Microsoft since Oct 1989
Principal Software Development Engineer
ADP Sep 1984 - Oct 1989
Driver, Dispatcher, Developer
Education:
Spring Woods Senior High - Houston, Texas 1978 - 1982
Skills:
Win32 Api Distributed Systems Tcp/Ip Cloud Computing Scalability Uml Test Automation Windows Azure Windbg Software Design Software Engineering Visual Studio Object Oriented Design Software Development Kernel Windows System Architecture Multithreading Device Drivers C++ Agile Methodologies Debugging Technical Leadership Algorithms Web Services C# Scrum .Net Hadoop Perl Xml .Net Framework Microsoft Azure
Coaltion Studios since Jan 2002
President
Hill Air Force Contracted to Woodbury Tech. Inc. - Hill Air Force Base Jun 2007 - Dec 2011
Systems Administrator/VMware Systems Administrator
Hill Air Force Base May 2007 - Dec 2011
System Administrator
Hill Air Force Base May 2007 - Dec 2011
Systems Administrator/Vmware sys admin
White Dot Solutions/Hill Af Base Mar 2004 - Jun 2007
Systems Symantec Administrator
Interests:
Producing and Directing Movies
Post production, both video and audio
Certifications:
Network +, Comptia Securtity +, Comptia A+, Comptia MCP Server 2000, Microsoft CIW Certified Internet Web Designer, Comptia Project Management, Project +, Comptia
Brandon R. Bray - Redmond WA, US Bryan W. Tuttle - Newcastle WA, US Louis Lafreniere - Seattle WA, US Philip M. Lucido - Redmond WA, US Richard M. Shupak - Bellevue WA, US Daniel R. Spalding - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 3/00 G06F 9/44 G06F 11/00 H04L 9/00
US Classification:
719318, 717124, 713164, 726 22
Abstract:
Safe exceptions detect and intervene in a malicious attack against an application or system component, even in the presence of a coding flaw such as a buffer overrun. A list of all the exception handlers in an image (e. g. , a DLL or EXE) is desirably created. When loading the image into a process, the operating system loader finds and stores a reference to this list. When a subsequent attack targets exception handling by creating an attacker provided exception handler, the new attacker provided exception handler is compared to a list of the real exception handlers. The list of real exception handlers is stored in memory, and desirably cannot be modified. In particular, when an exception occurs, the operating system finds the proper exception handler from information on the stack (this may be under attack, so the information is not trusted) and compares it to the previously created read-only reference list. If the exception handler that has occurred is found on the reference list, the exception handler is allowed to execute. Otherwise, the operating system assumes the application is under attack and terminates the process' execution.
Offloading Packet Processing For Networking Device Virtualization
Yue Zuo - Redmond WA, US Daniel M. Firestone - Seattle WA, US Albert Gordon Greenberg - Seattle WA, US Ho Yuen Chau - Bellevue WA, US Yimin Deng - Redmond WA, US Bryan William Tuttle - Newcastle WA, US Pankaj Garg - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/455
US Classification:
718 1
Abstract:
The present invention extends to methods, systems, and computer program products for offloading packet processing for networking device virtualization. A host maintains rule set(s) for a virtual machine, and a physical network interface card (NIC) maintains flow table(s) for the virtual machine. The physical NIC receives and processes a network packet associated with the virtual machine. Processing the network packet includes the physical NIC comparing the network packet with the flow table(s) at the physical NIC. When the network packet matches with a flow in the flow table(s) at the physical NIC, the physical NIC performs an action on the network packet based on the matching flow. Alternatively, when the network packet does not match with a flow in the flow table(s) at the physical NIC, the physical NIC passes the network packet to the host partition for processing against the rule set(s).
Embedding Certifications In Executable Files For Network Transmission
Robert G. Atkinson - Woodinville WA Bryan W. Tuttle - Newcastle WA Robert M. Price - Seattle WA Robert P. Reichel - Redmond WA
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 930
US Classification:
713176, 713167, 713187
Abstract:
A certification or signature is incorporated in a computer program, an executable file, or code to assure its authenticity and integrity, particularly for receiving it over an open computer network like the Internet. The executable file may be of any executable form, including an executable or portable executable. exe file format, a. cab cabinet file format, an. ocx object control format, or a Java class file. The certification includes a keyed source confirmation with a secure representation of the executable file. In an embodiment, the certification is referenced in a header of the executable file, the reference including a pointer to the keyed source confirmation and an indication of the size of the keyed source confirmation.
