HYPERQUALITY, INC Quality Assurance Consultant · Administrative Management and General Management Consulting
10900 NE 8 St SUITE 1101, Bellevue, WA 98004 Seattle, WA 98101 316 Occidental Ave S SUITE 300, Seattle, WA 98104 1118 Post Ave, Seattle, WA 98101 2062837119, 2064943860
Jude Kavalam VP Engineering
GOTVOICE, INC Research And Development · Operations · Telecommunications · Cell Phone Service · Custom Computer Programming Services · All Other Telecommunications
10512 NE 68, Kirkland, WA 98033 4256054100, 4258280472
Spoken Communications 2010 - Mar 2012
Vice President Engineering
Clearsight Systems Oct 2005 - Mar 2012
Chief Technology Officer
Hyperquality Mar 2007 - Sep 2009
Chief Technology Officer
Blue Heron Biotechnology Jul 2005 - Dec 2005
Software Developer
Microsoft Jul 2005 - Dec 2005
Principal Software Engineer Lead
Education:
University of California, Berkeley
Masters
Skills:
Entrepreneurship C++ Cloud Computing Mobile Applications Strategic Partnerships Analytics Product Management Strategic Planning C# Program Management Start Ups Software Development Team Leadership Saas E Commerce Mobile Devices Distributed Systems Business Development Scalability Marketing Strategy Software Design User Experience Business Strategy Product Development Web Services
Jude Jacob Kavalam - Seattle WA, US Edward J. Praitis - Woodinville WA, US Jonathan C. Lew - Redmond WA, US Pierre-Yves Santerre - Bellevue WA, US Timothy D. Noonan - Cary NC, US Valeriy V. Tsuryk - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 26/06
US Classification:
713167
Abstract:
Preventing uncontrolled access to an execution environment of a first component object by a second component object. A system includes a memory area storing the first component object, the second component object, and one or more predefined properties associated with the second component object. The system comprises a processor configured to receive a request from the first component object stored in the memory area to create the second component object stored in the memory area. The first component object executes in a first execution environment and the request specifies a requested execution environment for the second component object. The processor is also configured for analyzing the predefined properties stored in the memory area to determine an execution environment privilege associated with the second component object. The processor is configured for granting the received request as a function of the determined execution environment privilege.
System And Method For Monitoring Interactions Between Application Programs And Data Stores
Jude Jacob Kavalam - Seattle WA, US Adam D. Stritzel - Redmond WA, US Nigel S. Keam - Redmond WA, US Timothy D. Noonan - Cary NC, US Valeriy V. Tsuryk - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/44 H04L 29/06 G06F 17/30
US Classification:
719328, 713164, 707 3
Abstract:
Monitoring interactions between application programs and data stores for analyzing stability of application programs. A method of the invention intercepts interactions from a plurality of application programs to a data store. The method also identifies pre-execution data relating to each of the intercepted interactions and the intercepted interaction is executed. The method identifies post-execution data relating to each of the executed interactions. The identified pre-execution data and the identified post-execution data from each of the interactions are normalized to create normalized interaction data for each of the interactions. The method combines the normalized interaction data for each of the interactions as a function of the application programs associated with each of the interactions. The method further stores the combined interaction data for analysis of the interactions between the application programs and the data store which is indicative of the stability of the application programs.
Method And System For Keeping An Application Up-To-Date
Sudeep Bharati - Bellevue WA, US John D. Colleran - Redmond WA, US Jude Kavalam - Seattle WA, US Kyle P. Shannon - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F009/44
US Classification:
717/170000
Abstract:
Disclosed are methods for keeping an application up-to-date that identify the application and the application user's specific needs to apply just the updates the user needs when the user needs them. Based on particulars of the user's computing environment, an update policy is implemented that specifies certain “triggering events” for each application to be kept up-to-date. When a triggering event occurs, the application associated with the triggering event is identified. A list is compiled of the updates already applied to the application. Another list is compiled, possibly at a remote update server, of all the updates available for the application. The lists are compared, and if an available but not yet applied update is found, then that update is sent to the user. To identify an application associated with a triggering event, the update server correlates information collected from the user's computing environment with the server's database of available updates.
