Patents by Inventor James J. Voll
James J. Voll has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11950987Abstract: A method of manufacturing incontinence detection pads that have wireless communication capability includes readying an RFID tag applicator to place RFID tags on backsheet material fed between a pair of nip rollers. The backsheet material has a series of electrode traces thereon. The method also includes operating a nip roller motor to feed the backsheet material between the pair of nip rollers and toward the RFID tag applicator, operating the RFID tag applicator to place each RFID tag across regions of a respective electrode trace of the series of electrode traces, and operating RFID tag test equipment to energize each RFID tag a first time and a second time using wireless emissions and receiving return signals from each RFID tag in response to the wireless emissions.Type: GrantFiled: April 23, 2020Date of Patent: April 9, 2024Assignee: Hill-Rom Services, Inc.Inventors: Brett A. Knittle, Ryan S. Severns, James D. Voll, Nicholas Comparone, Edward J. Koors
-
Patent number: 10552606Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.Type: GrantFiled: January 5, 2018Date of Patent: February 4, 2020Assignee: VMware, Inc.Inventors: Jason A. Lango, Dennis Ramdass, James J. Voll
-
Publication number: 20180293378Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.Type: ApplicationFiled: January 5, 2018Publication date: October 11, 2018Inventors: JASON A. LANGO, DENNIS RAMDASS, JAMES J. VOLL
-
Patent number: 9892256Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.Type: GrantFiled: April 10, 2017Date of Patent: February 13, 2018Assignee: Bracket Computing, Inc.Inventors: Jason A. Lango, Dennis Ramdass, James J. Voll
-
Patent number: 9535741Abstract: One or more services for enhancing guest utilization of a virtual machine and other VDC resources may be provided at the intermediary manager. In an embodiment, the intermediary manager intercepts a hypercall from a guest operating system that is separate from the intermediary manager. The intermediary manager determines that a particular intermediary service is associated with the hypercall and causes execution of service instructions associated with the particular intermediary service. The intermediary manager and guest operating systems may operate within a virtual machine hosted by a host machine and managed by a hypervisor. Embodiments may be useful in any of a virtualized enterprise computer system; a virtual machine infrastructure in a private data center; computing, storage or networking resources in a private cloud; computing, storage or networking resources of cloud service provider; and a hybrid cloud computing environment.Type: GrantFiled: January 27, 2016Date of Patent: January 3, 2017Assignee: Bracket Computing, Inc.Inventors: Jason A. Lango, James J. Voll, Andrew G. Tucker
-
Patent number: 9292331Abstract: One or more services for enhancing guest utilization of a virtual machine and other VDC resources may be provided at the intermediary manager. In an embodiment, the intermediary manager intercepts a hypercall from a guest operating system that is separate from the intermediary manager. The intermediary manager determines that a particular intermediary service is associated with the hypercall and causes execution of service instructions associated with the particular intermediary service. The intermediary manager and guest operating systems may operate within a virtual machine hosted by a host machine and managed by a hypervisor. Embodiments may be useful in any of a virtualized enterprise computer system; a virtual machine infrastructure in a private data center; computing, storage or networking resources in a private cloud; computing, storage or networking resources of cloud service provider; and a hybrid cloud computing environment.Type: GrantFiled: March 15, 2013Date of Patent: March 22, 2016Assignee: Bracket Computing, Inc.Inventors: Jason A. Lango, James J. Voll, Andrew G. Tucker
-
Patent number: 9274714Abstract: A system for managing configuration of a storage network having multiple storage resources is disclosed. The system uses a storage management policy to set parameters for detecting storage resource problems in the storage network. The system monitors the storage resources in the storage network based on the storage management policy. Based on the monitoring, the system detects limited storage resource conditions, and identifies one or more potential solutions to the condition. After identifying potential solutions, the system simulates effects on the storage resources of implementing individual solutions. Based on the simulations, the system then implements one or more selected solutions. These solutions may be selected automatically or by a user.Type: GrantFiled: October 27, 2008Date of Patent: March 1, 2016Assignee: NETAPP, INC.Inventors: Shailaja Kamila, James J. Voll, Ameet Deulgaonkar, Anurag Palsule, Ramanathan S. Padinjarel
-
Patent number: 8166257Abstract: Methods and systems for mapping data-management requirements to the provisioning of a data storage system to conform to a set of user-defined data-management policies. A conformance engine with storage system awareness translates the set of data-management policies to a corresponding set of storage-provisioning policies and provisions the resources of the storage system thereby to conform the storage system to the data-management policies. A conformance checker continuously and automatically compares the provisioning of the storage system resources to the provisioning required to meet the data-management policies. When nonconformance is detected, the conformance engine automatically re-provisions the available resources of the storage system to conform the storage system to the data management policies.Type: GrantFiled: January 24, 2008Date of Patent: April 24, 2012Assignee: Network Appliance, Inc.Inventors: James H. Holl, II, James J. Voll
