Andrew D. Birrell - Los Altos CA Edward P. Wobber - Menlo Park CA Michael Schroeder - Cupertino CA
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 1730
US Classification:
707 2, 707 1
Abstract:
In a computerized distributed mail system, a plurality of client computers are connected to each other via a network. Each client computer is configured to execute client mail application programs. A mail service system is also connected to the network. The system is for executing server mail programs on server computers. The mail service system includes an index server for storing mail messages in message files, and for storing a full-text index of the mail messages. In addition, the system includes means for accessing the mail messages by the plurality of client computers by searching the full-text index using queries.
System And Methods For An Overlay Disk And Cache Using Portable Flash Memory
Andrew Birrell - Los Altos CA, US Edward P. Wobber - Menlo Park CA, US Muthukaruppan Annamalai - Seattle WA, US Ulfar Erlingsson - San Francisco CA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 12/14 G06F 12/16 H04L 9/32
US Classification:
711103, 726 24, 713188
Abstract:
A system is provided for reading and writing sectors which may be realized as either a disk device to the local operating system, or as a virtual disk device to a virtual machine. A user's computing environment is stored in the network in the form of a disk image, which may be a virtual disk image, for example. The virtual disk is realized on host computers through host-resident virtual machine monitors such as MICROSOFT VIRTUAL PC. Portable memory devices, such as flash devices, buffer virtual disk writes and cache reads, greatly reducing the performance degradation associated with remote disk access. The cache is mobile so that it can be travel with the user. The flash device remembers commonly used virtual disk content fingerprints so that the host machine's local disk can be used to satisfy many common disk reads when ubiquitous static content is involved. Standard, frequently used software images might be distributed in advance to host machines. Flash disk contents are trickled back into the networked parent disk image in order to provide an automatic backup facility, adding the benefit of ensuring that the flash drive doesn't overflow.
System And Methods For An Overlay Disk And Cache Using Portable Flash Memory
Andrew Birrell - Los Altos CA, US Edward P. Wobber - Menlo Park CA, US Muthukaruppan Annamalai - Seattle WA, US Ulfar Erlingsson - San Francisco CA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 12/08
US Classification:
711103, 711122
Abstract:
A lifting and shaping system for a bra is disclosed. The system uses lift platforms shaped to fit into the cups of the bra and formed from thin material such as plastic. The lift platforms are attached to the bra toward the center of the bra. Connectors having one end attached to the lift platform and the other end attached to a slide on the shoulder strap adjust the lift of the lift platform when the slide is moved. Flexible shaping members distribute the lift of the lift platforms and maintain the natural shape of the breasts as they are lifted. Smoothing shields ease the movement of the lift platforms and connectors within the cloth confines of the breast cups. The flexible shaping members may also perform some of the functions of a smoothing shield.
System And Methods For An Overlay Disk And Cache Using Portable Flash Memory
Andrew Birrell - Los Altos CA, US Edward P. Wobber - Menlo Park CA, US Muthukaruppan Annamalai - Seattle WA, US Ulfar Erlingsson - San Francisco CA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 12/08 G06F 13/20
US Classification:
711103
Abstract:
A system is provided for reading and writing sectors which may be realized as either a disk device to the local operating system, or as a virtual disk device to a virtual machine. A user's computing environment is stored in the network in the form of a disk image, which may be a virtual disk image, for example. The virtual disk is realized on host computers through host-resident virtual machine monitors such as MICROSOFT VIRTUAL PC. Portable memory devices, such as flash devices, buffer virtual disk writes and cache reads, greatly reducing the performance degradation associated with remote disk access. The cache is mobile so that it can be travel with the user. The flash device remembers commonly used virtual disk content fingerprints so that the host machine's local disk can be used to satisfy many common disk reads when ubiquitous static content is involved. Standard, frequently used software images might be distributed in advance to host machines. Flash disk contents are trickled back into the networked parent disk image in order to provide an automatic backup facility, adding the benefit of ensuring that the flash drive doesn't overflow.
