Patents by Inventor Richard Spillane

Richard Spillane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11917003
    Abstract: Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file. The exo-clone file includes the differences between two or more snapshots of the volume on the primary cluster, along with identifiers of the change blocks and (optionally) state information thereof. Just these changes, identifiers, and state information are packaged in the exo-clone file and then exported to the secondary cluster, which in turn makes the changes to its version of the volume. Exporting just the changes to the data blocks and the corresponding block identifiers drastically reduces the information needed to be exchanged and processed to keep the two volumes consistent.
    Type: Grant
    Filed: October 2, 2020
    Date of Patent: February 27, 2024
    Assignee: VMware, Inc.
    Inventors: Richard Spillane, Yunshan Luke Lu, Wenguang Wang, Maxime Austruy, Christos Karamanolis, Rawlinson Rivera
  • Publication number: 20210075855
    Abstract: Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file. The exo-clone file includes the differences between two or more snapshots of the volume on the primary cluster, along with identifiers of the change blocks and (optionally) state information thereof. Just these changes, identifiers, and state information are packaged in the exo-clone file and then exported to the secondary cluster, which in turn makes the changes to its version of the volume. Exporting just the changes to the data blocks and the corresponding block identifiers drastically reduces the information needed to be exchanged and processed to keep the two volumes consistent.
    Type: Application
    Filed: October 2, 2020
    Publication date: March 11, 2021
    Inventors: Richard Spillane, Yunshan Luke Lu, Wenguang Wang, Maxime Austruy, Christos Karamanolis, Rawlinson Rivera
  • Patent number: 10812582
    Abstract: Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file. The exo-clone file includes the differences between two or more snapshots of the volume on the primary cluster, along with identifiers of the change blocks and (optionally) state information thereof. Just these changes, identifiers, and state information are packaged in the exo-clone file and then exported to the secondary cluster, which in turn makes the changes to its version of the volume. Exporting just the changes to the data blocks and the corresponding block identifiers drastically reduces the information needed to be exchanged and processed to keep the two volumes consistent.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: October 20, 2020
    Assignee: VMware, Inc.
    Inventors: Richard Spillane, Yunshan Luke Lu, Wenguang Wang, Maxime Austruy, Christos Karamanolis, Rawlinson Rivera
  • Publication number: 20170264684
    Abstract: Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file. The exo-clone file includes the differences between two or more snapshots of the volume on the primary cluster, along with identifiers of the change blocks and (optionally) state information thereof. Just these changes, identifiers, and state information are packaged in the exo-clone file and then exported to the secondary cluster, which in turn makes the changes to its version of the volume. Exporting just the changes to the data blocks and the corresponding block identifiers drastically reduces the information needed to be exchanged and processed to keep the two volumes consistent.
    Type: Application
    Filed: June 23, 2016
    Publication date: September 14, 2017
    Inventors: Richard Spillane, Yunshan Luke Lu, Wenguang Wang, Maxime Austruy, Christos Karamanolis, Rawlinson Rivera
  • Publication number: 20170054746
    Abstract: Systems, methods, and software provided herein identify unverified behavior in an application component environment. In one example, a method of operating a collection service includes receiving communication data for a plurality of application components and generating a baseline set of communication interactions for the application component environment based on the communication data. The method further includes receiving additional communication data for the application components and generating a second set of communication interactions for the application component environment based on the communication data. The method also provides identifying a differential set of communication interactions by comparing the baseline set and the second set of communication interactions.
    Type: Application
    Filed: August 5, 2016
    Publication date: February 23, 2017
    Inventors: Vibhav Sreekanti, Gaurav Mathur, Richard Spillane, Gordon Chaffee
  • Publication number: 20170054747
    Abstract: Systems, methods, and software provided herein manage behavioral data for application components in a computing environment. In one example, a method of operating collection service includes receiving behavior reports for application containers in a computing environment. Once received, behavioral data in the behavior reports is stored in a tree data structure, wherein the tree data structure includes nodes for various time periods. Once the behavioral data is stored, a request may be generated for a portion of the behavioral data over a defined time period. In response to the request, a response summary may be generated based on the tree data structure and the defined time period.
    Type: Application
    Filed: August 5, 2016
    Publication date: February 23, 2017
    Inventors: Vibhav Sreekanti, Gaurav Mathur, Richard Spillane, Gordon Chaffee
  • Publication number: 20160301585
    Abstract: Systems, methods, and software provided herein generate a visual representation of communication between application components. In one example, a method of operating a method of operating a collection service system includes receiving a plurality of communication reports representing communications for application components, and storing the communication data from the plurality of communication reports in one or more data structures. The method further provides identifying administrator defined display parameters for the communication data, and generating a visual representation of the application components based on the display parameters and the one or more data structures.
    Type: Application
    Filed: April 13, 2016
    Publication date: October 13, 2016
    Inventors: Vibhav Sreekanti, Gaurav Mathur, Richard Spillane, Gordon Chaffee
  • Publication number: 20160292431
    Abstract: Systems, methods, and software to manage encryption keys in an application container environment are provided. In one example, a method of managing encryption keys comprises identifying a plurality of data objects to encrypt and encrypting the plurality of data objects via a plurality of encryption keys. The method further provides generating supplemental data for each data object, wherein the supplemental data for each data object comprises a key identifier that corresponds to an encryption key used to encrypt each data object. The method further includes associating the supplemental data for each data object with the encrypted version of each data object, and organizing the key identifiers from the plurality of data objects into a data structure with the plurality of encryption keys.
    Type: Application
    Filed: April 2, 2015
    Publication date: October 6, 2016
    Inventors: Vibhav Sreekanti, Gaurav Mathur, Richard Spillane, Gordon Chaffee