-
Patent number: 7926087Abstract: Described herein is a centralized access request authorization system comprising an authorization module, one or more server systems, and a collection of one or more storage systems connected through a network. An application executing on a server system receives an access request for accessing the storage system collection and sends an authorization request to the authorization module for authorizing the access request. The application may be configured to only send the access request to the storage system collection if it first receives an authorization of the access request from the authorization module. Since the application is configured to do such, the storage system performs the access request without performing any authorization verification on the access request.Type: GrantFiled: November 30, 2007Date of Patent: April 12, 2011Assignee: NetApp, Inc.Inventors: James Hartwell Holl, II, James J Voll, Konstantinos Roussos, Anshu Surana
-
Publication number: 20100106933Abstract: A system for managing configuration of a storage network having multiple storage resources is disclosed. The system uses a storage management policy to set parameters for detecting storage resource problems in the storage network. The system monitors the storage resources in the storage network based on the storage management policy. Based on the monitoring, the system detects limited storage resource conditions, and identifies one or more potential solutions to the condition. After identifying potential solutions, the system simulates effects on the storage resources of implementing individual solutions. Based on the simulations, the system then implements one or more selected solutions. These solutions may be selected automatically or by a user.Type: ApplicationFiled: October 27, 2008Publication date: April 29, 2010Applicant: NetApp, Inc.Inventors: Shailaja Kamila, James J. Voll, Ameet Deulgaonkar, Anurag Palsule, Ramanathan S. Padinjarel
-
Patent number: 7200603Abstract: In a technique for compressing data, a data storage server receives a set of data, which includes a first number of subsets. The storage server defines a number of compression groups for the set of data, each compression group including multiple entries, each entry containing a pointer to a different subset of the set of data. At least part of the set of data is then compressed into a smaller number of subsets. For each of the subsets which does not contain compressed data after the compression, a predetermined value is stored in the corresponding entry of the corresponding compression group, to indicate that corresponding data is compressed and represented elsewhere in the compression group. The predetermined value may also indicate which compression algorithm was used to compress the data.Type: GrantFiled: January 8, 2004Date of Patent: April 3, 2007Assignee: Network Appliance, Inc.Inventors: David Hitz, Mehul S. Shah, Daniel W. Ting, James J. Voll
-
Patent number: 6170018Abstract: Doors are implemented in an existing operating system by using a novel adaptation of existing data structures and procedures which represent and control data files of the operating system. A door is represented by a file descriptor and is managed by existing mechanisms of an operating system, such as the Unix operating system, which are also used to manage files. A door is represented by a door node, which is a novel extension of the conventional vnode structure which in turn is used in conventional operating systems to represent the state of a computer resource, e.g., a data file. A door node is adapted such that most conventional file access and control procedures, e.g., procedures open( ) and close( ), can be used to access and control door with minimal adaptation.Type: GrantFiled: November 27, 1995Date of Patent: January 2, 2001Assignee: Sun MicroSystems, Inc.Inventors: James J. Voll, Graham Hamilton, Panagiotis Kougiouris, Steven R. Kleiman
-
Patent number: 5953522Abstract: A devtmp device driver provides the functionality of temporary files by representing a virtual device and including the virtual device among several devices within which a file system can store files. Rather than storing data in and retrieving data from a physical device, the devtmp device driver stores data in and retrieves data from anonymous storage through a swap file system which manages anonymous storage for a virtual memory system. A file system uses the devtmp device driver in the same manner the file system uses conventional device drivers which store data in and retrieve data from secondary storage devices. Since the devtmp device driver represents a virtual device whose data are stored in anonymous storage managed by the swap file system, the total amount of storage available for storing data of temporary files is shared among the various components of a computer process to successfully satisfy various needs of various computer processes.Type: GrantFiled: July 1, 1996Date of Patent: September 14, 1999Assignee: Sun Microsystems, Inc.Inventors: Kevin C. Fox, Timothy P. Marsland, Michael L. Federwisch, James J. Voll, Madhusudhan Talluri