Patents by Inventor Joel Howard
Joel Howard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250077358Abstract: An illustrative data storage management system protects data in a replicated multi-node system (“cluster”). The illustrative system creates a new administrative entity (“pseudo-client”) that represents the cluster within the system. The system intelligently performs as an adaptive “set it and forget it” system. Preferences for the pseudo-client, including alternate rules that cover various contingencies in the cluster, need not be reset as the cluster undergoes node failures and/or role changes over time. Rather, the disclosed system adapts, on each successive secondary copy job, to the current configuration of the cluster without requiring a system administrator to provide further input or analysis. This approach ensures that jobs can begin promptly as scheduled or on demand. Component selection is based at least in part on geography/zone and/or network topology considerations, which improves the likelihood of job completion and success, and RPO/RTO service levels are more likely to be met.Type: ApplicationFiled: July 29, 2024Publication date: March 6, 2025Applicant: Commvault Systems, Inc.Inventors: Sunil Babu TELAGAMSETTI, Joel HOWARD, Punit Pranesh KOUJALGI, Ganesh Kishan BABU, Meera R. NAIR
-
Patent number: 11672029Abstract: Embodiments are disclosed that allow data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, embodiments of a virtual mobile device system may include one or more components for processing Bluetooth calls where these Bluetooth components may process received Bluetooth calls in a first manner in a connected state and process Bluetooth calls in a disconnected state in a second manner.Type: GrantFiled: October 21, 2020Date of Patent: June 6, 2023Assignee: HYPORI, LLCInventor: Joel Howard Schopp
-
Patent number: 11596008Abstract: Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.Type: GrantFiled: May 24, 2021Date of Patent: February 28, 2023Assignee: HYPORI LLCInventor: Joel Howard Schopp
-
Publication number: 20210282196Abstract: Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.Type: ApplicationFiled: May 24, 2021Publication date: September 9, 2021Applicant: Hypori LLCInventor: Joel Howard Schopp
-
Patent number: 11039486Abstract: Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.Type: GrantFiled: February 1, 2018Date of Patent: June 15, 2021Assignee: Hypori LLCInventor: Joel Howard Schopp
-
Patent number: 10963280Abstract: Systems, apparatuses, and methods for implementing hypervisor post-write notification of processor state register modifications. A write to a state register of the processor may be detected during guest execution. In response to detecting the write to the state register, the processor may trigger microcode to perform the write and copy the new value of the register to a memory location prior to exiting the guest. The hypervisor may be notified of the update to the state register after it occurs, and the hypervisor may be prevented from modifying the value of the guest's state register. The hypervisor may terminate the guest if the update to the state register is unacceptable. Alternatively, the hypervisor may recommend an alternate value to the guest. If the guest agrees, the guest may set the state register to the alternate value recommended by the hypervisor when the guest resumes operation.Type: GrantFiled: February 3, 2016Date of Patent: March 30, 2021Assignee: Advanced Micro Devices, Inc.Inventors: David A. Kaplan, Joel Howard Schopp
-
Publication number: 20210037579Abstract: Embodiments are disclosed that allow data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, embodiments of a virtual mobile device system may include one or more components for processing Bluetooth calls where these Bluetooth components may process received Bluetooth calls in a first manner in a connected state and process Bluetooth calls in a disconnected state in a second manner.Type: ApplicationFiled: October 21, 2020Publication date: February 4, 2021Applicant: Intelligent Waves LLCInventor: Joel Howard SCHOPP
-
Patent number: 10849172Abstract: Embodiments are disclosed that allow data to be sent between a BLUETOOTH® enabled device and a virtual device associated with a corresponding physical device. In particular, embodiments of a virtual mobile device system may include one or more components for processing BLUETOOTH® calls where these components may process received BLUETOOTH® calls in a first manner in a connected state and process BLUETOOTH® calls in a disconnected state in a second manner.Type: GrantFiled: February 1, 2018Date of Patent: November 24, 2020Assignee: Intelligent Waves LLCInventor: Joel Howard Schopp
-
Publication number: 20200030534Abstract: A medicament injection device including a needle, a first stage that controls positioning of the needle at a depth into an animal when the device is pressed against the animal, and a second stage that injects the medicament through the needle into the animal after the needle is positioned at the depth and the device is further pressed against the animal. The device preferably includes a mechanism that permits the second stage to inject the medicament only after the needle is positioned at the depth. The depth of the needle preferably is adjustable, as is the amount of the medicament injected. In preferred aspects, these two features are independently adjustable. One or more springs, pneumatics elements, or other elements may automatically reset the first stage, the second stage, or both after the device is withdrawn from the animal. Also, associated methods.Type: ApplicationFiled: July 28, 2018Publication date: January 30, 2020Inventor: Joel Howard
-
Publication number: 20180219672Abstract: Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.Type: ApplicationFiled: February 1, 2018Publication date: August 2, 2018Inventor: Joel Howard Schopp
-
Publication number: 20180220472Abstract: Embodiments are disclosed that allow data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, embodiments of a virtual mobile device system may include one or more components for processing Bluetooth calls where these Bluetooth components may process received Bluetooth calls in a first manner in a connected state and process Bluetooth calls in a disconnected state in a second manner.Type: ApplicationFiled: February 1, 2018Publication date: August 2, 2018Inventor: Joel Howard Schopp
-
Patent number: 9734078Abstract: A method for resetting of memory locks in a transactional memory system. The method includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The method further includes determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register.Type: GrantFiled: August 31, 2015Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Ryan Patrick Grimm, Robert Cory Jennings, Jr., Joel Howard Schopp, Michael Thomas Strosaker
