Amy H. Kang - Mountain View CA, US Joseph F. Di Pol - Sunnyvale CA, US Linda K. Schneider - San Jose CA, US Christopher S. Kasso - Los Altos CA, US
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 9/44
US Classification:
717128
Abstract:
For a flexible error trace mechanism, embodiments may be implemented for C/C++ interface libraries, or in programs written in C/C++ or other programming languages. In one embodiment, when an error occurs in a function call, a trace element may be recorded that may include the source file name, function name, line number and other information that may be used to identify the error. In one embodiment, the library function may call a plurality of library functions in a function call stack. For each of the plurality of library functions, if the library function generates an error, an error trace element may be added to the error trace. After completion of the library function, the program may obtain the error trace for the library function. The error(s), if any, may be debugged using the information in the obtained error trace.
Pluggable Authentication And Access Control For A Messaging System
Amy Kang - Mountain View CA, US George Tharakan - Sunnyvale CA, US Joseph Pol - Sunnyvale CA, US Christopher Kasso - Los Altos CA, US
International Classification:
G06F015/173
US Classification:
709/225000, 709/229000
Abstract:
A system and method for providing pluggable authentication and access control in computer systems and services are described. The authentication and access control process may be categorized into three components: an authentication protocol, a user repository and an access control model. In one embodiment, the authentication and access control mechanism may be implemented as three pluggable modules: an authentication protocol handler module for the authenticator side, an authentication protocol handler for the side to be authenticated, and an access control context module on the authenticator side. The pluggable modules may be exchangeable to support a variety of authentication types, user repositories, and access control models. The authentication protocol handlers provide symmetrical methods to handle requests and responses in the authentication process that reflect the symmetrical nature of the authentication process.
Caching Bids In An Online Advertisement Bidding System
Bhaskar Ghosh - Palo Alto CA, US Amy Kang - New York NY, US Wendell Craig Baker - Palo Alto CA, US
International Classification:
G06Q 30/00
US Classification:
705 1471, 705 26
Abstract:
An online advertising system integrates third party agents to permit the third party agents to participate in auctions to bid on a per opportunity basis. An advertising exchange module receives requests for opportunities to serve online advertisements to users. In response, an advertising exchange module applies one or more business rules to determine third party agents that qualify to serve the online advertisement. A bid gateway module generates and transmits requests for bids to the third party agents. The bid gateway module then receives bids from the third party agents in response to the requests for bids. The advertising exchange module then selects an advertisement based on the bid. The online advertisement exchange system provides a unified marketplace to permit integrator networks to bid on both ads pursuant to guaranteed contracts and ads not subject to guaranteed contracts (e.g., non-guaranteed ads). The online advertisement system further includes traffic management to allow the third parties to regulate bid requests sent from the online advertisement system. In some embodiments, the online advertising system caches bids, to efficiently implement the per opportunity auction, and transmits information, such as targeting information, to the third party agents to aid in the third party agents' formulation of bids.
Architecture For An Online Advertisement Bidding System
Bhaskar Ghosh - Palo Alto CA, US Wendell Craig Baker - Palo Alto CA, US George Goldenberg - Los Altos CA, US Amy Kang - New York NY, US Sunil Nagaraj - Sunnyvale CA, US
International Classification:
G06Q 30/00
US Classification:
705 1473, 705 26
Abstract:
An online advertising system integrates third party agents to permit the third party agents to participate in auctions to bid on a per opportunity basis. An advertising exchange module receives requests for opportunities to serve online advertisements to users. In response, an advertising exchange module applies one or more business rules to determine third party agents that qualify to serve the online advertisement. A bid gateway module generates and transmits requests for bids to the third party agents. The bid gateway module then receives bids from the third party agents in response to the requests for bids. The advertising exchange module then selects an advertisement based on the bid. The online advertisement exchange system provides a unified marketplace to permit integrator networks to bid on both ads pursuant to guaranteed contracts and ads not subject to guaranteed contracts (e.g., non-guaranteed ads). The online advertisement system further includes traffic management to allow the third parties to regulate bid requests sent from the online advertisement system. In some embodiments, the online advertising system caches bids, to efficiently implement the per opportunity auction, and transmits information, such as targeting information, to the third party agents to aid in the third party agents' formulation of bids.
System And Method For Flow Control In A Messaging Subsystem Based On Message-In/Out Rates
Amy H. Kang - Mountain View CA, US Edward J. Bratt - Oakland CA, US
Assignee:
ORACLE INTERNATIONAL CORPORATION - Redwood Shores CA
International Classification:
G06F 15/16
US Classification:
709204
Abstract:
Systems and methods are provided, for use in a messaging subsystem, which supports flow control of messages between producers and consumers. A system can include at least one producer that is operable to send messages in a batch to one or more consumers via at least one destination; and one or more consumers that are operable to process messages received from the at least one producer via the at least one destination. The system can also include a message broker which includes the at least one destination and which manages communications between the at least one producer and the one or more consumers. The message broker includes a flow controller that is operable to monitor a producing rate and a consuming rate, and dynamically adjust a batch size of the batch at the at least one producer based on the producing rate and the consuming rate to communicate the messages more efficiently.
