Patents by Inventor Abdelsalam A. Heddaya
Abdelsalam A. Heddaya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10389746Abstract: The low latency use of a multi-tenancy environment. To protect against hostility between tenants within different trust domains, tenant(s) of a common trust domain are run within a trust boundary component. Thus, there is security to protect against potential hostility between tenants of different trust domains. In order to quickly start up trust boundary components, there are multiple pre-readied (e.g., initialized, pre-booted, and/or snapshotted) trust boundary components that may be started up quickly when a new trust boundary is to be established. Processes within the trust boundary component may additionally be run within a resource container that facilitates allocation of resources amongst the various processes. Because trust boundary components may be started up quickly, the multi-tenancy environment may have security (as provided by the trust boundary components) while still being lower latency (due to the fast availability of pre-readied trust boundaries).Type: GrantFiled: September 27, 2016Date of Patent: August 20, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Sarvesh Sakalanaga, Abdelsalam Heddaya, Mitchel Chinedu Arene
-
Publication number: 20170093903Abstract: The low latency use of a multi-tenancy environment. To protect against hostility between tenants within different trust domains, tenant(s) of a common trust domain are run within a trust boundary component. Thus, there is security to protect against potential hostility between tenants of different trust domains. In order to quickly start up trust boundary components, there are multiple pre-readied (e.g., initialized, pre-booted, and/or snapshotted) trust boundary components that may be started up quickly when a new trust boundary is to be established. Processes within the trust boundary component may additionally be run within a resource container that facilitates allocation of resources amongst the various processes. Because trust boundary components may be started up quickly, the multi-tenancy environment may have security (as provided by the trust boundary components) while still being lower latency (due to the fast availability of pre-readied trust boundaries).Type: ApplicationFiled: September 27, 2016Publication date: March 30, 2017Inventors: Sarvesh Sakalanaga, Abdelsalam Heddaya, Mitchel Chinedu Arene
-
Patent number: 8286033Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.Type: GrantFiled: March 24, 2011Date of Patent: October 9, 2012Assignee: Microsoft CorporationInventors: Paul L. Li, Andrew J. Lagattuta, Matthew Jeremiah Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
-
Patent number: 8117505Abstract: Resource exhaustion is anticipated, a cause of the resource exhaustion is identified and options are identified to address the resource exhaustion.Type: GrantFiled: November 7, 2005Date of Patent: February 14, 2012Assignee: Microsoft CorporationInventors: Baskar Sridharan, Elsie Nallipogu, Abdelsalam Heddaya, Mario R. Garzia, Björn Levidow
-
Publication number: 20110214015Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.Type: ApplicationFiled: March 24, 2011Publication date: September 1, 2011Applicant: Microsoft CorporationInventors: Paul L. Li, Andrew J. Lagattuta, Matt Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
-
Patent number: 7934129Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.Type: GrantFiled: September 5, 2008Date of Patent: April 26, 2011Assignee: Microsoft CorporationInventors: Paul L. Li, Andrew J. Lagattuta, Matt Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
-
Patent number: 7908521Abstract: Process reflection techniques are described in which a reflected process is created to facilitate analysis of a process. Events are detected to initiate reflection of a target process. Process reflection of a target process may be initiated by an external process or by the target process itself. A reflected process of the target process is created. In an implementation, data defining the target process is replicated, copied, or otherwise collected from the target process to create the reflected process. Then, analysis may be performed on the reflected process while execution of the target process continues.Type: GrantFiled: June 25, 2008Date of Patent: March 15, 2011Assignee: Microsoft CorporationInventors: Baskar Sridharan, Abdelsalam A. Heddaya, Jonathan D. Morrison, Mujtaba S. Khambatti, Anthony J. Lorelli, Tristan P. K. Schmelcher
-
Patent number: 7774741Abstract: The resource leak detector attempts to identify the causes of resource leaks and fix the causes if possible. At a minimum, the located resource leaks are reported to an operating system manufacture for additional study and possible correction, either by the operating system manufacturer or the application manufacturer that is causing the resource leak. In an embodiment, in operation, a leak trigger for starting leak detection is started. If the leak trigger is activated, leak detection is started when an application begins. Resource allocations are tracked for the leaked resource and each leaked resource is matched to a corresponding allocation call stack. A type of the leaked resource may be identified. The leak detection and the leak trigger may be controlled according to at least one of a local policy and a global policy.Type: GrantFiled: May 22, 2006Date of Patent: August 10, 2010Assignee: Microsoft CorporationInventors: Baskar Sridharan, Jason Stewart Wohlgemuth, Abdelsalam A. Heddaya, Elsie Nallipogu
-
Publication number: 20100064177Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.Type: ApplicationFiled: September 5, 2008Publication date: March 11, 2010Applicant: Microsoft CorporationInventors: Paul L. Li, Andrew J. Lagattuta, Matt Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
-
Publication number: 20090327815Abstract: Process reflection techniques are described in which a reflected process is created to facilitate analysis of a process. Events are detected to initiate reflection of a target process. Process reflection of a target process may be initiated by an external process or by the target process itself. A reflected process of the target process is created. In an implementation, data defining the target process is replicated, copied, or otherwise collected from the target process to create the reflected process. Then, analysis may be performed on the reflected process while execution of the target process continues.Type: ApplicationFiled: June 25, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Baskar Sridharan, Abdelsalam A. Heddaya, Jonathan D. Morrison, Mujtaba S. Khambatti, Anthony J. Lorelli, Tristan P.K. Schmelcher
-
Publication number: 20070271418Abstract: The resource leak detector attempts to identify the causes of resource leaks and fix the causes if possible. At a minimum, the located resource leaks are reported to an operating system manufacture for additional study and possible correction, either by the operating system manufacturer or the application manufacturer that is causing the resource leak.Type: ApplicationFiled: May 22, 2006Publication date: November 22, 2007Applicant: MICROSOFT CORPORATIONInventors: Baskar Sridharan, Jason Stewart Wohlgemuth, Abdelsalam A. Heddaya, Elsie Nallipogu
-
Publication number: 20070106636Abstract: Resource exhaustion is anticipated, a cause of the resource exhaustion is identified and options are identified to address the resource exhaustion.Type: ApplicationFiled: November 7, 2005Publication date: May 10, 2007Applicant: MICROSOFT CORPORATIONInventors: Baskar Sridharan, Elsie Nallipogu, Abdelsalam Heddaya, Mario Garzia, Bjorn Levidow
-
Publication number: 20070101338Abstract: A computer configured for managing multiple processing threads is susceptible to deadlocks or hangs when resources needed by one process are locked by another process that is not progressing. Locking relationships are created and released so quickly that rigidly monitoring these relationships would consume more computer power than are being monitored. An approach to determining the existence of a deadlock or hang uses a first ‘snapshot’ showing an approximation of locking relationships and then verifies a deadlock or hang using a second snapshot to determine if a suspected deadlock or hang is still present.Type: ApplicationFiled: October 31, 2005Publication date: May 3, 2007Applicant: MICROSOFT CORPORATIONInventors: Abdelsalam Heddaya, Stephan Doll, Bradley Waters, William Barnes
-
Patent number: 6892218Abstract: A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermediate node. The mobile agent indicates to the intermediate node that a secondary server node is capable of providing the service. The technique further involves intercepting, at the intermediate node, a subsequent service request sent from a client node to the primary server node, the subsequent service request requesting the service, and sending an instruction from the intermediate node to the secondary server node. The instruction instructs the secondary server node to provide the service. The technique further includes providing, in response to the instruction, the service from the secondary server node to the client node.Type: GrantFiled: September 15, 2003Date of Patent: May 10, 2005Assignee: Certeon, Inc.Inventors: Abdelsalam A. Heddaya, Kevin T. Lewis, Sulaiman A. Mirdad, David J. Yates, Ian C. Yates
-
