Patents by Inventor Aamer Hydrie
Aamer Hydrie has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20050192971Abstract: A controller, referred to as the “BMonitor”, is situated on a computer. The BMonitor includes a plurality of filters that identify where data can be sent to and/or received from, such as another node in a co-location facility or a client computer coupled to the computer via the Internet. The BMonitor further receives and implements requests from external sources regarding the management of software components executing on the computer, allowing such external sources to initiate, terminate, debug, etc. software components on the computer. Additionally, the BMonitor operates as a trusted third party mediating interaction among multiple external sources managing the computer.Type: ApplicationFiled: April 22, 2005Publication date: September 1, 2005Applicant: Microsoft CorporationInventors: Bassam Tabbara, Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Robert Welland
-
Patent number: 6915338Abstract: A system and procedure to automatically enforce policy in distributed multi-computer service applications. Such service applications include multiple software modules that execute on multiple computers. The computers have access to communications media that allow data communications between the computers. Logical ports are configured on different modules according to a logical model of the multi-computer service application. Each logical port is defined by port software. Logical data connections between the logical ports are configured in accordance with the logical model. Each port is configured to communicate through different numbers of logical data connections without modifying the port software. In response to the occurrence of a condition, a module sends an event notification to a policy module. The policy module responds to the notification by formulating a request for one or more destination modules. The policy module provides the request to an output port of the policy module.Type: GrantFiled: October 24, 2000Date of Patent: July 5, 2005Assignee: Microsoft CorporationInventors: Galen C. Hunt, Aamer Hydrie, Steven P. Levi, Bassam Tabbara, Mark D. Van Antwerp, Robert V. Welland
-
Patent number: 6907395Abstract: A system facilitates the design and implementation of large-scale applications, such as Internet Services and Websites, for distributed computer systems, such as server data centers, Internet data centers (IDCs), Web farms, and the like. The system has a modeling system and a deployment system. The modeling system permits developers to architect the hardware and software used to implement the applications in an abstract manner. The modeling system defines a set of components used to describe the functionality of an application. The model components are arranged and interconnected to form a scale-independent logical model of the application. Once a logical model is created, the deployment system uses the logical model to automatically deploy various computer/software resources to implement the application. The deployment system converts each of the model components into one or more instances that correspond to physical resources.Type: GrantFiled: October 24, 2000Date of Patent: June 14, 2005Assignee: Microsoft CorporationInventors: Galen C. Hunt, Aamer Hydrie, Robert V. Welland, Bassam Tabbara, Steven P. Levi, Jakob Rehof
-
Publication number: 20050125212Abstract: A system facilitates the design and implementation of large-scale applications, such as Internet Services and Websites, for distributed computer systems, such as server data centers, Internet data centers (IDCs), Web farms, and the like. The system has a modeling system and a deployment system. The modeling system permits developers to architect the hardware and software used to implement the applications in an abstract manner. The modeling system defines a set of components used to describe the functionality of an application. The model components are arranged and interconnected to form a scale-independent logical model of the application. Once a logical model is created, the deployment system uses the logical model to automatically deploy various computer/software resources to implement the application. The deployment system converts each of the model components into one or more instances that correspond to physical resources.Type: ApplicationFiled: December 9, 2004Publication date: June 9, 2005Applicant: Microsoft CorporationInventors: Galen Hunt, Aamer Hydrie, Robert Welland, Bassam Tabbara, Steven Levi, Jakob Rehof
-
Publication number: 20050108381Abstract: A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application operations tier, execution of the applications is managed and sub-boundaries within a cluster of servers can be established. In the cluster operations tier, operation of the server computers is managed without concern for what applications are executing on the one or more server computers and boundaries between clusters of servers can be established. The multi-tiered server management architecture can also be employed in co-location facilities where clusters of servers are leased to tenants, with the tenants implementing the application operations tier and the facility owner (or operator) implementing the cluster operations tier.Type: ApplicationFiled: November 12, 2004Publication date: May 19, 2005Applicant: Microsoft CorporationInventors: Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Bassam Tabbara, Robert Welland
-
Publication number: 20050102404Abstract: A controller, referred to as the “BMonitor”, is situated on a computer. The BMonitor includes a plurality of filters that identify where data can be sent to and/or received from, such as another node in a co-location facility or a client computer coupled to the computer via the Internet. The BMonitor further receives and implements requests from external sources regarding the management of software components executing on the computer, allowing such external sources to initiate, terminate, debug, etc. software components on the computer. Additionally, the BMonitor operates as a trusted third party mediating interaction among multiple external sources managing the computer.Type: ApplicationFiled: December 8, 2004Publication date: May 12, 2005Applicant: Microsoft CorporationInventors: Bassam Tabbara, Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Robert Welland
-
