new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings

Kristofer Hellick Reierson patents

Recent patents with Kristofer Hellick Reierson listed as an inventor - additional entries may be under other spellings.


Kristofer Hellick Reierson - Related organizations: Microsoft Technology Licensing, Llc patents, Microsoft Corporation patents

Satisfying application dependencies

11/10/16 - 20160328224 - The dependencies of an application are identified by intercepting application programming interface calls made by an application. A determination is then made at the runtime of the application as to whether the dependencies of the application are present. If the dependencies are not present, a client device upon which the
Inventors: Matthew Christopher Babey, Eric Jewart, Kristofer Hellick Reierson, Angela Mele Anderson

Providing a persona-based application experience

05/12/16 - 20160134721 - Technologies are described herein for providing a persona-based application experience. A query for a location of a persona package is received from a virtualization client. When the query is received, a current persona of a user requesting execution of a virtualized application is determined. The location of the persona package
Inventors: Alvin Chardon, Kristofer Hellick Reierson, Angela Mele Anderson, Galen Clyde Hunt, Douglas Christopher Burger, Dilip Krishna Pai

Storing and resuming application runtime state

04/14/16 - 20160103701 - Execution of an application is suspended and the runtime state of the application is collected and persisted. Maintenance operations may then be performed on the computer that the application was executing upon. The runtime state might also be moved to another computer. In order to resume execution of the application,
Inventors: Charles Kekeh, Aseem Kohli, Scott Elliot Stearns, Kristofer Hellick Reierson, Cread Wellington Mefford, Angela Mele Anderson

Selectively managing datasets

03/24/16 - 20160087993 - Selectively wiping data. A method includes identifying a plurality of datasets on a device. The method further includes identifying one or more datasets, on a dataset basis, from among the plurality of datasets that are managed datasets associated with a particular user account by being associated with an account identifier
Inventors: Meera Jindal, Kristofer Hellick Reierson, Neil Adam Jacobson, Alemeshet Yismaw Alemu, Lidiane Souza Jones

Predicting, diagnosing, and recovering from application failures based on resource access patterns

03/03/16 - 20160062817 - Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from application failures. Access to resources by the application program is monitored, and resource access events are logged. Resource access patterns are established from the logged resource access events utilizing
Inventors: Matthew David Young, Kristofer Hellick Reierson, Eric Jewart

Converting desktop applications to web applications

01/28/16 - 20160026478 - Technologies are described herein for converting a desktop application to a web application. An interface file is generated based on a user interface of the desktop application. A logic file is generated based on application executables of the desktop application. A data model is generated based on application data and
Inventors: Aseem Kohli, Kristofer Hellick Reierson, Angela Mele Anderson

Thread operation across virtualization contexts

12/18/14 - 20140373008 - Application virtualization at the thread level, rather than at the process level, the operation of a thread across virtualization contexts. For instance, one virtualization context might be a native environment, whereas another virtualization context might be a virtualization environment in which code running inside a virtualization package has access to
Inventors: Neil A. Jacobson, Gurashish Singh Brar, Kristofer Hellick Reierson

Multi-machine deployment and configuration of multi-tiered applications

10/16/14 - 20140310703 - Technologies are described herein for deploying and configuring a multi-tiered application to multiple computers. A selection of one or more application packages from multiple available application packages is received. Each of the selected application packages may correspond to one of multiple deployment configurations. The selected application packages may form the
Inventors: Lidiane Pereira De Souza, Kristofer Hellick Reierson, Matthew R. Yandek

Application execution in a restricted application execution environment

10/09/14 - 20140304771 - Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call is allowed or blocked by a restricted application execution environment. Each API call that is blocked by the restricted application execution environment is modified so that
Inventors: Kristofer Hellick Reierson, Angela Mele Anderson

Application execution in a restricted application execution environment

09/04/14 - 20140250494 - Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call is allowed or blocked by a restricted application execution environment. Each API call that is blocked by the restricted application execution environment is modified so that
Inventors: Kristofer Hellick Reierson, Angela Mele Anderson

Application execution in a restricted application execution environment

06/28/12 - 20120167121 - Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call is allowed or blocked by a restricted application execution environment. Each API call that is blocked by the restricted application execution environment is modified so that
Inventors: Kristofer Hellick Reierson, Angela Mele Anderson