Publication number: 20040153499Abstract: A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermediate node. The mobile agent indicates to the intermediate node that a secondary server node is capable of providing the service. The technique further involves intercepting, at the intermediate node, a subsequent service request sent from a client node to the primary server node, the subsequent service request requesting the service, and sending an instruction from the intermediate node to the secondary server node. The instruction instructs the secondary server node to provide the service. The technique further includes providing, in response to the instruction, the service from the secondary server node to the client node.Type: ApplicationFiled: September 15, 2003Publication date: August 5, 2004Applicant: Certeon, Inc.Inventors: Abdelsalam A. Heddaya, Kevin T. Lewis, Sulaiman A. Mirdad, David J. Yates, Ian C. Yates
-
Patent number: 6622157Abstract: A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermediate node. The mobile agent indicates to the intermediate node that a secondary server node is capable of providing the service. The technique further involves intercepting, at the intermediate node, a subsequent service request sent from a client node to the primary server node, the subsequent service request requesting the service, and sending an instruction from the intermediate node to the secondary server node. The instruction instructs the secondary server node to provide the service. The technique further includes providing, in response to the instruction, the service from the secondary server node to the client node.Type: GrantFiled: September 24, 1999Date of Patent: September 16, 2003Assignee: Certeon, Inc.Inventors: Abdelsalam A. Heddaya, Kevin T. Lewis, Sulaiman A. Mirdad, David J. Yates, Ian C. Yates
-
Publication number: 20020082858Abstract: A configuration management service in a client-server data processing system that manages distribution and installation of different versions and formats of resources so that they remain compatible with each other. When the resources are application programs, the service only distributes combinations of applications that are compatible with one another. This provides the advantages of local execution of application programs on a client computer while at the same time providing the advantages of managed configuration from the central server location. The applications continue to run on the clients and network hosting is not used. The service thus separates execution of applications from the control over their distribution. In a preferred embodiment, a hierarchical, networked cache storage arrangement is used to coordinate the actual physical storage and distribution of the resources as demands are made for them.Type: ApplicationFiled: September 12, 2001Publication date: June 27, 2002Applicant: InfoLibria, Inc.Inventors: Abdelsalam A. Heddaya, Sulaiman A. Mirdad
-
Patent number: 6205481Abstract: A technique for automatic, transparent, distributed, scalable and robust replication of document copies in a computer network wherein request messages for a particular document follow paths from the clients to a home server that form a routing graph. Client request messages are routed up the graph towards the home server as would normally occur in the absence of caching. However, cache servers are located along the route, and may intercept requests if they can be serviced. In order to be able to service requests in this manner without departing from standard network protocols, the cache server needs to be able to insert a packet filter into the router associated with it, and needs also to proxy for the home server from the perspective of the client. Cache servers cooperate to update cache content by communicating with neighboring caches whenever information is received about invalid cache copies.Type: GrantFiled: March 17, 1998Date of Patent: March 20, 2001Assignee: InfoLibria, Inc.Inventors: Abdelsalam A. Heddaya, Sulaiman A. Mirdad, David J. Yates, Ian C. Yates
-
Patent number: 6167438Abstract: A technique for automatic, transparent, distributed, scalable and robust caching, prefetching, and replication in a computer network that request messages for a particular document follow paths from the clients to a home server that form a routing graph. Client request messages are routed up the graph towards the home server as would normally occur in the absence of caching. However, cache servers are located along the route, and may intercept requests if they can be serviced. In order to be able to service requests in this manner without departing from standard network protocols, the cache server needs to be able to insert a packet filter into the router associated with it, and needs also to proxy for the home server from the perspective of the client. Cache servers may cooperate to service client requests by caching and discarding documents based on its local load, the load on its neighboring caches, attached communication path load, and on document popularity.Type: GrantFiled: May 22, 1997Date of Patent: December 26, 2000Assignee: Trustees of Boston UniversityInventors: David J. Yates, Abdelsalam A. Heddaya, Sulaiman A. Mirdad