About
Articles by Tom
Activity
-
Anduril is excited to partner with Oracle to bring our Lattice command and control (C2) platform to Oracle Cloud Infrastructure (OCI) and OCI Roving…
Anduril is excited to partner with Oracle to bring our Lattice command and control (C2) platform to Oracle Cloud Infrastructure (OCI) and OCI Roving…
Shared by Tom Keane
-
A lot has been written about Anduril's Series F this week. It's an incredibly exciting time, highlighting the incredible momentum and growth we are…
A lot has been written about Anduril's Series F this week. It's an incredibly exciting time, highlighting the incredible momentum and growth we are…
Shared by Tom Keane
-
Excited to share some of the capabilities we have been building and deploying with customers to make time-sensitive, mesh-centric scenarios possible.…
Excited to share some of the capabilities we have been building and deploying with customers to make time-sensitive, mesh-centric scenarios possible.…
Shared by Tom Keane
Experience & Education
Patents
-
Just-In-Time access based on geolocation to maintain control of restricted data in cloud computing environments
Issued US -
A JIT service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for an external device. When JIT access to a resource is requested by a device, the JIT service retrieves a JIT policy for the resource that includes geolocation criteria limiting the geolocation from which JIT access can be automatically granted. The geolocation of the device is evaluated against the geolocation criteria. If the geolocation criteria and any other criteria…
A JIT service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for an external device. When JIT access to a resource is requested by a device, the JIT service retrieves a JIT policy for the resource that includes geolocation criteria limiting the geolocation from which JIT access can be automatically granted. The geolocation of the device is evaluated against the geolocation criteria. If the geolocation criteria and any other criteria of the JIT policy are satisfied, the JIT service provisions JIT access to the resource for the device.
Other inventorsSee patent -
Just-In-Time access based on screening to maintain control of restricted data in cloud computing environments
Issued US -
A JIT service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for an external device. When JIT access to a resource is requested by a device, the JIT service retrieves a JIT policy for the resource that includes screening criteria limiting automatic granting of JIT access to users who meet the screening criteria. Screening information for a user associated with the request is evaluated against one or more screening requirements set…
A JIT service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for an external device. When JIT access to a resource is requested by a device, the JIT service retrieves a JIT policy for the resource that includes screening criteria limiting automatic granting of JIT access to users who meet the screening criteria. Screening information for a user associated with the request is evaluated against one or more screening requirements set forth by the screening criteria. If the screening criteria and any other criteria of the JIT policy are satisfied, the JIT service provisions JIT access to the resource for the device.
Other inventorsSee patent -
Network buildout for cloud computing environments with data control policies
Issued US US10762218B2
Network buildout of cloud computing environments subject to different data control policies is performed in a manner that ensures compliance with the data control policies. A buildout service is located in a remote cloud computing environment separate from the cloud computing environments at which buildout is being performed. The buildout service implements workflows to manage different aspects of network buildout in the cloud computing environments. The buildout service does not have access to…
Network buildout of cloud computing environments subject to different data control policies is performed in a manner that ensures compliance with the data control policies. A buildout service is located in a remote cloud computing environment separate from the cloud computing environments at which buildout is being performed. The buildout service implements workflows to manage different aspects of network buildout in the cloud computing environments. The buildout service does not have access to restricted data in the cloud computing environments, including access control data, such that the buildout service cannot directly interact with network devices. The buildout service issues requests for device configuration to hardware proxies in the cloud computing environments. In response to the requests, the hardware proxies obtain access control data to access and configure the network devices.
Other inventorsSee patent -
Monitoring cloud computing environments with data control policies
Issued US US10567356B2
Monitoring of cloud computing environments subject to different data control policies is performed in a manner that ensures compliance with the data control policies. A monitoring service is located in a remote cloud computing environment separate from the cloud computing environments being monitored. The monitoring service does not have access to restricted data in the cloud computing environments, including access control data, such that the monitoring service cannot directly interact with…
Monitoring of cloud computing environments subject to different data control policies is performed in a manner that ensures compliance with the data control policies. A monitoring service is located in a remote cloud computing environment separate from the cloud computing environments being monitored. The monitoring service does not have access to restricted data in the cloud computing environments, including access control data, such that the monitoring service cannot directly interact with network devices. The monitoring service issues requests for monitoring data to device access services in the cloud computing environments. In response to the requests, the device access services obtain access control data to access the network devices and obtain the requested data, which is returned to the monitoring service.