Storing and resuming application runtime state

06/28/12 - 20120167117 - Execution of an application is suspended and the runtime state of the application is collected and persisted. Maintenance operations may then be performed on the computer that the application was executing upon. The runtime state might also be moved to another computer. In order to resume execution of the application,
Inventors: Charles Kekeh, Aseem Kohli, Scott Elliot Stearns, Kristofer Hellick Reierson, Cread Wellington Mefford, Jr., Angela Mele Anderson

Converting desktop applications to web applications

06/28/12 - 20120166963 - Technologies are described herein for converting a desktop application to a web application. An interface file is generated based on a user interface of the desktop application. A logic file is generated based on application executables of the desktop application. A data model is generated based on application data and
Inventors: Aseem Kohli, Kristofer Hellick Reierson, Angela Mele Anderson

Predicting, diagnosing, and recovering from application failures based on resource access patterns

06/28/12 - 20120166869 - Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from application failures. Access to resources by the application program is monitored, and resource access events are logged. Resource access patterns are established from the logged resource access events utilizing
Inventors: Matthew David Young, Kristofer Hellick Reierson, Eric Jewart

Satisfying application dependencies

06/28/12 - 20120166597 - The dependencies of an application are identified by intercepting application programming interface calls made by an application. A determination is then made at the runtime of the application as to whether the dependencies of the application are present. If the dependencies are not present, a client device upon which the
Inventors: Matthew Christopher Babey, Eric Jewart, Kristofer Hellick Reierson, Angela Mele Anderson

Providing a security boundary

06/21/12 - 20120159570 - In order to enable potentially conflicting applications to execute on the same computer, application programming interface (API) calls are intercepted when an application attempts to access a computer system's resources. During a learning mode of operation, a security monitor stores data in a security monitor database identifying which applications are
Inventors: Kristofer Hellick Reierson, Lidiane Pereira De Souza, Angela Mele Anderson

Providing a persona-based application experience

06/21/12 - 20120159479 - Technologies are described herein for providing; a persona-based application experience. A query for a location of a persona package is received from a virtualization client. When the query is received, a current persona of a user requesting execution of a virtualized application is determined. The location of the persona package
Inventors: Alvin Chardon, Kristofer Hellick Reierson, Angela Mele Anderson, Galen Clyde Hunt, Douglas Christopher Burger, Dilip Krishna Pai

Multi-machine deployment and configuration of multi-tiered applications

06/21/12 - 20120159471 - Technologies are described herein for deploying and configuring a multi-tiered application to multiple computers. A selection of one or more application packages from multiple available application packages is received. Each of the selected application packages may correspond to one of multiple deployment configurations. The selected application packages may form the
Inventors: Lidiane Pereira De Souza, Kristofer Hellick Reierson, Matthew R. Yandek

Policy-based application delivery

06/21/12 - 20120158819 - Technologies are described herein for automatically selecting a best application delivery method based on a centrally maintained policy. An agent executing on a user computing device receives a request to initiate an application. The agent requests a centrally maintained application placement policy document regarding the application program from a policy
Inventors: Angela Mele Anderson, Charles Kekeh, Scott Elliot Stearns, Kristofer Hellick Reierson, Lidiane Pereira De Souza


### Kristofer Hellick Reierson patent invention listings

The bibliographic references displayed about Kristofer Hellick Reierson's patents are for a recent sample of Kristofer Hellick Reierson's publicly published patent applications. The inventor/author may have additional bibliographic citations listed at the USPTO.gov. FreshPatents.com is not associated or affiliated in any way with the author/inventor or the United States Patent/Trademark Office but is providing this non-comprehensive sample listing for educational and research purposes using public bibliographic data published and disseminated from the United States Patent/Trademark Office public datafeed. This information is also available for free on the USPTO.gov website. If Kristofer Hellick Reierson filed recent patent applications under another name, spelling or location then those applications could be listed on an alternate page. If no bibliographic references are listed here, it is possible there are no recent filings or there is a technical issue with the listing--in that case, we recommend doing a search on the USPTO.gov website.

###



Sign up for the FreshPatents.com FREE Keyword Monitor and check for keyword phrases (ie. "RFID" , "wireless", "web development", "fuel cells" etc.)...You will be notified when new patent applications and inventions are published that match your keywords. Also you can save for later research public patent/invention documents using our FREE Organizer. It takes only 30 seconds to sign up or login.

Advertise on FreshPatents.com - Rates & Info

###

FreshPatents.com Support - Terms & Conditions