1
Wassef Haroun, George M Moore, Forrest Foltz, Edward L Stubbs, Felix Gerard Torquil Ifor Andrew: Digital interconnects of a PC with consumer electronics devices. Microsoft Corporation, Workman Nydegger & Seeley, July 28, 1998: US05787259 (210 worldwide citation)

A computer includes a housing, a processor positioned in the housing, and an external bus adapter configured to allow the processor to access consumer electronics devices positioned outside of the housing using an external bus. The processor is configured to produce a first digital audio signal, to ...


2
Robert M McKaughan, Forrest Foltz, Rajasekhar Abburi: System for remotely waking a sleeping computer in power down state by comparing incoming packet to the list of packets storing on network interface card. Microsoft Corporation, Jones & Askew, September 1, 1998: US05802305 (170 worldwide citation)

In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer having a list of packets to listen for stored on a network interface card associated with the sleeping computer, a method of waking the ...


3
Benjamin W Slivka, Forrest Foltz: Caching uncompressed data on a compressed drive. Microsoft Corporation, Joseph R Kelly, Westman Champlin & Kelly P A, February 20, 2001: US06192432 (40 worldwide citation)

An improved compressed file system is provided. In a preferred embodiment of the present invention, a memory cache is used for storing uncompressed data that is sent to or received from a compressed logical drive. When writing data to the compressed logical drive, the preferred embodiment of the pre ...


4
Robert M McKaughan, Forrest Foltz: State governing the performance of optional booting operations. Microsoft Corporation, Leydig Voit & Mayer, January 11, 2000: US06014744 (31 worldwide citation)

The present invention is directed to a facility for performing selected operations as part of a booting process of a computer system only during iterations of the booting process that immediately follow failed iterations of the booting process. At the beginning of the booting process, the facility c ...


5
Eric Traut, Forrest Foltz, Andrew Thornton, Suyash Sinha: Protection agents and privilege modes. Microsoft Corporation, Lee & Hayes PLLC, February 19, 2013: US08380987 (16 worldwide citation)

This document describes tools capable of making a portion of operating-system memory associated with a protection agent unalterable or inaccessible from an operating-system privilege mode. In some embodiments, these tools are capable of creating a protection-agent privilege mode by requesting that a ...


6
Benjamin W Slivka, Forrest Foltz: Method and system for storing uncompressed data in a memory cache that is destined for a compressed file system. Microsoft Corporation, Seed and Berry, June 22, 1999: US05915129 (8 worldwide citation)

An improved compressed file system is provided. In a preferred embodiment of the present invention, a memory cache is used for storing uncompressed data that is sent to or received from a compressed logical drive. When writing data to the compressed logical drive, the preferred embodiment of the pre ...


7
Scott A Field, Brandon Baker, Eric Traut, Suyash Sinha, Joy Ganguly, Forrest Foltz, David Cutler: Protecting operating-system resources. Microsoft Corporation, Lee & Hayes PLLC, July 27, 2010: US07765374 (3 worldwide citation)

This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside withi ...


8
Scott A Field, Brandon Baker, Eric Traut, Suyash Sinha, Joy Ganguly, Forrest Foltz, David Cutler: Protecting Operating-System Resources. Microsoft Corporation, Lee & Hayes Pllc, July 31, 2008: US20080183996-A1

This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside withi ...



Click the thumbnails below to visualize the patent trend.