-
Publication number: 20170220369Abstract: Systems, apparatuses, and methods for implementing hypervisor post-write notification of processor state register modifications. A write to a state register of the processor may be detected during guest execution. In response to detecting the write to the state register, the processor may trigger microcode to perform the write and copy the new value of the register to a memory location prior to exiting the guest. The hypervisor may be notified of the update to the state register after it occurs, and the hypervisor may be prevented from modifying the value of the guest's state register. The hypervisor may terminate the guest if the update to the state register is unacceptable. Alternatively, the hypervisor may recommend an alternate value to the guest. If the guest agrees, the guest may set the state register to the alternate value recommended by the hypervisor when the guest resumes operation.Type: ApplicationFiled: February 3, 2016Publication date: August 3, 2017Inventors: David A. Kaplan, Joel Howard Schopp
-
Patent number: 9524246Abstract: A system and computer program product for resetting of memory locks in a transactional memory system. The system includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The system further includes the processor determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register.Type: GrantFiled: September 10, 2014Date of Patent: December 20, 2016Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Ryan Patrick Grimm, Robert Cory Jennings, Jr., Joel Howard Schopp, Michael Thomas Strosaker
-
Publication number: 20160070650Abstract: A method for resetting of memory locks in a transactional memory system. The method includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The method further includes determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register.Type: ApplicationFiled: August 31, 2015Publication date: March 10, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathan FONTENOT, Ryan Patrick GRIMM, Robert Cory JENNINGS, JR., Joel Howard SCHOPP, Michael Thomas STROSAKER
-
Publication number: 20160070660Abstract: A system and computer program product for resetting of memory locks in a transactional memory system. The system includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The system further includes the processor determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register.Type: ApplicationFiled: September 10, 2014Publication date: March 10, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: NATHAN FONTENOT, RYAN PATRICK GRIMM, ROBERT CORY JENNINGS, JR., JOEL HOWARD SCHOPP, MICHAEL THOMAS STROSAKER
-
Patent number: 8819654Abstract: The present invention provides a method to optimize object code files produced by a compiler for several different types of target processors. The compiler divides the source code to be compiled into several functional modules. Given a specified set of target processors, each functional module is compiled resulting in a target object version for each target processor. Then, for each functional module, a merging process is performed wherein identical target object versions or target object versions with similar contents are merged by deleting the identical or similar versions. After this merging process, a composite object code file is formed containing all of the non-deleted target object versions of the function modules.Type: GrantFiled: October 21, 2013Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Michael Thomas Strosaker, Joel Howard Schopp
-
Publication number: 20140047424Abstract: The present invention provides a method to optimize object code files produced by a compiler for several different types of target processors. The compiler divides the source code to be compiled into several functional modules. Given a specified set of target processors, each functional module is compiled resulting in a target object version for each target processor. Then, for each functional module, a merging process is performed wherein identical target object versions or target object versions with similar contents are merged by deleting the identical or similar versions. After this merging process, a composite object code file is formed containing all of the non-deleted target object versions of the function modules.Type: ApplicationFiled: October 21, 2013Publication date: February 13, 2014Applicant: International Business Machines CorporationInventors: Nathan Fontenot, Michael Thomas Strosaker, Joel Howard Schopp
-
Patent number: 8645934Abstract: The present invention provides a method to optimize object code files produced by a compiler for several different types of target processors. The compiler divides the source code to be compiled into several functional modules. Given a specified set of target processors, each functional module is compiled resulting in a target object version for each target processor. Then, for each functional module, a merging process is performed wherein identical target object versions or target object versions with similar contents are merged by deleting the identical or similar versions. After this merging process, a composite object code file is formed containing all of the non-deleted target object versions of the function modules.Type: GrantFiled: May 6, 2010Date of Patent: February 4, 2014Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Michael Thomas Strosaker, Joel Howard Schopp
-
Patent number: 8365172Abstract: A computer implemented method, data processing system, and computer program product for dynamically scheduling algorithms in a pipeline which operate on a stream of data. The illustrative embodiments determine a computational cost of each algorithm in a plurality of algorithms in a pipeline. The plurality of algorithms in the pipeline processes an incoming data stream in a first sequential algorithm order. The illustrative embodiments reorder the plurality of algorithms in the pipeline to form a second sequential algorithm order based on the computational cost of each algorithm. The plurality of algorithms may then be executed in the second sequential algorithm order. When the illustrative embodiments assign a spare processing unit to an algorithm at an end of the pipeline, the computational cost of each algorithm in the plurality of algorithms in the pipeline is redetermined.Type: GrantFiled: May 7, 2008Date of Patent: January 29, 2013Assignee: International Business Machines CorporationInventors: Nathan D. Fontenot, Jacob Lorien Moilanen, Joel Howard Schopp, Michael Thomas Strosaker