Patents by Inventor Adam C. Swift
Adam C. Swift has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230259548Abstract: Described herein are techniques to enable limited access to a photos library by enabling application specific virtual photo libraries. When an application requests access to the photos library, the user can select an option to enable or configure a virtual photos library, and then select specific assets (e.g., photos, videos) within the photos library to be selected for inclusion into an application specific virtual photos library.Type: ApplicationFiled: April 3, 2023Publication date: August 17, 2023Inventors: Matthew J. DICKOFF, Jessica ARANDA, Patrick COFFMAN, Richard L. HAGY, Stephen J. RHEE, Nicole R. RYAN, Adam C. SWIFT, Gavin B. THOMSON, Brandon J. VAN RYSWYK
-
Patent number: 11620329Abstract: Described herein are techniques to enable limited access to a photos library by enabling application specific virtual photo libraries. When an application requests access to the photos library, the user can select an option to enable or configure a virtual photos library, and then select specific assets (e.g., photos, videos) within the photos library to be selected for inclusion into an application specific virtual photos library.Type: GrantFiled: February 23, 2021Date of Patent: April 4, 2023Assignee: Apple Inc.Inventors: Matthew J. Dickoff, Jessica Aranda, Patrick Coffman, Richard L. Hagy, Stephen J. Rhee, Nicole R. Ryan, Adam C. Swift, Gavin B. Thomson, Brandon J. Van Ryswyk
-
Publication number: 20210397647Abstract: Described herein are techniques to enable limited access to a photos library by enabling application specific virtual photo libraries. When an application requests access to the photos library, the user can select an option to enable or configure a virtual photos library, and then select specific assets (e.g., photos, videos) within the photos library to be selected for inclusion into an application specific virtual photos library.Type: ApplicationFiled: February 23, 2021Publication date: December 23, 2021Inventors: Matthew J. Dickoff, Jessica Aranda, Patrick Coffman, Richard L. Hagy, Stephen J. Rhee, Nicole R. Ryan, Adam C. Swift, Gavin B. Thomson, Brandon J. Van Ryswyk
-
Patent number: 9400677Abstract: An operating system of a data processing system receives a request from a first process to acquire an exclusive lock for accessing a resource of the data processing system. A second priority of a second process is increased to reduce total execution time. The second process is currently in possession of the exclusive lock for performing a transactional operation with the resource. The second priority was lower than a first priority of the first process. The operating system notifies the second process to indicate that another process is waiting for the exclusive lock to allow the second process to complete or roll back the transactional operation and to release the exclusive lock thereafter.Type: GrantFiled: May 14, 2013Date of Patent: July 26, 2016Assignee: Apple Inc.Inventors: Benjamin C. Trumbull, Adam C. Swift, Russell A. Blaine, Benjamin H. Nham, Kari E. Christianson
-
Patent number: 9244914Abstract: Methods and apparatus are provided in which applications that run on different devices can be upgraded with migration of data to a new database format. A method of upgrading a first version of an application installed on a first device to a second version is provided, where first and second transaction logs for respective first and second schema versions are stored in respective first and second log containers on a server computer, and the first version of the application stores data in accordance with a first schema version, and further stores a cache of at least a portion of the first transaction log in a log database on the first device, migrating the log database to the second schema version, storing a duplicate copy of the first transaction log in the second log container, and rewriting the duplicate copy of the first transaction logs using the second schema.Type: GrantFiled: September 28, 2012Date of Patent: January 26, 2016Assignee: Apple Inc.Inventors: Benjamin C. Trumbull, Nicholas W. Gillett, Adam C. Swift
-
Patent number: 8930324Abstract: Guarded file access operations are provided for creating and using guarded file descriptors, which can detect and prevent erroneous file access operations in computer programs. A file descriptor can be associated with a guard identifier to create a guarded file descriptor. The association can be established when the file is opened, and can be maintained independently of the computer program, which ordinarily maintains its own association between files, file descriptors, and guard identifiers. Subsequent file operations using the guarded file descriptor check that the guard identifier previously associated with that file descriptor is presented, and generate errors without performing the requested file operations if the correct guard identifier is not presented. This check serves as a validation of the computer program's use of file descriptors. An error and stack trace can be generated for use in analyzing a cause of the guard violation.Type: GrantFiled: September 15, 2012Date of Patent: January 6, 2015Inventors: Russell A. Blaine, Timothy P. Marsland, Benjamin H. Nham, Adam C. Swift, Benjamin C. Trumbull, Umesh S. Vaishampayan
-
Publication number: 20140189693Abstract: An operating system of a data processing system receives a request from a first process to acquire an exclusive lock for accessing a resource of the data processing system. A second priority of a second process is increased to reduce total execution time. The second process is currently in possession of the exclusive lock for performing a transactional operation with the resource. The second priority was lower than a first priority of the first process. The operating system notifies the second process to indicate that another process is waiting for the exclusive lock to allow the second process to complete or roll back the transactional operation and to release the exclusive lock thereafter.Type: ApplicationFiled: May 14, 2013Publication date: July 3, 2014Applicant: Apple Inc.Inventors: Benjamin C. Trumbull, Adam C. Swift, Russell A. Blaine, Benjamin H. Nham, Kari E. Christianson
