Methods and arrangements are provided that automatically adjust various operating settings associated with a display device in response to detected lighting conditions. The methods and arrangements respond to dynamically changing light conditions in an effort to significantly maintain the output quality of the display as previously established by the user. Memory is provided and configured to store at least one user preference value. At least one display parameter controller unit operatively associated with the display device is also provided and configured to respond to a parameter setting. At least one sensor unit, which is responsive to light, is configured to output a detected light value to logic. The logic is operatively coupled to the memory, the display parameter controller unit and the sensor unit. The logic is configured to output the parameter setting to the parameter controller unit based on the user preference value and the detected light value.
Yun Lin - Kirkland WA, US Shishir Pardikar - Redmond WA, US Venkataraman Ramanathan - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F017/00
US Classification:
707200, 707 10, 707205
Abstract:
A method of purging cached open files from a client-side delayed close list on a remote file system. The remote file system stores a unique file identifier for each cached open file which is independent of the cached file's namespace. In response to a delete or rename command of a remote target file, the remote file system obtains a target file identifier from the target file's server. The remote file system then compares the target file identifier with each of the cached file's unique file identifier. If a cached file's unique file identifier matches the target file identifier, the cached file is purged from the delayed close list.
System And Method Of Pipeline Data Access To Remote Data
Yun Lin - Kirkland WA, US Balan Sethu Raman - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F017/30
US Classification:
707 10, 709203, 709217
Abstract:
A pipeline I/O mechanism in a network redirector that breaks up large files into sections, and sends write (or read) requests for each section in a pipeline fashion to a network file server, without waiting for a response for a previously-sent section. The pipeline I/O mechanism tracks the returned status of each section for which a request was made, so that success or failure of the request is determined as a whole. The pipeline I/O system and method dramatically increase the performance of network remote I/O operations, particularly with file write operations directed to a file on a network file server.
Opportunistic Directory Cache And Method Of Serving Target Directory Information In A Network Environment
Venkataraman Ramanathan - Sammamish WA, US Ramanathan Ganapathy - Redmond WA, US Yun Lin - Kirkland WA, US David Kruse - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
709217, 709219, 709203
Abstract:
An opportunistic directory cache and method of usage reduce the number of calls between a client and server for file information, reducing the wastage of network resources and server resources. The expirable directory cache can be refreshed any time an appropriate directory enumeration call is made to the server, and is capable of being partially rather than completely invalidated in response to an indication that the file information of a file listed in the cache has or will change. If the affected file is identifiable, the entry in the cache for that file is invalidated, i. e. it is no longer useful for serving file information. If the affected file is not identifiable, then a first character projection of the file name is invalidated in the cache. In this manner, the directory cache is maintained with minimum resources and is persisted to the greatest extent possible, increasing its likelihood of usefulness.
System And Method For Managing Objects Stored In A Cache
David C. Steere - Bellevue WA, US Brian S. Aust - Redmond WA, US Yun Lin - Kirkland WA, US Mohammed Samji - Bellevue WA, US Navjot Virk - Bellevue WA, US Shishir P. Pardikar - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 12/00 G06F 7/00
US Classification:
711133, 711118, 711154
Abstract:
The present invention is directed at a system and method for managing and evicting objects stored in a cache. The invention provides a mechanism for determining which objects to evict based on a weight that is calculated for each object stored in the cache. The weight is determined by at least two factors, including file size, file type, primary user, last access time, and the like, and by the relative importance of each of the factors. The weight for each object may be determined autonomously and/or may be determined upon a trigger event. The factors and their relative importance may be obtained from a policy applicable to one or several computers.
Protocol-Independent Client-Side Caching System And Method
Yun Lin - Kirkland WA, US Navjot Virk - Redmond WA, US Shishir Pardikar - Redmond WA, US Rohan Kumar - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16 G06F 12/00
US Classification:
709203, 709213, 709217, 711118, 711141
Abstract:
A system and method that automatically and transparently handle client-side caching of network file data, independent of any remote file handling protocol. A protocol-independent client-side caching mechanism is inserted as a service that handles file-related requests directed to a network, and attempts to satisfy the requests via a client-side caching persistent store. By way of pre-process and post-process calls on a file create request, the caching mechanism creates file-related data structures, and overwrites the information in those structures that a buffering service uses to call back to a network redirector, whereby the client-side caching mechanism inserts itself into the communication flow between the network redirector and the buffering service. Once in the flow of communication, network-directed file read and write requests may be transparently handled by the client-side caching mechanism when appropriate, yet the redirector may be instructed to communicate with the server when needed to satisfy the request.
System And Method Of Pipeline Data Access To Remote Data
Yun Lin - Kirkland WA, US Balan Sethu Raman - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707 10, 709203, 709217
Abstract:
A pipeline I/O mechanism in a network redirector that breaks up large files into sections, and sends write (or read) requests for each section in a pipeline fashion to a network file server, without waiting for a response for a previously-sent section. The pipeline I/O mechanism tracks the returned status of each section for which a request was made, so that success or failure of the request is determined as a whole. The pipeline I/O system and method dramatically increase the performance of network remote I/O operations, particularly with file write operations directed to a file on a network file server.
