11
Tariq Sharif, Arun K Nanda, Roberto A Franco, Richard Randall: Form filling with digital identities, and automatic password generation. Microsoft Corporation, Henry Gabryjelski, Sade Fashokun, Micky Minhas, December 9, 2014: US08910256 (4 worldwide citation)

In one implementation, form field(s) of a form of a website or application are populated with data obtained using a digital identity, and the populated form field(s) are submitted to the website or application. A form field specification specifying information about the form fields of the form is ob ...


12
Albert Greenberg, Alan Shieh, Srikanth Kandula, Changhoon Kim: Performance isolation for clouds. Microsoft Technology Licensing, Henry Gabryjelski, Kate Drakos, Micky Minhas, September 20, 2016: US09450873 (4 worldwide citation)

Traffic in a cloud is controlled by the nodes participating in the cloud. Tenants of the cloud each have a ratio. On any given node, a current transmission rate of the node is allocated among the tenants of the node, or more specifically, their execution units (e.g., virtual machines) on the node. T ...


13
Ran Kalach, Paul Adrian Oltean, Cristian G Teodorescu, Mathew James Dickson: Data deduplication in a virtualization environment. Microsoft Corporation, Henry Gabryjelski, Kate Drakos, Micky Minhas, February 17, 2015: US08959293 (4 worldwide citation)

Techniques are described herein that are capable of optimizing (i.e., deduplicating) data in a virtualization environment. For example, optimization designations (a.k.a. deduplication designations) may be assigned to respective regions of a virtualized storage file. A virtualized storage file is a f ...


14
William A Arbaugh, Jeffrey D Chung, Nick L Petroni, Bryan Boot: Method and system for monitoring integrity of running computer system. Microsoft Corporation, Henry Gabryjelski, Kate Drakos, Micky Minhas, May 20, 2014: US08732824 (4 worldwide citation)

Monitoring integrity of a running computer system is based on creating a Test Model which includes predicates descriptive of invariant properties of security relevant objects and their attributes in the monitored structure known-to-be “healthy”, acquiring memory image of a portion of the running mon ...


15
Patrick Alexander Reynolds, John Branson Bley, David William Irwin, Aydan R Yumerefendi, Glenn Thomas Nethercutt: Methods and computer program products for transaction analysis of network traffic in a network device. Microsoft Technology Licensing, Henry Gabryjelski, Kate Drakos, Micky Minhas, November 24, 2015: US09197520 (4 worldwide citation)

Provided are methods and computer program products for analyzing and tracing the contents of network traffic in a network device and to help identify network performance issues. Methods for analyzing traffic include identifying thread identifiers associated with transactions, determining related eve ...


16
Alexey A Polyakov, Ravi Bikkula: Mitigating false positives in malware detection. Microsoft Corporation, Henry Gabryjelski, Kate Drakos, Micky Minhas, May 6, 2014: US08719935 (4 worldwide citation)

An anti-malware system that reduces the likelihood of detecting a false positive. The system is applied in an enterprise network in which a server receives reports of suspected malware from multiple hosts. Files on hosts suspected of containing malware are compared to control versions of those files ...


17
Mathew George, David M Kruse, James T Pinkerton, Roopesh C Battepati, Tom Jolly, Paul R Swan, Mingdong Shang, Daniel Edward Lovinger: Transparent failover. Microsoft Corporation, Henry Gabryjelski, Kate Drakos, Micky Minhas, October 7, 2014: US08856582 (3 worldwide citation)

Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifie ...


18
Mehmet Iyigun, Yevgeniy M Bak, Eric M Bluestein, Robin A Alexander, Andrew M Herron, Xiaozhong Xing: Assigning priorities to data for hybrid drives. Microsoft Technology Licensing, Henry Gabryjelski, Kate Drakos, Micky Minhas, March 24, 2015: US08990441 (3 worldwide citation)

A hybrid drive includes multiple parts: a performance part (e.g., a flash memory device) and a base part (e.g., a magnetic or other rotational disk drive). A drive access system, which is typically part of an operating system of a computing device, issues input/output (I/O) commands to the hybrid dr ...


19
Yuan Zheng, David James Armour, Stephen Jason Baron, Erik Stefan Nyström, John David Welch: Application migration between clouds. Microsoft Technology Licensing, Henry Gabryjelski, Doug Barker, Micky Minhas, September 13, 2016: US09444896 (3 worldwide citation)

Embodiments described herein are directed to reinitiating an application on a target computing cloud and to evaluating potential target cloud computing systems. In one scenario, a computing system receives an indication that identifies a target cloud for application migration. The target cloud compu ...


20
Nir Nice, Oleg Ananiev, John Wohlfert, Amit Finkelstein, Alik Teplitsky: Authentication in a globally distributed infrastructure for secure content management. Microsoft Corporation, Henry Gabryjelski, Kate Drakos, Micky Minhas, January 13, 2015: US08935742 (3 worldwide citation)

Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing prot ...