Patents by Inventor Thomas Speeter

Thomas Speeter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120131199
    Abstract: Systems and methods for encapsulating computing resources in one or more layers are provided. In some embodiments, a set of computing resources are encapsulated in a layer. The layer is mobile from a first storage to a second storage. A request for a specific computing resource is received by an application of a computing device. A determination is made whether the layer includes the requested computing resource. The request is processed if the layer includes the requested computing resource. The processed request is provided to the operating system of the computing device.
    Type: Application
    Filed: January 19, 2012
    Publication date: May 24, 2012
    Applicant: CITRIX SYSTEMS, INC.
    Inventors: Michael Larkin, Thomas Speeter
  • Publication number: 20090222491
    Abstract: Systems and methods for encapsulating computing resources in one or more layers are provided. In some embodiments, a set of computing resources are encapsulated in a layer. The layer is mobile from a first storage to a second storage. A request for a specific computing resource is received by an application of a computing device. A determination is made whether the layer includes the requested computing resource. The request is processed if the layer includes the requested computing resource. The processed request is provided to the operating system of the computing device.
    Type: Application
    Filed: January 8, 2009
    Publication date: September 3, 2009
    Inventors: Michael Larkin, Thomas Speeter
  • Publication number: 20060179116
    Abstract: The present invention provides a system and method for discovering configuration data in a computer system. The system retrieves at least one component indicator from a component blueprint, database or other location. A target computer is probed according to the retrieved component indicator. The results of the probing are used to generate at least one verification rule, which are used to verify the existence of the software component associated with the retrieved component indicator.
    Type: Application
    Filed: August 15, 2005
    Publication date: August 10, 2006
    Inventors: Thomas Speeter, Marco Framba, David Duncan, Venkateshwar Talla, Charles Bullis
  • Publication number: 20060161895
    Abstract: Comparison of configuration information between software applications, hosts computers or components of software applications using application blueprints. Comparison includes selecting the elements for comparison, determining the type of elements for comparison, selecting the appropriate algorithm for comparison depending upon whether the element type is a software application, a host computer or a components of software application. Comparing the selected elements according to the algorithm includes comparing the configuration information according to the meta-data in the blueprints associated with the elements being compared.
    Type: Application
    Filed: August 18, 2005
    Publication date: July 20, 2006
    Inventors: Thomas Speeter, Marco Framba, David Duncan, Venkateshwar Talla, Charles Bullis
  • Publication number: 20060149408
    Abstract: Discovery of software components including selecting agent-less indicators for a software component, probing one or more target computers according to the selected agent-less indicators, and receiving the results of the probe. The results of the probe are compared to a component blueprint to determine if there is one or more software components that match the results of the probe. In the event of a match, agent-less verification rules are selected and applied. The results of the application of the agent-less verification rules are compared to the expected results of the agent verification rules from the component blueprint to verify the existence of the software component.
    Type: Application
    Filed: August 16, 2005
    Publication date: July 6, 2006
    Inventors: Thomas Speeter, Marco Framba, David Duncan, Venkateshwar Talla, Charles Bullis
  • Publication number: 20060143144
    Abstract: The present invention provides rule sets and a system and method for creating and enforcing rule sets in a computer management system. Rules specifying a constraint on an attribute of a computer system may be created to enforce a policy. Multiple rules may be arranged into rule sets, specifying multiple constraints for a target computer system. Rules or rule sets are enforced against a target computer system to determine whether the rule or rules are satisfied. In the event an attribute of the computer system does not satisfy a constraint, the system declares the rule failed and may take action according to a severity attribute specified in the failed rule.
    Type: Application
    Filed: August 15, 2005
    Publication date: June 29, 2006
    Inventors: Thomas Speeter, Marco Framba, David Duncan, Venkateshwar Talla, Charles Bullis
  • Publication number: 20060037000
    Abstract: The present invention provides a data model for organizing configuration information for computer systems. The data model utilizes blueprints to structure the data for configuration discovery and management of the computer system. The data model supports a comprehensive organization of the software components associated with providing a service, and provides detailed configuration information for the components of the service across a distributed topology. In one embodiment, the blueprints are collections of rules specifying the actions a configuration management system may take in discovering, comparing and acting upon configuration data.
    Type: Application
    Filed: June 21, 2005
    Publication date: February 16, 2006
    Inventors: Thomas Speeter, Marco Framba, David Duncan, Venkateshwar Talla, Charles Bullis
  • Publication number: 20050080811
    Abstract: A system is for managing an application enterprise, wherein the application enterprise includes a plurality of distributed instances of a plurality of applications. The system includes a plurality of application blueprints, each application blueprint modeling a separate application. An enterprise data store is to hold enterprise data, representative of one or more states of the instances, according to the application blueprints. An application enterprise bus provides a standard interface to the enterprise data. A plurality of enterprise data access tools that each access the enterprise data via the application enterprise bus and provide a view of the current state of the application enterprise based thereon.
    Type: Application
    Filed: August 17, 2004
    Publication date: April 14, 2005
    Applicant: Cendura Corporation
    Inventors: Thomas Speeter, Marco Framba, David Duncan, Venkateshwar Talla, Charles Bullis