Patents by Inventor Dave Dopson
Dave Dopson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11392596Abstract: A systems and method for providing various improvements in the computing time and accuracy for finding items using a hybrid vector space inner-product search are described.Type: GrantFiled: May 14, 2019Date of Patent: July 19, 2022Assignee: Google LLCInventors: Xiang Wu, Dave Dopson, David Morris Simcha, Sanjiv Kumar, Ruiqi Guo
-
Publication number: 20190347256Abstract: A systems and method for providing various improvements in the computing time and accuracy for finding items using a hybrid vector space inner-product search are described.Type: ApplicationFiled: May 14, 2019Publication date: November 14, 2019Inventors: Xiang Wu, Dave Dopson, David Morris Simcha, Sanjiv Kumar, Ruiqi Guo
-
Patent number: 8370689Abstract: A method and system for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a portion of a file and a checksum representing data within the memory block at a first time. Based at least in part on determining that the memory block is mapped to the same portion of the same file at a second time, it is indicated that the checksum represents expected data within the memory block. A system for verifying memory device integrity is also disclosed.Type: GrantFiled: May 6, 2010Date of Patent: February 5, 2013Assignee: UTC Fire & Security Americas Corporation, Inc.Inventors: Timothy Steven Potter, Donald Becker, Bruce Montgomery, Jr., Dave Dopson
-
Patent number: 8335951Abstract: A method for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a prior checksum. It is determined whether the first memory block is designated read-only. A current checksum is calculated based at least in part on data within the memory block. When the first memory block is designated read-only, and the prior checksum represents expected data within the first memory block, it is determined whether the current checksum is equal to the prior checksum. When the current checksum is not equal to the prior checksum, a verification failure for the first memory block is indicated via a notification interface. A system for verifying memory device integrity is also disclosed.Type: GrantFiled: May 6, 2010Date of Patent: December 18, 2012Assignee: UTC Fire & Security Americas Corporation, Inc.Inventors: Donald Becker, Timothy Steven Potter, Bruce Montgomery, Jr., Dave Dopson
-
Patent number: 8291481Abstract: Embodiments described herein are directed to establishing a terminal services (TS) session between a TS server and the client without creating a temporary session. In one embodiment, a computer system receives a user request indicating that a TS session with a first TS server is to be initiated. The request includes an indication that the user is authenticated and authorized to use the first TS server. The computer system searches for any prior TS sessions previously initiated by the user with other TS servers and determines, based on the search, that at least one prior TS session was initiated with a second TS server. The computer system also sends redirection data to the user indicating that the user request is to be redirected to the second TS server to reestablish the prior TS session with the second TS server.Type: GrantFiled: June 27, 2008Date of Patent: October 16, 2012Assignee: Microsoft CorporationInventors: Munindra N. Das, Sriram Sampath, Huei Chung Wong, Rouslan Beletski, Dave Dopson
-
Publication number: 20120159085Abstract: A method for validating an eligibility for verification of a memory device within an embedded demand paged memory operating system environment is provided. The method includes receiving a request from an application being executed by a processor coupled to the memory device, the request to utilize at least one memory location. The method includes identifying, by the processor, at least one memory block corresponding to at least one memory location within the memory device, determining, by the processor, whether the at least one memory block is eligible for verification, and producing an eligibility result based on the determination by the processor. A system for validating an eligibility for verifying memory device integrity is also disclosed.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Inventors: Timothy Steven Potter, Donald Becker, Bruce Montgomery, JR., Dave Dopson
-
Patent number: 8176200Abstract: The present invention extends to methods, systems, and computer program products for distributed aggregation on an overlay network. Embodiments of the invention utilize tiers of nodes that are cascaded in a layered system. Each tier reduces the size of data by orders of magnitude through pre-aggregation. Thus, high volume streams of messages can be reduced to lower volume streams at large scales, such as, for example, the Internet. No central coordination is used; thus there is no central point of failure or bottleneck. When a node fails, other nodes in the same tier as the failing node automatically take over the responsibilities of the failed node.Type: GrantFiled: April 21, 2009Date of Patent: May 8, 2012Assignee: Microsoft CorporationInventors: Gueorgui Chkodrov, Richard D. Hill, Michael J. Marucheck, Dave Dopson, Mansoor Mohsin
-
Publication number: 20110276837Abstract: A method and system for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a portion of a file and a checksum representing data within the memory block at a first time. Based at least in part on determining that the memory block is mapped to the same portion of the same file at a second time, it is indicated that the checksum represents expected data within the memory block. A system for verifying memory device integrity is also disclosed.Type: ApplicationFiled: May 6, 2010Publication date: November 10, 2011Inventors: Timothy Steven Potter, Donald Becker, Bruce Montgomery, JR., Dave Dopson
-
Publication number: 20110276844Abstract: A method for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a prior checksum. It is determined whether the first memory block is designated read-only. A current checksum is calculated based at least in part on data within the memory block. When the first memory block is designated read-only, and the prior checksum represents expected data within the first memory block, it is determined whether the current checksum is equal to the prior checksum. When the current checksum is not equal to the prior checksum, a verification failure for the first memory block is indicated via a notification interface. A system for verifying memory device integrity is also disclosed.Type: ApplicationFiled: May 6, 2010Publication date: November 10, 2011Inventors: Timothy Steven Potter, Donald Becker, Bruce Montgomery, JR., Dave Dopson
-
Publication number: 20100268808Abstract: The present invention extends to methods, systems, and computer program products for distributed aggregation on an overlay network. Embodiments of the invention utilize tiers of nodes that are cascaded in a layered system. Each tier reduces the size of data by orders of magnitude through pre-aggregation. Thus, high volume streams of messages can be reduced to lower volume streams at large scales, such as, for example, the Internet. No central coordination is used; thus there is no central point of failure or bottleneck. When a node fails, other nodes in the same tier as the failing node automatically take over the responsibilities of the failed node.Type: ApplicationFiled: April 21, 2009Publication date: October 21, 2010Applicant: Microsoft CorporationInventors: Gueorgui Chkodrov, Richard D. Hill, Michael J. Marucheck, Dave Dopson, Mansoor Mohsin
-
Publication number: 20090328172Abstract: Embodiments described herein are directed to establishing a terminal services (TS) session between a TS server and the client without creating a temporary session. In one embodiment, a computer system receives a user request indicating that a TS session with a first TS server is to be initiated. The request includes an indication that the user is authenticated and authorized to use the first TS server. The computer system searches for any prior TS sessions previously initiated by the user with other TS servers and determines, based on the search, that at least one prior TS session was initiated with a second TS server. The computer system also sends redirection data to the user indicating that the user request is to be redirected to the second TS server to reestablish the prior TS session with the second TS server.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: Microsoft CorporationInventors: Munindra N. Das, Sriram Sampath, Huei Chung Wong, Rouslan Beletski, Dave Dopson