James Peter Rupke

age ~40

from Seattle, WA

Also known as:
  • James P Rupke
  • James P Rurke
Phone and address:
119 29Th Ave E, Seattle, WA 98112

James Rupke Phones & Addresses

  • 119 29Th Ave E, Seattle, WA 98112
  • Bellevue, WA
  • Redmond, WA
  • Auburn, WA

Work

  • Company:
    Qualtrics
    Jul 2017
  • Position:
    Senior software engineer

Education

  • Degree:
    Bachelors
  • School / High School:
    University of Waterloo
    2003 to 2008
  • Specialities:
    Computer Science

Skills

C# • C++ • Software Development • Visual Studio • Sharepoint • Java • Microsoft Sql Server • Powershell • Asp.net • Distributed Systems • Software Design • .Net Framework • Javascript • Sql • Web Services • Object Oriented Design

Industries

Computer Software

Resumes

James Rupke Photo 1

Senior Software Engineer

view source
Location:
Seattle, WA
Industry:
Computer Software
Work:
Qualtrics
Senior Software Engineer

Microsoft Sep 2015 - Jun 2017
Senior Software Engineer

Microsoft Jul 2008 - Sep 2015
Software Development Engineer

University of Waterloo May 2007 - Aug 2007
Research Assistant

Syntergy Sep 2006 - Dec 2006
Software Developer
Education:
University of Waterloo 2003 - 2008
Bachelors, Computer Science
Skills:
C#
C++
Software Development
Visual Studio
Sharepoint
Java
Microsoft Sql Server
Powershell
Asp.net
Distributed Systems
Software Design
.Net Framework
Javascript
Sql
Web Services
Object Oriented Design

Us Patents

  • Isolating Data To Be Moved Across Boundaries

    view source
  • US Patent:
    20160321248, Nov 3, 2016
  • Filed:
    Oct 2, 2015
  • Appl. No.:
    14/874137
  • Inventors:
    - Redmond WA, US
    Adrian Fanaru - Sammamish WA, US
    Burra Gopal - Bellevue WA, US
    James P. Rupke - Seattle WA, US
    Parul Manek - Redmond WA, US
    Ziyi Wang - Redmond WA, US
    David Charles Oliver - Bellevue WA, US
    Daniel Keith Winter - Monroe WA, US
    Yang Xiang - Issaquah WA, US
  • International Classification:
    G06F 17/30
  • Abstract:
    Data to be moved from a source system to a target system, for a set of tenants, is first identified. It is then isolated into its own container. The contents are then moved.
  • Securely Moving Data Across Boundaries

    view source
  • US Patent:
    20160321274, Nov 3, 2016
  • Filed:
    Sep 15, 2015
  • Appl. No.:
    14/854761
  • Inventors:
    - Redmond WA, US
    Burra Gopal - Sammamish WA, US
    Adrian Fanaru - Sammamish WA, US
    James Rupke - Seattle WA, US
    David Charles Oliver - Bellevue WA, US
    Daniel Keith Winter - Redmond WA, US
    Parul Manek - Redmond WA, US
  • International Classification:
    G06F 17/30
  • Abstract:
    Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.
  • Generating An Idempotent Workflow

    view source
  • US Patent:
    20150067095, Mar 5, 2015
  • Filed:
    Aug 30, 2013
  • Appl. No.:
    14/015160
  • Inventors:
    - Redmond WA, US
    Yuriy Labunets - Redmond WA, US
    Amy Simpson - Kirkland WA, US
    James Rupke - Seattle WA, US
    Kai Zhu - Bellevue WA, US
    Roberto Taboada - Duvall WA, US
    Shayan Kayhanian - Kirkland WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 12/24
  • US Classification:
    709217
  • Abstract:
    Various methods and systems for generating an idempotent workflow are described herein. In one example, a method includes detecting distributed code and identifying a boundary function in the distributed code. The method can also include separating the boundary function into a transition function, a non-idempotent function, and a reversion function. Additionally, the method can include transforming the non-idempotent function into an idempotent function by generating a flag corresponding to the non-idempotent function, wherein the flag indicates if the non-idempotent function has been executed. Furthermore, the method can include combining the transition function, the idempotent function, and the reversion function to form the idempotent workflow.

Get Report for James Peter Rupke from Seattle, WA, age ~40
Control profile