“I worked with Charles for a couple of years. I have never seen an engineer like Charles. Versatile, high throughput, great team player all put into one person. Microsoft is very fortunate to get him back.”
Bellevue, Washington, United States
Contact Info
33K followers
500+ connections
About
Activity
-
Accelerate Regression Testing & Save Costs with Panaya's Test Automation - a Codeless SaaS Solution, Designed Specifically for Salesforce.
Accelerate Regression Testing & Save Costs with Panaya's Test Automation - a Codeless SaaS Solution, Designed Specifically for Salesforce.
Liked by Charles Lamanna
-
A huge milestone for Dynamics 365 - the new Contact Center channels, with Copilot & AI built-in, unlock all kinds of benefits around your existing…
A huge milestone for Dynamics 365 - the new Contact Center channels, with Copilot & AI built-in, unlock all kinds of benefits around your existing…
Shared by Charles Lamanna
-
🚀Launching breakthrough Automation Innovation at Microsoft Build 2024! Last week, we embarked on a new journey at Microsoft Build event, unveiling a…
🚀Launching breakthrough Automation Innovation at Microsoft Build 2024! Last week, we embarked on a new journey at Microsoft Build event, unveiling a…
Liked by Charles Lamanna
Experience & Education
Publications
-
Determination of Specificity Residues in Two Component Systems using Graphlets
Biocomp
This work presents a novel method for the identification of specificity residues in two component systems based on the discovery of graphlet signatures. We use network representations of 3-D structures and sequence of proteins, experimental data and graph-based learning to detect graphlet signatures that potentially are responsible for phosphotranfer specificity between Histidine Kinase (HK) and Response Regulator (RR) domains.
Other authors -
-
Cytoprophet: A Cytoscape plug-in for protein and domain interaction networks inference
Oxford Journal of Bioinformatics.
Cytoprophet is a software tool that allows prediction and visualization of protein and domain interaction networks. It is implemented as a plug-in of Cytoscape, an open source software framework for analysis and visualization of molecular networks. Cytoprophet implements three algorithms that predict new potential physical interactions using the domain composition of proteins and experimental assays.
Other authors -
Patents
-
Predictive load scaling for services
Issued US US 14/307,759
Embodiments are directed to determining an optimal number of concurrently running cloud resource instances, based on the projected operational metric measurements, a number of cloud resource instances that are to be concurrently running at a specified future point in time.
-
Determining document classification probabilistically through classification rule analysis
Issued USPTO 08972328
A classification application identifies patterns and evidences within representative documents. The application constructs a classification rule according to an entity and an affinity determined from the patterns and evidences. The application processes the representative documents with the classification rule to evaluate whether the rules meet acceptance requirements. Subsequent to a successful evaluation, the application identifies confidence levels for patterns and evidences within other…
A classification application identifies patterns and evidences within representative documents. The application constructs a classification rule according to an entity and an affinity determined from the patterns and evidences. The application processes the representative documents with the classification rule to evaluate whether the rules meet acceptance requirements. Subsequent to a successful evaluation, the application identifies confidence levels for patterns and evidences within other documents.
-
DYNAMIC RULE REORDERING FOR MESSAGE CLASSIFICATION
Filed US US-2012-0303624-A1
Spam filters use sets of rules to identify unwanted messages. These rules are typically applied in the same static order each time a message is received. The invention uses previously processed rules to more efficiently classify similar messages received in the future. The invention identifies which rules resulted in the classification of a particular message, and, the next time a message with a similar fingerprint is received, those rules are used to classify the message. The rules may also be…
Spam filters use sets of rules to identify unwanted messages. These rules are typically applied in the same static order each time a message is received. The invention uses previously processed rules to more efficiently classify similar messages received in the future. The invention identifies which rules resulted in the classification of a particular message, and, the next time a message with a similar fingerprint is received, those rules are used to classify the message. The rules may also be re-ordered so that the rules that are the most effective at classifying messages are moved to the top of the list and are thus executed first. Claims are directed to generating a customized classification rule execution order and to identifying optimal ordering rules for previously processed data.
