Patents by Inventor James J. Voll

James J. Voll has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11950987
    Abstract: A method of manufacturing incontinence detection pads that have wireless communication capability includes readying an RFID tag applicator to place RFID tags on backsheet material fed between a pair of nip rollers. The backsheet material has a series of electrode traces thereon. The method also includes operating a nip roller motor to feed the backsheet material between the pair of nip rollers and toward the RFID tag applicator, operating the RFID tag applicator to place each RFID tag across regions of a respective electrode trace of the series of electrode traces, and operating RFID tag test equipment to energize each RFID tag a first time and a second time using wireless emissions and receiving return signals from each RFID tag in response to the wireless emissions.
    Type: Grant
    Filed: April 23, 2020
    Date of Patent: April 9, 2024
    Assignee: Hill-Rom Services, Inc.
    Inventors: Brett A. Knittle, Ryan S. Severns, James D. Voll, Nicholas Comparone, Edward J. Koors
  • Patent number: 10552606
    Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: February 4, 2020
    Assignee: VMware, Inc.
    Inventors: Jason A. Lango, Dennis Ramdass, James J. Voll
  • Publication number: 20180293378
    Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.
    Type: Application
    Filed: January 5, 2018
    Publication date: October 11, 2018
    Inventors: JASON A. LANGO, DENNIS RAMDASS, JAMES J. VOLL
  • Patent number: 9892256
    Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: February 13, 2018
    Assignee: Bracket Computing, Inc.
    Inventors: Jason A. Lango, Dennis Ramdass, James J. Voll
  • Patent number: 9535741
    Abstract: One or more services for enhancing guest utilization of a virtual machine and other VDC resources may be provided at the intermediary manager. In an embodiment, the intermediary manager intercepts a hypercall from a guest operating system that is separate from the intermediary manager. The intermediary manager determines that a particular intermediary service is associated with the hypercall and causes execution of service instructions associated with the particular intermediary service. The intermediary manager and guest operating systems may operate within a virtual machine hosted by a host machine and managed by a hypervisor. Embodiments may be useful in any of a virtualized enterprise computer system; a virtual machine infrastructure in a private data center; computing, storage or networking resources in a private cloud; computing, storage or networking resources of cloud service provider; and a hybrid cloud computing environment.
    Type: Grant
    Filed: January 27, 2016
    Date of Patent: January 3, 2017
    Assignee: Bracket Computing, Inc.
    Inventors: Jason A. Lango, James J. Voll, Andrew G. Tucker
  • Patent number: 9292331
    Abstract: One or more services for enhancing guest utilization of a virtual machine and other VDC resources may be provided at the intermediary manager. In an embodiment, the intermediary manager intercepts a hypercall from a guest operating system that is separate from the intermediary manager. The intermediary manager determines that a particular intermediary service is associated with the hypercall and causes execution of service instructions associated with the particular intermediary service. The intermediary manager and guest operating systems may operate within a virtual machine hosted by a host machine and managed by a hypervisor. Embodiments may be useful in any of a virtualized enterprise computer system; a virtual machine infrastructure in a private data center; computing, storage or networking resources in a private cloud; computing, storage or networking resources of cloud service provider; and a hybrid cloud computing environment.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 22, 2016
    Assignee: Bracket Computing, Inc.
    Inventors: Jason A. Lango, James J. Voll, Andrew G. Tucker
  • Patent number: 9274714
    Abstract: A system for managing configuration of a storage network having multiple storage resources is disclosed. The system uses a storage management policy to set parameters for detecting storage resource problems in the storage network. The system monitors the storage resources in the storage network based on the storage management policy. Based on the monitoring, the system detects limited storage resource conditions, and identifies one or more potential solutions to the condition. After identifying potential solutions, the system simulates effects on the storage resources of implementing individual solutions. Based on the simulations, the system then implements one or more selected solutions. These solutions may be selected automatically or by a user.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: March 1, 2016
    Assignee: NETAPP, INC.
    Inventors: Shailaja Kamila, James J. Voll, Ameet Deulgaonkar, Anurag Palsule, Ramanathan S. Padinjarel
  • Patent number: 8166257
    Abstract: Methods and systems for mapping data-management requirements to the provisioning of a data storage system to conform to a set of user-defined data-management policies. A conformance engine with storage system awareness translates the set of data-management policies to a corresponding set of storage-provisioning policies and provisions the resources of the storage system thereby to conform the storage system to the data-management policies. A conformance checker continuously and automatically compares the provisioning of the storage system resources to the provisioning required to meet the data-management policies. When nonconformance is detected, the conformance engine automatically re-provisions the available resources of the storage system to conform the storage system to the data management policies.
