Patents by Inventor Bei-Jing Guo
Bei-Jing Guo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10896061Abstract: Burst throttling methods may be used to manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A first token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a second token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received tokens may be charged the first token bucket and the second token bucket. Furthermore, if there is sufficient capacity, the data storage service may charge a reduced number of tokens to the third token bucket.Type: GrantFiled: July 2, 2019Date of Patent: January 19, 2021Assignee: Amazon Technologies, Inc.Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
-
Publication number: 20190324812Abstract: Burst throttling methods may be used to manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A first token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a second token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received tokens may be charged the first token bucket and the second token bucket. Furthermore, if there is sufficient capacity, the data storage service may charge a reduced number of tokens to the third token bucket.Type: ApplicationFiled: July 2, 2019Publication date: October 24, 2019Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
-
Patent number: 10387200Abstract: Burst throttling methods may be used to manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A first token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a second token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received tokens may be charged the first token bucket and the second token bucket. Furthermore, if there is sufficient capacity, the data storage service may charge a reduced number of tokens to the third token bucket.Type: GrantFiled: July 10, 2017Date of Patent: August 20, 2019Assignee: Amazon Technologies, Inc.Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
-
Publication number: 20180308149Abstract: A system for building outfits is disclosed. The system may include a tagging system configured to receive a user's clothing items and tag the clothing items according to their attributes. The system may also include an outfit generation engine coupled in electronic communication with the tagging system and configured to receive the tagged clothing items from the tagging system and outfit templates and, using the outfit templates and the tagged clothing items, form a set of recommended outfits. The system may also include a user system coupled in electronic communication with the outfit generation engine and configured to receive at least one of the recommended outfits from the outfit generation engine and receive qualitative feedback about the recommended outfit from the user and send the feedback to the outfit generation engine.Type: ApplicationFiled: April 18, 2018Publication date: October 25, 2018Inventors: Bei-Jing Guo, Long Cheng, Pavani Haridasyam, Yuan Yuan Zhou, Zhike Kong
-
Publication number: 20170308406Abstract: Burst throttling methods may be used to manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A first token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a second token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received tokens may be charged the first token bucket and the second token bucket. Furthermore, if there is sufficient capacity, the data storage service may charge a reduced number of tokens to the third token bucket.Type: ApplicationFiled: July 10, 2017Publication date: October 26, 2017Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
-
Patent number: 9703602Abstract: Burst throttling methods may be used manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A global token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a work token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O request are received tokens may be charged the global token bucket and the work token bucket. Furthermore, if there is sufficient capacity the data storage service may charge a reduced number of tokens to the work token bucket.Type: GrantFiled: March 31, 2015Date of Patent: July 11, 2017Assignee: Amazon Technologies, Inc.Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
-
Patent number: 9639397Abstract: Burst throttling methods may be used manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A global token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a work token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O requests are received the data storage service may dynamically determine an amount of tokens to be removed from the global token bucket and/or work token bucket for each received request. Furthermore, if there is sufficient capacity the data storage service may charge a reduced number of tokens to the work token bucket.Type: GrantFiled: March 31, 2015Date of Patent: May 2, 2017Assignee: Amazon Technologies, Inc.Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
-
Patent number: 9639398Abstract: Burst throttling methods may be used manage computing resources of a data storage service. Tokens may represent I/O operations executed by a customer of the data storage service. A global token bucket may contain a set of tokens representing the overall I/O operation capacity of the data storage service. Additionally, a work token bucket may contain a set of tokens for a given logical volume maintained by the data storage service. When I/O request are received the data storage service may determine if the I/O request is a member of a sequence and removed a reduced number for tokens from the work token bucket as a result. Furthermore, if there is sufficient capacity the data storage service may charge a reduced number of tokens to the work token bucket.Type: GrantFiled: March 31, 2015Date of Patent: May 2, 2017Assignee: Amazon Technologies, Inc.Inventors: Norbert Paul Kusters, John Robert Smiley, Marc John Brooker, Bei-Jing Guo, Marc Levy
-
Publication number: 20100082372Abstract: A web- or network-based healthcare management tool is provided. The innovation provides for a browser-based version of a client that enables clinicians, from remote locations, to securely review patient data retrieved from a healthcare data store. Remote locations include, but are not limited to, from outside the hospital (e.g., at home) or from inside the hospital but in an office or lab that does not have intranet access to the healthcare data store.Type: ApplicationFiled: May 15, 2009Publication date: April 1, 2010Applicant: MICROSOFT CORPORATIONInventors: Jie Wen, Kevin Luo, Sameer Bade, Bei-Jing Guo, Lijiang Fang
-
Patent number: 7437763Abstract: Provided is an in-context security advisor that unifies computer system security, and generally improves computer system security by proactively and reactively monitoring for changes to security settings made by users and programs. By operating in real time, advice comprising meaningful feedback is given for any intrusion, thus giving a user the proper context about the consequences of changes to security settings that negatively affect the level of protection on computer systems, and allowing automated correction. Files can also be monitored, e.g., to prevent certain files from being remotely accessed or transmitted. The security advisor may adjust its operation based on user preferences, policy information, and via a connection to a remote source such as a backend server. The security advisor can also output security-related information, such as to a log and/or to components that evaluate the overall health of the machine.Type: GrantFiled: June 5, 2003Date of Patent: October 14, 2008Assignee: Microsoft CorporationInventor: Bei-Jing Guo
-
Publication number: 20050257268Abstract: A method and system for verifying whether basic security is installed, up-to-date, and functioning on a computer. A user interface is provided that provides prescription items that are associated with status indicators that readily indicate the status of the prescription items. An overall status indicator readily indicates whether the security of the computer needs attention. The user may select which types of security vulnerabilities for which the user wishes to receive notification. The user may indicate that the user will be responsible for monitoring third party solutions that are not detected by the security center.Type: ApplicationFiled: April 29, 2004Publication date: November 17, 2005Applicant: Microsoft CorporationInventors: Bei-Jing Guo, Margaret Clinton, George Young, Mark Zuber, Trevor Foucher, Judson Hally
-
Publication number: 20040250107Abstract: Provided is an in-context security advisor that unifies computer system security, and generally improves computer system security by proactively and reactively monitoring for changes to security settings made by users and programs. By operating in real time, advice comprising meaningful feedback is given for any intrusion, thus giving a user the proper context about the consequences of changes to security settings that negatively affect the level of protection on computer systems, and allowing automated correction. Files can also be monitored, e.g., to prevent certain files from being remotely accessed or transmitted. The security advisor may adjust its operation based on user preferences, policy information, and via a connection to a remote source such as a backend server. The security advisor can also output security-related information, such as to a log and/or to components that evaluate the overall health of the machine.Type: ApplicationFiled: June 5, 2003Publication date: December 9, 2004Applicant: MICROSOFT CORPORATIONInventor: Bei-Jing Guo
-
Patent number: D520512Type: GrantFiled: December 3, 2004Date of Patent: May 9, 2006Assignee: Microsoft CorporationInventors: Margaret R. Clinton, Bei-Jing Guo, Judson Craig Hally