Patents by Inventor Arthur S. Hitomi
Arthur S. Hitomi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240126674Abstract: A technique for generating component usage statistics involves associating components with blocks of a stream-enabled application. When the streaming application is executed, block requests may be logged by Block ID in a log. The frequency of component use may be estimated by analyzing the block request log with the block associations.Type: ApplicationFiled: August 28, 2023Publication date: April 18, 2024Inventors: Jeffrey de Vries, Arthur S. Hitomi
-
Patent number: 11824723Abstract: A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed.Type: GrantFiled: August 13, 2021Date of Patent: November 21, 2023Assignee: NUMECENT HOLDINGS, INC.Inventors: Jeffrey DeVries, Arthur S. Hitomi
-
Patent number: 11740992Abstract: A technique for generating component usage statistics involves associating components with blocks of a stream-enabled application. When the streaming application is executed, block requests may be logged by Block ID in a log. The frequency of component use may be estimated by analyzing the block request log with the block associations.Type: GrantFiled: August 17, 2021Date of Patent: August 29, 2023Assignee: Numecent Holdings, Inc.Inventors: Jeffrey de Vries, Arthur S. Hitomi
-
Publication number: 20230144263Abstract: Interaction output over a local computer-readable medium (CRM) generated based on user interaction with rendered content input representing a virtualized asset being is received at a virtualized asset local provisioning server. A manner to exploit the virtualized asset is determined from interaction output. The virtualized asset is exploited based on the determined manner to exploit the virtualized asset. A request for a portion of the virtualized asset generated in response to the exploiting the virtualized asset is intercepted. If it is determined that the portion of the virtualized asset is absent from the local storage, a request for the portion of the virtualized asset is sent to a virtualized asset delivery system over a non-local CRM; the portion of the virtualized asset retrieved by the virtualized asset delivery system is received over the non-local CRM; and the received portion of the virtualized asset is used in exploiting the virtualized asset.Type: ApplicationFiled: January 4, 2023Publication date: May 11, 2023Inventors: Huy Nguyen, Robert Tran, Brian Maxson, Arthur S. Hitomi
-
Publication number: 20230105105Abstract: What is disclosed is incorporating a plurality of containers within a work pod, wherein the plurality of containers are associated with a corresponding plurality of applications; maintaining container versioning data and other container data for each of the plurality of containers, and work pod versioning data and other work pod data for the work pod; deploying a first instance of the work pod, wherein deployment to a desktop provides an end user with access to the corresponding plurality of applications; updating a first container of the plurality of containers within the work pod, wherein updating the first container includes an update to an application of the container; non-destructively updating container versioning data for the first container; on-destructively updating the work pod versioning data for the work pod; and deploying a second instance of the work pod, wherein deployment to the desktop provides the end user with access to the updated application.Type: ApplicationFiled: October 6, 2022Publication date: April 6, 2023Inventors: Doug Pfiffner, Arthur S. Hitomi, Lin Ma
-
Patent number: 11586672Abstract: Interaction output over a local computer-readable medium (CRM) generated based on user interaction with rendered content input representing a virtualized asset being is received at a virtualized asset local provisioning server. A manner to exploit the virtualized asset is determined from interaction output. The virtualized asset is exploited based on the determined manner to exploit the virtualized asset. A request for a portion of the virtualized asset generated in response to the exploiting the virtualized asset is intercepted. If it is determined that the portion of the virtualized asset is absent from the local storage, a request for the portion of the virtualized asset is sent to a virtualized asset delivery system over a non-local CRM; the portion of the virtualized asset retrieved by the virtualized asset delivery system is received over the non-local CRM; and the received portion of the virtualized asset is used in exploiting the virtualized asset.Type: GrantFiled: April 28, 2020Date of Patent: February 21, 2023Assignee: Numecent Holdings, Inc.Inventors: Huy Nguyen, Robert Tran, Brian Maxson, Arthur S. Hitomi
-
Publication number: 20230047944Abstract: A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.Type: ApplicationFiled: August 17, 2022Publication date: February 16, 2023Applicant: Numecent Holdings, Inc.Inventors: Arthur S. Hitomi, Robert Tran, Peter J. Kammer, Doug Pfiffner, Huy Nguyen
-
Patent number: 11451548Abstract: A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.Type: GrantFiled: July 16, 2019Date of Patent: September 20, 2022Assignee: NUMECENT HOLDINGS, INCInventors: Arthur S. Hitomi, Robert Tran, Peter J. Kammer, Doug Pfiffner, Huy Nguyen
-
Publication number: 20220255804Abstract: A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed.Type: ApplicationFiled: August 13, 2021Publication date: August 11, 2022Applicant: NUMECENT HOLDINGS, INC.Inventors: Jeffrey DeVries, Arthur S. Hitomi
-
