Dr. Lin graduated from the Natl Taiwan Univ Coll of Med, Taipei, Taiwan (385 02 Prior 1/71) in 1974. He works in San Bernardino, CA and specializes in Internal Medicine and Pulmonary Disease. Dr. Lin is affiliated with Community Hospital Of San Bernardino and St Bernardine Medical Center.
Samaritan Orthopedics Sports Medicine & Rheumatology 3620 NW Samaritan Dr STE 202, Corvallis, OR 97330 5417684810 (phone), 5417684813 (fax)
Education:
Medical School Mount Sinai School of Medicine Graduated: 2004
Procedures:
Arthrocentesis Hallux Valgus Repair Joint Arthroscopy Lower Leg Amputation Lower Leg/Ankle Fractures and Dislocations Occupational Therapy Evaluation Spinal Surgery Hip/Femur Fractures and Dislocations Knee Arthroscopy Shoulder Surgery
Conditions:
Fractures, Dislocations, Derangement, and Sprains Hallux Valgus Osteoarthritis Plantar Fascitis Sciatica
Languages:
English Spanish
Description:
Dr. Lin graduated from the Mount Sinai School of Medicine in 2004. He works in Corvallis, OR and specializes in Orthopaedic Surgery. Dr. Lin is affiliated with Good Samaritan Regional Medical Center.
- Redmond WA, US Gregory John COLOMBO - Kirkland WA, US Weidong CUI - Redmond WA, US Jason LIN - Bellevue WA, US Kenneth Dean JOHNSON - Bellevue WA, US
International Classification:
G06F 9/38 G06F 11/36
Abstract:
A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
- Redmond WA, US Jason LIN - Bellevue WA, US Matthew John WOOLMAN - Seattle WA, US Mehmet IYIGUN - Kirkland WA, US
International Classification:
G06F 21/52 G06F 12/10
Abstract:
Handling a memory fault based on detecting whether a memory pointer was invalidated by a pointer authentication (PA) failure. After an access to a memory pointer causes a memory fault, detecting that the memory pointer was invalidated by a PA failure includes creating a new memory pointer by replacing reserved bits of the memory pointer with a default value, and determining that the new memory pointer corresponds to a memory address that falls within executable memory. This determination includes determining that the memory address is within an executable memory page, determining that a call instruction is stored at a prior memory address that immediately precedes the memory address, and/or determining that the memory address corresponds to a code section of an executable file. The PA failure is handled based on logging the PA failure, terminating the application program, and/or resuming execution at an instruction stored at the memory address.
- Redmond WA, US Mehmet IYIGUN - Kirkland WA, US Jason LIN - Bellevue WA, US Matthew John WOOLMAN - Seattle WA, US
International Classification:
G06F 9/30 G06F 9/38 G06F 9/50
Abstract:
Performing shadow stack functionality for a thread in an audit mode includes initiating execution of a thread at the processor. Execution of the thread includes initiating execution of executable code of an application binary as part of the thread and enabling shadow stack functionality for the thread in an audit mode. Based at least on the execution of the thread in the audit mode, at least a portion of the shadow stack is enabled to be a circular stack. In response to determining that usage of the shadow stack has reached the defined threshold, one or more currently used entries of the shadow stack are overwritten, preventing the shadow stack from overflowing.
- Redmond WA, US Jason LIN - Bellevue WA, US Niraj MAJMUDAR - Renton WA, US Mehmet IYIGUN - Kirkland WA, US
International Classification:
G06F 21/54 G06F 9/48 G06F 9/445
Abstract:
Enforcing shadow stack violations for dynamic code. A thread is executed at a processor, which includes generating a portion of dynamic code for execution by the thread, identifying a range of memory addresses where the portion of dynamic code is loaded in memory, and initiating execution of the portion of dynamic code. Based at least on execution of the thread, an exception triggered by a mismatch between a first return address popped from a call stack corresponding to the thread and a second return address popped from a shadow stack corresponding to the thread is processed. Processing the exception includes (i) determining whether the second return address popped from the shadow stack is within the identified range of addresses, and (ii) based on having determined that the second return address is within the range of addresses, initiating a shadow stack enforcement action.
