Patents by Inventor Christopher Wolf
Christopher Wolf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140351957Abstract: When objects are shared by one user with another user, objectionable content, if identified as such, can be blocked from being shared, while the remainder of the shared objects can be accessed by the other user. Functions that allow sharing of content are implemented so as prevent sharing of objectionable content with another user, while allowing other content to be shared. If a group of files or objects is shared, then the presence of objectionable content in one object in the group results in that objectionable content not being shared, but the remaining files or objects are still shared. A graphical user interface for accessing the storage system, whether by providers or recipients of shared content, can selectively render information about objects with objectionable content.Type: ApplicationFiled: May 23, 2013Publication date: November 27, 2014Applicant: Microsoft CorporationInventors: Ryan Zacher, Jorge Pozas Trevino, Christopher Wolf, Gary Anderson, Jeff Ferreira, Mark Kramer, Kathleen Ewing, Anthony Charles DiCola, Emmanuel Miranda-Steiner
-
Publication number: 20140343897Abstract: Methods and systems for efficient contour and gating in flow cytometry are provided. Event data is compressed to reduce the number of points needed to represent polygon contours for the event data. Selection of a level within the contour then causes the generation of a gate. This allows limited resource devices, such as touchscreen wireless devices, to render and gate flow cytometry data in a resource efficient manner.Type: ApplicationFiled: May 14, 2014Publication date: November 20, 2014Applicant: BECTON, DICKINSON AND COMPANYInventors: Joseph Trotter, Christopher Wolf
-
Publication number: 20140188808Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data are disclosed. In some implementations, visual representations of files are generated for presentation in a backup user interface. The visual representations are generated from sparse file system metadata stored on the computing device, thus allowing faster navigating of the backup user interface. During a restore operation, the metadata can be used to retrieve the items from their physical storage locations. In some implementations, when the storage capacity of a backup storage device exceeds a threshold, the data for the N oldest backups are replaced with sparse file system metadata, which can be used to generate visual representations for presentation in the backup user interface.Type: ApplicationFiled: March 15, 2013Publication date: July 3, 2014Inventors: Christopher Wolf, Daniel I. Feldman, Eric A. Weiss, Kristen A. McIntyre, Pavel Cisler, Richard B. Blair, Erika Misaki
-
Patent number: 8725965Abstract: Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes detecting a remote storage device, prompting the user to use the detected remote storage device for backup operations, receiving a user input to use the detected remote storage device for backup operations, and automatically configuring backup operations using the remote storage device. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media.Type: GrantFiled: June 8, 2007Date of Patent: May 13, 2014Assignee: Apple Inc.Inventors: David Hart, Christopher Wolf, Pavel Cisler, Robert Ulrich, Kevin Tiene, Mike Metas
-
Patent number: 8555258Abstract: A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time or from crash logs can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree.Type: GrantFiled: November 20, 2009Date of Patent: October 8, 2013Assignee: Apple Inc.Inventors: Christina E. Warren, David V. Payne, Darin Adler, Maciej J. Stachowiak, Bertrand P. Serlet, Christopher A. Wolf
-
SYSTEM AND METHOD FOR MITIGATING REPEATED CRASHES OF AN APPLICATION RESULTING FROM SUPPLEMENTAL CODE
Publication number: 20130246837Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.Type: ApplicationFiled: May 3, 2013Publication date: September 19, 2013Applicant: Apple Inc.Inventor: Christopher A. Wolf -
System and method for mitigating repeated crashes of an application resulting from supplemental code
Patent number: 8438546Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.Type: GrantFiled: August 9, 2011Date of Patent: May 7, 2013Assignee: Apple Inc.Inventor: Christopher Wolf -
SYSTEM AND METHOD FOR MITIGATING REPEATED CRASHES OF AN APPLICATION RESULTING FROM SUPPLEMENTAL CODE
Publication number: 20110296247Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.Type: ApplicationFiled: August 9, 2011Publication date: December 1, 2011Applicant: Apple Inc.Inventor: Christopher A. Wolf -
System and method for mitigating repeated crashes of an application resulting from supplemental code
Patent number: 8020149Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.Type: GrantFiled: August 4, 2006Date of Patent: September 13, 2011Assignee: Apple Inc.Inventor: Christopher A Wolf -