Jude Kavalam - Seattle WA, US Timothy Noonan - Cary WA, US Valeriy Tsuryk - Sammamish WA, US Adam Stritzel - Redmond WA, US David Probert - Woodinville WA, US Eric Li - Redmond WA, US John Rector - Redmond WA, US Dragos Sambotin - Issaquah WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L009/00
US Classification:
713201000
Abstract:
Managing the installation, execution, and removal of application programs by an operating system via an application identity associated with each application program. A method of the invention assigns the application identity to each application program and a resource identity to each resource associated with each application program. The method relates the assigned application identity and resource identity to enable manipulation of the application program and its resources.
Jude Kavalam - Seattle WA, US Timothy Noonan - Cary NC, US Valeriy Tsuryk - Sammamish WA, US RoseMarie FitzSimons - Seattle WA, US Jonathan Lew - Redmond WA, US Freddie Aaron - Bothell WA, US Edward Praitis - Woodinville WA, US David Probert - Woodinville WA, US Eric Li - Redmond WA, US John Rector - Redmond WA, US Dragos Sambotin - Issaquah WA, US Genevieve Fernandes - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F007/00
US Classification:
718104000, 707001000
Abstract:
Granting an application program access to a resource as a function of a privilege associated with the application program. An embodiment of the invention employs a persistent, individual identity associated with the components of an application program or a group of application programs to allow an operating system to identify and differentiate between different application programs or groups of application programs installed on a computing system. The identity associated with each component of an application program enables the identification and removal or uninstallation of the application program. The identity also enables isolation of resources of the application program and protection of operating system resources.
Analysis Of The Impact Of Application Programs On Resources Stored In Data Stores
Jude Kavalam - Seattle WA, US Adam Stritzel - Redmond WA, US Nigel Keam - Redmond WA, US Timothy Noonan - Cary NC, US Valeriy Tsuryk - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/45
US Classification:
717141000
Abstract:
System and method for analyzing the impact of interactions of application programs with resources stored in a data store. A method of the invention receiving a selection of the application programs from a user. The interactions of the resources by the selected application programs are identified. The method also determines access types for each of the interactions of the resources by the selected application programs. The method further selects a set of the identified interactions and the determined access types that corresponds to a map, said map including a predefined set of interactions having access types associated therewith. The map with the selected set of the identified interactions and the determined access types is provided to the user. For example, the map identifies potential resource conflicts. Alternatively, the method generates a report including the map.
System And Method For Resizing And Rearranging A Composite Toolbar By Direct Manipulation
Jude Jacob Kavalam - Bellevue WA Shawna Rae Sandeno - Issaquah WA Jeffrey L. Bogdan - Redmond WA Christopher R. Brown - Seattle WA Arthur E. Blume - New York NY
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 501
US Classification:
345334
Abstract:
A system and method for customizing a composite toolbar via direct on-screen manipulation by resizing the composite toolbar and by rearranging sections within a composite toolbar. A composite toolbar is displayed in an initial configuration state having a resizing area and a plurality of sections displayed on a number n rows. When the resizing area has been dragged in a first direction, the size of the composite toolbar is increased by changing to a larger configuration state having n+1 rows. When the resizing area has been dragged in a second direction, the size of the composite toolbar is decreased by changing to a smaller configuration state having n-1 rows. In another aspect of the present invention, when the one of the sections has been dragged in a first direction, the dragged section is expanded so that it overlaps an adjacent section. When one of the sections has been dragged in a second direction, the dragged section is collapsed so that it reveals an adjacent section.
Youtube
W209 - Visualizing Brooklyn Demo
Video demoing the dashboard built as a final project by Alice Ye, Aman...
Duration:
3m 24s
|Pr.Anish Kavalam|short and sweet
WELCOME NOTE: Greetings from Gospel king. Thanks for visiting us. Let'...
Duration:
10m 42s
Smrithi | Kavalam Narayana Panicker | Safari TV
|| ANTI-PIRACY WARNING || This content is Copyrighted to Safari TV. An...
Duration:
28m 1s
A Christian Devotional Message by Pr.Anish Ka...
Malayalam Christian Messages 2022 -Christian Malayalam Messages-Malaya...
Duration:
1h 26m 17s
BETTER HALFWife of Kavalam Sreekumar Jaihind ...
Launched on 17 August 2007, by Congress President and UPA Chairperson,...
Duration:
18m 31s
Epistle of Jude Part 1/4 | Br. George Cherian...
Jeevaram Bible studies has been a blessing to many over the past 30+ y...