Search

Deon Brewis Phones & Addresses

  • 15610 NE 59Th Way, Redmond, WA 98052 (425) 443-8718
  • 16110 108Th St, Redmond, WA 98052 (425) 558-9643
  • Kiona, WA
  • Honolulu, HI
  • 15610 NE 59Th Way, Redmond, WA 98052

Work

Company: Mylio (mylio, llc) May 2014 Position: Software engineer

Education

Degree: Bachelors, Bachelor of Science School / High School: University of South Africa/Universiteit Van Suid - Afrika 1994 to 1997 Specialities: Computer Science

Skills

Software Engineering • Software Development • Software Design • Visual Studio • C# • Distributed Systems • C++ • Agile Methodologies • Design Patterns • .Net • Microsoft Sql Server • Web Services • Asp.net • Javascript • Scrum • Java • Xml • C

Industries

Computer Software

Resumes

Resumes

Deon Brewis Photo 1

Software Engineer

View page
Location:
Redmond, WA
Industry:
Computer Software
Work:
Mylio (Mylio, Llc)
Software Engineer

Microsoft Jan 1996 - Apr 2014
Principal Software Engineer
Education:
University of South Africa/Universiteit Van Suid - Afrika 1994 - 1997
Bachelors, Bachelor of Science, Computer Science
Skills:
Software Engineering
Software Development
Software Design
Visual Studio
C#
Distributed Systems
C++
Agile Methodologies
Design Patterns
.Net
Microsoft Sql Server
Web Services
Asp.net
Javascript
Scrum
Java
Xml
C

Publications

Us Patents

Performing Networking Tasks Based On Destination Networks

View page
US Patent:
8238238, Aug 7, 2012
Filed:
May 16, 2008
Appl. No.:
12/121961
Inventors:
Andrew T. Baron - Redmond WA, US
Aaron W. Cunningham - Bellevue WA, US
David Jones - Seattle WA, US
Arun K. Buduri - Seattle WA, US
Deon C. Brewis - Redmond WA, US
Bill Begorre - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04Q 7/24
US Classification:
370230, 370252, 370338, 370401, 4554323, 709228
Abstract:
Methods and systems which identify and interact with network interfaces based on the network to which they provide access. A computing device operating in accordance with one or more of the principles described herein may examine available network interfaces and identify the network to which the network interfaces provide access, and perform networking tasks on interfaces based on the network identified. For example, a user may instruct a computing device to connect to a specified network, and the computing device will select a particular network interface by which to connect from the one or more available network interfaces that are able to connect to that network. Alternatively, a user may manage policies (e. g. , security, connection, and application policies) based on the network to which a network interface provides access and thereby manage a network regardless of which of multiple network interfaces is used to access the network.

System, Method And User Interface For Network Status Reporting

View page
US Patent:
8285855, Oct 9, 2012
Filed:
Feb 28, 2005
Appl. No.:
11/067016
Inventors:
Sean O. Lyndersay - Seattle WA, US
Deon C. Brewis - Redmond WA, US
Jean-Pierre Duplessis - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 3/048
G06F 15/16
G06F 15/173
G06F 15/177
H04L 12/66
US Classification:
709228, 370463, 709224, 715735, 715736, 715772
Abstract:
A method and user interface for informing a user of the status of a network connection are provided. Conventionally, the “connected” icon in the system tray only informs the user that the computer is linked to a network medium, such as an Ethernet or wireless access point. This icon does not indicate whether a routable IP address has been obtained. In this invention, an icon is used to inform the user that the network connection is disabled, connecting, connected (routable IP address obtained), or in a warning state. The warning state indicates that a non-routable IP address (e. g. autonet address) has been obtained, which will likely be unsatisfactory to the user. However, when connected to an 802. 11 ad-hoc network, or when IP status checking is disabled, a non-routable IP address is deemed acceptable, and thus the “connected” icon is displayed.

Heuristics For Determining Source Code Ownership

View page
US Patent:
8589878, Nov 19, 2013
Filed:
Oct 22, 2007
Appl. No.:
11/975784
Inventors:
Deon C. Brewis - Redmond WA, US
Jean-Pierre Duplessis - Redmond WA, US
Matthew S. Johnson - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/44
US Classification:
717123
Abstract:
Various technologies and techniques are disclosed for using heuristics to determine source code ownership. A request is received to identify at least one owner of a particular source code unit. Initial ownership totals are calculated for the source code unit based upon a code contribution heuristic. The code contribution heuristic counts lines of code that were added and that were modified in the totals for contributing users. The initial ownership totals of the particular source code unit are adjusted based upon at least one other heuristic. The at least one owner of the particular source code unit is then output to an output device. The at least one owner is determined by selecting a contributing user that has a highest ranking total after adjusting the initial ownership totals. For example, there can be a primary owner and a backup owner selected based on the ranking of the ownership totals.

