Patents by Inventor Richard Mortier
Richard Mortier has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8649380Abstract: Hosts or end-systems residing at the edges of a network gather data about the traffic they transmit into and receive from the network. The network's routing protocol (typically a link-state protocol such as OSPF) is monitored and routing data or packets are used to recover the network's current status and topology. This data can be collected, fused, and maintained and a platform, preferably distributed, can be provided to query the data, thus enabling a variety of network management applications.Type: GrantFiled: November 20, 2011Date of Patent: February 11, 2014Assignee: Microsoft CorporationInventors: Richard Mortier, Rebecca Isaacs, Paul Barham
-
Patent number: 8375141Abstract: Methods of querying a large number of endsystems are described in which metadata is replicated between endsystems. When a query is injected, an available endsystem receives a message relating to the query which identifies a range of endsystems for which that available endsystem is responsible. The available endsystem then generates completeness data for the range of endsystems based on data stored at the endsystem and this completeness data is transmitted to the sender of the message. The methods may be implemented using device-executable instructions which may be stored on device readable media.Type: GrantFiled: September 29, 2006Date of Patent: February 12, 2013Assignee: Microsoft CorporationInventors: Antony Rowstron, Richard Mortier, Austin Donnelly, Dushyanth Narayanan
-
Patent number: 8214813Abstract: A method of optimizing code which invokes methods on a system across an interface is described. High level information relating to the system is accessed and this information is used in performing code transformations in order to optimize the code.Type: GrantFiled: January 12, 2007Date of Patent: July 3, 2012Assignee: Microsoft CorporationInventors: Timothy Harris, Rebecca Isaacs, Eric Koskinen, Richard Mortier
-
Patent number: 7949745Abstract: An activity model is generated at a computer. The activity model may be generated by monitoring incoming and outgoing data in the computer. The collected data is analyzed to form a graph that describes and predicts what output is generated in response to received input. Later, a window of input and output data is collected from the computer. This collected window of data is used to query the activity model. The graph in the activity model is then used to give the probability that the collected window of data was collected from the computer used to generate the activity model. A high probability indicates that the computer is performing normally, while a low probability indicates that the computer may behaving erratically and there may be a problem with the computer.Type: GrantFiled: October 31, 2006Date of Patent: May 24, 2011Assignee: Microsoft CorporationInventors: Paul Barham, Richard Black, Moises Goldszmidt, Rebecca Isaacs, John MacCormick, Richard Mortier
-
Publication number: 20080172662Abstract: A method of optimizing code which invokes methods on a system across an interface is described. High level information relating to the system is accessed and this information is used in performing code transformations in order to optimize the code.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Timothy Harris, Rebecca Isaacs, Eric Koskinen, Richard Mortier
-
Publication number: 20080101352Abstract: An activity model is generated at a computer. The activity model may be generated by monitoring incoming and outgoing data in the computer. The collected data is analyzed to form a graph that describes and predicts what output is generated in response to received input. Later, a window of input and output data is collected from the computer. This collected window of data is used to query the activity model. The graph in the activity model is then used to give the probability that the collected window of data was collected from the computer used to generate the activity model. A high probability indicates that the computer is performing normally, while a low probability indicates that the computer may behaving erratically and there may be a problem with the computer.Type: ApplicationFiled: October 31, 2006Publication date: May 1, 2008Applicant: Microsoft CorporationInventors: Paul Barham, Richard Black, Moises Goldszmidt, Rebecca Isaacs, John MacCormick, Richard Mortier
-
Publication number: 20080103729Abstract: Activity models are maintained on a plurality of computers on a network. When a user or a particular activity model at a computer discovers an error, it may query its own activity model to determine a possible source of the error. If it is determined to not be the likely source of the error, the activity model queries the activity models of those computers on the network that it depends on. These activity models may then query the activity models of the computers that their particular host computer depends on and so forth. Ultimately the results of these activity model queries may be used to diagnose the likely source of the error and may be presented to the requesting user as a report.Type: ApplicationFiled: October 31, 2006Publication date: May 1, 2008Applicant: Microsoft CorporationInventors: Paul Barham, Richard Black, Moises Goldszmidt, Rebecca Isaacs, John MacCormick, Richard Mortier
-
Publication number: 20080082628Abstract: Methods of querying a large number of endsystems are described in which metadata is replicated between endsystems. When a query is injected, an available endsystem receives a message relating to the query which identifies a range of endsystems for which that available endsystem is responsible. The available endsystem then generates completeness data for the range of endsystems based on data stored at the endsystem and this completeness data is transmitted to the sender of the message. The methods may be implemented using device-executable instructions which may be stored on device readable media.Type: ApplicationFiled: September 29, 2006Publication date: April 3, 2008Applicant: Microsoft CorporationInventors: Antony Rowstron, Richard Mortier, Austin Donnelly, Dushyanth Narayanan
-
Publication number: 20070058631Abstract: Hosts or end-systems residing at the edges of a network gather data about the traffic they transmit into and receive from the network. The network's routing protocol (typically a link-state protocol such as OSPF) is monitored and routing data or packets are used to recover the network's current status and topology. This data can be collected, fused, and maintained and a platform, preferably distributed, can be provided to query the data, thus enabling a variety of network management applications.Type: ApplicationFiled: August 12, 2005Publication date: March 15, 2007Applicant: Microsoft CorporationInventors: Richard Mortier, Paul Barham, Rebecca Isaacs