Search

Praerit K Garg

from Seattle, WA
Age ~53

Praerit Garg Phones & Addresses

  • 8021 Wallingford Ave N, Seattle, WA 98103 (206) 947-2545
  • Kirkland, WA
  • Bellevue, WA
  • Redmond, WA
  • West Lafayette, IN
  • Kiona, WA

Work

Company: Smartsheet Feb 2019 Position: Chief technology officer and executive vice president head of engineering

Education

Degree: Master of Science, Masters School / High School: Purdue University 1993 to 1995 Specialities: Computer Science

Skills

Cloud Computing • Start Ups • Saas • Distributed Systems • Scalability • Security • Software Development • Enterprise Software • Software Design • Windows Server • Computer Security • Business Development • Product Management • Software Engineering • Leadership • Entrepreneurship • Systems Management • C# • Asp.net Ajax • Strategic Partnerships • Pki • Integration • Product Development • Cloud Applications • .Net • Mobile Applications • Venture Financing • Public Speaking • Windows Security • Go To Market Strategy • Leading Development Teams • Strategic Planning • Databases • Javascript • Asp.net Mvc • Jquery • Windows • Mergers and Acquisitions • Marketing Strategy • Html • High Performance Teams • Internet Entrepreneur • Building High Performance Teams • Growth Strategies • Organizational Vision • Cloud Storage • Jquery Ui • Jquery Mobile • Mergers • Multithreaded Application Development

Languages

Hindi

Industries

Computer Software

Resumes

Resumes

Praerit Garg Photo 1

Chief Technology Officer And Executive Vice President Head Of Engineering

View page
Location:
8121 northeast 110Th Pl, Kirkland, WA 98034
Industry:
Computer Software
Work:
Smartsheet
Chief Technology Officer and Executive Vice President Head of Engineering

Experience Cultures Spend Time With Extended Family and Close Friends Jun 2018 - Jan 2019
Creating Memories

Amazon Web Services May 2014 - Jun 2018
Gm, Aws Identity and Directory and Access Services

Joggle Https://Www.joggleme.com Jan 2013 - Apr 2014
Co-Founder

Chronus Corporation Software For Talent & Career Development Mar 2013 - Feb 2014
Chief Products Officer
Education:
Purdue University 1993 - 1995
Master of Science, Masters, Computer Science
Birla Institute of Technology and Science, Pilani 1989 - 1993
Bachelor of Engineering, Bachelors, Computer Science
Skills:
Cloud Computing
Start Ups
Saas
Distributed Systems
Scalability
Security
Software Development
Enterprise Software
Software Design
Windows Server
Computer Security
Business Development
Product Management
Software Engineering
Leadership
Entrepreneurship
Systems Management
C#
Asp.net Ajax
Strategic Partnerships
Pki
Integration
Product Development
Cloud Applications
.Net
Mobile Applications
Venture Financing
Public Speaking
Windows Security
Go To Market Strategy
Leading Development Teams
Strategic Planning
Databases
Javascript
Asp.net Mvc
Jquery
Windows
Mergers and Acquisitions
Marketing Strategy
Html
High Performance Teams
Internet Entrepreneur
Building High Performance Teams
Growth Strategies
Organizational Vision
Cloud Storage
Jquery Ui
Jquery Mobile
Mergers
Multithreaded Application Development
Languages:
Hindi

Publications

Us Patents

Extensible Security System And Method For Controlling Access To Objects In A Computing Environment

View page
US Patent:
6412070, Jun 25, 2002
Filed:
Sep 21, 1998
Appl. No.:
09/157882
Inventors:
Clifford P. Van Dyke - Bellevue WA
Peter T. Brundrett - Seattle WA
Michael M. Swift - Seattle WA
Praerit Garg - Kirkland WA
Richard B. Ward - Redmond WA
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 1214
US Classification:
713200, 713201, 713167, 707 9, 707 10
Abstract:
A method and computing system for extending access control of system objects in a computing environment beyond traditional rights such as read, write, create and delete. According to the invention, a system administrator or user application is able to create control rights that are unique to the type of object. Rights can be created that do not relate to any specific property of the object, but rather define how a user may control the object. A novel object, referred to as a control access data structure, is defined for each unique control right and associates the control right with one or more objects of the computing environment. In order to grant the right to a trusted user, an improved access control entry (ACE) is defined which holds a unique identifier of the trusted user and a unique identifier of the control access data structure.