Unified Storage For Configuring Multiple Networking Technologies

View page
US Patent:
8615570, Dec 24, 2013
Filed:
Nov 21, 2008
Appl. No.:
12/276157
Inventors:
Deon C. Brewis - Redmond WA, US
Taroon Mandhana - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/177
US Classification:
709221
Abstract:
A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity (e. g. , multiple networks, media types, and/or connections). The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising settings for multiple aspects of network connectivity may be generated based on preferences entered by a system administrator, or by exporting current settings from a particular computing device. Global configuration policies or other configuration settings that span multiple types of network connectivity may be also created and stored in one or more configuration files. Stand-alone media managers and/or plug-in modules may implement one or more standardized application programming interface functions so that they may interoperate with the network and connection provisioning framework. The standardized API may be used to ensure that configuration information is handled and stored in a standardized manner by different media managers and/or plug-in modules.

Secure Identification Of Intranet Network

View page
US Patent:
8635680, Jan 21, 2014
Filed:
Apr 19, 2007
Appl. No.:
11/788210
Inventors:
Bill Begorre - Redmond WA, US
Deon C. Brewis - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/173
G06F 15/177
G06F 7/00
H04L 9/00
US Classification:
726 6, 709222, 709223, 709220, 713170
Abstract:
A method is provided for network identification based on high entropy data on a network which are not easily guessed or obtained outside the network, which can prevent an attacker from “spoofing” the network. A component in a client computer connected to a network may obtain over the network a network data block including device identification information of a device controlling the network. Upon parsing the network data block, such high entropy data as unique device identifiers may be obtained from the device identification information. Depending on availability of the unique device identifiers and authentication history of the client computer, different combinations of the unique device identifiers and/or other identification information may be used to generate a unique network identifier such as a network signature. The component may provide the network signature to applications within the client computer.

History-Based Downgraded Network Identification

View page
US Patent:
20090064299, Mar 5, 2009
Filed:
Feb 19, 2008
Appl. No.:
12/070500
Inventors:
Bill Begorre - Redmond WA, US
Deon C. Brewis - Redmond WA, US
Alok Sinha - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32
G06F 21/00
US Classification:
726 7
Abstract:
Some embodiments of the invention are directed to increasing security and lowering risk of attack in connecting automatically to networks by enabling client devices to verify the identity of the networks by, for example, confirming the identity of networks and network components such as wireless access points. In some embodiments, a client device may maintain a data store of characteristics of a network—including, for example, characteristics of a wireless access point or other portion of the network and/or characteristics of a connection previously established with the wireless access point and/or network. Stored characteristics may include characteristics other than those minimally necessary to identify a wireless access point and/or wireless network. The stored characteristics may be compared to known good characteristics of a network (including characteristics of a wireless access point or other portion of the wireless network) prior to connection to the network to determine whether the characteristics match.

Ethernet Extensibility

View page
US Patent:
20090271518, Oct 29, 2009
Filed:
Apr 28, 2008
Appl. No.:
12/110790
Inventors:
Alok Manchanda - Redmond WA, US
Taroon Mandhana - Redmond WA, US
Noel W. Anderson - Bellevue WA, US
Sharad Mittal - Redmond WA, US
Deon C. Brewis - Redmond WA, US
Olivier Contant - Redmond WA, US
Bernard Aboba - Bellevue WA, US
Jerry E. Peterson - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
709227
Abstract:
A networked computer with a networking framework that can operate in accordance with a standard protocol or may be configured to perform one or more functions that alter or extend processing according to the standard. The framework includes extensibility points and a mechanism to receive plug-ins that may perform extensibility functions. Network profile information indicates configuration of the extensibility points, including specific extensibility functions to be executed at the extensibility points. This information may be used to configure the extensibility points so that, as the computer operates, the extensibility functions are selectively executed instead of or in addition to standard functions.

Network Location Determination For Direct Access Networks

View page
US Patent:
20100107240, Apr 29, 2010
Filed:
Jan 22, 2009
Appl. No.:
12/357812
Inventors:
David Thaler - Redmond WA, US
Rob M. Trace - Redmond WA, US
Deon C. Brewis - Redmond WA, US
Arun K. Buduri - Seattle WA, US
Bill Begorre - Redmond WA, US
Scott Roberts - Redmond WA, US
Srinivas Raghu Gatta - Redmond WA, US
Gerardo Diaz Cuellar - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 15
Abstract:
A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall, and therefore can operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through the Internet or other outside network, and therefore, because it is outside the private network firewall, should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller.
Deon C Brewis from Redmond, WA, age ~49 Get Report