Publication number: 20050102388Abstract: A controller, referred to as the “BMonitor”, is situated on a computer. The BMonitor includes a plurality of filters that identify where data can be sent to and/or received from, such as another node in a co-location facility or a client computer coupled to the computer via the Internet. The BMonitor further receives and implements requests from external sources regarding the management of software components executing on the computer, allowing such external sources to initiate, terminate, debug, etc. software components on the computer. Additionally, the BMonitor operates as a trusted third party mediating interaction among multiple external sources managing the computer.Type: ApplicationFiled: December 8, 2004Publication date: May 12, 2005Applicant: Microsoft CorporationInventors: Bassam Tabbara, Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Robert Welland
-
Publication number: 20050102403Abstract: A controller, referred to as the “BMonitor”, is situated on a computer. The BMonitor includes a plurality of filters that identify where data can be sent to and/or received from, such as another node in a co-location facility or a client computer coupled to the computer via the Internet. The BMonitor further receives and implements requests from external sources regarding the management of software components executing on the computer, allowing such external sources to initiate, terminate, debug, etc. software components on the computer. Additionally, the BMonitor operates as a trusted third party mediating interaction among multiple external sources managing the computer.Type: ApplicationFiled: December 8, 2004Publication date: May 12, 2005Applicant: Microsoft CorporationInventors: Bassam Tabbara, Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Robert Welland
-
Publication number: 20050102538Abstract: A system facilitates the design and implementation of large-scale applications, such as Internet Services and Websites, for distributed computer systems, such as server data centers, Internet data centers (IDCs), Web farms, and the like. The system has a modeling system and a deployment system. The modeling system permits developers to architect the hardware and software used to implement the applications in an abstract manner. The modeling system defines a set of components used to describe the functionality of an application. The model components are arranged and interconnected to form a scale-independent logical model of the application. Once a logical model is created, the deployment system uses the logical model to automatically deploy various computer/software resources to implement the application. The deployment system converts each of the model components into one or more instances that correspond to physical resources.Type: ApplicationFiled: December 9, 2004Publication date: May 12, 2005Applicant: Microsoft CorporationInventors: Galen Hunt, Aamer Hydrie, Robert Welland, Bassam Tabbara, Steven Levi, Jakob Rehof
-
Publication number: 20050097097Abstract: A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application operations tier, execution of the applications is managed and sub-boundaries within a cluster of servers can be established. In the cluster operations tier, operation of the server computers is managed without concern for what applications are executing on the one or more server computers and boundaries between clusters of servers can be established. The multi-tiered server management architecture can also be employed in co-location facilities where clusters of servers are leased to tenants, with the tenants implementing the application operations tier and the facility owner (or operator) implementing the cluster operations tier.Type: ApplicationFiled: November 12, 2004Publication date: May 5, 2005Applicant: Microsoft CorporationInventors: Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Bassam Tabbara, Robert Welland
-
Publication number: 20050097147Abstract: A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application operations tier, execution of the applications is managed and sub-boundaries within a cluster of servers can be established. In the cluster operations tier, operation of the server computers is managed without concern for what applications are executing on the one or more server computers and boundaries between clusters of servers can be established. The multi-tiered server management architecture can also be employed in co-location facilities where clusters of servers are leased to tenants, with the tenants implementing the application operations tier and the facility owner (or operator) implementing the cluster operations tier.Type: ApplicationFiled: November 1, 2004Publication date: May 5, 2005Applicant: Microsoft CorporationInventors: Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Bassam Tabbara, Robert Welland
-
Publication number: 20050097058Abstract: A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application operations tier, execution of the applications is managed and sub-boundaries within a cluster of servers can be established. In the cluster operations tier, operation of the server computers is managed without concern for what applications are executing on the one or more server computers and boundaries between clusters of servers can be established. The multi-tiered server management architecture can also be employed in co-location facilities where clusters of servers are leased to tenants, with the tenants implementing the application operations tier and the facility owner (or operator) implementing the cluster operations tier.Type: ApplicationFiled: November 12, 2004Publication date: May 5, 2005Applicant: Microsoft CorporationInventors: Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Bassam Tabbara, Robert Welland
-
Publication number: 20050091078Abstract: A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application operations tier, execution of the applications is managed and sub-boundaries within a cluster of servers can be established. In the cluster operations tier, operation of the server computers is managed without concern for what applications are executing on the one or more server computers and boundaries between clusters of servers can be established. The multi-tiered server management architecture can also be employed in co-location facilities where clusters of servers are leased to tenants, with the tenants implementing the application operations tier and the facility owner (or operator) implementing the cluster operations tier.Type: ApplicationFiled: November 2, 2004Publication date: April 28, 2005Applicant: Microsoft CorporationInventors: Galen Hunt, Aamer Hydrie, Steven Levi, David Stutz, Bassam Tabbara, Robert Welland
-
