2015Publication date: December 17, 2015Inventors: George Hicken, Adam Pilkington
-
Patent number: 9148444Abstract: A method for phishing attack management through Web site content rotation includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.Type: GrantFiled: February 28, 2012Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: George Hicken, Adam Pilkington
-
Publication number: 20150058843Abstract: A distributed computing application is described that provides a highly elastic and multi-tenant platform for Hadoop applications and other workloads running in a virtualized environment. Multiple instances of a distributed computing framework, such as Hadoop, may be executed concurrently. A centralized manager detects when contention for computing resources, such as memory and CPU, causes tasks to run slower on VMs executing on a given host, and scales up or scales down a cluster based on the detected resource contention.Type: ApplicationFiled: June 23, 2014Publication date: February 26, 2015Inventors: Anne HOLLER, Jayanth GUMMARAJU, Kinshuk GOVIL, Benjamin J. CORRIE, George HICKEN
-
Patent number: 8800033Abstract: A method for phishing attack management through Web site content rotation includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.Type: GrantFiled: May 26, 2011Date of Patent: August 5, 2014Assignee: International Business Machines CorporationInventors: George Hicken, Adam Pilkington
-
Publication number: 20120304291Abstract: Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.Type: ApplicationFiled: February 28, 2012Publication date: November 29, 2012Applicant: International Business Machines CorporationInventors: George HICKEN, Adam PILKINGTON
-
Publication number: 20120304289Abstract: Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.Type: ApplicationFiled: May 26, 2011Publication date: November 29, 2012Applicant: International Business Machines CorporationInventors: George Hicken, Adam Pilkington