BackgroundCheck.run
Search For

George Kevin Colley, 683505 Lochside, Frisco, TX 75056

George Colley Phones & Addresses

3505 Lochside, The Colony, TX 75056    817-6886433   

Bonham, TX   

Lewisville, TX   

259 Ginko Ter, Sunnyvale, CA 94086    408-7731892   

San Jose, CA   

Arlington, TX   

Santa Clara, CA   

Mentions for George Kevin Colley

George Colley resumes & CV records

Resumes

George Colley Photo 27

George Colley

George Colley Photo 28

Direct Marketing Specialist

Work:

Direct Marketing Specialist

Publications & IP owners

Wikipedia

George Colley Photo 29

Albert Reynolds

…erty which aligned itself to Charles Haughey and supported him in the subsequent leadership contest. Reynolds' affable personality helped him to coax a number of backbenchers into supporting Haughey[citation needed], who went on to beat George Colley in the leadership struggle and become Tao...
George Colley Photo 30

George Colley

George Colley (18 October 1925 17 September 1983) was an Irish Fianna Fil politician, who served in a wide number of Cabinet poistions, most notably as Minister for Finance and ...
George Colley Photo 31

George Pomeroy Colley

Major-General Sir George Pomeroy Colley KCSI CB CMG (1 November 1835 27 February 1881) was a British Army officer who became Governor and Commander-in-Chief of Natal and High ...

Us Patents

File System Support For Rolling Keys

US Patent:
2016032, Nov 3, 2016
Filed:
Apr 29, 2015
Appl. No.:
14/700070
Inventors:
- Cupertino CA, US
Eric B. TAMURA - Sunnyvale CA, US
George K. COLLEY - Sunnyvale CA, US
Mark S. DAY - Saratoga CA, US
International Classification:
G06F 21/62
G06F 21/60
G06F 21/79
H04L 9/14
Abstract:
This application relates to a key rolling process for a file system of a computing device. The key rolling process allows for files to be transparently re-encrypted in a background process while still allowing applications to access files being re-encrypted. During re-encryption, a portion of the file is decrypted using a current key for the file and re-encrypted using a new key for the file. During re-encryption, the portion of the file can be relocated to another location in memory. Metadata associated with the file can be updated to include information pertaining to the location of the re-encrypted portion. The metadata can also be updated include information pertaining to how much of the file has been re-encrypted with the new key and how much of the file remains encrypted with the current key.

Remote Enumeration Of A Directory

US Patent:
2014036, Dec 11, 2014
Filed:
Jun 7, 2013
Appl. No.:
13/913229
Inventors:
- Cupertino CA, US
George K. Colley - Sunnyvale CA, US
Bradley R. M. Suinn - Fort Collins CO, US
Christopher N. Ryan - San Jose CA, US
International Classification:
G06F 17/30
US Classification:
707827
Abstract:
When enumerating of a set of content items in a directory in a remote file server, an electronic device provides a request for information associated with the set of content items. The electronic device and the file server may use, respectively, use an OS X-based operating system and a Windows-based operating system. In response to the request, the file server may access information specifying the set of content items. For example, the information may include maximal access information and finder information for each content item in the set of content items in the directory. Next, the electronic device may receive a response with the requested information from the file server. The providing of the request and the receiving of the response may, respectively, involve single instances of a request and a response, thereby significantly reducing the amount of communication between the electronic device and the file server.

Method And System For Unmounting An Inaccessible Network File System

US Patent:
2014022, Aug 7, 2014
Filed:
Feb 1, 2013
Appl. No.:
13/757630
Inventors:
- Cupertino CA, US
Guy HARRIS - Palo Alto CA, US
George K. COLLEY - Cupertino CA, US
Assignee:
APPLE INC. - Cupertino CA
International Classification:
G06F 17/30
US Classification:
707827
Abstract:
The invention provides a technique for managing hard-mounted network file systems (NFSs). First, a network file system (NFS) interface detects that a hard-mounted NFS is inaccessible. In response, the NFS interface obtains a list of virtual nodes (vNodes) associated with the hard-mounted NFS. If the NFS interface determines that each vNode in the list of vNodes is only associated with a read IN/OUT (I/O) operation, then the NFS interface automatically unmounts the hard-mounted NFS since doing so does not compromise the coherency of the hard-mounted NFS. Alternatively, if the NFS interface determines that at least one vNode in the list of vNodes is associated with data that is open for a write I/O operation, is mapped into a memory, or is associated with at least one dirty page, then the NFS interface does not unmount the hard-mounted NFS since doing so will compromise the coherency of the hard-mounted NFS.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.