Other inventorsSee patent -
Unified service management
Issued US US20150006688A1
The described unified service management system provides a unified console to perform functions of individual management specialists. A unified console facilitates an administrator to perform the complex tasks that were performed by the individual management specialists. The unified console provides a “wizard” based approach to the administrator to design all aspects of the complex tasks including placement of components or computing devices, deciding on policies of the components or computing…
The described unified service management system provides a unified console to perform functions of individual management specialists. A unified console facilitates an administrator to perform the complex tasks that were performed by the individual management specialists. The unified console provides a “wizard” based approach to the administrator to design all aspects of the complex tasks including placement of components or computing devices, deciding on policies of the components or computing devices, deciding on health policies of components or computing devices, fixing data protection policies of components or computing devices, etc.
Other inventorsSee patent -
Classification and management of personally identifiable data
Filed US US20200233977A1
A computing system comprises a dataset including a plurality of data entries, at least some which include personally identifiable information (PII). A personal data oversight machine of the computing system is configured to receive an indication that a particular data entry includes PII, and based on the contents of the data entry, classify the data entry as including one or more of a plurality of types of PII by applying one or more data classification tags of a set of candidate data…
A computing system comprises a dataset including a plurality of data entries, at least some which include personally identifiable information (PII). A personal data oversight machine of the computing system is configured to receive an indication that a particular data entry includes PII, and based on the contents of the data entry, classify the data entry as including one or more of a plurality of types of PII by applying one or more data classification tags of a set of candidate data classification tags to the data entry. Based on the data classification tags applied to the data entry, the personal data oversight machine applies one of a set of data management tags to the data entry, the set of data management tags including deletion, retention, and anonymization tags, and based on the data management tag, applies a data management operation to the data entry.
Other inventorsSee patent -
Standardization of network management across cloud computing environments and data control policies
Filed US -
Network management of cloud computing environments subject to different data control policies is standardized in a manner that ensures compliance with the data control policies. An execution service remote from a cloud computing environment being managed implements workflows to manage different aspects of the cloud computing environment, including monitoring, incident management, deployment, and/or buildout. The execution service issues requests to perform management actions for network devices…
Network management of cloud computing environments subject to different data control policies is standardized in a manner that ensures compliance with the data control policies. An execution service remote from a cloud computing environment being managed implements workflows to manage different aspects of the cloud computing environment, including monitoring, incident management, deployment, and/or buildout. The execution service issues requests to perform management actions for network devices in the cloud computing environment. A device access service in the cloud computing environments receives the requests, and, in response to the requests, the device access service obtains access control data to access the network devices and perform the requested management actions for the network devices.
Other inventorsSee patent -
Unified Console For System and Workload Management
Issued US US20080281958
Systems and methods for implementing a unified console for managing computing-based devices. Described is a unified management solution to efficiently manage one or more workloads or a plurality of tasks performed by a user for managing the resources of applications in a computer network that includes the computing-based devices. The system can be implemented by providing a combined functionality that includes features of monitoring and update services, in a single console.
Other inventorsSee patent -
Tailored system management interface
Issued US PCT/US2008/064398
Processes and techniques for tailoring operations management in a system are described. The processes and techniques allow a user to customize operations management based on the user's function within a system and the particular tasks that the user wishes to accomplish. Simplified user interfaces can be created by scoping the interfaces based on user profiles, preferences and system components
Other inventorsSee patent -
Visualizers for change management system
Issued US 8543443
A change management system may use a phased status indicator that may illustrate several phases of a change request and a current status for each phase of a change management lifecycle. Additionally, a group of change requests may be displayed in a linked manner showing various relationships between change requests. The status indicator and linked display may be used together or separately to illustrate the status of various change requests and within interactive displays of change request data
Other inventorsSee patent -
Targeted user interface fall-through
Issued US 7761809
Targeted user interfaces of managed applications can be displayed in a number of ways. Targeted user interfaces can be displayed, at a management computer server, based on task templates associated with tasks selected in a user interface of a management application running on the management computer server. Targeted user interfaces can be displayed, at a management computer server, based on a chosen task template associated with a task selected in a user interface of a management application…
Targeted user interfaces of managed applications can be displayed in a number of ways. Targeted user interfaces can be displayed, at a management computer server, based on task templates associated with tasks selected in a user interface of a management application running on the management computer server. Targeted user interfaces can be displayed, at a management computer server, based on a chosen task template associated with a task selected in a user interface of a management application running on the management computer server. A task template can be chosen from one or more task templates associated with a selected task. Objects can be displayed in a user interface of a management application, and based on a selection of an object, tasks can be displayed
Other inventorsSee patent -
Integrated user experience while allocating licenses within volume licensing systems
Issued US 20090199299
Tools for providing integrated user experiences while allocating licenses within volume licensing systems. These tools may provide methods that include sending information for presenting licensing portals at recipient organizations. The licensing portals may include representations of properties licensed by the organizations, and may include indications of how many licenses remain available for allocation. The methods may include receiving and validating licensing requests. The tools may…
Tools for providing integrated user experiences while allocating licenses within volume licensing systems. These tools may provide methods that include sending information for presenting licensing portals at recipient organizations. The licensing portals may include representations of properties licensed by the organizations, and may include indications of how many licenses remain available for allocation. The methods may include receiving and validating licensing requests. The tools may provide other methods that include requesting and receiving information for presenting the licensing portals, as well as requesting and receiving licensing-related actions from the licensing systems. The tools may provide still other methods that include receiving requests for information to present launch portals, with these requests incorporating user identifiers for particular end-users. These methods may also populate the launch portals with representations of properties for which the end-users are licensed, and may send the information for the launch portals to licensee organizations.
