Warner Music Group - New York City since Aug 2012
SVP of DSP (Platform) Engineering
VMware Mar 2011 - Aug 2012
Technical Marketing for Cloud Foundry
Dell Jul 2010 - Mar 2011
Cloud Architect
Hyper9 (Acquired by SolarWinds Inc.) Jun 2006 - Jun 2010
Founder and CTO
Surgient Inc. (Acquired by Quest Software) May 2003 - May 2005
Founder and Chief Scientist
Education:
University of New Orleans 1996 - 1997
University of Louisiana at Lafayette 1993 - 1996
Brother Martin High School 1989 - 1993
Skills:
Cloud Computing Distributed Systems Architecture Big Data Start Ups Saas Open Source Software Development Ruby Strategy It Strategy Linux Agile Methodologies Enterprise Architecture System Architecture Architectures Amazon Web Services Software Engineering Public Speaking Systems Management Windows Azure Patents Python Conference Speaking Published Author Integration Inventor Patent Drafting Virtualization Vmware Java Adobe Creative Suite Patent Strategy Cap Software Design Enterprise Software Raising Finance Raising Venture Capital Social Media Marketing Blogging Scalability High Availability Unix Web Applications Storage Iaas Rest Spring Hazelcast Paas Soa Leadership Management Program Management Software Development Life Cycle Product Management Product Development Product Marketing Team Leadership Cross Functional Team Leadership Vice Presidents Software Engineering Practices Cloud Applications Cloud Foundry Project Management Vendor Management Business Analysis Change Management It Management Business Process Improvement It Infrastructure Management It Operations Management
Interests:
Mark Zuckerberg Technology Market Research Amazon Web Services Lean Startups Social Networks (Online) Twitter Big Data Social Media Startup Advice and Strategy Klout Cloud Computing Amazon S3 Vmware Google I/O Startups Virtualization Angel Investing
Robert A. Hirschfeld - Austin TX, US C. Evan Pollan - Austin TX, US Dave D. McCrory - Austin TX, US
Assignee:
Surgient, Inc. - Austin TX
International Classification:
G06F 17/30
US Classification:
707 10, 709217, 709212
Abstract:
A virtual hard drive (VHD) file manager system for a virtualized logical server cloud including a master repository and a VHD file manager. The VHD interfaces virtualization software and a server cloud manager to manage VHDs for logical servers of the server cloud. The master repository stores multiple master component files associated with the stored VHDs. The master component files include at least one core file and at least one delta file. The VHD file manager enables copying of the master component files to deploy VHDs in the server cloud, manages creation and storing of new delta files and corresponding VHDs in the master repository, and generates and maintains meta information to maintain file relationship integrity.
Adaptive, Scalable I/O Request Handling Architecture In Virtualized Computer Systems And Networks
Dave Dennis McCrory - Pflugerville TX, US John Edward Kellar - Austin TX, US
Assignee:
Inovawave, Inc. - Austin TX
International Classification:
G06F 3/00 G06F 13/36
US Classification:
710 52, 710 29, 710310, 370235
Abstract:
A system and method for processing input/output (I/O) requests in a virtualized computer system. I/O requests are received from a virtual machine. A set of virtual I/O channels that may be interfaced with a host I/O stack and/or a virtual machine I/O stack adaptively queues requested data using a variety of I/O queue management modules. In one embodiment, the virtual I/O channels include an entropy detection module and a queue storage. The entropy detection module determines an entropy value of specified I/O request data and encodes the specified I/O request data with the entropy value within the queue storage.
Network Abstraction And Isolation Layer Rules-Based Federation And Masquerading
A computer system of a federation coupled to a network including a server having an internal address associated with a first subnet and a network abstraction and isolation layer rules-based federation and masquerading (NAIL RBFM) interface that interfaces the server with the network. The NAIL RBFM interface transforms the internal address between the first subnet and a second subnet for intra-federation communications. The NAIL RBFM interface performs transform and inverse transform operations to convert between internal and external addresses of intra-federation network traffic. The operations may be performed on source and destination addresses, and may be configured in any of several manners, such as modifying at least one bit of an address, replacing at least one octet of an IP address, substituting a prefix of an address, replacing an entire address, etc.
