Patents by Inventor Nathaniel Brent Kranendonk
Nathaniel Brent Kranendonk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9088480Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.Type: GrantFiled: November 11, 2013Date of Patent: July 21, 2015Assignee: Novell, Inc.Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
-
Publication number: 20150143458Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.Type: ApplicationFiled: January 30, 2015Publication date: May 21, 2015Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter
-
Publication number: 20150120921Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.Type: ApplicationFiled: January 8, 2015Publication date: April 30, 2015Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
-
Patent number: 8977775Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.Type: GrantFiled: May 30, 2013Date of Patent: March 10, 2015Assignee: Novell. Inc.Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter
-
Patent number: 8949505Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.Type: GrantFiled: September 12, 2013Date of Patent: February 3, 2015Assignee: Novell, Inc.Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
-
Patent number: 8949832Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.Type: GrantFiled: August 29, 2011Date of Patent: February 3, 2015Assignee: Novell, Inc.Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
-
Publication number: 20140380316Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.Type: ApplicationFiled: September 8, 2014Publication date: December 25, 2014Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
-
Publication number: 20140359623Abstract: File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform.Type: ApplicationFiled: August 14, 2014Publication date: December 4, 2014Inventors: Nathaniel Brent Kranendonk, Jason Allen Sabin, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen
-
Publication number: 20140344461Abstract: Techniques for intelligent service deployment are provided. Cloud and service data are evaluated to develop a service deployment plan for deploying a service to a target cloud processing environment. When dictated by the plan or by events that trigger deployment, the service is deployed to the target cloud processing environment in accordance with the service deployment plan.Type: ApplicationFiled: July 31, 2014Publication date: November 20, 2014Inventors: Stephen R. Carter, Jason Allen Sabin, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen
-
Patent number: 8812766Abstract: File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform.Type: GrantFiled: August 29, 2011Date of Patent: August 19, 2014Assignee: Novell, Inc.Inventors: Nathaniel Brent Kranendonk, Jason Allen Sabin, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen
-
Patent number: 8806014Abstract: Techniques for intelligent service deployment are provided. Cloud and service data are evaluated to develop a service deployment plan for deploying a service to a target cloud processing environment. When dictated by the plan or by events that trigger deployment, the service is deployed to the target cloud processing environment in accordance with the service deployment plan.Type: GrantFiled: May 28, 2010Date of Patent: August 12, 2014Assignee: Novell, Inc.Inventors: Stephen R Carter, Jason Allen Sabin, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen
-
Publication number: 20140222564Abstract: The present invention extends to methods, systems, and computer program products for geo-located social connectivity relating to people, events, and commerce. In general, embodiments of the invention provide a social commerce matching system. An intelligent interactive tool provides individuals the ability to geo-locate like-minded individuals/groups and participate in events. Individuals or businesses can generate events. Businesses can support events through advertising promotions, and deals.Type: ApplicationFiled: February 5, 2014Publication date: August 7, 2014Applicant: KBR IP Holdings, LLCInventors: Nathaniel Brent Kranendonk, Brett Leon Ross, David O. Hyde, Lukas Olson
-
Publication number: 20140164606Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.Type: ApplicationFiled: November 11, 2013Publication date: June 12, 2014Applicant: Novell, Inc.Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
-
Publication number: 20140143200Abstract: The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified.Type: ApplicationFiled: December 27, 2013Publication date: May 22, 2014Applicant: Novell, Inc.Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
-
Publication number: 20140032724Abstract: Techniques for workload coordination are provided. An automated discovery service identifies resources with hardware and software specific dependencies for a workload. The dependencies are made generic and the workload and its configuration with the generic dependencies are packaged. At a target location, the packaged workload is presented and the generic dependencies automatically resolved with new hardware and software dependencies of the target location. The workload is then automatically populated in the target location.Type: ApplicationFiled: October 3, 2013Publication date: January 30, 2014Applicant: Novell, Inc.Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch, Michael John Jorgensen, Micheal Fairbanks, Nathaniel Brent Kranendonk, Kal A. Larsen, Thomas Larry Biggs
-
Patent number: 8639926Abstract: A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.Type: GrantFiled: October 29, 2010Date of Patent: January 28, 2014Assignee: Novell, Inc.Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch
-
Publication number: 20140019971Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.Type: ApplicationFiled: September 12, 2013Publication date: January 16, 2014Applicant: Novell, Inc.Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
-
Patent number: 8620851Abstract: The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified.Type: GrantFiled: November 23, 2010Date of Patent: December 31, 2013Assignee: Novell, Inc.Inventors: Jeremy Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Michael Fairbanks, Michael Jorgensen, Thomas Larry Biggs
-
Patent number: 8583788Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.Type: GrantFiled: April 20, 2011Date of Patent: November 12, 2013Assignee: Novell, Inc.Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
-
Publication number: 20130283269Abstract: The system and method described herein may identify one or more virtual desktop extensions available in a cloud computing environment and launch virtual machine instances to host the available virtual desktop extensions in the cloud. For example, a virtual desktop extension manager may receive a virtual desktop extension request from a client desktop and determine whether authentication credentials for the client desktop indicate that the client desktop has access to the requested virtual desktop extension. In response to authenticating the client desktop, the virtual desktop extension manager may then launch a virtual machine instance to host the virtual desktop extension in the cloud and provide the client desktop with information for locally controlling the virtual desktop extension remotely hosted in the cloud.Type: ApplicationFiled: June 17, 2013Publication date: October 24, 2013Applicant: Novell, Inc.Inventors: Michael JORGENSEN, Michael Fairbanks, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen