Greg Hartrell

Greg Hartrell

San Francisco Bay Area
4K followers 500+ connections

About

Greg Hartrell helps large teams build high performing software products, platforms and…

Contributions

Activity

Join now to see all activity

Experience

  • Roblox Graphic

    Roblox

    San Francisco Bay Area

  • -

    Mountain View, CA

  • -

    Mountain View, CA

  • -

    Mountain View, CA

  • -

    Toronto and Los Angeles

  • -

    Toronto, Canada Area

  • -

  • -

  • -

Licenses & Certifications

Publications

  • Predicting Search Queries Based on Personal Routines

    Technical Disclosure Commons

    Abstract
    Generally, the present disclosure is directed to a computing system for predicting user intent in operation of a device based on personal routines. In particular, in some implementations, the systems and methods of the present disclosure can include or otherwise leverage one or more machine-learned models to predict user intent in operation of a device based on past and/or current operation of the device and routine of the user.

    See publication
  • The Origins of Hacker Culture

    Huffington Post

    How hacker culture originated is an interesting story...

    See publication
  • How did hacker culture originate?

    Observer

    How hacker culture originated is an interesting story. Here’s a set of perspectives that I found interesting many years after I realized I was pulled into this culture at a young age. https://www.quora.com/How-did-hacker-culture-originate

    See publication
  • Information Security and Reputation Systems

    Information Security Bulletin, CHI Publishing, Inc.

    Other authors
    • Art Baker

Patents

  • Automatic Translation of Digital Graphic Novels

    Issued US 14/863,394

    Digital graphic novel content is received and features of the graphic novel content are identified. At least one of the identified features includes text. Contextual information corresponding to the feature or features that include text is generated based on the identified features. The contextual information is used to aid translation of the text included in the feature or features that include text.

    See patent
  • Malicious code infection cause-and-effect analysis

    Issued US 8,117,659

    A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a time frame prior to the notification of the suspected malware infection. The malware analysis system may also create a time-bounded snapshot of the…

    A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a time frame prior to the notification of the suspected malware infection. The malware analysis system may also create a time-bounded snapshot of the monitored activities that are conducted within a time frame subsequent to the notification of the suspected malware infection. The malware analysis system provides the created snapshot or snapshots for further analysis.

    See patent
  • Distributed peer attack alerting

    Issued US 7,779,465

    A system and method for distributed peer attack alerting is disclosed. The method includes accessing a peer community wherein the peer community comprises a plurality of nodes comprising a network and wherein at least one of the plurality of nodes comprises an attack identifier. The method further includes identifying an attack at one of the plurality of nodes. In addition, the method includes transmitting an alert to the plurality of nodes, the alert comprising information associated with the…

    A system and method for distributed peer attack alerting is disclosed. The method includes accessing a peer community wherein the peer community comprises a plurality of nodes comprising a network and wherein at least one of the plurality of nodes comprises an attack identifier. The method further includes identifying an attack at one of the plurality of nodes. In addition, the method includes transmitting an alert to the plurality of nodes, the alert comprising information associated with the attack and automatically configuring at least one attack identifier associated with one of the plurality of nodes in response to the alert.

    Other inventors
    See patent
  • Personal Game Services Commerce System

    Issued US 12/184,411

    The system allows a user to contract with another user to perform service within a virtual environment.

    Other inventors
    See patent
  • Obfuscating computer code to prevent an attack

    Issued US 7,620,987

    A method and system for obfuscating computer code of a program to protect it from the adverse effects of malware is provided. The obfuscation system retrieves an executable form of the computer code. The obfuscation system then selects various obfuscation techniques to use in obfuscating the computer code. The obfuscation system applies the selected obfuscation techniques to the computer code. The obfuscation system then causes the obfuscated computer code to execute.

