Patents by Inventor Josha Stella

Josha Stella has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190272157
    Abstract: A system and method for generating a visualization of cloud based computing system based on a domain-specific language file is provided. In one or more examples, the domain-specific language file is compiled so as to generate a data file. The data file is parsed to generate an intermediate file that converts the computing resources found in the data file into symbolic representations. The intermediate file is then processed so as to produce a position for each symbol within the symbolic representation. Finally, the symbolic representation is rendered using a markup language such as HTML.
    Type: Application
    Filed: March 1, 2019
    Publication date: September 5, 2019
    Applicant: FUGUE, INC.
    Inventor: Josha STELLA
  • Patent number: 10341194
    Abstract: A method for building, optimizing, and maintaining a computing infrastructure on a cloud computing environment is provided. A user provides a high-level declaration to a cloud environment operating system, specifying the details of the infrastructure that is intended to be built on the cloud. A cloud environment operating system converts the high level declaration to a lower level declaration and then to a series of instructions that can be executed by the cloud to build the desired infrastructure. The cloud environment operating system can also continuously monitor the infrastructure once it is built on the cloud. If the cloud environment operating system notices any discrepancies between the user's original specification and the infrastructure as built on the cloud, the operating system can work to modify the existing infrastructure on the cloud to conform to the infrastructure specified by a user.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: July 2, 2019
    Assignee: FUGUE, INC.
    Inventors: Josha Stella, Dominic Zippilli, Emily Dresner-Thornber, Denison Wright, Wayne Crissman, Matthew Brinkman, Nathan McCourtney, Alexander E. Schoof, Daniel Kerrigan, Jared Tobin, Jasper Van Der Jeugt, Maciej Wos, Christopher Kaminski, Tyler Drombosky
  • Patent number: 10310828
    Abstract: A system and method for providing and executing a domain-specific programming language for cloud services infrastructure is provided. The system may be used to integrate references to external entities, such as cloud service compute instances, directly into a domain-specific programming language, allowing developers to easily integrate cloud services directly using the domain-specific programming language. Using a domain-specific programming language, references to external entities (not in memory) as variables may be used. Using the domain-specific programming language described herein, lexical scoping may be mapped onto collections of entities that aren't a native part of the language. In order to facilitate these and other benefits, the system may maintain state information of all references and shared variables across program boundaries. The system may make the state information accessible via a state information service that understands the language features of the domain-specific programming language.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: June 4, 2019
    Assignee: Fugue, Inc.
    Inventors: Josha Stella, Dominic Zippilli, Alex Schoof, Jared Tobin, Jasper Van Der Jeugt, Maciej Wos, Christopher Kaminski, Tyler Drombosky, Timothy Wilson, Jonathan Sabo
  • Publication number: 20190087165
    Abstract: A system and method for providing and executing a domain-specific programming language for cloud services infrastructure is provided. The system may be used to integrate references to external entities, such as cloud service compute instances, directly into a domain-specific programming language, allowing developers to easily integrate cloud services directly using the domain-specific programming language. The domain-specific programming language may also allow users to declare strategies for a given computing system rather than specific instances of computing infrastructure. The strategies can be resolved by an artificial intelligence engine to determine an optimal computing instance solution to the user declared strategy. The determined solution from the artificial intelligence engine can be used to generate a computing system on a cloud service provider account.
    Type: Application
    Filed: September 20, 2018
    Publication date: March 21, 2019
    Applicant: FUGUE, INC.
    Inventor: Josha STELLA
  • Publication number: 20190052542
    Abstract: A system and method for generating a visualization of cloud-based computing system based on a domain-specific language file is provided. In one or more examples, the domain-specific language file is compiled so as to generate a data file. The data file is parsed to generate an intermediate file that converts the computing resources found in the data file into symbolic representations. The intermediate file is then processed so as to produce a position for each symbol within the symbolic representation. Finally, the symbolic representation is rendered using a markup language such as HTML.
    Type: Application
    Filed: August 10, 2018
    Publication date: February 14, 2019
    Applicant: FUGUE, INC.
    Inventors: Leslie PASSANTE, Josha STELLA, Henry HARDING, Andrew METCALF, Evan SAMEK
  • Publication number: 20180034847
    Abstract: Techniques for replacing instances of software defined networks (SDN's) in software defined network systems (SDN systems) are provided. In a SDN system having a first instance of a SDN, a second instance of the SDN is instantiated, and instructions are sent to other components of the SDN system to route traffic to the new SDN instance, and the old SDN instance is retired from service. Instructions for routing traffic to the new SDN instance and for retiring the old SDN instance may be transmitted by a distributed key/value store system leveraging asynchronous communication. A retired SDN instance may be destroyed or repurposed for deceptive or forensic purposes. SDN infrastructure and topology may be cycled according to a schedule, may be algorithmically cycled, and may be proactively cycled without any indication that an SDN instance is compromised. Similar techniques for replacing instances of individual network components in SDN's are also provided.
    Type: Application
    Filed: July 27, 2017
    Publication date: February 1, 2018
    Applicant: FUGUE, INC.
    Inventor: Josha STELLA
  • Patent number: 9847878
    Abstract: Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: December 19, 2017
    Assignee: FUGUE, INC.
    Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman
  • Publication number: 20170099191
    Abstract: A method for building, optimizing, and maintaining a computing infrastructure on a cloud computing environment is provided. A user provides a high-level declaration to a cloud environment operating system, specifying the details of the infrastructure that is intended to be built on the cloud. A cloud environment operating system converts the high level declaration to a lower level declaration and then to a series of instructions that can be executed by the cloud to build the desired infrastructure. The cloud environment operating system can also continuously monitor the infrastructure once it is built on the cloud. If the cloud environment operating system notices any discrepancies between the user's original specification and the infrastructure as built on the cloud, the operating system can work to modify the existing infrastructure on the cloud to conform to the infrastructure specified by a user.