System And Method For Providing Transparent Access To Distributed Authoring And Versioning Files Including Encrypted Files
Shishir Pardikar - Redmond WA, US Rohan Kumar - Seattle WA, US Yun Lin - Kirkland WA, US Praerit Garg - Bellevue WA, US Jianrong Gu - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16 G06F 12/00
US Classification:
709219, 709203, 707203
Abstract:
Access to WebDAV (Distributed Authoring and Versioning) servers is provided in a manner that is essentially transparent to applications. A WebDAV redirector and related components support file system I/O requests and network requests directed to WebDAV servers identified by URI (Universal Resource Identifier) names, or by a drive may be mapped to a WebDAV share. An application's create or open I/O requests directed to a WebDAV server are detected, and result in a local copy of the file being downloaded and cached for local access. When closed, the local file is uploaded to the WebDAV server. Network-related requests such as for browsing that are directed to a WebDAV server are also handled transparently. WebDAV files may be locally encrypted and decrypted at the file system level, transparent to applications and the WebDAV server, via an encrypting file system that performs local encryption and decryption at the local file system level.
Union National Culture and Sports Foundation New York, NY Nov 2013 to Apr 2014 Project ManagerBaidu, Inc
Dec 2012 to Jan 2013 Senior Business Development ManagerTencent, Inc
Sep 2008 to Dec 2012 Senior Software Engineer and Business Development ManagerPICA Inc.
Sep 2007 to Sep 2008 Software Engineer
Education:
New York University New York, NY 2013 to 2014 Master's in ManagementBeijing post and telecommunication University 2011 to 2014 MBAChongqing Communication University 2004 to 2008 Bachelor's in Software Engineering
Skills:
Mobile software development (Android, KJava) Quality Management/ Application test Program Management /Project Management Business developer/ Business analysis Marketing
Youtube
[2009.05.02]Gao Lin's Wedding
there are four groomsmen and four bridesmaids on the wedding, cai yun ...
Category:
Sports
Uploaded:
02 May, 2009
Duration:
2m 51s
Present! - Feng Shui (part one) with Khadro C...
Khadro Crystal Chu Rinpoche, the successor to Grand Master Thomas Lin ...
Category:
Education
Uploaded:
27 Jun, 2011
Duration:
27m 28s
Vivaldi Cello Sonata in e minorRV40
Shih Yun Lin Vivaldi--Cell... Sonata in e minorRV40
Category:
Music
Uploaded:
27 Oct, 2009
Duration:
8m 28s
Student Protest Continues in Taiwan
And in Taiwan a student movement known as the wild strawberries are ca...
Category:
News & Politics
Uploaded:
09 Dec, 2008
Duration:
2m
ISSF Bangkok, THA 2007 Final 10m Air Pistol ...
ISSF World Cup Final in Rifle / Pistol Bangkok, THA 2007 Final 10m A...
Category:
Sports
Uploaded:
15 Feb, 2008
Duration:
7m 43s
RED CAUTION1
This documentary recorded many scenes of conflicts of Taiwanese people...
University of Massachusetts Amherst - Computer Science, Harbin Institute of Technology - Electrical Engineering
Yun Lin
Yun Lin
Yun Lin
Yun Lin
Tagline:
Be part of the world, Be only.
Yun Lin
About:
Wholesale cheap shoes,jordans,nike,ugg,NBA,UGG... and other shoes.All products on our site are already marked down 40-70% off retail price. Our website: http://www.sosonike.com
Yun Lin
Yun Lin
News
Metformin’s secret brain pathway revealed after 60 years
Other contributors to this work include Hsiao-Yun Lin, Weisheng Lu, Yanlin He, Yukiko Fu, Kentaro Kaneko, Peimeng Huang, Ana B De la Puente-Gomez, Chunmei Wang, Yongjie Yang, Feng Li and Yong Xu. The authors are affiliated with one or more of the following institutions: Baylor College of Medicine, L
Date: Sep 10, 2025
Category: Health
Source: Google
After 60 Years, Scientists Uncover Hidden Brain Pathway Behind Diabetes Drug Metformin
Reference: Low-dose metformin requires brain Rap1 for its antidiabetic action by Hsiao-Yun Lin, Weisheng Lu, Yanlin He, Yukiko Fu, Kentaro Kaneko, Peimeng Huang, Ana B. De la Puente-Gomez, Chunmei Wang, Yongjie Yang, Feng Li, Yong Xu and Makoto Fukuda, 30 July 2025, Science Advances.DOI: 10.1126/
Date: Aug 25, 2025
Category: Health
Source: Google
Bacteria Breakthrough Could Simplify Rare Earth Element Processing
Other Penn State co-authors are Joseph Mattocks, Jonathan Jung, Chi-Yun Lin, Neela Yennawar, Emily Featherston and Timothy Hamilton. Ziye Dong, Christina Kang-Yun and Dan Park of the Lawrence Livermore National Laboratory also co-authored the paper.
Date: Jun 17, 2023
Category: Health
Source: Google
10 Brilliant Quotes From Tesla Short Sellers & Confident Critics
headed for bankruptcy. It is full of comments regarding Tesla and Elon Musk (and CleanTechnica) that are hugely divorced from reality. A Twitter user named Yun Lin recently posted a nice collection of these tweets. Im quoting 10 of my favorites from that collection and a few older sources below.