Management Of Graphics Processing Units In A Cloud Platform
- Redmond WA, US Huy HOANG - Seattle WA, US Bryan W. TUTTLE - Newcastle WA, US
International Classification:
G06T 1/20 A63F 13/355 G09G 5/36 G09G 5/00
Abstract:
A graphics rendering system is provided for controlling the rendering of images to manage expected errors. The graphics rendering system receives a specification of a render task to be performed to render an image of a graphics scene and then identifies computing devices that each have a graphics processing unit. The graphics rendering system directs each of the identified computing devices to render the image specified by the render task such that each identified computing device renders the same image. When the graphics rendering system detects that a computing device has completed the render task successfully, it provides the image rendered by that computing device as the rendered image of the render task such that any other image rendered by another of the computing devices is not needed.
Optimal Allocation Of Dynamic Cloud Computing Platform Resources
- Redmond WA, US JAMES E. JOHNSON - BELLEVUE WA, US AJAY MANI - WOODINVILLE WA, US BRYAN W. TUTTLE - NEWCASTLE WA, US ALEJANDRO MATUTE GONZALEZ - SEATTLE WA, US HUY VU-BAO HOANG - BELLEVUE WA, US
International Classification:
H04L 29/08 G06F 9/50 G06F 3/06
Abstract:
In various embodiments, methods and systems for optimizing allocation of dynamic resources are provided. A user service request resource instance is received at an allocator. The user service request resource instance is based on a dynamic resource protocol that supports generating and communicating resource instances between components in a resource allocation platform. The dynamic resource protocol also defines a set of rules for translating and representing resources as logical resource types and logical units. At a node, a node resource instance is generated and communicated, based on the dynamic resource protocol, from the node to the allocator. The node resource instance specifically comprises a resource interaction matrix that indicates dependencies between resource types. A resource allocation instance is generated at the allocator for the user service request resource instance. The resource allocation instance is communicated, such that, resource types on the node are allocated based on the resource allocation instance.
Hardware-Accelerated Secure Communication Management
- Redmond WA, US Ho Yuen Chau - Bellevue WA, US Bryan William Tuttle - Newcastle WA, US
International Classification:
H04L 29/06 H04L 9/32
Abstract:
Computing systems, devices, and associated methods of managing secure communication using hardware accelerators are disclosed herein. In one embodiment, a method includes receiving messages from a peer computing device via a computer network at a FPGA of a hardware accelerator and examining each of the received messages to determine whether the received messages contain application data. The method can then include forwarding a first subset of the received messages that do not contain application data to the processor for further processing and processing a second subset of the messages containing application data according to a security protocol without forwarding the second subset to the processor to reduce a consumption of bandwidth across the communications bridge.
Optimal Allocation Of Dynamic Cloud Computing Platform Resources
- Redmond WA, US JAMES E. JOHNSON - BELLEVUE WA, US AJAY MANI - WOODINVILLE WA, US BRYAN TUTTLE - NEWCASTLE WA, US ALEJANDRO MATUTE GONZALEZ - SEATTLE WA, US HUY VU-BAO HOANG - BELLEVUE WA, US
International Classification:
H04L 29/08
Abstract:
In various embodiments, methods and systems for optimizing allocation of dynamic resources are provided. A user service request resource instance is received at an allocator. The user service request resource instance is based on a dynamic resource protocol that supports generating and communicating resource instances between components in a resource allocation platform. The dynamic resource protocol also defines a set of rules for translating and representing resources as logical resource types and logical units. At a node, a node resource instance is generated and communicated, based on the dynamic resource protocol, from the node to the allocator. The node resource instance specifically comprises a resource interaction matrix that indicates dependencies between resource types. A resource allocation instance is generated at the allocator for the user service request resource instance. The resource allocation instance is communicated, such that, resource types on the node are allocated based on the resource allocation instance.
Management Of Graphics Processing Units In A Cloud Platform
- Redmond WA, US Huy Hoang - Seattle WA, US Bryan W. Tuttle - Newcastle WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06T 1/20 A63F 13/52 G09G 5/00
US Classification:
463 31, 345505
Abstract:
A graphics rendering system is provided for controlling the rendering of images to manage expected errors. The graphics rendering system receives a specification of a render task to be performed to render an image of a graphics scene and then identifies computing devices that each have a graphics processing unit. The graphics rendering system directs each of the identified computing devices to render the image specified by the render task such that each identified computing device renders the same image. When the graphics rendering system detects that a computing device has completed the render task successfully, it provides the image rendered by that computing device as the rendered image of the render task such that any other image rendered by another of the computing devices is not needed.
License Records
Bryan D Tuttle
License #:
GFE0804489 - Active
Category:
Mechanical
Expiration Date:
Mar 31, 2017
Type:
Fuel Gas Service Technician
Googleplus
Bryan Tuttle
Work:
The Highlander - Photography Editor
Education:
University of California, Riverside - Sociology / Administrative Studies, Palos Verdes Peninsula High School