Network Abstraction And Isolation Layer For Masquerading Machine Identity Of A Computer
Scott C. Johnson - Austin TX, US Dave D. McCrory - Austin TX, US
Assignee:
Surgient, Inc. - Austin TX
International Classification:
H04L 12/28
US Classification:
370389, 370392
Abstract:
A network abstraction and isolation layer (NAIL) for masquerading the machine identity of a computer in a network to enable the computer to communicate in the network with a different machine identity including an isolated network interface for communicating with the computer, an abstraction network interface for communicating with a network device coupled to the network, and control logic. The control logic is coupled to the isolated and abstraction network interfaces and performs machine identity translation to masquerade machine identity of the computer relative to the network. Machine identity masquerading includes selectively translating any one or more of an IP address, a MAC address, a machine name, a system identifier, and a DNS Name in the header or payload of communication packets.
Network Abstraction And Isolation Layer For Masquerading Machine Identity Of A Computer
Scott C. Johnson - Austin TX, US Dave D. McCrory - Austin TX, US
Assignee:
Quest Software, Inc. - Aliso Viejo CA
International Classification:
H04L 12/56 H04J 1/16
US Classification:
370419, 370252, 370389, 370392
Abstract:
A network abstraction and isolation layer (NAIL) for masquerading the machine identity of a computer in a network to enable the computer to communicate in the network with a different machine identity including an isolated network interface for communicating with the computer, an abstraction network interface for communicating with a network device coupled to the network, and control instructions or device. The control instructions or device performs machine identity translation to masquerade machine identity of the computer relative to the network. Machine identity masquerading includes selectively translating any one or more of an IP address, a MAC address, a machine name, a system identifier, and a DNS Name in the header or payload of communication packets.
Hardware Agnostic Manipulation And Management Of Image Resources
Dave McCrory - Austin TX, US Ghassan Yammine - Georgetown TX, US Neal Prager - Austin TX, US Robert Hirschfeld - Austin TX, US
Assignee:
Surgient, Inc. - Austin TX
International Classification:
G06F009/445
US Classification:
717177000
Abstract:
A conversion system for converting a source disk image supporting a first hardware configuration into a target disk image supporting a second and different hardware configuration. The conversion system includes a first server that mounts the source disk image as a target disk drive, a repository that stores information and files useful for supporting the second hardware configuration, a rules library that facilitates conversion of hardware specific attributes in accordance with an external introspection process (EIP), and a conversion engine executed on the first server and interfaced with the repository and the rules library. The conversion engine performs the EIP by examining the source disk image on the target disk drive to determine modifications to convert to the target disk image.
Adaptive, Scalable I/O Request Handling Architecture In Virtualized Computer Systems And Networks
Dave Dennis McCrory - Pflugerville TX, US John Edward Kellar - Austin TX, US
International Classification:
G06F 9/455 G06F 12/06
US Classification:
718 1
Abstract:
A system and method for processing input/output (I/O) requests in a virtualized computer system. I/O requests are received from a virtual machine. A set of virtual I/O channels that may be interfaced with a host I/O stack and/or a virtual machine I/O stack adaptively queues requested data using a variety of I/O queue management modules. In one embodiment, the virtual I/O channels include an entropy detection module and a queue storage. The entropy detection module determines an entropy value of specified I/O request data and encodes the specified I/O request data with the entropy value within the queue storage.
Adaptive, Scalable I/O Request Handling Architecture In Virtualized Computer Systems And Networks
Dave Dennis McCrory - Pflugerville TX, US John Edward Kellar - Austin TX, US
International Classification:
G06F 9/455
US Classification:
718 1
Abstract:
A system and method for processing input/output (I/O) requests in a virtualized computer system. I/O requests are received from a virtual machine. A set of virtual I/O channels that may be interfaced with a host I/O stack and/or a virtual machine I/O stack adaptively queues requested data using a variety of I/O queue management modules. In one embodiment, the virtual I/O channels include an entropy detection module and a queue storage. The entropy detection module determines an entropy value of specified I/O request data and encodes the specified I/O request data with the entropy value within the queue storage.