Eric D. Deily - Issaquah WA, US Jaroslav Dunajsky - Redmond WA, US Wade A. Hilmo - Snohomish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 11/00
US Classification:
714 39
Abstract:
Use of configuration information to specify particular conditions under which trace events are to be logged. When accessing trace events generated by various modules, configuration data is referred to specifying condition(s) under which the trace events should be logged. If the log condition(s) are satisfied, the trace events are logged. Otherwise, they may be discarded. Thus, the number of trace events in the log may be significantly reduced to those trace events that satisfy conditions of interest to an evaluator.
Modular Server Architecture For Multi-Environment Http Request Processing
Bilal Alam - Sammamish WA, US Erik B. Olson - Sammamish WA, US Anil K. Ruia - Issaquah WA, US Michael D. Volodarsky - Seattle WA, US David Wang - Issaquah WA, US Jaroslav Dunajsky - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/44 G06F 9/45 G06F 3/00
US Classification:
717167, 717131, 719332
Abstract:
Methods are provided for utilizing a modular server architecture for processing requests for services, such as authorization and authentication, in a web server. The modular server architecture includes self-contained modular components that can be plugged in and out of the web server, as needed, to provide requested web services. The modular server architecture is also extensible in that it provides set of server APIs for processing requests for supporting built-in server functionality as well as functionality provided by third party modular components. The modular server architecture also supports the integration of request processing tasks for both native and managed modular components, such as ASP. NET modules, by virtue of a managed module host component. The modular server architecture also optimizes server performance by only providing modular component functionality when needed.
Servicing resource requests. A method includes at a first caching node, receiving a request for a first resource. The method further includes at the first caching node, determining at least one of health or load information of the first caching node. The method further includes generating a response to the request for the first resource, including generating a header to the response. The header is a custom header. The custom header includes at least one of health or load information. The method further includes sending the response to the request including sending the custom header with the at least one of health or load information.
Vikas Malhotra - Redmond WA, US Scott A. Field - Redmond WA, US Jaroslav Dunajsky - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 29/06
US Classification:
726 10
Abstract:
A secure web hosting system is provided. In various embodiments, the secure web hosting system identifies an application that is to be loaded, creates a security token that is unique to the computer system and based on a name of the identified application, receives a request to load the identified application, and creates a process in which to load the identified application, the process having security attributes associated with the created security token. In various embodiments, the secure web hosting system includes an isolation service component that creates a security token based on an application name of an application identified by the configuration file.
Eric Deily - Issaquah WA, US Ming Lu - Redmond WA, US Gabriele Giuseppini - Redmond WA, US Melur Raghuraman - Sammamish WA, US Jaroslav Dunajsky - Redmond WA, US
International Classification:
G06F017/30
US Classification:
707104100
Abstract:
A method of tracing data on a network for a Web request that detects events of the Web request as the Web request is serviced. The method provides a unique identifier (ID) for the Web request. The ID is associated with all events for the Web request in a trace log. When such events occur in the servicing of the Web request, each event is recorded with the ID of the Web request in a trace log. The trace log can be accessed via the ID to debug a Web request service failure.
Bilal Alam - Bellevue WA, US Fabio Alexandre Yeon - Mill Creek WA, US Jaroslav Dunajsky - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 15/177
US Classification:
709222
Abstract:
Techniques are described herein that are capable of dynamically activating web applications. For instance, such applications may not be configured on a machine until requests for those applications are received by the machine. For example, upon receipt of such a request, the machine may automatically configure an application that is identified by the request on the machine. The machine may then forward the request to the application for processing. In another example, the machine may run an application-agnostic worker process (AAWP), which configures an application on the machine upon receipt of a request for the application. An AAWP is a worker process that is capable of processing requests for web application(s) that are not previously associated with the AAWP. The AAWP may cause a specified worker process to run on the machine, so that the specified worker process may process the request and/or subsequent requests for the application.
- Redmond WA, US Fabio Alexandre Yeon - Mill Creek WA, US Jaroslav Dunajsky - Redmond WA, US
International Classification:
H04L 12/24 H04L 29/08 G06F 8/71 G06F 9/48
Abstract:
Techniques are described herein that are capable of dynamically activating web applications. For instance, such applications may not be configured on a machine until requests for those applications are received by the machine. For example, upon receipt of such a request, the machine may automatically configure an application that is identified by the request on the machine. The machine may then forward the request to the application for processing. In another example, the machine may run an application-agnostic worker process (AAWP), which configures an application on the machine upon receipt of a request for the application. An AAWP is a worker process that is capable of processing requests for web application(s) that are not previously associated with the AAWP. The AAWP may cause a specified worker process to run on the machine, so that the specified worker process may process the request and/or subsequent requests for the application.
- Redmond WA, US Fabio Alexandre Yeon - Mill Creek WA, US Jaroslav Dunajsky - Redmond WA, US
International Classification:
H04L 12/24 G06F 9/48 G06F 9/44 H04L 29/08
Abstract:
Techniques are described herein that are capable of dynamically activating web applications. For instance, such applications may not be configured on a machine until requests for those applications are received by the machine. For example, upon receipt of such a request, the machine may automatically configure an application that is identified by the request on the machine. The machine may then forward the request to the application for processing. In another example, the machine may run an application-agnostic worker process (AAWP), which configures an application on the machine upon receipt of a request for the application. An AAWP is a worker process that is capable of processing requests for web application(s) that are not previously associated with the AAWP. The AAWP may cause a specified worker process to run on the machine, so that the specified worker process may process the request and/or subsequent requests for the application.