Patents by Inventor William Charnell
William Charnell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11347701Abstract: Described embodiments provide systems and methods of migrating clients between databases with different schemas. A database migrator may identify a first database accessible by the client including a first data object maintained in accordance with a first schema. The database migrator may generate, using the first database, a second database including the first data object from the first database. The database migrator may store, onto the second database in accordance with a second schema, a second data object received by the first database subsequent to generation of the second database. The database migrator may convert the first data object of the second database from the first schema to the second schema. The database migrator may migrate the client from the first database to the second database responsive to the completion of storing and converting.Type: GrantFiled: February 13, 2018Date of Patent: May 31, 2022Assignee: Citrix Systems, Inc.Inventors: Sheldon Lachambre, Sebastian Amrogowicz, William Charnell
-
Patent number: 11062049Abstract: Aspects described herein are directed to the concealment of customer sensitive data in virtual computing arrangements. A local computing platform may receive an object including a customer sensitive object name from a user computing device operating on a same internal domain as the local computing platform. The local computing platform may conceal the customer sensitive object name from a virtual computing platform operating on a domain external from the internal domain. The local computing platform may provide the concealed object name to the virtual computing platform for facilitating object enumeration requests from the user computing device during virtual computing sessions. During a virtual computing session between the user computing device and virtual computing platform, the local computing platform may receive the concealed object name from the user computing device and may perform one or more operations to reveal the object name to the user computing device.Type: GrantFiled: April 30, 2018Date of Patent: July 13, 2021Assignee: Citrix Systems, Inc.Inventors: Simon Frost, William Charnell
-
Patent number: 11057358Abstract: Aspects described herein are directed to the concealment of customer sensitive data in virtual computing arrangements. A local computing platform may receive an object including a customer sensitive object name from a user computing device operating on a same internal domain as the local computing platform. The local computing platform may conceal the customer sensitive object name from a virtual computing platform operating on a domain external from the internal domain. The local computing platform may provide the concealed object name to the virtual computing platform for facilitating object enumeration requests from the user computing device during virtual computing sessions. During a virtual computing session between the user computing device and virtual computing platform, the local computing platform may receive the concealed object name from the user computing device and may perform one or more operations to reveal the object name to the user computing device.Type: GrantFiled: September 5, 2018Date of Patent: July 6, 2021Assignee: Citrix Systems, Inc.Inventors: Simon Frost, William Charnell
-
Publication number: 20190334874Abstract: Aspects described herein are directed to the concealment of customer sensitive data in virtual computing arrangements. A local computing platform may receive an object including a customer sensitive object name from a user computing device operating on a same internal domain as the local computing platform. The local computing platform may conceal the customer sensitive object name from a virtual computing platform operating on a domain external from the internal domain. The local computing platform may provide the concealed object name to the virtual computing platform for facilitating object enumeration requests from the user computing device during virtual computing sessions. During a virtual computing session between the user computing device and virtual computing platform, the local computing platform may receive the concealed object name from the user computing device and may perform one or more operations to reveal the object name to the user computing device.Type: ApplicationFiled: September 5, 2018Publication date: October 31, 2019Inventors: Simon Frost, William Charnell
-
Publication number: 20190332798Abstract: Aspects described herein are directed to the concealment of customer sensitive data in virtual computing arrangements. A local computing platform may receive an object including a customer sensitive object name from a user computing device operating on a same internal domain as the local computing platform. The local computing platform may conceal the customer sensitive object name from a virtual computing platform operating on a domain external from the internal domain. The local computing platform may provide the concealed object name to the virtual computing platform for facilitating object enumeration requests from the user computing device during virtual computing sessions. During a virtual computing session between the user computing device and virtual computing platform, the local computing platform may receive the concealed object name from the user computing device and may perform one or more operations to reveal the object name to the user computing device.Type: ApplicationFiled: April 30, 2018Publication date: October 31, 2019Inventors: Simon Frost, William Charnell
-
Publication number: 20190251180Abstract: Described embodiments provide systems and methods of migrating clients between databases with different schemas. A database migrator may identify a first database accessible by the client including a first data object maintained in accordance with a first schema. The database migrator may generate, using the first database, a second database including the first data object from the first database. The database migrator may store, onto the second database in accordance with a second schema, a second data object received by the first database subsequent to generation of the second database. The database migrator may convert the first data object of the second database from the first schema to the second schema. The database migrator may migrate the client from the first database to the second database responsive to the completion of storing and converting.Type: ApplicationFiled: February 13, 2018Publication date: August 15, 2019Inventors: Sheldon Lachambre, Sebastian Amrogowicz, William Charnell
-
Patent number: 8171127Abstract: Systems and methods for response monitoring are described. A method of generating a measurement for use in calculating an end-user experience metric in a server-based computing environment includes, transmitting a message from a client of the server-based computing environment to an application executing in a user space provided by an operating system of the server, receiving a graphic response for execution by the client from the application, and determining an amount of time elapsed between the transmission of the message and the conclusion of the execution of the graphic response.Type: GrantFiled: October 25, 2005Date of Patent: May 1, 2012Assignee: Citrix Systems, Inc.Inventors: Simon Frost, William Charnell
-
Publication number: 20080016507Abstract: A computer system which includes a plurality of threads and a garbage collector that traces memory objects and identifies memory objects according to a three-color abstraction. The computer system also includes two methods of deleting compiled code in a self-modifying multi-threaded computer system. The computer system also utilizes a method of handling links between fragments of code in a self-modifying multi-threaded computer system. The computer system also handles patches between two pieces of code.Type: ApplicationFiled: June 29, 2007Publication date: January 17, 2008Applicant: ESMERTEC AGInventors: Stephen Thomas, William Charnell, Stephen Darnell, Blaise Dias, Philippa Guthrie, Jeremy Kramskoy, Jeremy Sexton, Michael Wynn, Keith Rautenbach, Wayne Plummer
-
Patent number: 7207036Abstract: A solution to avoid performance degradation associated with load-object independence by arranging interface source code, particurlarly JNI source code, in a stylized form, and then preprocessing the stylized interface source code into a Virtual Machine (“VM”) specific form. The stylized source code allows a preprocessor to identify and track field and method identifiers, and to match up the field and method uses with the specification of the field or method. The source code is stylized by substituting stylized variable names, each with a native element identifier, for non-stylized variables.Type: GrantFiled: February 7, 2001Date of Patent: April 17, 2007Assignee: Esmertec AGInventor: William Charnell
-
Publication number: 20030154467Abstract: A solution to avoid performance degradation associated with load-object independence by arranging interface source code, particurlarly JNI source code, in a stylized form, and then preprocessing the stylized interface source code into a Virtual Machine (“VM”) specific form. The stylized source code allows a preprocessor to identify and track field and method identifiers, and to match up the field and method uses with the specification of the field or method. The source code is stylized by substituting stylized variable names, each with a native element identifier, for non-stylized variables.Type: ApplicationFiled: December 3, 2002Publication date: August 14, 2003Inventor: William Charnell