Patents by Inventor Christopher Wolf

Christopher Wolf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140351957
    Abstract: When objects are shared by one user with another user, objectionable content, if identified as such, can be blocked from being shared, while the remainder of the shared objects can be accessed by the other user. Functions that allow sharing of content are implemented so as prevent sharing of objectionable content with another user, while allowing other content to be shared. If a group of files or objects is shared, then the presence of objectionable content in one object in the group results in that objectionable content not being shared, but the remaining files or objects are still shared. A graphical user interface for accessing the storage system, whether by providers or recipients of shared content, can selectively render information about objects with objectionable content.
    Type: Application
    Filed: May 23, 2013
    Publication date: November 27, 2014
    Applicant: Microsoft Corporation
    Inventors: Ryan Zacher, Jorge Pozas Trevino, Christopher Wolf, Gary Anderson, Jeff Ferreira, Mark Kramer, Kathleen Ewing, Anthony Charles DiCola, Emmanuel Miranda-Steiner
  • Publication number: 20140343897
    Abstract: Methods and systems for efficient contour and gating in flow cytometry are provided. Event data is compressed to reduce the number of points needed to represent polygon contours for the event data. Selection of a level within the contour then causes the generation of a gate. This allows limited resource devices, such as touchscreen wireless devices, to render and gate flow cytometry data in a resource efficient manner.
    Type: Application
    Filed: May 14, 2014
    Publication date: November 20, 2014
    Applicant: BECTON, DICKINSON AND COMPANY
    Inventors: Joseph Trotter, Christopher Wolf
  • Publication number: 20140188808
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data are disclosed. In some implementations, visual representations of files are generated for presentation in a backup user interface. The visual representations are generated from sparse file system metadata stored on the computing device, thus allowing faster navigating of the backup user interface. During a restore operation, the metadata can be used to retrieve the items from their physical storage locations. In some implementations, when the storage capacity of a backup storage device exceeds a threshold, the data for the N oldest backups are replaced with sparse file system metadata, which can be used to generate visual representations for presentation in the backup user interface.
    Type: Application
    Filed: March 15, 2013
    Publication date: July 3, 2014
    Inventors: Christopher Wolf, Daniel I. Feldman, Eric A. Weiss, Kristen A. McIntyre, Pavel Cisler, Richard B. Blair, Erika Misaki
  • Patent number: 8725965
    Abstract: Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes detecting a remote storage device, prompting the user to use the detected remote storage device for backup operations, receiving a user input to use the detected remote storage device for backup operations, and automatically configuring backup operations using the remote storage device. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media.
    Type: Grant
    Filed: June 8, 2007
    Date of Patent: May 13, 2014
    Assignee: Apple Inc.
    Inventors: David Hart, Christopher Wolf, Pavel Cisler, Robert Ulrich, Kevin Tiene, Mike Metas
  • Patent number: 8555258
    Abstract: A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time or from crash logs can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree.
    Type: Grant
    Filed: November 20, 2009
    Date of Patent: October 8, 2013
    Assignee: Apple Inc.
    Inventors: Christina E. Warren, David V. Payne, Darin Adler, Maciej J. Stachowiak, Bertrand P. Serlet, Christopher A. Wolf
  • Publication number: 20130246837
    Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.
    Type: Application
    Filed: May 3, 2013
    Publication date: September 19, 2013
    Applicant: Apple Inc.
    Inventor: Christopher A. Wolf
  • Patent number: 8438546
    Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.
    Type: Grant
    Filed: August 9, 2011
    Date of Patent: May 7, 2013
    Assignee: Apple Inc.
    Inventor: Christopher Wolf
  • Publication number: 20110296247
    Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.
    Type: Application
    Filed: August 9, 2011
    Publication date: December 1, 2011
    Applicant: Apple Inc.
    Inventor: Christopher A. Wolf
  • Patent number: 8020149
    Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.
    Type: Grant
    Filed: August 4, 2006
    Date of Patent: September 13, 2011
    Assignee: Apple Inc.
    Inventor: Christopher A Wolf
  • Publication number: 20100107145
    Abstract: A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time or from crash logs can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree.
    Type: Application
    Filed: November 20, 2009
    Publication date: April 29, 2010
    Applicant: Apple Inc.
    Inventors: Christina E. Warren, David V. Payne, Darin Adler, Maciej Stachowiak, Bertrand P. Serlet, Christopher A. Wolf
  • Patent number: 7644397
    Abstract: A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time or from crash logs can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree.
    Type: Grant
    Filed: June 19, 2004
    Date of Patent: January 5, 2010
    Assignee: Apple Inc.
    Inventors: Christina E. Warren, David V. Payne, Darin Adler, Maciej Stachowiak, Bertrand P. Serlet, Christopher A. Wolf
  • Publication number: 20080307175
    Abstract: Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes detecting a remote storage device, prompting the user to use the detected remote storage device for backup operations, receiving a user input to use the detected remote storage device for backup operations, and automatically configuring backup operations using the remote storage device. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media.
    Type: Application
    Filed: June 8, 2007
    Publication date: December 11, 2008
    Inventors: David Hart, Christopher Wolf, Pavel Cisler, Robert Ulrich, Kevin Tiene, Mike Metas
  • Publication number: 20080052677
    Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.
    Type: Application
    Filed: August 4, 2006
    Publication date: February 28, 2008
    Inventor: Christopher A. Wolf
  • Publication number: 20060045246
    Abstract: A billing and payment method and system for networks incorporating long latency in their systems architectures is provided. As a result of this method and system, it is possible for customers and users to experience virtual real-time access to a network incorporating long latency in its systems architecture and for the network operator to incorporate operating procedures and controls and customer payment procedures and financial controls customarily available in real-time environments. In particular, the present invention is advantageous where reconciliation of accounts and verification of account balances cannot be done in short amounts of time due to high latency of the transmissions. Also, pre-paid and/or post-paid debit and/or credit cards can be used for purchases of goods and services in an environment whereby real-time verification of balances would not otherwise be possible.
    Type: Application
    Filed: August 31, 2005
    Publication date: March 2, 2006
    Applicant: United Villages, Inc.
    Inventors: Eugene Pettinelli, Christopher Wolf, Daniel Alexander, Amir Hasson
  • Publication number: 20050283765
    Abstract: A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree. The principles of the present invention can find particular usefulness with respect to analyzing crashlogs.
    Type: Application
    Filed: June 19, 2004
    Publication date: December 22, 2005
    Inventors: Christina Warren, David Payne, Darin Adler, Maciej Stachowiak, Bertrand Serlet, Christopher Wolf
  • Publication number: 20020116210
    Abstract: Computerized system and method for coordinating business information flow to permit a provider of goods or services to prepare a project proposal including a price quote for a project requested by a customer.
    Type: Application
    Filed: December 20, 2001
    Publication date: August 22, 2002
    Applicant: Honeywell International Inc.
    Inventors: Martin J. Medina, John J. Deinlein, Joseph A. Williams, Gary L. Gillette, Hedy L. Dachel, Christopher Wolf