- Redmond WA, US Rahul NAIR - Bellevue WA, US Mark Allan BELLON - Seattle WA, US Christopher Peter KLEYNHANS - Bothell WA, US Jason LIN - Bellevue WA, US Ojasvi CHOUDHARY - Seattle WA, US Tristan Anthony BROWN - Seattle WA, US
Assignee:
Microsoft Technology Licensing, LLC - Redmond WA
International Classification:
G06F 9/50 G06F 9/48
Abstract:
Described herein is a system and method for latency-aware thread scheduled. For each processor core, an estimated cost to schedule a particular thread on the processor core is calculated. The estimated cost to schedule can be a period of time between the scheduling decision and the point in time where the scheduled thread begins to run. For each processor core, an estimated cost to execute the particular thread on the processor core is calculated. The estimated cost to execute can be a period of time spent actually running the particular thread on a particular processor core. A determination as to which processor core to utilize for execution of the particular thread based, at least in part, upon the calculated estimated costs to schedule the particular thread and/or the calculated estimated costs to execute the particular thread. The particular thread can be scheduled to execute on the determined processor core.
Verified Stack Trace Generation And Accelerated Stack-Based Analysis With Shadow Stacks
- Redmond WA, US Jason LIN - Bellevue WA, US Niraj MAJMUDAR - Renton WA, US Mehmet IYIGUN - Kirkland WA, US
International Classification:
G06F 9/30 G06F 9/32
Abstract:
A verified stack trace can be generated by utilizing information contained in a shadow stack, such as a hardware protected duplicate stack implemented for malware prevention and computer security. The shadow stack contains return addresses which are obtainable without requiring an unwinding of the traditional call stack. As such, triaging based on return address information can be performed more quickly and more efficiently, and with a reduced utilization of processing resources. Additionally, the generation of a verified stack trace can be performed, with such a verified stack trace containing return addresses that are known to be correct and not corrupted. The return addresses can either be read from the traditional call stack, or derived therefrom, and then verified by comparison to corresponding return addresses from the shadow stack, or they can be read directly from the shadow stack.
- Redmond WA, US Gregory John COLOMBO - Kirkland WA, US Weidong CUI - Redmond WA, US Jason LIN - Bellevue WA, US Kenneth Dean JOHNSON - Bellevue WA, US
International Classification:
G06F 9/38 G06F 11/36
Abstract:
A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
Power Polarity Detection For Accessory Mode Change
- Redmond WA, US Arto YLIKOSKI - Redmond WA, US Jason LIN - Redmond WA, US
International Classification:
H02J 7/00 H04R 1/10 H02J 7/02
Abstract:
A portable electronic accessory is adapted to initiate an operational mode change in a portable electronic accessory responsive to a user-initiated instruction received along a standard power line. The portable electronic accessory includes a rechargeable battery, electrical leads adapted to couple with a charging source to charge the rechargeable battery, and a polarity detection circuit configured to detect a power polarity switch of the electrical leads when the portable electronic accessory is coupled to the charging source. The portable electronic accessory further includes a controller that initiates a device mode change responsive to the power polarity switch detected by the polarity detection circuit.
Gamer.com.tw - Sports Game Editor (2012-2012) Exploding Barrel Games - Embedded Game Tester (2011-2012) Jireh Studio - Designer (2011-2011) Electronic Arts - Embedded Game Tester (2008-2010)
About:
When we’re in game worlds, we become the best version of ourselves, the most likely to help at a moment’s notice, the most likely to stick with a problem as long as it takes, to get up after failure a...