    Type: Grant
    Filed: January 24, 2008
    Date of Patent: April 24, 2012
    Assignee: Network Appliance, Inc.
    Inventors: James H. Holl, II, James J. Voll
  • Patent number: 7926087
    Abstract: Described herein is a centralized access request authorization system comprising an authorization module, one or more server systems, and a collection of one or more storage systems connected through a network. An application executing on a server system receives an access request for accessing the storage system collection and sends an authorization request to the authorization module for authorizing the access request. The application may be configured to only send the access request to the storage system collection if it first receives an authorization of the access request from the authorization module. Since the application is configured to do such, the storage system performs the access request without performing any authorization verification on the access request.
    Type: Grant
    Filed: November 30, 2007
    Date of Patent: April 12, 2011
    Assignee: NetApp, Inc.
    Inventors: James Hartwell Holl, II, James J Voll, Konstantinos Roussos, Anshu Surana
  • Publication number: 20100106933
    Abstract: A system for managing configuration of a storage network having multiple storage resources is disclosed. The system uses a storage management policy to set parameters for detecting storage resource problems in the storage network. The system monitors the storage resources in the storage network based on the storage management policy. Based on the monitoring, the system detects limited storage resource conditions, and identifies one or more potential solutions to the condition. After identifying potential solutions, the system simulates effects on the storage resources of implementing individual solutions. Based on the simulations, the system then implements one or more selected solutions. These solutions may be selected automatically or by a user.
    Type: Application
    Filed: October 27, 2008
    Publication date: April 29, 2010
    Applicant: NetApp, Inc.
    Inventors: Shailaja Kamila, James J. Voll, Ameet Deulgaonkar, Anurag Palsule, Ramanathan S. Padinjarel
  • Patent number: 7200603
    Abstract: In a technique for compressing data, a data storage server receives a set of data, which includes a first number of subsets. The storage server defines a number of compression groups for the set of data, each compression group including multiple entries, each entry containing a pointer to a different subset of the set of data. At least part of the set of data is then compressed into a smaller number of subsets. For each of the subsets which does not contain compressed data after the compression, a predetermined value is stored in the corresponding entry of the corresponding compression group, to indicate that corresponding data is compressed and represented elsewhere in the compression group. The predetermined value may also indicate which compression algorithm was used to compress the data.
    Type: Grant
    Filed: January 8, 2004
    Date of Patent: April 3, 2007
    Assignee: Network Appliance, Inc.
    Inventors: David Hitz, Mehul S. Shah, Daniel W. Ting, James J. Voll
  • Patent number: 6170018
    Abstract: Doors are implemented in an existing operating system by using a novel adaptation of existing data structures and procedures which represent and control data files of the operating system. A door is represented by a file descriptor and is managed by existing mechanisms of an operating system, such as the Unix operating system, which are also used to manage files. A door is represented by a door node, which is a novel extension of the conventional vnode structure which in turn is used in conventional operating systems to represent the state of a computer resource, e.g., a data file. A door node is adapted such that most conventional file access and control procedures, e.g., procedures open( ) and close( ), can be used to access and control door with minimal adaptation.
    Type: Grant
    Filed: November 27, 1995
    Date of Patent: January 2, 2001
    Assignee: Sun MicroSystems, Inc.
    Inventors: James J. Voll, Graham Hamilton, Panagiotis Kougiouris, Steven R. Kleiman
  • Patent number: 5953522
    Abstract: A devtmp device driver provides the functionality of temporary files by representing a virtual device and including the virtual device among several devices within which a file system can store files. Rather than storing data in and retrieving data from a physical device, the devtmp device driver stores data in and retrieves data from anonymous storage through a swap file system which manages anonymous storage for a virtual memory system. A file system uses the devtmp device driver in the same manner the file system uses conventional device drivers which store data in and retrieve data from secondary storage devices. Since the devtmp device driver represents a virtual device whose data are stored in anonymous storage managed by the swap file system, the total amount of storage available for storing data of temporary files is shared among the various components of a computer process to successfully satisfy various needs of various computer processes.
    Type: Grant
    Filed: July 1, 1996
    Date of Patent: September 14, 1999
    Assignee: Sun Microsystems, Inc.
    Inventors: Kevin C. Fox, Timothy P. Marsland, Michael L. Federwisch, James J. Voll, Madhusudhan Talluri