    Other inventors
    See patent
  • PLATFORM INDEPENDENT ECOSYSTEM FOR CREATION, CONSUMPTION AND TRADE OF USER-GENERATED DIGITAL CONTENT

    Issued EU EP09774200

    A platform (e.g. game console) and application (e.g. game title) independent ecosystem for the creation, consumption and trade of user generated digital content permits any application operating on any platform to participate in a market driven economy for user generated digital objects (UGDOs). The trading system is independent of (i.e. external to) all participating applications. A metadata attribution method for UGDOs in combination with heterogeneous application support through well-defined…

    A platform (e.g. game console) and application (e.g. game title) independent ecosystem for the creation, consumption and trade of user generated digital content permits any application operating on any platform to participate in a market driven economy for user generated digital objects (UGDOs). The trading system is independent of (i.e. external to) all participating applications. A metadata attribution method for UGDOs in combination with heterogeneous application support through well-defined interfaces facilitates unlimited participation. Attributed metadata may be understood and consumed across platforms and applications. Flexible UGDO rights enforcement techniques in combination with a flexible fair exchange service for those rights support all manner of UGDOs and commercial transactions therefore. Participating application may provide rights enforcement in some instances. The nature of enforcement may rest on the nature of UGDO content, rights in UGDOs or author preferences. The trading system assures that all transactions in the UGDO economy are secure, fault tolerant and atomic, providing integrity and confidence in the UGDO economy.

    Other inventors
    See patent
  • STRATEGIES FOR INVESTIGATING AND MITIGATING VULNERABILITIES CAUSED BY THE ACQUISITION OF CREDENTIALS

    Issued EU EP2122524

    strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can…

    strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.

    Other inventors
    See patent
  • Identification and visualization of trusted user interface objects

    Issued US 7,913,292

    A unique system and method that facilitates visually identifying authentic UI objects, bundles, or windows is provided. A detection component can detect when user-based input has activated a verification mode with respect to one or more trusted UI objects rendered on-screen. A verification component can verify at least one of a source and identity associated with one or more UI objects in order to ensure the integrity related therewith. A verification rendering engine can re-render the one or…

    A unique system and method that facilitates visually identifying authentic UI objects, bundles, or windows is provided. A detection component can detect when user-based input has activated a verification mode with respect to one or more trusted UI objects rendered on-screen. A verification component can verify at least one of a source and identity associated with one or more UI objects in order to ensure the integrity related therewith. A verification rendering engine can re-render the one or more trusted UI objects in a manner that is based at least upon whether the one or more trusted UI objects are verified, thus improving visual recognition of verified trusted UI objects over non-verified UI objects.

    Other inventors
    • Dave Steeves
    See patent
  • Key exchange verification

    Issued US 7,933,413

    Key exchanges between peer-to-peer devices can be vulnerable to man in the middle attacks. Verification of the key exchanges can be made on a channel, network and/or device different from the channel, network and/or device used for the key exchange to determine whether the key exchange was secure. Verification of the key exchange can also be made through an established and trusted device and/or entity. If the key exchange was secure, the parties to a communication utilizing the key(s) exchanged…

    Key exchanges between peer-to-peer devices can be vulnerable to man in the middle attacks. Verification of the key exchanges can be made on a channel, network and/or device different from the channel, network and/or device used for the key exchange to determine whether the key exchange was secure. Verification of the key exchange can also be made through an established and trusted device and/or entity. If the key exchange was secure, the parties to a communication utilizing the key(s) exchanged can be notified, if desired. If the key exchange was not secure, the parties can be notified and the communication can be selectively disconnected.

    Other inventors
    See patent
  • Computer-Aided Navigation of Digital Graphic Novels

    Filed US 14/863,392

    Digital graphic novel content is received and a machine-learning model applied to predict features of the digital graphic novel content. The predicted features include locations of a plurality of panels and a reading order of the plurality of panels. A packaged digital graphic novel is created that includes the digital graphic novel content and presentation metadata. The presentation metadata indicates a manner in which the digital graphic novel content should be presented based on the…

    Digital graphic novel content is received and a machine-learning model applied to predict features of the digital graphic novel content. The predicted features include locations of a plurality of panels and a reading order of the plurality of panels. A packaged digital graphic novel is created that includes the digital graphic novel content and presentation metadata. The presentation metadata indicates a manner in which the digital graphic novel content should be presented based on the locations and reading order of the plurality of panels. The packaged digital graphic novel is provided to a reading device to be presented in accordance with the manner indicated in the presentation metadata.

  • Automatically Identifying and Displaying Object of Interest in a Graphic Novel

    EU PCT/US2016068117

Projects

More activity by Greg

View Greg’s full profile

  • See who you know in common
  • Get introduced
  • Contact Greg directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses