Jason Cahill - Woodinville WA, US Alexander Hopmann - Seattle WA, US Eric Fox - Seattle WA, US Balinder Malhi - Redmond WA, US Zach Rosenfield - Seattle WA, US Marc Keith Windle - Woodinville WA, US Patrick Simek - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707756
Abstract:
An online service includes managed databases that include one or more tenants (e. g. customers, users). A multi-tenant database may be split between two or more databases while the database being split continues processing requests. For example, web servers continue to request operations on the database while content is being moved. After moving the content, tenant traffic is automatically redirected to the database that contains the tenant's content.
Techniques For Extracting Data From Content Databases
Samer Fouad Sawaya - Snoqualmie WA, US Patrick J. Simek - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/00 G06F 17/00 G06F 17/30
US Classification:
707649, 707609, 707662
Abstract:
Various technologies and techniques are disclosed for extracting data from databases of content management applications. Input is received from a user to connect to a database of a content management application. A connection is established to the database. When the database is not part of a current live instance of the content management application, an emulation is performed so that the database is treated like it is actually attached to the current live instance of the content management application. The user is able to browse the database. Unattached databases of a content management application can be managed using one or more commands, such as using an object model or command line. Orphaned databases can be detected and deleted from the content management application.
Gautam Vaidya - Redmond WA, US James Masson - Seattle WA, US Patrick Simek - Redmond WA, US Rebecca Chan - Kirkland WA, US Viktoriya Taranov - Bellevue WA, US Ziyi Wang - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707204000
Abstract:
A system to deploy content from one network to another includes an export search component. During an export process, a level-based scan of a content database is performed to efficiently find children and dependencies of the object(s) to be deployed. An export object table is created and filled with the children and dependencies found in the level-based scan. The export object table is ordered based on object type so that for each object being exported, its parent and its dependencies will be exported before the object itself is exported. The system may selectively perform incremental deployments in which only objects that have changed since their last deployment will be exported. Objects have identifiers and the system maintains a change log using the object identifiers, which allows the system to determine whether an object should be included in the incremental deployment.
Patrick J. Simek - Redmond WA, US Elisabeth Katarina Olson - Bellevue WA, US Samer Fouad Sawaya - Snoqualmie WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 12/16
US Classification:
707204, 711E12103
Abstract:
Technologies are described herein for managing database snapshots. One user interface is provided for managing the automated creation and deletion of database snapshots. Parameters are received through the user interface that define how the database snapshots should be created and deleted. Once the parameters are defined, a timer job is executed that causes a DBMS to create and delete the database snapshots according to the specified parameters. A user interface is also provided for manually managing the creation, deletion, and restoration of database snapshots. A request may be received through this user interface to recover data from a database snapshot. In response to such a request, another user interface is provided for specifying the data that should be recovered. Once the data to be recovered has been specified, the desired data is recovered from the database snapshot.
Exploring Attached And Unattached Content Databases
Patrick John Simek - Redmond WA, US Samer Fouad Sawaya - Snoqualmie WA, US Troy Ralph Starr - Sammamish WA, US Jeffrey Lamar McDowell - Redmond WA, US Elisabeth Katarina Olson - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707769, 707E17014
Abstract:
Various technologies and techniques are disclosed for searching for and extracting data from databases of content management applications. User input is received to connect to a database or database snapshot of an application, and a connection is established. When the database is not part of a current live instance of the application, an emulation is performed such that the database is treated like it is attached to the current live instance of the application. The user is able to browse and/or search for content, including documents, in the database or database snapshot without having to explore individual site collection structure and user interfaces of individual sites. A site collection user interface (UI), a site selector UI, and/or a list selector UI, for example, provide data entry fields for entering search requirements. Unattached databases can be managed using commands, such as using an object model or command line.
Placing Objects On Hosts Using Hard And Soft Constraints
Alexander Hopmann - Seattle WA, US Marc Keith Windle - Surrey, CA Patrick Simek - Redmond WA, US Erick Raymundo Lerma - Bothell WA, US Dan Rosenthal - Seattle WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 15/173
US Classification:
709226
Abstract:
Objects are placed on hosts using hard constraints and soft constraints. The objects to be placed on the host may be many different types of objects. For example, the objects to place may include tenants in a database, virtual machines on a physical machine, databases on a virtual machine, tenants in directory forests, tenants in farms, and the like. When determining a host for an object, a pool of hosts is filtered through a series of hard constraints. The remaining pool of hosts is further filtered through soft constraints to help in selection of a host. A host is then chosen from the remaining hosts.
Alexander Hopmann - Seattle WA, US Zach Rosenfield - Seattle WA, US Marc Keith Windle - Woodinville WA, US Patrick Simek - Redmond WA, US Erick Raymundo Lerma - Bothell WA, US Doron Bar-Caspi - Redmond WA, US Tarkan Sevilmis - Redmond WA, US Maxim Lukiyanov - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 9/44
US Classification:
717172
Abstract:
A cloud manager is utilized in the patching of physical machines and virtual machines that are used within an online service, such as an online content management service. The cloud manager assists in the scheduling of the application of software patches to the machines (physical and virtual) within the network such that the availability of the online service is maintained while machines are being patched. The machines to be patched are partitioned into groups that are patched at different times. Generally, the groups are partitioned into a highly available independent groups of machines such that one or more of the groups that are not currently being patched continue to provide the service(s) of the group that is being patched. The machines (physical and virtual) within each of the groups may be patched in parallel.
Installing Software Remotely Using A High Privilege Process
Alexander Hopmann - Seattle WA, US Zach Rosenfield - Seattle WA, US Marc Keith Windle - Surrey, CA Patrick Simek - Redmond WA, US Erick Raymundo Lerma - Bothell WA, US Doron Bar-Caspi - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 9/445
US Classification:
717176
Abstract:
Software that would not normally be able to be installed on a machine through a remote process is installed by a high privilege installer running on the machine. A request is received from a remote machine to install software on the machine using the high privilege installer. The high privilege installer determines when software that was requested remotely is to be installed. For example, the high privilege installer may monitor an install queue for software to be installed. When there are entries in the install queue, the high privilege installer is used to install the software. When there are no entries in the install queue, the high privilege installer may sleep until there is more software that is identified to be installed.
Name / Title
Company / Classification
Phones & Addresses
Patrick C. Simek Manager
St. Elizabeth's/John Saleh Catholic Student Center, LLC
Youtube
cabelos e pensamentos ao vento part II
REVOADA - por Dagmar Simek, direo coreogrfica Rocio Infante. Performan...
Category:
Entertainment
Uploaded:
20 Dec, 2010
Duration:
4m 7s
Gruesome Looking Leg Injury Sends Sharks' Rad...
Watch as Radim Simek is forced to leave the Sharks came against the je...
Duration:
1m 23s
Patrick Kane First Goal for EHC Biel in Switz...
Chicago Blackhawks Star Patrick Kane scores his first goal in his firs...
Duration:
35s
Jonathan Marchessault Cross Checks Radim Sime...
Simek couldn't catch a break on this shift All rights go to the NHL. I...
Duration:
1m 10s
Plantronics Lip Reading: Radil and Simek
Lukas Radil and Radim Simek have fun trying to read each other's lips ...
Duration:
3m 24s
Matt Cooper Live
Matt Cooper of Incognito playing his a** off. He's just doing "his job...
Duration:
3m 21s
Vlasics Play, Simek Rising, Seattle in the NH...
Welcome to The Fin Factor, a weekly podcast series where we discuss th...