Object Type Specific Access Control

View page
US Patent:
6625603, Sep 23, 2003
Filed:
Sep 21, 1998
Appl. No.:
09/157768
Inventors:
Praerit Garg - Kirkland WA
Michael M. Swift - Seattle WA
Clifford P. Van Dyke - Bellevue WA
Richard B. Ward - Redmond WA
Peter T. Brundrett - Seattle WA
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 1700
US Classification:
707 9, 707103 R, 707201, 709319, 709320
Abstract:
Providing object type specific access control to an object is described. In one embodiment, a computer system comprises an operating system operative to control an application and a service running on a computer. The service maintains a service object having a link to an access control entry. The access control entry contains an access right to perform an operation on an object type. The system further includes an access control module within the operating system. The access control module includes an access control interface and operates to grant or deny the access right to perform the operation on the object.

Methods And Arrangements For Providing Multiple Concurrent Desktops And Workspaces In A Shared Computing Environment

View page
US Patent:
6807666, Oct 19, 2004
Filed:
May 17, 2000
Appl. No.:
09/573628
Inventors:
Christopher A. Evans - Redmond WA
Giampiero M. Sierra - Seattle WA
Victor Tan - Kirkland WA
Praerit Garg - Kirkland WA
David Andrew Matthews - Sarnia, CA
Reiner Fink - Mercer Island WA
Paul S. Hellyar - Kirkland WA
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 900
US Classification:
718108, 345778
Abstract:
Methods and arrangements are provided for use in multiple user computing environments. These methods and arrangements can be configured to allow for a plurality of separate and concurrent desktops and workspaces within the shared computing environment. One method includes creating a separate desktop thread for each user that is authenticated during a logon process, creating a separate desktop associated with each desktop thread, and maintaining a list of desktop threads that are created. In this manner, several users can be logged on simultaneously. In certain implementations, the method further includes establishing a separate user environment associated with each desktop and launching a separate user shell associated with each desktop. The list of desktop threads allows for selective and/or automatic switching from a first desktop to a second desktop without terminating a desktop thread associated with the first desktop. The methods and arrangements are also applicable to remote process logon and switching.

System And Method For Replicating Data In Resource Sets

View page
US Patent:
6917951, Jul 12, 2005
Filed:
Jul 26, 2001
Appl. No.:
09/917261
Inventors:
David A. Orbits - Redmond WA, US
Praerit Garg - Kirkland WA, US
Sudarshan A. Chitre - Redmond WA, US
Balan Sethu Raman - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F017/30
US Classification:
707203, 707202, 707200
Abstract:
Described is a system and method for replicating each of a set of resources to a subject computer in a replica set prior to making use of a resource in the set of resources. The set of resources includes resources that are dependent upon each other for a proper functioning of the group. A manifest file that identifies each resource in a group of interrelated resources is used. The manifest file is generated at one computer in the replica set (typically the computer at which a modification to one of the interrelated resources occurred). When the modification occurs to one of the set of resources, the manifest file is transmitted (e. g. , itself replicated) to each computer in the replica set. The manifest file includes an indicator that identifies the manifest file as a special file. When received at another computer in the replica set, a service evaluates the manifest file to identify whether the appropriate versions of the identified resources exist at the receiving computer.

Encrypting File System And Method

View page
US Patent:
6986043, Jan 10, 2006
Filed:
May 29, 2001
Appl. No.:
09/870411
Inventors:
Brian Andrew - Redmond WA, US
Jianrong Gu - Bellevue WA, US
Mark J. Zbikowski - Woodinville WA, US
Praerit Garg - Kirkland WA, US
Mike K. Lai - Bellevue WA, US
Wesley Witt - Redmond WA, US
Klaus U. Schutz - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/00
US Classification:
713166, 380286
Abstract:
A system and method for encryption and decryption of files. The system and method operate in conjunction with the file system to transparently encrypt and decrypt files in using a public key-private key pair encryption scheme. When a user puts a file in an encrypted directory or encrypts a file, data writes to the disk for that file are encrypted with a random file encryption key generated from a random number and encrypted with the public key of a user and the public key of at least one recovery agent. The encrypted key information is stored with the file, whereby the user or a recovery agent can decrypt the file data using a private key. With a correct private key, encrypted reads are decrypted transparently by the file system and returned to the user. One or more selectable encryption and decryption algorithms may be provided via interchangeable cryptographic modules.

