Patents by Inventor Dmitri Bronnikov

Dmitri Bronnikov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240176793
    Abstract: Systems and methods of fetching ideal data sets based on usage patterns are disclosed. The systems and methods include receiving a state specification of a graphical user interface, the state specification corresponding to a database query composed to retrieve, from a cloud-based data warehouse, a first data set associated with a workbook; identifying, for the workbook, a previous usage pattern representing a set of interactions with the workbook on a client computing device; determining, based on the identified previous usage pattern, a set of database queries that is anticipated to be executed by the client computing device, wherein the set of database queries corresponds to a second data set; and fetching, from the cloud-based data warehouse, a one or more execution results that include the first data set and the second data set.
    Type: Application
    Filed: February 3, 2023
    Publication date: May 30, 2024
    Inventor: DMITRI BRONNIKOV
  • Publication number: 20230153301
    Abstract: Evaluating stored query results including generating a database query using a state specification of a graphical user interface, wherein the database query is composed to retrieve a current query result from a cloud-based data warehouse; searching a cache local to the query execution engine for the current query result, wherein the cache comprises a first previous query result from the cloud-based data warehouse; determining, based on the searching, that the current query result may be generated using the first previous query result from the cache; and creating the current query result using at least a portion of the first previous query result from the cache.
    Type: Application
    Filed: November 18, 2021
    Publication date: May 18, 2023
    Inventors: JASON D. FRANTZ, DMITRI BRONNIKOV
  • Publication number: 20230153295
    Abstract: Prefetching query results using expanded queries including generating a database query using a state specification of a graphical user interface, wherein the database query is composed to retrieve initial results from a cloud-based data warehouse; determining that the database query is expandable; modifying the database query to retrieve expanded results from the cloud-based data warehouse, wherein the expanded results include the initial results; and fetching, from the cloud-based data warehouse, the expanded results using the modified database query.
    Type: Application
    Filed: November 18, 2021
    Publication date: May 18, 2023
    Inventors: Jason D. FRANTZ, Dmitri BRONNIKOV
  • Patent number: 10567009
    Abstract: Dynamic erasure coding for computing and data storage systems. A method embodiment commences upon accessing a set of fault tolerance policy attributes associated with the computing and data storage system. The topology of the system is analyzed to form mappings between the computing nodes of the system and the availability domains of the system. Based on the fault tolerance policy attributes, the topology, and the generated mapping, a plurality of feasible erasure coding configurations are generated. The feasible erasure coding configurations are scored. One or more high-scoring feasible erasure coding configurations are selected and deployed to the computing and data storage system. The method is repeated when there is a change in the fault tolerance policy attributes or in the topology. Depending on the topology and/or the nature of a change in the topology, more than one erasure coding configurations can be deployed onto the computing and data storage system.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: February 18, 2020
    Assignee: Nutanix, Inc.
    Inventors: Minghui Yang, Timothy Sujay Isaacs, Ajaykrishna Raghavan, Dmitri Bronnikov, Jaya Singhvi, Peihong Huang, Varun Kumar Arora
  • Publication number: 20200019343
    Abstract: A method and apparatus for a durable low latency system architecture. The method includes providing an apparatus that includes a battery backup electrically coupled to a motherboard, and to a non-volatile storage device (either through additional circuitry to through the motherboard itself). The process leverages the battery backup to allow for durably maintaining write requests in volatile memory while the system is operating on standard input power. When the system switches to battery power the write requests maintained in the volatile memory are persisted in a non-volatile storage device using the battery power. Thus, the write requests are durably maintained in a RAM where they are only copied to a persistent storage location that is not the write request target location when there is a failure of the power input to the system.
    Type: Application
    Filed: July 13, 2018
    Publication date: January 16, 2020
    Applicant: Nutanix, Inc.
    Inventor: Dmitri BRONNIKOV
  • Patent number: 10474656
    Abstract: Systems and methods for key-value pair management. A method embodiment commences upon receiving data records comprising key-value pairs. The key-value pairs are stored in two locations, (1) in an in-memory data structure in a first storage tier, and (2) in a log file in a second storage tier. At some moment in time, an event causes a flush of the in-memory data structure. The flush operations comprise renaming the log file to refer to it as a uniquely identifiable data file in the second storage tier, and populating an index file in the second storage tier. Requests for a value corresponding to a key is satisfied by using the index file to access the uniquely identifiable data file by byte or word offset to a location in the data file so as to retrieve the value of the corresponding key.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: November 12, 2019
    Assignee: NUTANIX, INC.