Publication number: 20100107145Abstract: A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time or from crash logs can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree.Type: ApplicationFiled: November 20, 2009Publication date: April 29, 2010Applicant: Apple Inc.Inventors: Christina E. Warren, David V. Payne, Darin Adler, Maciej Stachowiak, Bertrand P. Serlet, Christopher A. Wolf
-
Patent number: 7644397Abstract: A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time or from crash logs can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree.Type: GrantFiled: June 19, 2004Date of Patent: January 5, 2010Assignee: Apple Inc.Inventors: Christina E. Warren, David V. Payne, Darin Adler, Maciej Stachowiak, Bertrand P. Serlet, Christopher A. Wolf
-
Publication number: 20080307175Abstract: Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes detecting a remote storage device, prompting the user to use the detected remote storage device for backup operations, receiving a user input to use the detected remote storage device for backup operations, and automatically configuring backup operations using the remote storage device. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media.Type: ApplicationFiled: June 8, 2007Publication date: December 11, 2008Inventors: David Hart, Christopher Wolf, Pavel Cisler, Robert Ulrich, Kevin Tiene, Mike Metas
-
SYSTEM AND METHOD FOR MITIGATING REPEATED CRASHES OF AN APPLICATION RESULTING FROM SUPPLEMENTAL CODE
Publication number: 20080052677Abstract: Provided is a method for mitigating the effects of an application which crashes as the result of supplemental code (e.g., plug-in), particularly a plug-in from a source other than the source of the operating system of the device or the source of the application that crashes. The method includes executing the application. As the application is running, it may be monitored to determine if normal execution of instructions ceases. When that occurs, the system will make a determination if code from a supplemental code module was the cause of the crash, and will make an evaluation if that supplemental code module is from a source other than the source(s) of the operating system and application in question. In some implementations, remedial steps may be provided, such as providing information on subsequent executions of the application.Type: ApplicationFiled: August 4, 2006Publication date: February 28, 2008Inventor: Christopher A. Wolf -
Publication number: 20060045246Abstract: A billing and payment method and system for networks incorporating long latency in their systems architectures is provided. As a result of this method and system, it is possible for customers and users to experience virtual real-time access to a network incorporating long latency in its systems architecture and for the network operator to incorporate operating procedures and controls and customer payment procedures and financial controls customarily available in real-time environments. In particular, the present invention is advantageous where reconciliation of accounts and verification of account balances cannot be done in short amounts of time due to high latency of the transmissions. Also, pre-paid and/or post-paid debit and/or credit cards can be used for purchases of goods and services in an environment whereby real-time verification of balances would not otherwise be possible.Type: ApplicationFiled: August 31, 2005Publication date: March 2, 2006Applicant: United Villages, Inc.Inventors: Eugene Pettinelli, Christopher Wolf, Daniel Alexander, Amir Hasson
-
Publication number: 20050283765Abstract: A system, method, and computer program for analyzing code execution and software performance characteristics are disclosed. Samples of code during run-time can be displayed as both a top-down tree of calls from a particular function and a bottom-up tree of calls to the particular function. Data mining techniques, including filtering and focusing, remove code that is not of interest and display code that is more relevant to performance analysis. In particular, functions contained in libraries such as system libraries can be stripped from view. The cost associated with an excluded function can be propagated to a calling function, in either the top-down or bottom-up tree. The principles of the present invention can find particular usefulness with respect to analyzing crashlogs.Type: ApplicationFiled: June 19, 2004Publication date: December 22, 2005Inventors: Christina Warren, David Payne, Darin Adler, Maciej Stachowiak, Bertrand Serlet, Christopher Wolf
-
Publication number: 20020116210Abstract: Computerized system and method for coordinating business information flow to permit a provider of goods or services to prepare a project proposal including a price quote for a project requested by a customer.Type: ApplicationFiled: December 20, 2001Publication date: August 22, 2002Applicant: Honeywell International Inc.Inventors: Martin J. Medina, John J. Deinlein, Joseph A. Williams, Gary L. Gillette, Hedy L. Dachel, Christopher Wolf