Dr. Huang graduated from the Albert Einstein College of Medicine at Yeshiva University in 1982. She works in Bronx, NY and specializes in Internal Medicine. Dr. Huang is affiliated with Montefiore Medical Center.
Octavian T. Ureche - Renton WA, US Alex M. Semenko - Issaquah WA, US Hui Huang - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32
US Classification:
713168, 713190, 713193
Abstract:
In accordance with one or more aspects, a storage volume is transformed into an encrypted storage volume or an unencrypted storage volume using a multi-phase process. One or more parts of the storage volume that have not yet been transformed are identified, and one or more parts of the storage volume that are allocated for use are identified. In a first phase of the multi-phase process, one or more parts of the storage volume that have not yet been transformed and that are allocated for use are transformed. In a second phase of the multi-phase process, after the first phase is finished, one or more parts of the storage volume that have not yet been transformed and are not allocated for use are transformed.
Anand B. Iyer - Sammamish WA, US Michael H. Krause - Redmond WA, US Haseeb Ahmed - Redmond WA, US Yunfei Shang - Bothell WA, US Kumneger T. Zelalem - Bellevue WA, US Zinaida A. Pozen - Seattle WA, US Hui Huang - Redmond WA, US Yau N. Chin - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/22
US Classification:
719318, 718103, 718104, 710110
Abstract:
In a computing device running multiple applications, a check is made as to whether a threshold value of multiple threshold values has been met. Each of the multiple threshold values is associated with a characteristic of one of the multiple applications or a characteristic of a resource of the computing device. If the threshold value has not been met, then the multiple applications are allowed to continue running on the computing device. However, if the threshold value has been met, then one or more of the multiple applications to shut down is selected based at least in part on the characteristic associated with the threshold value that has been met, and the selected application is shut down.
Guidance And Navigation Control Proteins And Method Of Making And Using Thereof
- Redmond WA, US - Chengdu, Sichuan, CN Dong XIA - Redmond WA, US David JELLYMAN - Duvall WA, US Katrina BYKOVA - Seattle WA, US Anne-Marie ROUSSEAU - Seattle WA, US Bill BRADY - Bothell WA, US Blair RENSHAW - Renton WA, US Brian KOVACEVICH - Snohomish WA, US Yu LIANG - Redmond WA, US Camilla WANG - Sammamish WA, US Zeren GAO - Redmond WA, US Hui Huang - Redmond WA, US
International Classification:
C07K 16/28 A61P 35/02 C12N 5/0783 C12N 5/09
Abstract:
The application provides guidance and navigation control (GNC) proteins. In one embodiment, the guidance and navigation control (GNC) protein, comprising a binding domain for a T cell activating receptor, a binding domain for a tumor associated antigen, a bind domain for an immune checkpoint receptor, and a binding domain for a T cell co-stimulating receptor. The binding domain for the tumor associated antigen is not adjacent to the binding domain for the T cell co-stimulating receptor. In one embodiment, the binding domain for the T cell activating receptor is adjacent to the binding domain for the tumor associated antigen (TAA).
Methods Of Making And Using Guidance And Navigation Control Proteins
- Redmond WA, US - Chengdu, Sichuan, CN Jahan KHALILI - Everett WA, US Dong XIA - Redmond WA, US David JELLYMAN - Duvall WA, US Katrina BYKOVA - Seattle WA, US Anne-Marie ROUSSEAU - Seattle WA, US Camilla WANG - Sammamish WA, US Zeren GAO - Redmond WA, US Hui HUANG - Redmond WA, US Steven K. LUNDY - Woodinville WA, US
The application provides methods for generating a therapeutic composition. The method includes the steps of providing a cell material comprising a cytotoxic cell, incubating the cell material with a first GNC protein to provide an activated cell composition, wherein the activated cell composition comprises a first therapeutic cell, and formulating the activated cell composition to provide a therapeutic composition, wherein the therapeutic composition is substantially free of exogenous viral and non-viral DNA or RNA. The first GNC protein comprises a first cytotoxic binding moiety and a first cancer targeting moiety, wherein the first cytotoxic binding moiety has a specificity to a first cytotoxic cell receptor and is configured to activate the first cytotoxic cell, and wherein the first cancer targeting moiety has a specificity to a first cancer cell receptor. The first therapeutic cell comprises the first GNC protein bound to the cytotoxic cell through the first cytotoxic cell receptor.
Identifying The Best Suitable Application To Open A File Shared Via A Link
- Redmond WA, US Daron SPEKTOR - Seattle WA, US Hui HUANG - Bellevue WA, US Jonathan Alexander BOCKELMAN - Kirkland WA, US Peter EBERHARDY - Seattle WA, US Alisa Yujin SO - Kirkland WA, US Kevin Kaiwon LAM - Kirkland WA, US
International Classification:
H04L 29/08
Abstract:
The techniques enable a device to identify a best suitable application to open a resource such as a file. The file can be shared via a link or can be attached to a communication. The link comprises a uniform resource locator (URL) or is in some way associated with an underlying URL. The URL includes a pattern, or a portion that identifies a domain (e.g., a hostname) and/or a portion that identifies a type of file that is to be accessed and opened. Upon activation of the link, the device analyzes the URL to determine the pattern. The device then obtains, from a service associated with the URL, a ranked list of applications that are authorized to open the file. Moreover, the device performs, at run-time, a negotiation with the service to determine which application is best suited to open the file.
- Redmond WA, US Greg S. FRIEDMAN - Redmond WA, US Eugene S. LIN - Seattle WA, US Sean Lamont Grant LIVINGSTON - Bothell WA, US Hui HUANG - Bellevue WA, US Gang ZHAI - Bellevue WA, US Michael Scott PIERCE - Seattle WA, US Sarat Chandra SUBRAMANIAM - Bellevue WA, US
International Classification:
H04L 29/06 G06F 21/62 H04L 12/58
Abstract:
A computing system includes a processor and a data store coupled to the processor. The computing system is configured to provide access to electronic content stored in the data store. A user interface component is configured to receive an indication of an external user with which to share an item of electronic content. A link generation component is configured to generate a link to share the item of electronic content. An access control component is configured to receive a request to access the item of electronic content using the link, and responsively generate an access code that is communicated to a known endpoint associated with the link. The user interface component is configured to receive a user input containing a user-entered access input. The access control component is configured to selectively grant access to the item of electronic content based on whether the user-entered access input matched the access code communicated to the known endpoint associated with the link.
- Redmond WA, US Robert G. Hawking - Seattle WA, US Hui Huang - Bellevue WA, US Sean L. G. Livingston - Bothell WA, US
International Classification:
H04L 29/06 H04L 29/12
Abstract:
A computing system is configured to provide access to electronic content. The computing system includes a processor, a data store, an access control system, and a user interface component. The data store is coupled to the processor and is configured to store the electronic content. The access control system control system is configured to selectively allow a requestor to access the electronic content based on a stored metadata setting that is associated with the link. The user interface component is configured to receive a setting change related to a share associated with the link and to persist metadata associated with the setting change.