-
Managing Unwanted Communications Using Template Generation And Fingerprint Comparison Features
Filed US 20120215853
Unwanted communication detection and/or management features are providing, including using one or more commonality measures as part of generating templates for fingerprinting and comparison operations, but the embodiments are not so limited. An computing architecture of one embodiment includes components configured to generate templates and associated fingerprints for known unwanted communications, wherein the template fingerprints can be compared to unknown communication fingerprints as part…
Unwanted communication detection and/or management features are providing, including using one or more commonality measures as part of generating templates for fingerprinting and comparison operations, but the embodiments are not so limited. An computing architecture of one embodiment includes components configured to generate templates and associated fingerprints for known unwanted communications, wherein the template fingerprints can be compared to unknown communication fingerprints as part of determining whether the unknown communications are based on similar templates and can be properly classified as unwanted or potentially unsafe communications for further analysis and/or blocking. A method of one embodiment operates to use a number of template fingerprints to detect and classify unknown communications as spam, phishing, and/or other unwanted communications.
-
DECOMPOSING AND MERGING REGULAR EXPRESSIONS
Filed US 20120158768
The present invention extends to methods, systems, and computer program products for decomposing and merging regular expressions. Embodiments of the invention decompose a regular expression into multiple simple keyword graphs, merge those keyword graphs in a compact and efficient manner, and produce a directed acyclic graph (DAG) that can execute a simplified regular expression alphabet. Several of these regular expression DAG's can then be merged together to produce a single DAG that…
The present invention extends to methods, systems, and computer program products for decomposing and merging regular expressions. Embodiments of the invention decompose a regular expression into multiple simple keyword graphs, merge those keyword graphs in a compact and efficient manner, and produce a directed acyclic graph (DAG) that can execute a simplified regular expression alphabet. Several of these regular expression DAG's can then be merged together to produce a single DAG that represents an entire collection of regular expressions. DAGs along with other text processing algorithms and a heap collection can be combined in a multi-pass approach to expand the regular expression alphabet.
-
INDEXING AND QUERYING HASH SEQUENCE MATRICES
Filed US 12/943,780
Embodiments are directed to indexing and querying a sequence of hash values in an indexing matrix. A computer system accesses a document to extract a portion of text from the document. The computer system applies a hashing algorithm to the extracted text. The hash values of the extracted text form a representative sequence of hash values. The computer system inserts each hash value of the sequence of hash values into an indexing matrix, which is configured to store multiple different hash value…
Embodiments are directed to indexing and querying a sequence of hash values in an indexing matrix. A computer system accesses a document to extract a portion of text from the document. The computer system applies a hashing algorithm to the extracted text. The hash values of the extracted text form a representative sequence of hash values. The computer system inserts each hash value of the sequence of hash values into an indexing matrix, which is configured to store multiple different hash value sequences. The computer system also queries the indexing matrix to determine how similar the plurality of hash value sequences are to the selected hash value sequence based on how many hash values of the selected hash value sequence overlap with the hash values of the plurality of stored hash value sequences.
-
CONDITIONAL EXECUTION OF REGULAR EXPRESSIONS
Filed US 12/938,895
Embodiments directed to conditionally executing regular expressions and to simplifying regular expressions by canonicalizing regular expression terms. In an embodiment, a computer system accesses identified regular expression key terms that are to appear in a selected portion of text. The regular expression key terms are identified from terms in a selected regular expression. The computer system determines whether the identified regular expression key terms appear in the selected portion of…
Embodiments directed to conditionally executing regular expressions and to simplifying regular expressions by canonicalizing regular expression terms. In an embodiment, a computer system accesses identified regular expression key terms that are to appear in a selected portion of text. The regular expression key terms are identified from terms in a selected regular expression. The computer system determines whether the identified regular expression key terms appear in the selected portion of text. The computer system also, upon determining that none of the identified regular expression key terms appears in the selected portion of text, prevents execution of the regular expression. Upon determining that at least one of the identified regular expression key terms appears in the selected portion of text, the computer system executes the regular expression.
-
CONTAINMENT COEFFICIENT FOR IDENTIFYING TEXTUAL SUBSETS
Filed US 12/871,672
Similarity is determined between documents based on a method for identifying documents that are likely to be based on another document. The method can include the determination of a containment coefficient, which can indicate when a template document is a subset or substantially a subset of another document. Based on this determination, an appropriate document management action can be taken, such as implementing a security policy or modifying the display of messages from a user interface.