Publication number: 20220083448Abstract: A technique for generating component usage statistics involves associating components with blocks of a stream-enabled application. When the streaming application is executed, block requests may be logged by Block ID in a log. The frequency of component use may be estimated by analyzing the block request log with the block associations.Type: ApplicationFiled: August 17, 2021Publication date: March 17, 2022Applicant: Numecent Holdings, Inc.Inventors: Jeffrey de Vries, Arthur S. Hitomi
-
Patent number: 11119884Abstract: A technique for generating component usage statistics involves associating components with blocks of a stream-enabled application. When the streaming application is executed, block requests may be logged by Block ID in a log. The frequency of component use may be estimated by analyzing the block request log with the block associations.Type: GrantFiled: October 15, 2019Date of Patent: September 14, 2021Assignee: NUMECENT HOLDINGS, INC.Inventors: Jeffrey de Vries, Arthur S. Hitomi
-
Patent number: 11121928Abstract: A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed.Type: GrantFiled: March 10, 2020Date of Patent: September 14, 2021Assignee: NUMECENT HOLDINGS, INC.Inventors: Jeffrey DeVries, Arthur S. Hitomi
-
Publication number: 20200387541Abstract: Interaction output over a local computer-readable medium (CRM) generated based on user interaction with rendered content input representing a virtualized asset being is received at a virtualized asset local provisioning server. A manner to exploit the virtualized asset is determined from interaction output. The virtualized asset is exploited based on the determined manner to exploit the virtualized asset. A request for a portion of the virtualized asset generated in response to the exploiting the virtualized asset is intercepted. If it is determined that the portion of the virtualized asset is absent from the local storage, a request for the portion of the virtualized asset is sent to a virtualized asset delivery system over a non-local CRM; the portion of the virtualized asset retrieved by the virtualized asset delivery system is received over the non-local CRM; and the received portion of the virtualized asset is used in exploiting the virtualized asset.Type: ApplicationFiled: April 28, 2020Publication date: December 10, 2020Applicant: Numecent Holdings, Inc.Inventors: Huy Nguyen, Robert Tran, Brian Maxson, Arthur S. Hitomi
-
Publication number: 20200322221Abstract: A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed.Type: ApplicationFiled: March 10, 2020Publication date: October 8, 2020Applicant: Numecent Holdings, Inc.Inventors: Jeffrey DeVries, Arthur S. Hitomi
-
Publication number: 20200162464Abstract: A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.Type: ApplicationFiled: July 16, 2019Publication date: May 21, 2020Applicant: Numecent Holdings, Inc.Inventors: Arthur S. Hitomi, Robert Tran, Peter J. Kammer, Doug Pfiffner, Huy Nguyen
-
Patent number: 10635715Abstract: Interaction output over a local computer-readable medium (CRM) generated based on user interaction with rendered content input representing a virtualized asset being is received at a virtualized asset local provisioning server. A manner to exploit the virtualized asset is determined from interaction output. The virtualized asset is exploited based on the determined manner to exploit the virtualized asset. A request for a portion of the virtualized asset generated in response to the exploiting the virtualized asset is intercepted. If it is determined that the portion of the virtualized asset is absent from the local storage, a request for the portion of the virtualized asset is sent to a virtualized asset delivery system over a non-local CRM; the portion of the virtualized asset retrieved by the virtualized asset delivery system is received over the non-local CRM; and the received portion of the virtualized asset is used in exploiting the virtualized asset.Type: GrantFiled: May 9, 2017Date of Patent: April 28, 2020Assignee: Numecent Holdings, Inc.Inventors: Huy Nguyen, Robert Tran, Brian Maxson, Arthur S. Hitomi
-
Publication number: 20200117571Abstract: A technique for generating component usage statistics involves associating components with blocks of a stream-enabled application. When the streaming application is executed, block requests may be logged by Block ID in a log. The frequency of component use may be estimated by analyzing the block request log with the block associations.Type: ApplicationFiled: October 15, 2019Publication date: April 16, 2020Applicant: Numecent Holdings, Inc.Inventors: Jeffrey de Vries, Arthur S. Hitomi
-
Patent number: 10587473Abstract: A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed.Type: GrantFiled: October 2, 2017Date of Patent: March 10, 2020Assignee: Numecent Holdings, Inc.Inventors: Jeffrey DeVries, Arthur S. Hitomi
-
Patent number: 10445210Abstract: A technique for generating component usage statistics involves associating components with blocks of a stream-enabled application. When the streaming application is executed, block requests may be logged by Block ID in a log. The frequency of component use may be estimated by analyzing the block request log with the block associations.Type: GrantFiled: April 20, 2016Date of Patent: October 15, 2019Assignee: Numecent Holdings, Inc.Inventors: Jeffrey de Vries, Arthur S. Hitomi
-
Patent number: 10356100Abstract: A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.Type: GrantFiled: June 18, 2018Date of Patent: July 16, 2019Assignee: Numecent Holdings, Inc.Inventors: Arthur S. Hitomi, Robert Tran, Peter J. Kammer, Doug Pfiffner, Huy Nguyen