Patents by Inventor Dan Boldo

Dan Boldo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8910065
    Abstract: A secondary output of a user interface created using a presentation framework may be created by making a clone of the user interface, then modifying the cloned user interface by expanding various components. The cloned user interface may also be configured to the output characteristics of the secondary output, which may be a printer or other hardcopy device. The user interface may be created with callbacks or other actions that may be executed when the cloned user interface is configured. The callbacks may cause certain user interface components to be changed on the cloned version of the user interface.
    Type: Grant
    Filed: November 8, 2010
    Date of Patent: December 9, 2014
    Assignee: Microsoft Corporation
    Inventors: Gaurav Kapila, Vipul Malhotra, Bahadir Onalan, Jagadeesh Kalki, Mark Sterin, Dan Boldo
  • Publication number: 20140040795
    Abstract: A secondary output of a user interface created using a presentation framework may be created by making a clone of the user interface, then modifying the cloned user interface by expanding various components. The cloned user interface may also be configured to the output characteristics of the secondary output, which may be a printer or other hardcopy device. The user interface may be created with callbacks or other actions that may be executed when the cloned user interface is configured. The callbacks may cause certain user interface components to be changed on the cloned version of the user interface.
    Type: Application
    Filed: November 8, 2010
    Publication date: February 6, 2014
    Applicant: Microsoft Corporation
    Inventors: Gaurav Kapila, Vipul Malhotra, Bahadir Onalan, Jagadeesh Kalki, Mark Sterin, Dan Boldo
  • Patent number: 8416788
    Abstract: Contiguous data packets of a single communication session between endpoints are gathered for compression, and at least the payloads are compressed collectively via a single compressible buffer. The original headers, which may or may not be compressed, and the compressed payloads are transmitted from a sending packet compression device to a receiving packet compression device that performs decompression to the compressed payload and may also decompress headers if they have been compressed at the sending end. The original contiguous data packets including headers and payload may be reconstructed at the receiving packet compression device by matching the headers to the corresponding payloads. The reconstructed data packets are injected back into the single communication session, and the presence of the original headers in the reconstructed data packets may thereby maintain the endpoint-to-endpoint authentication protocols.
    Type: Grant
    Filed: April 26, 2007
    Date of Patent: April 9, 2013
    Assignee: Microsoft Corporation
    Inventors: Scott Colville, James Pinkerton, Dan Boldo, Maxim Stepin
  • Publication number: 20120117498
    Abstract: A secondary output of a user interface created using a presentation framework may be created by making a clone of the user interface, then modifying the cloned user interface by expanding various components. The cloned user interface may also be configured to the output characteristics of the secondary output, which may be a printer or other hardcopy device. The user interface may be created with callbacks or other actions that may be executed when the cloned user interface is configured. The callbacks may cause certain user interface components to be changed on the cloned version of the user interface.
    Type: Application
    Filed: November 8, 2010
    Publication date: May 10, 2012
    Applicant: Microsoft Corporation
    Inventors: Gaurav Kapila, Vipul Malhotra, Bahadir Onalan, Jagadeesh Kalki, Mark Sterin, Dan Boldo
  • Publication number: 20110010536
    Abstract: Optimization of encrypted traffic flowing over a WAN is provided by an arrangement in which WAN compression is distributed between endpoints (i.e., client machines or servers) in a subnet of a hub and branch network and a WAN compression server in the subnet. A client portion of the WAN compression running on each of one or more endpoints interfaces with a disposable local cache of data seen by endpoints in the subnet that is used for compressing and decompressing traffic using dictionary-based compression techniques. The local WAN compression server in a subnet stores a shared central database of all the WAN traffic in the subnet which is used to populate local disposable caches in the endpoints.
    Type: Application
    Filed: September 20, 2010
    Publication date: January 13, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Maxim STEPIN, Dan BOLDO, Scott COLVILLE, James PINKERTON
  • Patent number: 7809820
    Abstract: Optimization of encrypted traffic flowing over a WAN is provided by an arrangement in which WAN compression is distributed between endpoints (i.e., client machines or servers) in a subnet of a hub and branch network and a WAN compression server in the subnet. A client portion of the WAN compression running on each of one or more endpoints interfaces with a disposable local cache of data seen by endpoints in the subnet that is used for compressing and decompressing traffic using dictionary-based compression techniques. The local WAN compression server in a subnet stores a shared central database of all the WAN traffic in the subnet which is used to populate local disposable caches in the endpoints.
    Type: Grant
    Filed: July 17, 2007
    Date of Patent: October 5, 2010
    Assignee: Microsoft Corporation
    Inventors: Maxim Stepin, Dan Boldo, Scott Colville, James Pinkerton
  • Publication number: 20090024763
    Abstract: Optimization of encrypted traffic flowing over a WAN is provided by an arrangement in which WAN compression is distributed between endpoints (i.e., client machines or servers) in a subnet of a hub and branch network and a WAN compression server in the subnet. A client portion of the WAN compression running on each of one or more endpoints interfaces with a disposable local cache of data seen by endpoints in the subnet that is used for compressing and decompressing traffic using dictionary-based compression techniques. The local WAN compression server in a subnet stores a shared central database of all the WAN traffic in the subnet which is used to populate local disposable caches in the endpoints.
    Type: Application
    Filed: July 17, 2007
    Publication date: January 22, 2009
    Applicant: Microsoft Corporation
    Inventors: Maxim Stepin, Dan Boldo, Scott Colville, James Pinkerton
  • Publication number: 20080267217
    Abstract: Contiguous data packets of a single communication session between endpoints are gathered for compression, and at least the payloads are compressed collectively via a single compressible buffer. The original headers, which may or may not be compressed, and the compressed payloads are transmitted from a sending packet compression device to a receiving packet compression device that performs decompression to the compressed payload and may also decompress headers if they have been compressed at the sending end. The original contiguous data packets including headers and payload may be reconstructed at the receiving packet compression device by matching the headers to the corresponding payloads. The reconstructed data packets are injected back into the single communication session, and the presence of the original headers in the reconstructed data packets may thereby maintain the endpoint-to-endpoint authentication protocols.
    Type: Application
    Filed: April 26, 2007
    Publication date: October 30, 2008
    Applicant: Microsoft Corporation
    Inventors: Scott Colville, James Pinkerton, Dan Boldo, Maxim Stepin
  • Publication number: 20080205388
    Abstract: Otherwise network-transparent devices that are logically located between a client device and a service device are discovered by sending a probe packet that has a destination address of one of the client or service but that specifies a discovery network port such as a port of the transport layer. The otherwise network-transparent device receives the packet as it is traversing the hops between the client and service. The network-transparent device analyzes the network traffic passing through it to determine whether the destination port is the discovery network port and thereby recognizes the probe packet. The network-transparent device provides a return packet to the device that sent the probe packet, whereby the return packet provides the source address as the network address of the otherwise network-transparent device.
    Type: Application
    Filed: February 22, 2007
    Publication date: August 28, 2008
    Applicant: Microsoft Corporation
    Inventors: Scott Colville, James Pinkerton, Dan Boldo, Maxim Stepin