Patents by Inventor George Hicken

George Hicken has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240069884
    Abstract: A computer-implemented method, computer-readable medium and computer system to execute containerized applications includes initiating a Supervisor Cluster on top of a SDDC to support execution of containerized applications. A supervisor cluster namespace is created on the Supervisor Cluster. A storage policy is attached to the supervisor cluster namespace. Then, a control plane is bootstrapped, and containerized applications are executed in a virtual machine cluster using vSphere pods as the worker nodes in the virtual machine cluster.
    Type: Application
    Filed: August 23, 2022
    Publication date: February 29, 2024
    Inventors: Anubhab Majumdar, Harsh Kumar, George Hicken
  • Patent number: 11611540
    Abstract: This disclosure describes a process for securely instantiating a virtual machine on a server cluster. The virtual machine just after instantiation has access to persistent storage that includes an encrypted region and lacks access to an encryption key configured to provide access to data stored within the encrypted region. The virtual machine receives a communication from a management server associated with the server cluster that includes the encryption key configured to provide access to the data stored within the encrypted region. After the virtual machine receives the encryption key, the server cluster runs services that depend upon the data stored within the encrypted region to operate after receiving the communication from the management server.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: March 21, 2023
    Assignee: VMware, Inc.
    Inventors: Michal A. Jankowski, Benjamin J. Corrie, George Hicken, Christian Lita
  • Publication number: 20220006792
    Abstract: This disclosure describes a process for securely instantiating a virtual machine on a server cluster. The virtual machine just after instantiation has access to persistent storage that includes an encrypted region and lacks access to an encryption key configured to provide access to data stored within the encrypted region. The virtual machine receives a communication from a management server associated with the server cluster that includes the encryption key configured to provide access to the data stored within the encrypted region. After the virtual machine receives the encryption key, the server cluster runs services that depend upon the data stored within the encrypted region to operate after receiving the communication from the management server.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 6, 2022
    Applicant: VMware, Inc.
    Inventors: Michal A. JANKOWSKI, Benjamin J. CORRIE, George HICKEN, Christian LITA
  • Patent number: 10079856
    Abstract: Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: September 18, 2018
    Assignee: International Business Machines Corporation
    Inventors: George Hicken, Adam Pilkington
  • Publication number: 20170371693
    Abstract: One example relates to a computer system that includes a plurality of host computers each executing a hypervisor. The computer system further includes a virtualization manager having an application programming interface (API) configured to manage the hypervisor on each of the plurality of host computers, the virtualization manager configured to create a virtual container host within a resource pool that spans the plurality of host computers. The computer system further includes a plurality of container virtual machines (VMs) in the virtual container host configured to consume resources in the resource pool. The computer system further includes a daemon appliance executing in the virtual container host configured to invoke the API of the virtualization manager to manage the plurality of container VMs in response to commands from one or more clients.
    Type: Application
    Filed: June 23, 2016
    Publication date: December 28, 2017
    Inventors: Benjamin J. CORRIE, George HICKEN, Aaron SWEEMER, Zee YANG
  • Patent number: 9727355
    Abstract: A distributed computing application is described that provides a highly elastic and multi-tenant platform for Hadoop applications and other workloads running in a virtualized environment. Multiple instances of a distributed computing framework, such as Hadoop, may be executed concurrently. A centralized manager detects when contention for computing resources, such as memory and CPU, causes tasks to run slower on VMs executing on a given host, and scales up or scales down a cluster based on the detected resource contention.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: August 8, 2017
    Assignee: VMware, Inc.
    Inventors: Anne Holler, Jayanth Gummaraju, Kinshuk Govil, Benjamin J. Corrie, George Hicken
  • Patent number: 9652273
    Abstract: A virtualized computing system supports the execution of a plurality of virtual machines, where each virtual machine supports the execution of applications therein. Each application executes within a container that isolates the application executing therein from other processes executing on the computing system. A hierarchy of virtual machine templates is created by instantiating a parent virtual machine template, the parent virtual machine template having a guest operating system and a container. An application to be run in a container is determined, and, in response, the parent virtual machine template is forked to create a child virtual machine template, where the child virtual machine template includes a replica of the container, and where the guest operating system of the parent virtual machine template overlaps in memory with a guest operating system of the child virtual machine template. The application is then installed in the replica of the container.
    Type: Grant
    Filed: October 2, 2014
    Date of Patent: May 16, 2017
    Assignee: VMware, Inc.
    Inventors: Scott Howard Davis, Aaron Sweemer, Clint Greenwood, Benjamin J. Corrie, George Hicken, Zhenhua Yang
  • Publication number: 20160098285
    Abstract: A virtualized computing system supports the execution of a plurality of virtual machines, where each virtual machine supports the execution of applications therein. Each application executes within a container that isolates the application executing therein from other processes executing on the computing system. A hierarchy of virtual machine templates is created by instantiating a parent virtual machine template, the parent virtual machine template having a. guest operating system and a container. An application to be run in a container is determined, and, in response, the parent virtual machine template is forked to create a child virtual machine template, where the child virtual machine template includes a replica of the container, and where the guest operating system of the parent virtual machine template overlaps in memory with a guest operating system of the child virtual machine template. The application is then installed in the replica of the container.
    Type: Application
    Filed: October 2, 2014
    Publication date: April 7, 2016
    Inventors: Scott Howard DAVIS, Aaron SWEEMER, Clint GREENWOOD, Benjamin J. CORRIE, George HICKEN, Zhenhua YANG
  • Publication number: 20150365434
    Abstract: Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    Type: Application
    Filed: August 20, 2015
    Publication date: December 17, 2015
    Inventors: George Hicken, Adam Pilkington
  • Patent number: 9148444
    Abstract: A method for phishing attack management through Web site content rotation includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: September 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: George Hicken, Adam Pilkington
  • Publication number: 20150058843
    Abstract: A distributed computing application is described that provides a highly elastic and multi-tenant platform for Hadoop applications and other workloads running in a virtualized environment. Multiple instances of a distributed computing framework, such as Hadoop, may be executed concurrently. A centralized manager detects when contention for computing resources, such as memory and CPU, causes tasks to run slower on VMs executing on a given host, and scales up or scales down a cluster based on the detected resource contention.
    Type: Application
    Filed: June 23, 2014
    Publication date: February 26, 2015
    Inventors: Anne HOLLER, Jayanth GUMMARAJU, Kinshuk GOVIL, Benjamin J. CORRIE, George HICKEN
  • Patent number: 8800033
    Abstract: A method for phishing attack management through Web site content rotation includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    Type: Grant
    Filed: May 26, 2011
    Date of Patent: August 5, 2014
    Assignee: International Business Machines Corporation
    Inventors: George Hicken, Adam Pilkington
  • Publication number: 20120304291
    Abstract: Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    Type: Application
    Filed: February 28, 2012
    Publication date: November 29, 2012
    Applicant: International Business Machines Corporation
    Inventors: George HICKEN, Adam PILKINGTON
  • Publication number: 20120304289
    Abstract: Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    Type: Application
    Filed: May 26, 2011
    Publication date: November 29, 2012
    Applicant: International Business Machines Corporation
    Inventors: George Hicken, Adam Pilkington