Kenneth D. Wolf - Seattle WA, US Nicholas Alexander Allen - Redmond WA, US Kirill Gavrylyuk - Seattle WA, US Edmund Samuel Victor Pinto - Duvall WA, US Tao Xie - Bellevue WA, US Asad Jawahar - Woodinville WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 11/00
US Classification:
714 381, 714 471, 714 48, 717117
Abstract:
A declarative program definition. The definition is analyzed to produce an application contract that describes semantics for sending and receiving application messages during the successful execution of operations by the program. In addition, this analysis may also generate local behaviors associated with the local execution of the program. Alternatively or in addition, the analysis may infer secondary contracts regarding the sending and receiving of application messages, even though the full details of the secondary contracts are not present in the declarative program definition. For instance, the secondary contracts might include error contracts or consistency contracts.
Error Recovery For Application-Level Intermediaries
John Anthony Taylor - Bellevue WA, US Nicholas Alexander Allen - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 11/00
US Classification:
714 18, 714 41, 714 16, 714 43
Abstract:
Error handling in the intermediation of one-way transacted messages. Rather than receiving an inbound message under a transaction, the intermediary performs a non-destructive exclusive read of the message from the source outside of a transaction. Routing logic is applied against the content of the message to determine a collection of message consumers to which a copy of the inbound message is to be sent. Then, under a transaction, the copy of the message is attempted to be sent to each destination. If a send of the copy fails, the transaction is rolled back, but the failure is recorded such that the same transmission mechanism is not, or is less likely to be, tried again in subsequent attempts. The principles may apply to a single message to be sent under the transaction, or to multiple messages to be sent under a single transaction.
Testing Automatic Data Collection Devices, Such As Barcode, Rfid And/Or Magnetic Stripe Readers
Andrew Harding - Kirkland WA, US Jeffrey Suhr - Mukilteo WA, US Nicholas Allen - Edmonds WA, US
Assignee:
INTERMEC IP CORP. - Everett WA
International Classification:
G06K 5/00
US Classification:
235437000
Abstract:
Automatic data collection devices such as barcode readers, RFID readers, magnetic stripe readers and the like may be tested using ADC device test executables, modules or processes stored at a variety of network locations. One or more sets of tests or work lists may be defined to facilitate testing. Tests may be identified by name and/or keyword. Keywords may be indicative one or more functionalities tested by the respective ADC device test module.
Persistent Application Activation And Timer Notifications
John A. Taylor - Bellevue WA, US Nicholas A. Allen - Redmond WA, US Stuart J. Langley - Redmond WA, US Igor Sedukhin - Issaquah WA, US Justin D. Brown - Seattle WA, US Kartik Paramasivam - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 11/20 G06F 15/16 G06F 11/00 G06F 11/16
US Classification:
714 411, 709203, 714E11073
Abstract:
The present invention extends to methods, systems, and computer program products for persistent application activation and timer notifications. A durable instance manager, instance execution hosts, and an instance store interoperate to transition instances between executing and persisted states. System properties are associated with an instance. System properties can define re-activation conditions, that when satisfied, indicate that an instance is to be re-activated for execution. System properties can define timers as well as indications that instances are in a persisted but ready to run state.
- Seattle WA, US Gregory Alan Rubin - Seattle WA, US Eric Jason Brandwine - Haymarket VA, US Nicholas Alexander Allen - Kirkland WA, US Andrew Kyle Driggs - Seattle WA, US
A service provider provides virtual computing services using a fleet of one or more host computer systems. Each of the host computer systems may be equipped with a trusted platform module (“TPM”). The service provider, the host computer systems, and the virtual computing environments generate attestations that prove the integrity of the system. The attestations are signed with a one-time-use cryptographic key that is verifiable against the public keys of the service provider, a host computer system, and a virtual computing environment. The public key of the host computer system is integrated into a hash tree that links the public key of the host computer system to the public key of the service provider. The public key of the virtual computing environment is signed using a one-time-use graphic key issued to the host computer system that hosts the virtual computing environment.
- Seattle WA, US Nicholas Alexander Allen - Kirkland WA, US
International Classification:
H04L 9/32 H04L 9/30 G06F 21/64 G06F 8/65
Abstract:
A computer system obtains a request to apply a signed patch to a piece of signed executable code. The computer system determines whether the signed patch is allowed to be applied to the signed executable based on a set of patch policies. If the patch policies allow the patch to be applied, the patch is applied to the signed executable code. The computer system generates a new digital signature for the modified executable code thereby allowing the resulting signed patched executable code to be verified and executed by the computer system.
- Seattle WA, US Matthew John Campagna - Bainbridge Island WA, US Nicholas Alexander Allen - Kirkland WA, US Petr Praus - Seattle WA, US
International Classification:
H04L 9/32 H04L 9/06 H04L 9/08 H04L 9/14 H04L 9/30
Abstract:
A first public key is generated based at least in part on a first plurality of signing keys and a second public key is generated based at least in part on a second plurality of signing keys. The signing keys may be used to generate digital signatures. The second public key may be made available to verify a digital signature generated using a signing key from the second plurality of signing keys. In some cases, a first Merkle tree may be formed by the first public key and the first plurality of signing keys, and a second Merkle tree may be formed by the second public key, the first public key, and the second plurality of signing keys.
- Seattle WA, US Nicholas Alexander Allen - Seattle WA, US
International Classification:
G06F 12/02
Abstract:
Non-volatile devices may be configured such that a clear operation on a single bit clears an entire block of bits. The representation of particular data structures may be optimized to reduce the number of clear operations required to store the representation in non-volatile memory. A data schema may indicate that a data structure of an application may be optimized for storage in non-volatile memory. A translation layer may convert an application level representation of a data value associated with the data structure to an optimized storage representation of the data value before storing the optimized storage representation of the data value in non-volatile memory.
Jun 2009 to 2000 Logistics Coordinator Account ManagerPowell Industries
2009 to 2000 Warehouse Manager/ IT SupportAmerisource Bergen Kent, WA 2008 to 2009 Team LeadDoug Fox Parking
2004 to 2008 Shift SupervisorTitan Construction
2002 to 2004 Jobsite Foreman
Education:
ITT Technical Institute Jun 2013 Associates of Applied Science in Information TechnologyITT Technical Institute Bachelors in Project Management and Administration
Isbn (Books And Publications)
The Irish Book Lover: An Irish Studies Reader Taken From Issues of The Irish Book Lover (1909-1957)
"It was entirely a poisoned chalice," says Nicholas Allen, who teaches politics at Royal Holloway, University of London. "The odds were always stacked against her. No prime minister, certainly since 1945, has faced such a large set of challenges with simultaneously such a hugely divided, unleadable
"There have been few British politicians who have performed that kind of high-profile, international, quasi-official role and combined it with making money," said Nicholas Allen, senior lecturer in politics at Royal Holloway University of London.