Patent number: 6886038Abstract: A controller, referred to as the “BMonitor”, is situated on a computer. The BMonitor includes a plurality of filters that identify where data can be sent to and/or received from, such as another node in a co-location facility or a client computer coupled to the computer via the Internet. The BMonitor further receives and implements requests from external sources regarding the management of software components executing on the computer, allowing such external sources to initiate, terminate, debug, etc. software components on the computer. Additionally, the BMonitor operates as a trusted third party mediating interaction among multiple external sources managing the computer.Type: GrantFiled: October 24, 2000Date of Patent: April 26, 2005Assignee: Microsoft CorporationInventors: Bassam Tabbara, Galen C. Hunt, Aamer Hydrie, Steven P. Levi, David S. Stutz, Robert V. Welland
-
Publication number: 20050055435Abstract: In an exemplary device implementation, a device includes: a connection migrator that is configured to migrate connections away from the device; the connection migrator capable of precipitating a compilation of protocol state for a connection across a protocol stack; the connection migrator adapted to aggregate the compiled protocol state with data for the connection into an aggregated connection state; the connection migrator further capable of causing the aggregated connection state to be sent toward a target device. In an exemplary media implementation, processor-executable instructions direct a device to perform actions including: obtaining at least a portion of a source/destination pair from a packet; accessing an encapsulation mapping table using the at least a portion of the source/destination pair to locate an encapsulation mapping entry; extracting a flow identifier from the encapsulation mapping entry; and replacing part of the packet with the flow identifier to produce an encapsulated packet.Type: ApplicationFiled: September 8, 2003Publication date: March 10, 2005Inventors: Abolade Gbadegesin, Sean House, Aamer Hydrie, Joseph Joy, Sanjay Kaniyar, Robert Welland
-
Publication number: 20050021697Abstract: Systems and methods to enforce policy in a multi-computer service application are described. In one aspect, a scale-independent logical model of an application is generated. The application is for implementation in a distributed computing system. The scale-independent logical model includes multiple components representing logical functions of the application and intercommunication protocols. The model components are converted into one or more instances representative of physical resources used to implement the logical functions. The instances specify information such as communication ports on the physical resources and communication paths that link the physical resources.Type: ApplicationFiled: May 12, 2004Publication date: January 27, 2005Inventors: Galen Hunt, Aamer Hydrie, Steven Levi, Bassam Tabbara, Mark Van Antwerp, Robert Welland
-
Publication number: 20050021696Abstract: Systems and methods to enforce policy in a multi-computer service application are described. The application includes multiple software modules that execute on multiple computers. The multi-computer service application has access to a communications medium that allows data communications between different ones of the computers. The software modules have logical input and output ports and logical data connections between modules. Each logical port is defined by port software. In one aspect, a particular module sends a notification to a policy module. Responsive to the notification, the policy module (a) determines a request for one or more destination modules, and (b) provides the request to an output port of the policy module. The output port forwards the request to input ports of a plurality of the modules in accordance with the logical data connections.Type: ApplicationFiled: May 11, 2004Publication date: January 27, 2005Inventors: Galen Hunt, Aamer Hydrie, Steven Levi, Bassam Tabbara, Mark Van Antwerp, Robert Welland
-
Publication number: 20040264481Abstract: In an exemplary method implementation, a method includes: receiving a packet requesting a new connection at a forwarding component; sending the packet from the forwarding component to a classifying component; selecting, by the classifying component, a route for the new connection; and plumbing, by the classifying component, the route for the new connection by causing a new entry to be added in a local routing table of the forwarding component. In an exemplary media implementation, one or more processor-accessible media include processor-executable instructions that, when executed, enable a system to perform actions including: receiving a first packet for a connection at first forwarding functionality; plumbing a route for the connection at the first forwarding functionality; receiving a second packet for the connection at second forwarding functionality; and plumbing the route for the connection at the second forwarding functionality using a distributed session tracking table.Type: ApplicationFiled: September 8, 2003Publication date: December 30, 2004Inventors: Christopher L. Darling, Sean B. House, Aamer Hydrie, Joseph M. Joy, Robert V. Welland
-
Publication number: 20040267920Abstract: In an exemplary media implementation, one or more processor-accessible media include processor-executable instructions that, when executed, enable a system to facilitate actions including: operating network load balancing infrastructure in a first configuration; scaling out the network load balancing infrastructure; and operating the scaled-out network load balancing infrastructure in a second configuration. In another exemplary media implementation, one or more processor-accessible media include processor-executable instructions that, when executed, enable a system to be configured such that different percentages of system resources may be allocated to different network-load-balancing functions. In yet another exemplary media implementation, one or more processor-accessible media include processor-executable instructions for network load balancing that, when executed, enable a system to gradually increase a percentage of total computing resources that is devoted to the network load balancing.Type: ApplicationFiled: June 30, 2003Publication date: December 30, 2004Inventors: Aamer Hydrie, Joseph M. Joy, Robert V. Welland
-
Publication number: 20040225952Abstract: A design tool includes a service definition model to enable abstract description of distributed computing systems and distributed applications. The design tool also includes a schema to dictate how functional operations within the service definition model are to be specified. The functional operations include design of distributed applications, deployment of distributed applications, and management of distributed applications.Type: ApplicationFiled: February 26, 2004Publication date: November 11, 2004Applicant: Microsoft CorporationInventors: Mathilde C. Brown, Charlie D. Chase, Kevin Grealish, Galen C. Hunt, Aamer Hydrie, David Noble, Geoffrey Outhred, Glenn R. Peterson, Bassam Tabbara, Alexander Torone, Robert V. Welland