Projects
-
Active Cloud Monitoring
-
I developed the Active Cloud Monitoring, a service that monitors your cloud applications and automatically scales your service up or down based on rules you set.
Other creatorsSee project
Languages
-
English
Native or bilingual proficiency
-
Spanish
Limited working proficiency
Recommendations received
3 people have recommended Charles
Join now to viewMore activity by Charles
-
At Build this year, we shared two key insights for developers: that we are moving into an era of Copilot-first development, where both HOW and WHAT…
At Build this year, we shared two key insights for developers: that we are moving into an era of Copilot-first development, where both HOW and WHAT…
Shared by Charles Lamanna
-
I can’t wait to see everyone back in Las Vegas for #PPCC24 this September! If you caught my session at Build yesterday and want to go deeper into all…
I can’t wait to see everyone back in Las Vegas for #PPCC24 this September! If you caught my session at Build yesterday and want to go deeper into all…
Shared by Charles Lamanna
-
It's been a great start to #MSBuild this year! With Microsoft Copilot Studio, you can already create and customize your own copilots, and now we're…
It's been a great start to #MSBuild this year! With Microsoft Copilot Studio, you can already create and customize your own copilots, and now we're…
Shared by Charles Lamanna
-
Explore how CEOs can see ahead into the future to imagine and pursue a Gen AI vision that maximizes value for their organizations.
Explore how CEOs can see ahead into the future to imagine and pursue a Gen AI vision that maximizes value for their organizations.
Liked by Charles Lamanna
-
Today, we held the Microsoft Business Applications Launch Event for 2024 release wave 1 – if you missed it, it’s now available to watch on demand!…
Today, we held the Microsoft Business Applications Launch Event for 2024 release wave 1 – if you missed it, it’s now available to watch on demand!…
Shared by Charles Lamanna
-
This is an awesome new video series from the team, highlighting real questions from the community. Check this out if you want to learn more about…
This is an awesome new video series from the team, highlighting real questions from the community. Check this out if you want to learn more about…
Shared by Charles Lamanna
-
Excited to kick of 2024 release wave 1 with our launch event next week! We’ll share the latest on Copilot and highlight some of the new features…
Excited to kick of 2024 release wave 1 with our launch event next week! We’ll share the latest on Copilot and highlight some of the new features…
Shared by Charles Lamanna
-
AI is transforming how we work and redefining every business role in a powerful way. Today’s announcement with Adobe addresses the everyday needs of…
AI is transforming how we work and redefining every business role in a powerful way. Today’s announcement with Adobe addresses the everyday needs of…
Shared by Charles Lamanna
-
Proud of Microsoft's teamwork with PwC to help Northern Trust achieve a new enterprise-wide standard for efficiency and better serve their clients…
Proud of Microsoft's teamwork with PwC to help Northern Trust achieve a new enterprise-wide standard for efficiency and better serve their clients…
Liked by Charles Lamanna
-
Today we’re announcing the public preview of Microsoft Copilot for Finance! Our newest Copilot offering is designed for financial professionals and…
Today we’re announcing the public preview of Microsoft Copilot for Finance! Our newest Copilot offering is designed for financial professionals and…
Shared by Charles Lamanna
-
This Tuesday, I had an amazing opportunity to present in Microsoft AI Tour Tokyo. Starting off with keynote, I had a privilege to be part of a…
This Tuesday, I had an amazing opportunity to present in Microsoft AI Tour Tokyo. Starting off with keynote, I had a privilege to be part of a…
Liked by Charles Lamanna
-
Today we launched the 2024 Release Wave 1 plans for Dynamics 365 and the Power Platform with more than 300 new features and capabilities! The…
Today we launched the 2024 Release Wave 1 plans for Dynamics 365 and the Power Platform with more than 300 new features and capabilities! The…
Shared by Charles Lamanna
-
At Microsoft, we’re customer zero, including our own customer service organization. In the latest episode of #Pivotal with Hayete Gallot, Microsoft’s…
At Microsoft, we’re customer zero, including our own customer service organization. In the latest episode of #Pivotal with Hayete Gallot, Microsoft’s…
Liked by Charles Lamanna
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Charles Lamanna
3 others named Charles Lamanna are on LinkedIn
See others named Charles Lamanna