Patents by Inventor Nathaniel Brent Kranendonk

Nathaniel Brent Kranendonk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9088480
    Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: July 21, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
  • Publication number: 20150143458
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Application
    Filed: January 30, 2015
    Publication date: May 21, 2015
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter
  • Publication number: 20150120921
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Application
    Filed: January 8, 2015
    Publication date: April 30, 2015
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Patent number: 8977775
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: March 10, 2015
    Assignee: Novell. Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter
  • Patent number: 8949505
    Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: February 3, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
  • Patent number: 8949832
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Grant
    Filed: August 29, 2011
    Date of Patent: February 3, 2015
    Assignee: Novell, Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Publication number: 20140380316
    Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.
    Type: Application
    Filed: September 8, 2014
    Publication date: December 25, 2014
    Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
  • Publication number: 20140359623
    Abstract: File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform.
    Type: Application
    Filed: August 14, 2014
    Publication date: December 4, 2014
    Inventors: Nathaniel Brent Kranendonk, Jason Allen Sabin, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen
  • Publication number: 20140344461
    Abstract: Techniques for intelligent service deployment are provided. Cloud and service data are evaluated to develop a service deployment plan for deploying a service to a target cloud processing environment. When dictated by the plan or by events that trigger deployment, the service is deployed to the target cloud processing environment in accordance with the service deployment plan.
    Type: Application
    Filed: July 31, 2014
    Publication date: November 20, 2014
    Inventors: Stephen R. Carter, Jason Allen Sabin, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen
  • Patent number: 8812766
    Abstract: File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform.
    Type: Grant
    Filed: August 29, 2011
    Date of Patent: August 19, 2014
    Assignee: Novell, Inc.
    Inventors: Nathaniel Brent Kranendonk, Jason Allen Sabin, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen
  • Patent number: 8806014
    Abstract: Techniques for intelligent service deployment are provided. Cloud and service data are evaluated to develop a service deployment plan for deploying a service to a target cloud processing environment. When dictated by the plan or by events that trigger deployment, the service is deployed to the target cloud processing environment in accordance with the service deployment plan.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: August 12, 2014
    Assignee: Novell, Inc.
    Inventors: Stephen R Carter, Jason Allen Sabin, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen
  • Publication number: 20140222564
    Abstract: The present invention extends to methods, systems, and computer program products for geo-located social connectivity relating to people, events, and commerce. In general, embodiments of the invention provide a social commerce matching system. An intelligent interactive tool provides individuals the ability to geo-locate like-minded individuals/groups and participate in events. Individuals or businesses can generate events. Businesses can support events through advertising promotions, and deals.
    Type: Application
    Filed: February 5, 2014
    Publication date: August 7, 2014
    Applicant: KBR IP Holdings, LLC
    Inventors: Nathaniel Brent Kranendonk, Brett Leon Ross, David O. Hyde, Lukas Olson
  • Publication number: 20140164606
    Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.
    Type: Application
    Filed: November 11, 2013
    Publication date: June 12, 2014
    Applicant: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
  • Publication number: 20140143200
    Abstract: The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified.
    Type: Application
    Filed: December 27, 2013
    Publication date: May 22, 2014
    Applicant: Novell, Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
  • Publication number: 20140032724
    Abstract: Techniques for workload coordination are provided. An automated discovery service identifies resources with hardware and software specific dependencies for a workload. The dependencies are made generic and the workload and its configuration with the generic dependencies are packaged. At a target location, the packaged workload is presented and the generic dependencies automatically resolved with new hardware and software dependencies of the target location. The workload is then automatically populated in the target location.
    Type: Application
    Filed: October 3, 2013
    Publication date: January 30, 2014
    Applicant: Novell, Inc.
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch, Michael John Jorgensen, Micheal Fairbanks, Nathaniel Brent Kranendonk, Kal A. Larsen, Thomas Larry Biggs
  • Patent number: 8639926
    Abstract: A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: January 28, 2014
    Assignee: Novell, Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch
  • Publication number: 20140019971
    Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.
    Type: Application
    Filed: September 12, 2013
    Publication date: January 16, 2014
    Applicant: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
  • Patent number: 8620851
    Abstract: The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified.
    Type: Grant
    Filed: November 23, 2010
    Date of Patent: December 31, 2013
    Assignee: Novell, Inc.
    Inventors: Jeremy Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Michael Fairbanks, Michael Jorgensen, Thomas Larry Biggs
  • Patent number: 8583788
    Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.
    Type: Grant
    Filed: April 20, 2011
    Date of Patent: November 12, 2013
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
  • Publication number: 20130283269
    Abstract: The system and method described herein may identify one or more virtual desktop extensions available in a cloud computing environment and launch virtual machine instances to host the available virtual desktop extensions in the cloud. For example, a virtual desktop extension manager may receive a virtual desktop extension request from a client desktop and determine whether authentication credentials for the client desktop indicate that the client desktop has access to the requested virtual desktop extension. In response to authenticating the client desktop, the virtual desktop extension manager may then launch a virtual machine instance to host the virtual desktop extension in the cloud and provide the client desktop with information for locally controlling the virtual desktop extension remotely hosted in the cloud.
    Type: Application
    Filed: June 17, 2013
    Publication date: October 24, 2013
    Applicant: Novell, Inc.
    Inventors: Michael JORGENSEN, Michael Fairbanks, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen