Patents by Inventor Dan Boldo
Dan Boldo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8910065Abstract: A secondary output of a user interface created using a presentation framework may be created by making a clone of the user interface, then modifying the cloned user interface by expanding various components. The cloned user interface may also be configured to the output characteristics of the secondary output, which may be a printer or other hardcopy device. The user interface may be created with callbacks or other actions that may be executed when the cloned user interface is configured. The callbacks may cause certain user interface components to be changed on the cloned version of the user interface.Type: GrantFiled: November 8, 2010Date of Patent: December 9, 2014Assignee: Microsoft CorporationInventors: Gaurav Kapila, Vipul Malhotra, Bahadir Onalan, Jagadeesh Kalki, Mark Sterin, Dan Boldo
-
Publication number: 20140040795Abstract: A secondary output of a user interface created using a presentation framework may be created by making a clone of the user interface, then modifying the cloned user interface by expanding various components. The cloned user interface may also be configured to the output characteristics of the secondary output, which may be a printer or other hardcopy device. The user interface may be created with callbacks or other actions that may be executed when the cloned user interface is configured. The callbacks may cause certain user interface components to be changed on the cloned version of the user interface.Type: ApplicationFiled: November 8, 2010Publication date: February 6, 2014Applicant: Microsoft CorporationInventors: Gaurav Kapila, Vipul Malhotra, Bahadir Onalan, Jagadeesh Kalki, Mark Sterin, Dan Boldo
-
Patent number: 8416788Abstract: Contiguous data packets of a single communication session between endpoints are gathered for compression, and at least the payloads are compressed collectively via a single compressible buffer. The original headers, which may or may not be compressed, and the compressed payloads are transmitted from a sending packet compression device to a receiving packet compression device that performs decompression to the compressed payload and may also decompress headers if they have been compressed at the sending end. The original contiguous data packets including headers and payload may be reconstructed at the receiving packet compression device by matching the headers to the corresponding payloads. The reconstructed data packets are injected back into the single communication session, and the presence of the original headers in the reconstructed data packets may thereby maintain the endpoint-to-endpoint authentication protocols.Type: GrantFiled: April 26, 2007Date of Patent: April 9, 2013Assignee: Microsoft CorporationInventors: Scott Colville, James Pinkerton, Dan Boldo, Maxim Stepin
-
Publication number: 20120117498Abstract: A secondary output of a user interface created using a presentation framework may be created by making a clone of the user interface, then modifying the cloned user interface by expanding various components. The cloned user interface may also be configured to the output characteristics of the secondary output, which may be a printer or other hardcopy device. The user interface may be created with callbacks or other actions that may be executed when the cloned user interface is configured. The callbacks may cause certain user interface components to be changed on the cloned version of the user interface.Type: ApplicationFiled: November 8, 2010Publication date: May 10, 2012Applicant: Microsoft CorporationInventors: Gaurav Kapila, Vipul Malhotra, Bahadir Onalan, Jagadeesh Kalki, Mark Sterin, Dan Boldo
-
Publication number: 20110010536Abstract: Optimization of encrypted traffic flowing over a WAN is provided by an arrangement in which WAN compression is distributed between endpoints (i.e., client machines or servers) in a subnet of a hub and branch network and a WAN compression server in the subnet. A client portion of the WAN compression running on each of one or more endpoints interfaces with a disposable local cache of data seen by endpoints in the subnet that is used for compressing and decompressing traffic using dictionary-based compression techniques. The local WAN compression server in a subnet stores a shared central database of all the WAN traffic in the subnet which is used to populate local disposable caches in the endpoints.Type: ApplicationFiled: September 20, 2010Publication date: January 13, 2011Applicant: MICROSOFT CORPORATIONInventors: Maxim STEPIN, Dan BOLDO, Scott COLVILLE, James PINKERTON
-
Patent number: 7809820Abstract: Optimization of encrypted traffic flowing over a WAN is provided by an arrangement in which WAN compression is distributed between endpoints (i.e., client machines or servers) in a subnet of a hub and branch network and a WAN compression server in the subnet. A client portion of the WAN compression running on each of one or more endpoints interfaces with a disposable local cache of data seen by endpoints in the subnet that is used for compressing and decompressing traffic using dictionary-based compression techniques. The local WAN compression server in a subnet stores a shared central database of all the WAN traffic in the subnet which is used to populate local disposable caches in the endpoints.Type: GrantFiled: July 17, 2007Date of Patent: October 5, 2010Assignee: Microsoft CorporationInventors: Maxim Stepin, Dan Boldo, Scott Colville, James Pinkerton
-
Publication number: 20090024763Abstract: Optimization of encrypted traffic flowing over a WAN is provided by an arrangement in which WAN compression is distributed between endpoints (i.e., client machines or servers) in a subnet of a hub and branch network and a WAN compression server in the subnet. A client portion of the WAN compression running on each of one or more endpoints interfaces with a disposable local cache of data seen by endpoints in the subnet that is used for compressing and decompressing traffic using dictionary-based compression techniques. The local WAN compression server in a subnet stores a shared central database of all the WAN traffic in the subnet which is used to populate local disposable caches in the endpoints.Type: ApplicationFiled: July 17, 2007Publication date: January 22, 2009Applicant: Microsoft CorporationInventors: Maxim Stepin, Dan Boldo, Scott Colville, James Pinkerton
-
Publication number: 20080267217Abstract: Contiguous data packets of a single communication session between endpoints are gathered for compression, and at least the payloads are compressed collectively via a single compressible buffer. The original headers, which may or may not be compressed, and the compressed payloads are transmitted from a sending packet compression device to a receiving packet compression device that performs decompression to the compressed payload and may also decompress headers if they have been compressed at the sending end. The original contiguous data packets including headers and payload may be reconstructed at the receiving packet compression device by matching the headers to the corresponding payloads. The reconstructed data packets are injected back into the single communication session, and the presence of the original headers in the reconstructed data packets may thereby maintain the endpoint-to-endpoint authentication protocols.Type: ApplicationFiled: April 26, 2007Publication date: October 30, 2008Applicant: Microsoft CorporationInventors: Scott Colville, James Pinkerton, Dan Boldo, Maxim Stepin
-
Publication number: 20080205388Abstract: Otherwise network-transparent devices that are logically located between a client device and a service device are discovered by sending a probe packet that has a destination address of one of the client or service but that specifies a discovery network port such as a port of the transport layer. The otherwise network-transparent device receives the packet as it is traversing the hops between the client and service. The network-transparent device analyzes the network traffic passing through it to determine whether the destination port is the discovery network port and thereby recognizes the probe packet. The network-transparent device provides a return packet to the device that sent the probe packet, whereby the return packet provides the source address as the network address of the otherwise network-transparent device.Type: ApplicationFiled: February 22, 2007Publication date: August 28, 2008Applicant: Microsoft CorporationInventors: Scott Colville, James Pinkerton, Dan Boldo, Maxim Stepin