William M. Bumgarner - San Jose CA, US Adam C. Swift - San Jose CA, US Andrew Gross - Los Gatos CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 9/44
US Classification:
717103, 717120, 707623, 70799901, 709203, 718106
Abstract:
Mounting and populating a mirrored version of at least a portion of a file system of a recruiter machine at a volunteer machine performing one or more data processing tasks for the recruiter machine is disclosed. In some embodiments, an input stored in such a dedicated file system for the recruiter machine at the volunteer machine may be locally retrieved and reused, if still consistent with a corresponding input stored in a file system at the recruiter machine, when performing a data processing task for the recruiter machine at the volunteer machine. In some embodiments, if an input required by the volunteer machine to perform a data processing task for the recruiter machine is not cached in such a dedicated file system for the recruiter machine at the volunteer machine in a state that is consistent with a corresponding input stored in a file system at the recruiter machine, the input is obtained from the recruiter machine.
William Bumgarner - San Jose CA, US Adam Swift - San Jose CA, US Andrew Gross - Los Gatos CA, US
International Classification:
G06F 9/44
US Classification:
717120000
Abstract:
Mounting and populating a mirrored version of at least a portion of a file system of a recruiter machine at a volunteer machine performing one or more data processing tasks for the recruiter machine is disclosed. In some embodiments, an input stored in such a dedicated file system for the recruiter machine at the volunteer machine may be locally retrieved and reused, if still consistent with a corresponding input stored in a file system at the recruiter machine, when performing a data processing task for the recruiter machine at the volunteer machine. In some embodiments, if an input required by the volunteer machine to perform a data processing task for the recruiter machine is not cached in such a dedicated file system for the recruiter machine at the volunteer machine in a state that is consistent with a corresponding input stored in a file system at the recruiter machine, the input is obtained from the recruiter machine.
Russell A. BLAINE - San Francisco CA, US Timothy P. Marsland - Half Moon Bay CA, US Benjamin H. Nham - San Francisco CA, US Adam C. Swift - San Jose CA, US Benjamin C. Trumbull - San Jose CA, US Umesh S. Vaishampayan - Santa Clara CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 17/30
US Classification:
707691
Abstract:
Guarded file access operations are provided for creating and using guarded file descriptors, which can detect and prevent erroneous file access operations in computer programs. A file descriptor can be associated with a guard identifier to create a guarded file descriptor. The association can be established when the file is opened, and can be maintained independently of the computer program, which ordinarily maintains its own association between files, file descriptors, and guard identifiers. Subsequent file operations using the guarded file descriptor check that the guard identifier previously associated with that file descriptor is presented, and generate errors without performing the requested file operations if the correct guard identifier is not presented. This check serves as a validation of the computer program's use of file descriptors. An error and stack trace can be generated for use in analyzing a cause of the guard violation.
- Cupertino CA, US Jessica Aranda - Santa Clara CA, US Patrick Coffman - Cupertino CA, US Richard L. Hagy - Montara CA, US Stephen J. Rhee - San Jose CA, US Nicole R. Ryan - San Francisco CA, US Adam C. Swift - Cupertino CA, US Gavin B. Thomson - Mountain View CA, US Brandon J. Van Ryswyk - Cupertino CA, US
International Classification:
G06F 16/54 G06F 16/535 G06F 3/0482
Abstract:
Described herein are techniques to enable limited access to a photos library by enabling application specific virtual photo libraries. When an application requests access to the photos library, the user can select an option to enable or configure a virtual photos library, and then select specific assets (e.g., photos, videos) within the photos library to be selected for inclusion into an application specific virtual photos library.
Adaptive Handling Of Priority Inversions Using Transactions
- Cupertino CA, US Adam C. Swift - San Jose CA, US Russell A. Blaine - San Francisco CA, US Benjamin H. Nham - San Francisco CA, US Kari E. Christianson - Santa Clara CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 9/46
US Classification:
718101
Abstract:
An operating system of a data processing system receives a request from a first process to acquire an exclusive lock for accessing a resource of the data processing system. A second priority of a second process is increased to reduce total execution time. The second process is currently in possession of the exclusive lock for performing a transactional operation with the resource. The second priority was lower than a first priority of the first process. The operating system notifies the second process to indicate that another process is waiting for the exclusive lock to allow the second process to complete or roll back the transactional operation and to release the exclusive lock thereafter.
- Cupertino CA, US Nicholas W. GILLETT - Cupertino CA, US Adam C. SWIFT - San Jose CA, US
Assignee:
APPLE INC. - Cupertino CA
International Classification:
G06F 17/30
US Classification:
707610, 707803, 707E17005
Abstract:
Methods and apparatus are provided in which applications that run on different devices can be upgraded with migration of data to a new database format. A method of upgrading a first version of an application installed on a first device to a second version is provided, where first and second transaction logs for respective first and second schema versions are stored in respective first and second log containers on a server computer, and the first version of the application stores data in accordance with a first schema version, and further stores a cache of at least a portion of the first transaction log in a log database on the first device, migrating the log database to the second schema version, storing a duplicate copy of the first transaction log in the second log container, and rewriting the duplicate copy of the first transaction logs using the second schema.
Name / Title
Company / Classification
Phones & Addresses
Adam Swift President
Redmud Inc Computer Related Services
5315 N Clark St, Chicago, IL 60640
Adam Swift President
REDMUD, INC Computer Related Services, NEC
Chicago, IL 60640 5315 N Clark St, Chicago, IL 60640 3126712326
Brivo Inc.
Technical Team Lead
Brivo Inc.
Senior Software Engineer at Brivo Inc
5Am Solutions Aug 2010 - Apr 2014
Software Engineer
Booz Allen Hamilton Jan 2006 - Aug 2010
Software Developer
Apple Jan 2006 - Aug 2010
Software Engineer
Education:
University of Maryland Baltimore County 2001 - 2005
Bachelors, Bachelor of Science, Computer Science
Carnegie Mellon University 1989 - 1993
Bachelors, Bachelor of Science, Mathematics, Computer Science
Skills:
Java Jquery Java Enterprise Edition Javascript Hibernate Scrum Postgresql Junit Web Applications Software Development Agile Methodologies Struts Sun Certified Java Programmer Certified Scrum Master Csm Jee Struts2 Sun Certified Web Component Developer
Interests:
Ios Javascript Java Titanium
Certifications:
Java Programmer For Java 5 Web Component Developer Titanium Certified Application Developer Certified Scrum Master Sun Microsystems Appcelerator Scrum Alliance
Huber Street Elementary School Secaucus NJ 2001-2005
Community:
Sandra Wilstermann, Hera Kalu, Raymond Santana, Jessica Kalisch, Chris Lee, Jonathan Scheiner, Taylor Jones, Nima Brahmbhatt, John Cooley, Jordan Antonacci, Jane Merlo