Patents by Inventor Bei-Jing Guo

Bei-Jing Guo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10896061
    Abstract: Burst throttling methods may be used to manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A first token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a second token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received tokens may be charged the first token bucket and the second token bucket. Furthermore, if there is sufficient capacity, the data storage service may charge a reduced number of tokens to the third token bucket.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: January 19, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
  • Publication number: 20190324812
    Abstract: Burst throttling methods may be used to manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A first token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a second token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received tokens may be charged the first token bucket and the second token bucket. Furthermore, if there is sufficient capacity, the data storage service may charge a reduced number of tokens to the third token bucket.
    Type: Application
    Filed: July 2, 2019
    Publication date: October 24, 2019
    Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
  • Patent number: 10387200
    Abstract: Burst throttling methods may be used to manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A first token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a second token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received tokens may be charged the first token bucket and the second token bucket. Furthermore, if there is sufficient capacity, the data storage service may charge a reduced number of tokens to the third token bucket.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: August 20, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
  • Publication number: 20180308149
    Abstract: A system for building outfits is disclosed. The system may include a tagging system configured to receive a user's clothing items and tag the clothing items according to their attributes. The system may also include an outfit generation engine coupled in electronic communication with the tagging system and configured to receive the tagged clothing items from the tagging system and outfit templates and, using the outfit templates and the tagged clothing items, form a set of recommended outfits. The system may also include a user system coupled in electronic communication with the outfit generation engine and configured to receive at least one of the recommended outfits from the outfit generation engine and receive qualitative feedback about the recommended outfit from the user and send the feedback to the outfit generation engine.
    Type: Application
    Filed: April 18, 2018
    Publication date: October 25, 2018
    Inventors: Bei-Jing Guo, Long Cheng, Pavani Haridasyam, Yuan Yuan Zhou, Zhike Kong
  • Publication number: 20170308406
    Abstract: Burst throttling methods may be used to manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A first token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a second token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received tokens may be charged the first token bucket and the second token bucket. Furthermore, if there is sufficient capacity, the data storage service may charge a reduced number of tokens to the third token bucket.
    Type: Application
    Filed: July 10, 2017
    Publication date: October 26, 2017
    Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
  • Patent number: 9703602
    Abstract: Burst throttling methods may be used manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A global token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a work token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O request are received tokens may be charged the global token bucket and the work token bucket. Furthermore, if there is sufficient capacity the data storage service may charge a reduced number of tokens to the work token bucket.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: July 11, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
  • Patent number: 9639397
    Abstract: Burst throttling methods may be used manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A global token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a work token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received the data storage service may dynamically determine an amount of tokens to be removed from the global token bucket and/or work token bucket for each received request. Furthermore, if there is sufficient capacity the data storage service may charge a reduced number of tokens to the work token bucket.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: May 2, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
  • Patent number: 9639398
    Abstract: Burst throttling methods may be used manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A global token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a work token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O request are received the data storage service may determine if the I/O request is a member of a sequence and removed a reduced number for tokens from the work token bucket as a result. Furthermore, if there is sufficient capacity the data storage service may charge a reduced number of tokens to the work token bucket.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: May 2, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
  • Publication number: 20100082372
    Abstract: A web- or network-based healthcare management tool is provided. The innovation provides for a browser-based version of a client that enables clinicians, from remote locations, to securely review patient data retrieved from a healthcare data store. Remote locations include, but are not limited to, from outside the hospital (e.g., at home) or from inside the hospital but in an office or lab that does not have intranet access to the healthcare data store.
    Type: Application
    Filed: May 15, 2009
    Publication date: April 1, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Jie Wen, Kevin Luo, Sameer Bade, Bei-Jing Guo, Lijiang Fang
  • Patent number: 7437763
    Abstract: Provided is an in-context security advisor that unifies computer system security, and generally improves computer system security by proactively and reactively monitoring for changes to security settings made by users and programs. By operating in real time, advice comprising meaningful feedback is given for any intrusion, thus giving a user the proper context about the consequences of changes to security settings that negatively affect the level of protection on computer systems, and allowing automated correction. Files can also be monitored, e.g., to prevent certain files from being remotely accessed or transmitted. The security advisor may adjust its operation based on user preferences, policy information, and via a connection to a remote source such as a backend server. The security advisor can also output security-related information, such as to a log and/or to components that evaluate the overall health of the machine.
    Type: Grant
    Filed: June 5, 2003
    Date of Patent: October 14, 2008
    Assignee: Microsoft Corporation
    Inventor: Bei-Jing Guo
  • Publication number: 20050257268
    Abstract: A method and system for verifying whether basic security is installed, up-to-date, and functioning on a computer. A user interface is provided that provides prescription items that are associated with status indicators that readily indicate the status of the prescription items. An overall status indicator readily indicates whether the security of the computer needs attention. The user may select which types of security vulnerabilities for which the user wishes to receive notification. The user may indicate that the user will be responsible for monitoring third party solutions that are not detected by the security center.
    Type: Application
    Filed: April 29, 2004
    Publication date: November 17, 2005
    Applicant: Microsoft Corporation
    Inventors: Bei-Jing Guo, Margaret Clinton, George Young, Mark Zuber, Trevor Foucher, Judson Hally
  • Publication number: 20040250107
    Abstract: Provided is an in-context security advisor that unifies computer system security, and generally improves computer system security by proactively and reactively monitoring for changes to security settings made by users and programs. By operating in real time, advice comprising meaningful feedback is given for any intrusion, thus giving a user the proper context about the consequences of changes to security settings that negatively affect the level of protection on computer systems, and allowing automated correction. Files can also be monitored, e.g., to prevent certain files from being remotely accessed or transmitted. The security advisor may adjust its operation based on user preferences, policy information, and via a connection to a remote source such as a backend server. The security advisor can also output security-related information, such as to a log and/or to components that evaluate the overall health of the machine.
    Type: Application
    Filed: June 5, 2003
    Publication date: December 9, 2004
    Applicant: MICROSOFT CORPORATION
    Inventor: Bei-Jing Guo
  • Patent number: D520512
    Type: Grant
    Filed: December 3, 2004
    Date of Patent: May 9, 2006
    Assignee: Microsoft Corporation
    Inventors: Margaret R. Clinton, Bei-Jing Guo, Judson Craig Hally