-
Publication number: 20140095432Abstract: Methods and apparatus are provided in which applications that run on different devices can be upgraded with migration of data to a new database format. A method of upgrading a first version of an application installed on a first device to a second version is provided, where first and second transaction logs for respective first and second schema versions are stored in respective first and second log containers on a server computer, and the first version of the application stores data in accordance with a first schema version, and further stores a cache of at least a portion of the first transaction log in a log database on the first device, migrating the log database to the second schema version, storing a duplicate copy of the first transaction log in the second log container, and rewriting the duplicate copy of the first transaction logs using the second schema.Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Applicant: APPLE INC.Inventors: Benjamin C. TRUMBULL, Nicholas W. GILLETT, Adam C. SWIFT
-
Publication number: 20130339313Abstract: Guarded file access operations are provided for creating and using guarded file descriptors, which can detect and prevent erroneous file access operations in computer programs. A file descriptor can be associated with a guard identifier to create a guarded file descriptor. The association can be established when the file is opened, and can be maintained independently of the computer program, which ordinarily maintains its own association between files, file descriptors, and guard identifiers. Subsequent file operations using the guarded file descriptor check that the guard identifier previously associated with that file descriptor is presented, and generate errors without performing the requested file operations if the correct guard identifier is not presented. This check serves as a validation of the computer program's use of file descriptors. An error and stack trace can be generated for use in analyzing a cause of the guard violation.Type: ApplicationFiled: September 15, 2012Publication date: December 19, 2013Applicant: Apple Inc.Inventors: Russell A. BLAINE, Timothy P. Marsland, Benjamin H. Nham, Adam C. Swift, Benjamin C. Trumbull, Umesh S. Vaishampayan
-
Patent number: 8286127Abstract: Mounting and populating a mirrored version of at least a portion of a file system of a recruiter machine at a volunteer machine performing one or more data processing tasks for the recruiter machine is disclosed. In some embodiments, an input stored in such a dedicated file system for the recruiter machine at the volunteer machine may be locally retrieved and reused, if still consistent with a corresponding input stored in a file system at the recruiter machine, when performing a data processing task for the recruiter machine at the volunteer machine. In some embodiments, if an input required by the volunteer machine to perform a data processing task for the recruiter machine is not cached in such a dedicated file system for the recruiter machine at the volunteer machine in a state that is consistent with a corresponding input stored in a file system at the recruiter machine, the input is obtained from the recruiter machine.Type: GrantFiled: July 22, 2010Date of Patent: October 9, 2012Assignee: Apple Inc.Inventors: William M. Bumgarner, Adam C. Swift, Andrew Gross
-
Publication number: 20100287526Abstract: Mounting and populating a mirrored version of at least a portion of a file system of a recruiter machine at a volunteer machine performing one or more data processing tasks for the recruiter machine is disclosed. In some embodiments, an input stored in such a dedicated file system for the recruiter machine at the volunteer machine may be locally retrieved and reused, if still consistent with a corresponding input stored in a file system at the recruiter machine, when performing a data processing task for the recruiter machine at the volunteer machine. In some embodiments, if an input required by the volunteer machine to perform a data processing task for the recruiter machine is not cached in such a dedicated file system for the recruiter machine at the volunteer machine in a state that is consistent with a corresponding input stored in a file system at the recruiter machine, the input is obtained from the recruiter machine.Type: ApplicationFiled: July 22, 2010Publication date: November 11, 2010Applicant: APPLE INC.Inventors: William M. Bumgarner, Adam C. Swift, Andrew R. Gross
-
Patent number: 7797670Abstract: Mounting and populating a mirrored version of at least a portion of a file system of a recruiter machine at a volunteer machine performing one or more data processing tasks for the recruiter machine is disclosed. In some embodiments, an input stored in such a dedicated file system for the recruiter machine at the volunteer machine may be locally retrieved and reused, if still consistent with a corresponding input stored in a file system at the recruiter machine, when performing a data processing task for the recruiter machine at the volunteer machine. In some embodiments, if an input required by the volunteer machine to perform a data processing task for the recruiter machine is not cached in such a dedicated file system for the recruiter machine at the volunteer machine in a state that is consistent with a corresponding input stored in a file system at the recruiter machine, the input is obtained from the recruiter machine.Type: GrantFiled: April 14, 2006Date of Patent: September 14, 2010Assignee: Apple Inc.Inventors: William M. Bumgarner, Adam C. Swift, Andrew R. Gross