Other inventorsSee patent -
Centralized Monitoring of Distributed Systems
Issued US 20080201465
A remote server managing multiple client computers at a customer site communicates with a server at a service provider site. A proxy gateway at the remote server allows communications through a network to the server at the service provider site. Remote monitoring of the multiple client computers may be performed at the server at the service provider site through a central monitoring console.
Other inventorsSee patent -
Discovering and monitoring server clusters
Issued US 20060195561
In a server cluster, multiple nodes may host one or more virtual servers. Virtual servers that may be hosted by particular nodes are identified. From the nodes, status is provided as to nodes that are actively hosting virtual servers and status of nodes whether they are actively hosting or not hosting a virtual server. Failover events are indicated, including transition of a virtual server from a failed node to another node.
Other inventorsSee patent -
Monitoring health of actively executing computer applications
Filed US 20060200450
Systems and methods are described that monitor health of actively executing computer applications, and particularly which monitor relational database space availability. In one implementation, a warning threshold is defined for free space within a database located on a SQL server. The complexity of the database is assessed, in part by locating each file within the database. A health state is then established for each of the files located within the database, wherein the health state is based on…
Systems and methods are described that monitor health of actively executing computer applications, and particularly which monitor relational database space availability. In one implementation, a warning threshold is defined for free space within a database located on a SQL server. The complexity of the database is assessed, in part by locating each file within the database. A health state is then established for each of the files located within the database, wherein the health state is based on a comparison of free space in each of the located files to the warning threshold.
Other inventorsSee patent
Projects
-
Australian American Leadership Dialogue
The Australian American Leadership Dialogue (AALD) is a private diplomatic initiative, which brings together Australian and American leaders from government, enterprise, media, education and the community to help review and refine the parameters of the Australian-American bilateral relationship.
Honors & Awards
-
Cloud Industry Executive of the Year, Public Company
WashingtonExec Pinnacle Awards
On December 8, 2021, WashingtonExec unveiled the winners of the Pinnacle Awards, an annual program that embodies the WashingtonExec spirit of highlighting successful executives and businesses saving money and fostering innovation for federal clients across the Washington, DC region.
More activity by Tom
-
The team doin’ work at VS24! Thank you to all the collaboration and support from our partners and hosts around the world YOU make our work…
The team doin’ work at VS24! Thank you to all the collaboration and support from our partners and hosts around the world YOU make our work…
Liked by Tom Keane
-
“It was very intuitive for my soldiers to use. We had soldiers able to use it with very minimal training. They were able to pull intelligence feeds…
“It was very intuitive for my soldiers to use. We had soldiers able to use it with very minimal training. They were able to pull intelligence feeds…
Liked by Tom Keane
-
Incredibly exciting news! Our company has been recognized by CNBC as the second most disruptive company of 2024. Check out the full list of the top…
Incredibly exciting news! Our company has been recognized by CNBC as the second most disruptive company of 2024. Check out the full list of the top…
Shared by Tom Keane
-
What a great experience at #SOFWeek It was fantastic to talk through our Lattice C2 software and also our hardware family of systems - Menace, and…
What a great experience at #SOFWeek It was fantastic to talk through our Lattice C2 software and also our hardware family of systems - Menace, and…
Liked by Tom Keane
-
I am thrilled to announce the launch of our newest communications and computing device - Menace X! Menace is an expeditionary command, control…
I am thrilled to announce the launch of our newest communications and computing device - Menace X! Menace is an expeditionary command, control…
Shared by Tom Keane
-
The United States Air Force has selected Anduril to design, manufacture, and test production-representative Collaborative Combat Aircraft (CCA). In…
The United States Air Force has selected Anduril to design, manufacture, and test production-representative Collaborative Combat Aircraft (CCA). In…
Shared by Tom Keane
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Tom Keane in United States
162 others named Tom Keane in United States are on LinkedIn
See others named Tom Keane