System And Methods For Caching In Connection With Authorization In A Computer System

View page
US Patent:
7096367, Aug 22, 2006
Filed:
May 4, 2001
Appl. No.:
09/849099
Inventors:
Praerit Garg - Kirkland WA, US
Robert P. Reichel - Sammamish WA, US
Richard B. Ward - Redmond WA, US
Kedarnath A. Dubhashi - Bellevue WA, US
Jeffrey B. Hamblin - North Bend WA, US
Anne C. Hopkins - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04K 1/00
H04L 9/00
US Classification:
713182, 713165, 713167, 726 2, 707 9, 709217
Abstract:
An authorization handle is supported for each access policy determination that is likely to be repeated. In particular, an authorization handle may be assigned to access check results associated with the same discretionary access control list and the same client context. This likelihood may be determined based upon pre-set criteria for the application or service, based on usage history and the like. Once an access policy determination is assigned an authorization handle, the static maximum allowed access is cached for that policy determination. From access check to access check, the set of permissions desired by the client may change, and dynamic factors that might affect the overall privilege grant may also change; however, generally there is still a set of policies that is unaffected by the changes and common across access requests. The cached static maximum allowed access data is thus used to provide efficient operations for the evaluation of common policy sets. In systems having access policy evaluations that are repeated, authorization policy evaluations are more efficient, computer resources are free for other tasks, and performance improvements are observed.

Methods And Arrangements For Providing Multiple Concurrent Desktops And Workspaces In A Shared Computing Environment

View page
US Patent:
7127719, Oct 24, 2006
Filed:
Oct 15, 2004
Appl. No.:
10/966571
Inventors:
Christopher A. Evans - Sammamish WA, US
Giampiero M. Sierra - Seattle WA, US
Victor Tan - Kirkland WA, US
Praerit Garg - Kirkland WA, US
David A. Matthews - Seattle WA, US
Reiner Fink - Mercer Island WA, US
Paul S. Hellyar - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/00
G06F 9/54
US Classification:
718108, 345676, 709202
Abstract:
Methods and arrangements are provided for use in multiple user computing environments. These methods and arrangements can be configured to allow for a plurality of separate and concurrent desktops and workspaces within the shared computing environment. One method includes creating a separate desktop thread for each user that is authenticated during a logon process, creating a separate desktop associated with each desktop thread, and maintaining a list of desktop threads that are created. In this manner, several users can be logged on simultaneously. In certain implementations, the method further includes establishing a separate user environment associated with each desktop and launching a separate user shell associated with each desktop. The list of desktop threads allows for selective and/or automatic switching from a first desktop to a second desktop without terminating a desktop thread associated with the first desktop. The methods and arrangements are also applicable to remote process logon and switching.

Authentication And Authorization Across Autonomous Network Systems

View page
US Patent:
7185359, Feb 27, 2007
Filed:
Dec 21, 2001
Appl. No.:
10/029426
Inventors:
Donald E. Schmidt - Redmond WA, US
Clifford P. Van Dyke - Bellevue WA, US
Paul J. Leach - Seattle WA, US
Praerit Garg - Kirkland WA, US
Murli D. Satagopan - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/04
G06F 17/30
H04L 9/32
US Classification:
726 2, 726 1, 726 8, 713170
Abstract:
An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The first network system maintains namespaces that correspond to the second network system and a domain controller in the first network system, or a first network system administrator, indicates whether to trust individual namespaces. An account managed by a domain in the second network system can request authentication via a domain controller in the first network system. The first network system determines from the trust link to communicate the authentication request to the second network system. The first network system also determines from the trust link where to communicate authorization requests when administrators manage group memberships and access control lists.
Praerit K Garg from Seattle, WA, age ~53 Get Report