One Microsoft Way Patent applications |
Patent application number | Title | Published |
20150121126 | CRASH RECOVERY USING NON-VOLATILE MEMORY - Crash recovery of a computing system in the context in which the computing system includes a volatile memory which has contents lost due to the crash, an intermediate non-volatile memory that (together with the volatile memory) contributes to the active memory of the computing system, and non-volatile storage. The recovery occurs by identifying pages that were in the volatile memory at the time of the crash. For each of these pages, the recovery determines whether to recover the page into the volatile memory from either the intermediate non-volatile memory or the storage, and then performs the recovery. In embodiments in which access speeds for the intermediate non-volatile memory may be much faster than for the storage, and in which much of the pages to be recovered are recovered from the intermediate non-volatile memory, the recovery time may be reduced. | 04-30-2015 |
20120290880 | Real-Time Diagnostics Pipeline for Large Scale Services - Real-time diagnostics may be provided. A plurality of data feeds may be aggregated from at least one of a plurality of nodes. Upon determining that at least one element of at least one of the data feeds meets a trigger condition, an action associated with the trigger condition may be executed. | 11-15-2012 |
20090288069 | Dynamic Declarative Application Description - Embodiments described herein are directed to dynamically reconfiguring at least a portion of an operating software application. In one embodiment, a computer system receives an edit indicating that at least one portion of an operating software application is to be edited, where the edit includes changes that are to be dynamically applied to the application. The computer system instantiates dynamic configuration builders designed to implement application changes as indicated by the received edit and determines which portions of the application are to be suspended while the changes to the application are implemented. The computer system suspends the determined application portions until the application changes are implemented and implements the changes indicated by the edit on the suspended portion of the application, while the remainder of the application continues operating. The computer system also dynamically reconfigures the application with the implemented changes, where the reconfiguring includes reinitializing the suspended application portions. | 11-19-2009 |
20090158044 | OPTICAL DNA BASED ON NON-DETERMINISTIC ERRORS - The claimed subject matter relates to architectures and/or mechanisms that can facilitate issuing, embedding and verification of an optical DNA (o-DNA) signature. A first mechanism is provided for obtaining a set of manufacturing errors inherent in an optical media instance. These errors can be non-deterministic and can be encoded into the o-DNA that can be cryptographically signed with a private key, and then embedded into the source optical media instance. A second mechanism is provided that can decrypt the o-DNA with a public key and compare the authenticated errors to the observed errors to ascertain whether the optical media instance is authentic as opposed to a forgery or counterfeit. | 06-18-2009 |
20080222664 | Dynamic method selection based on declarative requirements of interaction scope - Various technologies and techniques are disclosed that dynamically implement method selections based on declarative requirements and interaction scope. Requirements that describe when each of multiple methods that can perform a particular operation should be called can be declared using a declarative syntax. Based upon a program event, the system determines that a request should be made to select a most appropriate method of the available methods to call to perform the particular operation. Upon receiving the request to select the most appropriate method, a sort process is executed that uses an interaction scope of a current user context in combination with a plurality of sort rules to generate a sorted list of the available methods into a particular order based upon appropriateness. A most appropriate method, if any, is returned to the calling application, and then called to perform the particular operation. | 09-11-2008 |