Tagline:
If you don't build your dream, someone will hire you to build theirs
Jason Lin
Work:
Rhythm and Hues Studios - Effects Technical Director (2011)
Education:
Carnegie Mellon University, Huaqiao University
About:
Http://initialfx.com/
Tagline:
A fine nerd
Jason Lin
Work:
Thermo Fisher Scientific - Research Intern (2011) Custom Care Pharmacy - Pharmacy Technician (2010-2011)
Education:
University of California, Berkeley - Chemical Biology
Jason Lin
Education:
St Hilda's secondary school
Jason Lin
Work:
University of Maryland, College Park - Student Assistant (2010-2012)
Education:
University of Maryland, College Park - Community Health
About:
Music is my passion, but instead i'm in school gettin my bachelors degree and somehow managing i guess... blehhh
Jason Lin
About:
Jason
Bragging Rights:
被GOOGLE+ 停權
Jason Lin
Work:
JOEONE Lenovo Group
Education:
London School of Economics - MISI
Jason Lin
Work:
Tencent (QQ) - Intern Software Engineer
Education:
The Hong Kong Polytechnic University
About:
A craftsman in JavaScript / Node.js / Front-end Dev
Mark your calendar (and set your TiVo while youre at it) Season two kicks off with an episode titled The Western Book of the Dead, which was written by Pizzolatto and directed by Jason Lin (an alum of NBC comedy Community and three films from the Fast and Furious franchise). The eight-episod
Date: Jun 19, 2015
Category: Entertainment
Source: Google
Taiwan Lawmakers Brawl in Parliament Over Nuclear Plant Vote
The ruling party shouldnt use the violence of majorityrule to push through the nuclear power plant project, DPPspokesman Jason Lin said in a statement today. We support thehard work of our party members.
Date: Aug 02, 2013
Category: Business
Source: Google
Taiwan's Jailed Ex-Leader Attempts Suicide With Towel in Protest
has applied to be reinstated as a member of theDemocratic Progressive Party. The application isnt progressingsmoothly, according to the justice ministrys statement. Partyspokesman Jason Lin said Chens application for reinstatement isunder review and theres no time-line for approval.
Date: Jun 03, 2013
Category: World
Source: Google
Next Media Says $536 Million Taiwan Asset Sale Falls Through
Were against the concentration of media in the hands ofpro-China interests, Jason Lin, a spokesman for the oppositionDemocratic Progressive Party, said by phone today, declining tocomment on the Next Media deal.
Date: Mar 26, 2013
Category: Business
Source: Google
Taiwan Anti-Nuclear Protests May Derail $8.9 Billion Power Plant
We demand construction of the No. 4 nuclear power plantto stop immediately and that Taiwan phase out the use of nuclearpower, Jason Lin, a spokesman for the opposition DemocraticProgressive Party, said before the weekend protest. After theFukushima crisis, people are awakened to the fact that
"I voted for the DPP last time but this time I'm not too sure," said Jason Lin, a 36-year-old engineer from the southern city of Kaohsiung. "In the end I think it will come down to whoever I think will handle the economy better. For me, the economy is the main issue."
Date: Dec 15, 2011
Category: World
Source: Google
Ex-Galleon Worker Tells of Gathering Tips on Intersil
Mr. Smith, who joined Galleon in 2002 after a stint as an investment banker at Morgan Stanley, said he developed a relationship with an Intersil executive named Jason Lin who worked in Taipei, Taiwan. Once a quarter, Mr. Smith would travel to Taiwan to meet with Mr. Lin. They initially discussed ind
Date: Mar 29, 2011
Category: Business
Source: Google
Ex-Galleon Employee Says Firm Used Insider Tips for 'Edge'
Smith testified he was able to get advance revenue figures from Intersil, a semiconductor maker, from a Taipei, Taiwan- based Intersil engineer named Jason Lin. Lin told Smith that he got the information from an unnamed senior member of the team in Taiwan, Smith said in court.