Patents by Inventor Ray Brown

Ray Brown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9454532
    Abstract: The present invention relates to a method and an apparatus for data migration of a first file system in a data storage system comprising a plurality of client computers 100, a first file system managing unit 310 for managing the first file system and being connected to the plurality of client computers 100, and a second file system managing unit 410 for managing a second file system and being connected to the first file system managing unit 310, the second file system comprising a plurality of data files and the first file system comprising a plurality of external link objects, each external link object of the first file system being associated with a respective data file of the second file system for enabling client access to the respective data file of the second file system.
    Type: Grant
    Filed: July 2, 2013
    Date of Patent: September 27, 2016
    Assignee: HITACHI DATA SYSTEMS ENGINEERING UK LIMITED
    Inventors: Richard Powell, James Gibbs, Daniel Picken, Timothy Warner, Zahra Tabaaloute, Chris Aston, Jon Smith, Ray Brown, Joseph Smith, Michael Benson
  • Patent number: 9454406
    Abstract: Techniques for automated and controlled cloud migration or bursting are provided. A schema for a first cloud in a first cloud processing environment is used to evaluate metrics against thresholds defined in the schema. When a threshold is reached other metrics for other clouds in second cloud processing environments are evaluated and a second cloud processing environment is selected. Next, a second cloud is cloned in the selected second cloud processing environment for the first cloud and traffic associated with the first cloud is automatically migrated to the cloned second cloud.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: September 27, 2016
    Assignee: Novell, Inc.
    Inventors: Jason Allen Sabin, Stephen R Carter, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen, Jeremy Ray Brown
  • Publication number: 20160239320
    Abstract: File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform.
    Type: Application
    Filed: April 27, 2016
    Publication date: August 18, 2016
    Inventors: Nathaniel Brent Kranendonk, Jason Allen Sabin, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen
  • Publication number: 20160173611
    Abstract: Techniques for preventing information disclosure via dynamic secure cloud resources are provided. Data (information) remotely housed on a particular cloud resource of a particular cloud is periodically, randomly, and dynamically changed to a different cloud resource within the same cloud or to a different cloud resource within an entirely different cloud. A requesting principal for the data is dynamically authenticated and a current location for the data is dynamically resolved and the principal is securely and dynamically connected to the current cloud resource and current cloud hosting the data for access.
    Type: Application
    Filed: January 25, 2016
    Publication date: June 16, 2016
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Patent number: 9348631
    Abstract: File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform.
    Type: Grant
    Filed: August 14, 2014
    Date of Patent: May 24, 2016
    Assignee: Novell, Inc.
    Inventors: Nathaniel Brent Kranendonk, Jason Allen Sabin, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen
  • Patent number: 9246985
    Abstract: Techniques for preventing information disclosure via dynamic secure cloud resources are provided. Data (information) remotely housed on a particular cloud resource of a particular cloud is periodically, randomly, and dynamically changed to a different cloud resource within the same cloud or to a different cloud resource within an entirely different cloud. A requesting principal for the data is dynamically authenticated and a current location for the data is dynamically resolved and the principal is securely and dynamically connected to the current cloud resource and current cloud hosting the data for access.
    Type: Grant
    Filed: June 28, 2011
    Date of Patent: January 26, 2016
    Assignee: Novell, Inc.
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Publication number: 20150213032
    Abstract: The present invention relates to a method and an apparatus for data migration of a first file system in a data storage system comprising a plurality of client computers 100, a first file system managing unit 310 for managing the first file system and being connected to the plurality of client computers 100, and a second file system managing unit 410 for managing a second file system and being connected to the first file system managing unit 310, the second file system comprising a plurality of data files and the first file system comprising a plurality of external link objects, each external link object of the first file system being associated with a respective data file of the second file system for enabling client access to the respective data file of the second file system.