Techniques For Using Signed Nonces To Secure Cloud Shells
- Redwood Shores CA, US Peter Grant Gavares - Austin TX, US Linda K. Schneider - Santa Clara CA, US Amy H. Kang - Mountain View CA, US Joseph John Snyder - Wenonah NJ, US
Assignee:
Oracle International Corporation - Redwood Shores CA
Techniques for using signed nonces to secure cloud shells are provided. The techniques include receiving, by a session manager service, a request to connect a user device to a secure connection to a secure shell instance. The session manager service may authorize the user device to access the secure shell instance and may configure the secure shell instance, being described by a shell identifier of the secure shell instance. The techniques also include generating, by the session manager service, a nonce token and providing the shell identifier, and a router address of the secure shell router to the user device. The techniques also include generating, by the session manager service, a signed nonce token using the nonce token; and providing the signed nonce token and the shell identifier to a user device.
Techniques For Utilizing Multiple Network Interfaces For A Cloud Shell
- Redwood Shores CA, US Peter G. Gavares - Austin TX, US John Wells - Scotch Plains NJ, US Amy H. Kang - Mountain View CA, US Joseph John Snyder - Wenonah NJ, US
Assignee:
Oracle International Corporation - Redwood Shores CA
Techniques for utilizing multiple network interfaces for a cloud shell are provided. The techniques include receiving, by a computer system, a command to execute an operation by the computer system, the command being received from a router via a primary virtual network interface card (vNIC). The computer system may execute the operation, generating an output of the operation. The techniques also include transmitting, by the computer system, a message comprising the output of the operation to a shell subnet via a secondary vNIC, the secondary vNIC being configured for unidirectional transmission from the computer system to the shell subnet. The shell subnet may be configured to transmit the output of the operation to an external network via a network gateway.
System And Method For Handling Lazy Deserialization Exceptions In An Application Server Environment
- Redwood Shores CA, US Amy Kang - Mountain View CA, US Joshua Dorr - San Jose CA, US Lenny Phan - Sunnyvale CA, US
International Classification:
G06F 9/445 G06F 9/50
Abstract:
In accordance with an embodiment, described herein is a system and method for handling lazy deserialization exceptions in an application server environment. When a stateful, e.g., EJB client request arrives to the EJB container, if the container detects that it cannot deserialize the state on this server and a patching (Patching, Zero Downtime Patching, ZDT) application upgrade rollout is in progress, the container can ask the replication manager to replicate the bean state to a new secondary that is in the opposite ZDT failover server group of this server, if it can find one. A remote reference of the replica on the new secondary will be set to a special type exception, which carries the replica's remote reference to the client side, in order to fulfill the client request.
Feb 2013 to 2000 Global Product Surveillance Quality Associate IBaxter Healthcare
Oct 2010 to 2000 Global Product Surveillance Quality Associate IPlasma Biological Services Elgin, IL Apr 2009 to Aug 2009 Quality Assurance CoordinatorDePaul University
Sep 2007 to Nov 2007 Intern, Athletic Training ServicesDePaul University
Apr 2007 to Nov 2007 Lead discussion and study group for students
Education:
DePaul University Chicago Chicago, IL Sep 2004 to 2008 BS in Biology
2014 to 2000 QUALITY ASSURANCE SPECIALISTBaxter Healthcare Corporation Round Lake, IL 2010 to 2014 PRODUCT SURVEILLANCE QUALITY ASSOCIATE, GLOBAL FIELD SURVEILLANCE, RENAL PRODUCTSPlasma Biological Services Elgin, IL 2009 to 2010 Leader
Education:
DePaul University Chicago Chicago, IL 2008 Bachelor of Science in Biology
Jan 2011 to Present Director of RecruitingBloomwell Inc San Francisco, CA Nov 2010 to May 2011 Legal CounselSole PractitionerSan Francisco, CA Dec 2008 to Jul 2010Hanson Bridgett LLP San Francisco, CA May 2007 to Aug 2007 Summer Associate, General LitigationSan Francisco District Attorney's Office San Francisco, CA Jun 2006 to Aug 2006 Legal Intern, Narcotics Department
Education:
Santa Clara University School of Law Santa Clara, CA May 2008 J.D.University of California Berkeley, CA May 2003 B.A. in Political ScienceCopyright, Trademark, Patent, Tech Licensing, Venture Capital Law, Chinese Law
Allie Hunter, Christina Zimmer, Elaine Parrish, Justina Auernheimer, Sarah Michaels, Adam Winsky, Cory Kessler, Cassie Tyner, Jonathan Bergquist, Melinda Brouwer