Patents by Inventor Ronen Borshack
Ronen Borshack has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10073922Abstract: In accordance with one or more aspects of the advertisement-controlled Web page customization discussed herein, functionality allowing an advertisement to set various presentation properties of a Web page is exposed. The advertisement invokes the functionality to set a particular presentation property of the Web page to a corresponding property value in order to customize the presentation of the Web page as desired by the advertisement.Type: GrantFiled: November 20, 2007Date of Patent: September 11, 2018Assignee: Microsoft Technology Licensing, LLCInventor: Ronen Borshack
-
Patent number: 9262423Abstract: Storing and retrieving files based on hashes for the files. One method for storing files includes: identifying a file; identifying a hash calculated based on the file; renaming the file based on the hash based on the file; and storing the file in a particular location based on the hash calculated based on the file. Another method for retrieving files includes: identifying a hash for a given file; using the hash, traversing a hierarchical file structure to find a location where the given file should be stored; determining that the file is at the location; and as a result, retrieving the file.Type: GrantFiled: September 27, 2012Date of Patent: February 16, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Ronen Borshack, Anil Francis Thomas, Erez Einav, Philip Ernst Taron
-
Patent number: 8954926Abstract: Code coverage detection for interpreted scriptable programming languages avoids source code modification. Each program element of the script is performed by (a) using a debugger to proactively computationally indicate in a coverage data structure that the element was reached, and integrally (b) running non-logger executable code which corresponds to the element. Coverage of lines, statements, and other program elements during script execution can be measured even though the source code has not been instrumented with injected log statements. Proactively generated breakpoints pass control from each coverage-tracked program element into a code coverage debugger which updates the coverage data structure. Comments are skipped. Code coverage detection may be invoked from a command line, an Integrated Development Environment, or another context. The coverage data structure is correlated with the source code to produce a coverage map that is displayed to users showing which source code was performed.Type: GrantFiled: March 5, 2012Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventors: Menachem Braun, Ronen Borshack
-
Patent number: 8756594Abstract: An enterprise computing system may utilize a management infrastructure that interacts with protected services in the system. The management infrastructure accepts requests through an anti-tamper procedure that specifies a tamper event, a crucial service to be protected, and a remedial action that may be applied when the tamper event occurs on the protected service. The anti-tamper procedure may be created by a system administrator and distributed to one or more client devices in the system. The management infrastructure monitors a protected service in accordance with the operations and actions specified in the anti-tamper procedure thereby ensuring that the integrity of the system is preserved.Type: GrantFiled: October 28, 2011Date of Patent: June 17, 2014Assignee: Microsoft CorporationInventors: Alex Umansky, Eli Zeitlin, Ronen Borshack
-
Publication number: 20140089273Abstract: Storing and retrieving files based on hashes for the files. One method for storing files includes: identifying a file; identifying a hash calculated based on the file; renaming the file based on the hash based on the file; and storing the file in a particular location based on the hash calculated based on the file. Another method for retrieving files includes: identifying a hash for a given file; using the hash, traversing a hierarchical file structure to find a location where the given file should be stored; determining that the file is at the location; and as a result, retrieving the file.Type: ApplicationFiled: September 27, 2012Publication date: March 27, 2014Applicant: MICROSOFT CORPORATIONInventors: Ronen Borshack, Anil Francis Thomas, Erez Einav, Philip Ernst Taron
-
Publication number: 20140059108Abstract: Implementing a unified communication system allowing different clients to communicate using different communication modalities to access the same functionality of a remote application. A method includes identifying functionality of an application of a service. The method further includes determining a plurality of communication modalities that can be used to access the functionality of the application of the service by identifying communication modalities identified by a developer as being communication modalities that can be used to access the functionality of the application of the service. The method further includes, based on identifying a plurality of communication modalities that can be used to access the functionality of the application of the service, determining that the functionality of the application is supported by a unified communication function. The method further includes at runtime mapping operation of the plurality of communication modalities to the unified communication function.Type: ApplicationFiled: August 27, 2012Publication date: February 27, 2014Applicant: MICROSOFT CORPORATIONInventors: Ronen Borshack, Leonid Verny, Yael Flashner
-
Publication number: 20130232473Abstract: Code coverage detection for interpreted scriptable programming languages avoids source code modification. Each program element of the script is performed by (a) using a debugger to proactively computationally indicate in a coverage data structure that the element was reached, and integrally (b) running non-logger executable code which corresponds to the element. Coverage of lines, statements, and other program elements during script execution can be measured even though the source code has not been instrumented with injected log statements. Proactively generated breakpoints pass control from each coverage-tracked program element into a code coverage debugger which updates the coverage data structure. Comments are skipped. Code coverage detection may be invoked from a command line, an Integrated Development Environment, or another context. The coverage data structure is correlated with the source code to produce a coverage map that is displayed to users showing which source code was performed.Type: ApplicationFiled: March 5, 2012Publication date: September 5, 2013Applicant: MICROSOFT CORPORATIONInventors: Menachem Braun, Ronen Borshack
-
Publication number: 20130111462Abstract: An enterprise computing system may utilize a management infrastructure that interacts with protected services in the system. The management infrastructure accepts requests through an anti-tamper procedure that specifies a tamper event, a crucial service to be protected, and a remedial action that may be applied when the tamper event occurs on the protected service. The anti-tamper procedure may be created by a system administrator and distributed to one or more client devices in the system. The management infrastructure monitors a protected service in accordance with the operations and actions specified in the anti-tamper procedure thereby ensuring that the integrity of the system is preserved.Type: ApplicationFiled: October 28, 2011Publication date: May 2, 2013Applicant: Microsoft CorporationInventors: ALEX UMANSKY, Eli Zeitlin, Ronen Borshack
-
Publication number: 20090132359Abstract: In accordance with one or more aspects of the advertisement-controlled Web page customization discussed herein, functionality allowing an advertisement to set various presentation properties of a Web page is exposed. The advertisement invokes the functionality to set a particular presentation property of the Web page to a corresponding property value in order to customize the presentation of the Web page as desired by the advertisement.Type: ApplicationFiled: November 20, 2007Publication date: May 21, 2009Applicant: MICROSOFT CORPORATIONInventor: Ronen Borshack