    Type: Application
    Filed: July 2, 2013
    Publication date: July 30, 2015
    Inventors: Richard Powell, James Gibbs, Daniel Picken, Timothy Warner, Zahra Tabaaloute, Chris Aston, Jon Smith, Ray Brown, Joseph Smith, Michael Benson
  • Patent number: 9088480
    Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: July 21, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
  • Publication number: 20150156198
    Abstract: Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
    Type: Application
    Filed: December 18, 2014
    Publication date: June 4, 2015
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Publication number: 20150143458
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Application
    Filed: January 30, 2015
    Publication date: May 21, 2015
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter
  • Publication number: 20150120921
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Application
    Filed: January 8, 2015
    Publication date: April 30, 2015
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Publication number: 20150078237
    Abstract: A method of coordinating tasks of a mobile computing device may include initializing a timer associated with one or more tasks and a state condition. The state condition may depend on a device state of the mobile computing device and/or a component state of a mobile computing device component. An expiration of the timer is detected. Upon detecting the expiration, a determination is made whether the state condition is satisfied based on whether the mobile computing device is in the device state and/or the mobile computing device component is in the component state. Based at least in part on the determination that the state condition is satisfied, performance of the one or more tasks associated with the timer can be initiated.
    Type: Application
    Filed: November 19, 2014
    Publication date: March 19, 2015
    Applicant: MICROSOFT CORPORATION
    Inventors: Sudeesh R. Pingili, Bharath Siravara, Martin Regen, Ray Brown, Justin Mann, Stephane Karoubi, Li Xu
  • Patent number: 8977775
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: March 10, 2015
    Assignee: Novell. Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter
  • Patent number: 8949832
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Grant
    Filed: August 29, 2011
    Date of Patent: February 3, 2015
    Assignee: Novell, Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Patent number: 8943320
    Abstract: Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
    Type: Grant
    Filed: October 31, 2011
    Date of Patent: January 27, 2015
    Assignee: Novell, Inc.
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Publication number: 20150012567
    Abstract: The present invention relates to a method and an apparatus for data migration of a first file system in a data storage system comprising a plurality of client computers 100, a first file system managing unit 310 for managing the first file system and being connected to the plurality of client computers 100, and a second file system managing unit 410 for managing a second file system and being connected to the first file system managing unit 310, the second file system comprising a plurality of data files and the first file system comprising a plurality of external link objects, each external link object of the first file system being associated with a respective data file of the second file system for enabling client access to the respective data file of the second file system.
    Type: Application
    Filed: July 31, 2014
    Publication date: January 8, 2015
    Inventors: Richard POWELL, James GIBBS, Daniel PICKEN, Timothy WARNER, Zahra TABAALOUTE, Chris ASTON, Jon SMITH, Ray BROWN, Joseph SMITH, Michael BENSON
  • Publication number: 20140380411
    Abstract: Techniques for spawning workloads are provided. A single repository is read once to obtain an image for a workload or files and resources for the image. The read operation spawns multiple, and in some cases, concurrent write operations, to instantiate the workload over a network as multiple occurrences or instances of the workload in multiple processing environments.
    Type: Application
    Filed: September 8, 2014
    Publication date: December 25, 2014
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Lloyd Leon Burch, Michael John Jorgensen
  • Publication number: 20140359623
    Abstract: File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform.
    Type: Application
    Filed: August 14, 2014
    Publication date: December 4, 2014
    Inventors: Nathaniel Brent Kranendonk, Jason Allen Sabin, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen
  • Publication number: 20140359016
    Abstract: Techniques for network process identity enablement are provided. Inter-server communications within a network are intercepted so that unique identity-based information is gathered and recorded before a sending process is permitted to release a communication over the network to a receiving process. Moreover, the receiving process cannot process the communication being sent until identifying information is gathered again and independently validated against the prior recorded information.
    Type: Application
    Filed: August 14, 2014
    Publication date: December 4, 2014
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Daniel Robert Timpson
  • Patent number: 8898487
    Abstract: Mobile computing device power consumption can be reduced by using expiration window timers, state-based timers and/or the coordination of keep-alive timers. Upon detecting a trigger event causing a mobile computing device to transition from a low-power state to an active state, the device can determine whether the trigger event occurs within the expiration window of a timer, and execute tasks associated with the trigger event and the timer. Tasks associated with state-based timers can be executed if the mobile computing device or a component thereof is in (or, alternatively, not in) a specified state. A mobile computing device can execute tasks associated with multiple keep-alive timers used for maintaining communication links between the device and cloud-based service providers in a single active state.
    Type: Grant
    Filed: December 27, 2010
    Date of Patent: November 25, 2014
    Assignee: Microsoft Corporation
    Inventors: Sudeesh R. Pingili, Bharath Siravara, Martin Regen, Ray Brown, Justin Mann, Stephane Karoubi, Li Xu