1
James E Allard, David R Treadwell III, John F Ludeman: Method, system and apparatus for client-side usage tracking of information server systems. Microsoft Corporation, Workman Nydegger Seeley, January 25, 2000: US06018619 (520 worldwide citation)

A method for tracking usage patterns of users of hyper-media systems, such as the World-Wide Web, that creates a usage log on a user's client computer and periodically transmits the usage log from the user's client machine to a usage tracking server computer to be incorporated in an overall usage lo ...


2
Heath Hunnicutt, John F Ludeman: Access check system utilizing cached access permissions. Microsoft Corporation, Duft Graziano & Forest P C, March 30, 1999: US05889952 (142 worldwide citation)

An access-check system for a network server comprises an access-cache for storing access-permissions generated by the server in response to resource access requests. The system retrieves the appropriate access-permission from the access-cache in response to receipt of a request necessitating the sam ...


3
Philippe Choquier, Quentin J Clark, William D Devlin, Lara N Dillingham, Cameron J A Ferroni, Justin Grant, Rodney T Limprecht, John F Ludeman, Alexander E Mallet, Boyd C Multerer, Martin J Sleeman, Michael W Thomas: System and method providing virtual applications architecture. Microsoft Corporation, Amin & Turocy, November 1, 2005: US06961681 (35 worldwide citation)

A virtual applications architecture is provided according to the present invention. The architecture includes a topology manager for managing applications across a plurality of members, and a virtual applications manager for defining a plurality of resources comprising the applications. The topology ...


4
Robert H Gerber, Balan Sethu Raman, James R Hamilton, John F Ludeman, Murali M Krishna, Samuel H Smith, Shrinivas Ashwin: Database fragment cloning and management. Microsoft Corporation, February 15, 2011: US07890508 (9 worldwide citation)

Mechanisms and techniques for database fragment cloning and management are provided. A database object, such as a table, rowset or index, is divided into fragments. Each fragment is cloned to create cloned fragments, which operationally are substantially identical to one another. One or more of the ...


5
Philippe Choquier, Quentin J Clark, William D Devlin, Lara N Dillingham, Cameron J A Ferroni, Justin Grant, Rodney T Limprecht, John F Ludeman, Alexander E Mallet, Boyd C Multerer, Martin J Sleeman, Michael W Thomas: System and method providing virtual applications architecture. Microsoft Corporation, Workman Nydegger, February 2, 2010: US07657580 (3 worldwide citation)

A virtual applications architecture is provided according to the present invention. The architecture includes a topology manager for managing applications across a plurality of members, and a virtual applications manager for defining a plurality of resources comprising the applications. The topology ...


6
Robert H Gerber, Balan Sethu Raman, James R Hamilton, John F Ludeman, Murali M Krishna, Samuel H Smith, Shrinivas Ashwin: Database fragment cloning and management. Microsoft Corporation, Microsoft Corporation, February 22, 2007: US20070043749-A1

Mechanisms and techniques for database fragment cloning and management are provided. A database object, such as a table, rowset or index, is divided into fragments. Each fragment is cloned to create cloned fragments, which operationally are substantially identical to one another. One or more of the ...


7
Heath Hunnicutt, John F Ludeman: Access check system utilizing cached access permissions. Lee & Hayes Pllc, October 9, 2003: US20030191846-A1

An access-check system for a network server comprises an access-cache for storing access-permissions generated by the server in response to resource access requests. The system retrieves the appropriate access-permission from the access-cache in response to receipt of a request necessitating the sam ...


8
Philippe Choquier, Quentin J Clark, William D Devlin, Lara N Dillingham, Cameron JA Ferroni, Justin Grant, Rodney T Limprecht, John F Ludeman, Alexander E Mallet, Boyd C Multerer, Martin J Sleeman, Michael W Thomas: System and method providing virtual applications architecture. Microsoft Corporation, Amin & Turocy, November 24, 2005: US20050262173-A1

A virtual applications architecture is provided according to the present invention. The architecture includes a topology manager for managing applications across a plurality of members, and a virtual applications manager for defining a plurality of resources comprising the applications. The topology ...


9
Mahesh K Sreenivas, Robert H Gerber, Vishal Kathuria, John F Ludeman, Ashwin Shrinivas, Michael A Uhlar: Storage Tiers for Database Server System. Microsoft Corporation, Microsoft Corporation, April 1, 2010: US20100082546-A1

A technique is described for storing data from a database across a plurality of data storage devices, wherein each data storage device is capable of being accessed only by a corresponding computer system in a group of interconnected computer systems. In accordance with the technique, an identifier o ...