    Type: Application
    Filed: July 20, 2016
    Publication date: April 6, 2017
    Applicant: FUGUE, INC.
    Inventors: Josha STELLA, Dominic ZIPPILLI, Emily DRESNER-THORNBER, Denison WRIGHT, Wayne CRISSMAN, Matthew BRINKMAN, Nathan MCCOURTNEY, Alexander E. SCHOOF, Daniel KERRIGAN, Jared TOBIN, Jasper VAN DER JEUGT, Maciej WOS, Christopher KAMINSKI, Tyler DROMBOSKY
  • Patent number: 9508095
    Abstract: A system and method is provided for generating and using purchase strategies based on the price, performance, and/or other information related to cloud services to optimize the selection of such services. The purchase strategies may comprehensively describe various cloud services in real-time so that customers may purchase cloud services using up-to-date, real-time information. The purchase strategies may, for example, describe pricing, performance, availability, and/or other attributes of various cloud services. A purchase agent may use the purchase strategies, one or more purchase rules, and/or other information to generate a purchase specification that specifies one or more cloud service instances that should be purchased. The purchase agent may leverage unique properties of spot instances to make favorable purchase decisions. For example, the system may determine bid prices that should be made to obtain certain spot instances.
    Type: Grant
    Filed: June 11, 2014
    Date of Patent: November 29, 2016
    Assignee: FUGUE, INC.
    Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman, Andrew Wright, Tyler Drombosky
  • Patent number: 9461823
    Abstract: Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.
    Type: Grant
    Filed: April 6, 2015
    Date of Patent: October 4, 2016
    Assignee: FUGUE, INC.
    Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman
  • Patent number: 9385866
    Abstract: Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.
    Type: Grant
    Filed: April 6, 2015
    Date of Patent: July 5, 2016
    Assignee: FUGUE, INC.
    Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman
  • Publication number: 20160139895
    Abstract: A system and method for providing and executing a domain-specific programming language for cloud services infrastructure is provided. The system may be used to integrate references to external entities, such as cloud service compute instances, directly into a domain-specific programming language, allowing developers to easily integrate cloud services directly using the domain-specific programming language. Using a domain-specific programming language, references to external entities (not in memory) as variables may be used. Using the domain-specific programming language described herein, lexical scoping may be mapped onto collections of entities that aren't a native part of the language. In order to facilitate these and other benefits, the system may maintain state information of all references and shared variables across program boundaries. The system may make the state information accessible via a state information service that understands the language features of the domain-specific programming language.
    Type: Application
    Filed: November 13, 2015
    Publication date: May 19, 2016
    Applicant: LUMINAL, INC.
    Inventors: Josha STELLA, Dominic ZIPPILLI, Alex SCHOOF, Jared TOBIN, Jasper VAN DER JEUGT, Maciej WOS, Christopher KAMINSKY, Tyler DROMBOSKY, Timothy WILSON, Jonathan SABO
  • Publication number: 20150363851
    Abstract: A system and method is provided for generating and using purchase strategies based on the price, performance, and/or other information related to cloud services to optimize the selection of such services. The purchase strategies may comprehensively describe various cloud services in real-time so that customers may purchase cloud services using up-to-date, real-time information. The purchase strategies may, for example, describe pricing, performance, availability, and/or other attributes of various cloud services. A purchase agent may use the purchase strategies, one or more purchase rules, and/or other information to generate a purchase specification that specifies one or more cloud service instances that should be purchased. The purchase agent may leverage unique properties of spot instances to make favorable purchase decisions. For example, the system may determine bid prices that should be made to obtain certain spot instances.
    Type: Application
    Filed: June 11, 2014
    Publication date: December 17, 2015
    Applicant: Luminal, Inc.
    Inventors: Josha STELLA, Dominic Zippilli, Matthew Brinkman, Andrew Wright, Tyler Drombosky
  • Publication number: 20150229474
    Abstract: Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.
    Type: Application
    Filed: April 20, 2015
    Publication date: August 13, 2015
    Applicant: LUMINAL, INC.
    Inventors: JOSHA STELLA, DOMINIC ZIPPILLI, MATTHEW BRINKMAN
  • Publication number: 20150213270
    Abstract: Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.
    Type: Application
    Filed: April 6, 2015
    Publication date: July 30, 2015
    Inventors: Josha STELLA, Dominic ZIPPILLI, Matthew BRINKMAN
  • Publication number: 20150213271
    Abstract: Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.
    Type: Application
    Filed: April 6, 2015
    Publication date: July 30, 2015
    Inventors: Josha STELLA, Dominic ZIPPILLI, Matthew BRINKMAN
  • Patent number: 9014373
    Abstract: Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: April 21, 2015
    Assignee: Luminal, Inc.
    Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman
  • Patent number: 9003525
    Abstract: Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: April 7, 2015
    Assignee: Luminal, Inc.
    Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman
  • Publication number: 20140380043
    Abstract: Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.
    Type: Application
    Filed: June 16, 2014
    Publication date: December 25, 2014
    Applicant: LUMINAL, INC.
    Inventors: JOSHA STELLA, DOMINIC ZIPPILLI, MATTHEW BRINKMAN
  • Publication number: 20140380487
    Abstract: Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.
    Type: Application
    Filed: August 25, 2014
    Publication date: December 25, 2014
    Applicant: LUMINAL, INC.
    Inventors: JOSHA STELLA, Dominic Zippilli, Matthew Brinkman