Method And System For Cooperatively Backing Up Data On Computers In A Network
Andrew David Birrell - Los Altos CA, US Mark David Lillibridge - Mountain View CA, US Michael Burrows - Palo Alto CA, US Michael Acheson Isard - San Francisco CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
A method for backing up data in a plurality of computers connected via a network. The method includes forming partnerships between the plurality of computers such that each computer in a partnership commits under agreements to help backup the data of its partners. The method further includes periodically verifying that previously backed up data is being retained by the computers committed to act as backup partners in accordance with the agreements. In another embodiment, the method provides a distributed cooperative backing up of data in a system that includes a loose confederation of computers connected via a network. In this embodiment the method includes selecting computers as potential backup partners from among the loose confederation of computers connected via the network based on predetermined criteria, and negotiating a reciprocal backup partnership agreement between the computers based on predetermined requirements, including backup requirements. Once the negotiations are complete and the agreements are made, the method proceeds to form partnerships between the computers. The computers become backup partners by agreeing to cooperatively provide backup services to each other so that a distributed cooperative backing up of data can be administered in the absence of central control.
Cryptographic Puzzle Cancellation Service For Deterring Bulk Electronic Mail Messages
Andrew D. Birrell - Los Altos CA, US Michael Burrows - Palo Alto CA, US Edward Pearce Wobber - Menlo Park CA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/00
US Classification:
713178, 713168, 713169, 726 2, 709206
Abstract:
Methods and systems are provided for a cancellation server maintaining a database of identifiers of cryptographic puzzles. A cryptographic puzzle is created from a unique identifier and a timestamp, and is attached to an electronic mail message, along with the puzzle's solution. The recipient verifies that the solution is correct and that the timestamp is current, and further queries the cancellation server with the puzzle identifier. If the identifier does not exist in the database, then the recipient knows the received message is legitimate. If the identifier already appears in the database, the received message can be automatically removed from the recipient's computer.
Systems And Methods For Pattern Matching On Principal Names To Control Access To Computing Resources
Andrew David Birrell - Los Altos CA, US Edward P. Wobber - Menlo Park CA, US Martin Abadi - Palo Alto CA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/04 G06F 21/00
US Classification:
726 19, 726 27, 713182
Abstract:
Systems and methods are provided for resource access control in computer systems. Our approach includes new techniques for composing and authenticating principals in an access control system. Our principals may comprise information that identifies the role of the user of a computer system, the mechanism by which the user was authenticated, and program execution history. Thus, when a principal makes a request, access control determinations can be made based on the principal's identity. Access control lists may provide patterns that are used to recognize principals, thereby ensuring a level of security without enumerating precise identifiers for all of the possible principles that may request a particular resource.
Martin Abadi - Palo Alto CA, US Andrew D. Birrell - Los Altos CA, US Timothy L. Harris - Cambridge, GB Michael A. Isard - San Francisco CA, US Johnson Hsieh - Waterloo, CA
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/00
US Classification:
707713, 707722, 707736, 707758, 707781, 707791
Abstract:
Strong semantics are provided to programs that are correctly synchronized in their use of transactions by using dynamic separation of objects that are accessed in transactions from those accessed outside transactions. At run-time, operations are performed to identify transitions between these protected and unprotected modes of access. Dynamic separation permits a range of hardware-based and software-based implementations which allow non-conflicting transactions to execute and commit in parallel. A run-time checking tool, analogous to a data-race detector, may be provided to test dynamic separation of transacted data and non-transacted data. Dynamic separation may be used in an asynchronous I/O library.
Andrew Birrell (2004-2008), Chris McCarty (1993-1997), Matt Barnes (1993-1997), Cassie Tosko (2001-2005), Adam Miller (1993-1997), Paul Thorla (1986-1990)
he two are part of an eight-person indictment alleging a $40 million fraud scheme. Farah's attorney, Andrew Birrell, said in a statement Tuesday: "We have been conducting our own parallel investigation since the execution of the search warrants in January. We are grateful the matter is now before th