Girish Bablani - Issaquah WA, US Anatoliy Panasyuk - Bellevue WA, US Scott Colin Cottrille - Sammamish WA, US Dennis Batchelder - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/08
US Classification:
380286
Abstract:
Data protection services for portable, handheld, or mobile device are provided in part by one or more cooperating network or data service(s), such as a cloud service, that provide volatile encryption/decryption key information to the device(s). Decryption key(s) are retrieved on demand by a device or application of the device from a network service or other data service based on an analysis of device and user credential(s). Retrieval of keys can be triggered automatically by meeting a set of pre-conditions by the device or application, or explicitly or implicitly requested by input to the device or application. Thus, decryption keys are provided to the mobile device in real time, on-demand, explicitly or implicitly defining a volatile lifetime prior to expiration of the decryption keys.
Anatoliy Panasyuk - Bellevue WA, US Girish Bablani - Bellevue WA, US Charles McColgan - Kirkland WA, US Krishna Kumar Parthasarathy - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00 G06F 15/16
US Classification:
726 1, 709217
Abstract:
Some embodiments are directed to an information protection scheme in which devices, users, and domains in an information space may be grouped into zones. When information is transferred across a zone boundary, information protection rules may be applied to determine whether the transfer should be permitted or blocked, and/or whether any other policy actions should be taken (e.g., requiring encryption, prompting the user for confirmation of the intended transfer, or some other action).
Marcelo De Barros - Redmond WA, US Michael Andrews - Redmond WA, US Manish Mittal - Redmond WA, US Girish Bablani - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 25
Abstract:
Web applications, systems and services, which are prone to cyber-attacks, can utilize an adaptive fuzzing system and methodology to intelligently employ fuzzer technology to test web site pages for vulnerabilities. A breadth first search and minimal fuzzing testing is performed on identified pages of a web site looking for either a vulnerability or the potential for a vulnerability. Heuristics are gathered and/or generated on each tested web page to determine a vulnerability score for the page that is an indication of the page's potential for hosting a vulnerability. When a page is discovered with a vulnerability score that indicates the page has the potential for a vulnerability a depth first search and expanded fuzzing testing is performed on one or more branches of the web site that begin with the page with the potential vulnerability.
Methods And Apparatus For Creating A Base Class For Manipulating External Data Connections In A Computer Generated Document
Cory Alan Reina - Kirkland WA Girish Bablani - Issaquah WA
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 944
US Classification:
395683
Abstract:
A method and apparatus for creating a base class and derived classes in an object-oriented computer programming environment that allows an application program to manipulate external data connections in a similar manner. The base class includes sufficient functionality for all external data connections regardless of the protocol of the data transfer mechanism that is utilized for the external data connection such that the specific function calls required from the application to implement each data transfer mechanism is hidden from the application. Thus, the application sees all external data connections as being similar because the application issues function calls only to the base class.
Leveraging Reserved Data Center Resources To Improve Data Center Utilization
- Redmond WA, US Christian L. BELADY - Mercer Island WA, US Osvaldo P. MORALES - Normandy Park WA, US Ricardo Gouvêa BIANCHINI - Bellevue WA, US Marcus F. FONTOURA - Medina WA, US Alok Gautam KUMBHARE - Redmond WA, US Girish S. BABLANI - Bellevue WA, US Lalu Vannankandy KUNNATH - Snoqualmie WA, US Steve Todd SOLOMON - Kirkland WA, US David Thomas GAUTHIER - Seattle WA, US
International Classification:
G06F 9/50 G06F 1/3206 G06F 1/329 G06F 9/455
Abstract:
A method for facilitating increased utilization of a data center includes receiving information about availability of components in a data center's electrical infrastructure and about power consumption of servers in the data center. The method may also include detecting that the power consumption of the servers in the data center exceeds a reduced total capacity of the electrical infrastructure. The reduced total capacity may be caused by unavailability of at least one component in the data center's electrical infrastructure. The method may also include causing power management to be performed to reduce the power consumption of the servers so that the power consumption of the servers does not exceed the reduced total capacity of the electrical infrastructure of the data center.
Predictive Rightsizing For Virtual Machines In Cloud Computing Systems
- Redmond WA, US Ricardo Gouvea BIANCHINI - Redmond WA, US Girish BABLANI - Redmond WA, US
International Classification:
G06F 9/455 G06F 9/50 G06N 5/04 G06N 20/00
Abstract:
Various embodiments, methods, and systems for implementing a predictive rightsizing system are provided. Predicted rightsized deployment configurations are generated for virtual machine “VM” deployments having deployment configurations that are modified to predicted rightsized deployment configurations based on a prediction engine. In operation, a VM deployment, associated with a request to deploy one or more VMs on a node, is accessed at a predictive rightsizing controller. A predicted resource utilization for the VM deployment is generated at the prediction engine and accessed at the predictive rightsizing controller. The predicted resource utilization is generated based on a prediction engine that uses past behaviors and features associated with previous VM deployments. Based on the predicted resource utilization, a predicted rightsized deployment configuration is generated for the VM deployment. The predicted rightsized deployment configuration is communicated such that the request to deploy the VMs is executed based on the predicted rightsized deployment configuration.
Microsoft Jan 2012 - May 2014
Director of Development, Enterprise Identity
Microsoft Jan 2012 - May 2014
Corporate Vice President
Microsoft Sep 2010 - Feb 2012
Director of Engineering and Qa, Bing
Microsoft Oct 2005 - Oct 2008
General Manager
Microsoft Jun 2002 - Oct 2005
Product Unit Manager
Education:
Uc Santa Barbara Sep 1990 - Dec 1991
Masters, Master of Arts, Computer Science
Indian Institute of Technology, Delhi 1986 - 1990
Bachelors, Bachelor of Technology, Computer Science
Delhi Public School - R. K. Puram 1980 - 1986
Skills:
Software Engineering Enterprise Software Software Development Distributed Systems Sharepoint Agile Methodologies Software Project Management Cloud Computing Scalability Security Software Design Agile Project Management Saas Product Management Scrum Big Data Web Services Windows Azure Software As A Service Microsoft Azure Paas Software Product Management Microsoft Exchange