T
Thomas Bishop
Researcher at Intuit
Publications - 17
Citations - 270
Thomas Bishop is an academic researcher from Intuit. The author has contributed to research in topics: Environmental science & Asset (computer security). The author has an hindex of 9, co-authored 11 publications receiving 264 citations.
Papers
More filters
Patent
Multidimensional modeling of software offerings
TL;DR: In this article, the authors present a system that facilitates the deployment and execution of a software offering by mapping a first set of elements from the service definition to a second set from the resource definition.
Patent
Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
Thomas Bishop,Brett Weaver,Christian Price,Javier Godinez,Capen Brinkley,M. Shannon Lietz,Luis Felipe Cabrera +6 more
TL;DR: In this paper, asset security compliance data is used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance compliance data to ensure that each asset is deployed in compliance according to the application's deployment security policies.
Patent
Automatic provisioning of resources to software offerings
TL;DR: In this paper, the authors present a system that facilitates the deployment and execution of a software offering, and provides a work-breakdown structure based on a set of policies from the service definition.
Patent
Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems
Brett Weaver,Javier Godinez,Capen Brinkley,Thomas Bishop,M. Shannon Lietz,Luis Felipe Cabrera +5 more
TL;DR: In this paper, two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed and actual user data is received.
Patent
Method and system for secure delivery of information to computing environments
TL;DR: A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment, is described in this article. But, it is not described in detail.