    Inventor: Dmitri Bronnikov
  • Publication number: 20190332473
    Abstract: Dynamic erasure coding for computing and data storage systems. A method embodiment commences upon accessing a set of fault tolerance policy attributes associated with the computing and data storage system. The topology of the system is analyzed to form mappings between the computing nodes of the system and the availability domains of the system. Based on the fault tolerance policy attributes, the topology, and the generated mapping, a plurality of feasible erasure coding configurations are generated. The feasible erasure coding configurations are scored. One or more high-scoring feasible erasure coding configurations are selected and deployed to the computing and data storage system. The method is repeated when there is a change in the fault tolerance policy attributes or in the topology. Depending on the topology and/or the nature of a change in the topology, more than one erasure coding configurations can be deployed onto the computing and data storage system.
    Type: Application
    Filed: December 6, 2017
    Publication date: October 31, 2019
    Applicant: Nutanix, Inc.
    Inventors: Minghui YANG, Timothy Sujay ISAACS, Ajaykrishna RAGHAVAN, Dmitri BRONNIKOV, Jaya SINGHVI, Peihong HUANG, Varun Kumar ARORA
  • Patent number: 9672106
    Abstract: A method for implementing erasure coding, including identifying a plurality of storage units, determining a number of storage unit failures to be tolerated, organizing data within the plurality of storage units as a matrix of rows and columns for computing one or more parity data, configuring the matrix to include one or more additional rows having preset values, computing the one or more parity data from the matrix that corresponds to the number of storage unit failures to be tolerated, wherein the one or more parity data comprises a row parity, a first diagonal parity, and a second diagonal parity, wherein the one or more additional rows having the preset values are used to compute the first diagonal parity and the second diagonal parity; and wherein the first diagonal parity comprises a different slope from the second diagonal parity.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: June 6, 2017
    Assignee: NUTANIX, INC.
    Inventors: Dmitri Bronnikov, Binny Sher Gill
  • Publication number: 20160188407
    Abstract: Disclosed is an improved approach to implement erasure coding, which can address multiple storage unit failures in an efficient manner. The approach can effectively address multiple failures of storage units by implementing diagonal parity sets.
    Type: Application
    Filed: December 30, 2014
    Publication date: June 30, 2016
    Applicant: NUTANIX, INC.
    Inventors: Dmitri BRONNIKOV, Binny Sher GILL
  • Patent number: 8793240
    Abstract: After receipt of an instruction (e.g. a database statement), one or more computers specialize an interpreter with the received instruction as constant, to obtain a specialized interpreter that is stored in memory and/or disk. The specialized interpreter is then invoked to execute the received instruction. Depending on the embodiment, the interpreter being specialized may additionally be received and used in binary form without specialization. Specifically, in some embodiments, an identical interpreter is received in two forms: in a binary language specific to the one or more computers and also in a language that is acceptable to a specializer, such as a source language or an intermediate language. The interpreter in the binary language is invoked by default unless a predetermined condition for specialization is met. When the predetermined condition is met, the interpreter in the specializer-acceptable language is specialized by the specializer, and then the specialized interpreter is invoked.
    Type: Grant
    Filed: August 26, 2011
    Date of Patent: July 29, 2014
    Assignee: Oracle International Corporation
    Inventors: Dmitry M. Potapov, Dmitri Bronnikov
  • Publication number: 20130054649
    Abstract: After receipt of an instruction (e.g. a database statement), one or more computers specialize an interpreter with the received instruction as constant, to obtain a specialized interpreter that is stored in memory and/or disk. The specialized interpreter is then invoked to execute the received instruction. Depending on the embodiment, the interpreter being specialized may additionally be received and used in binary form without specialization. Specifically, in some embodiments, an identical interpreter is received in two forms: in a binary language specific to the one or more computers and also in a language that is acceptable to a specializer, such as a source language or an intermediate language. The interpreter in the binary language is invoked by default unless a predetermined condition for specialization is met. When the predetermined condition is met, the interpreter in the specializer-acceptable language is specialized by the specializer, and then the specialized interpreter is invoked.
    Type: Application
    Filed: August 26, 2011
    Publication date: February 28, 2013
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Dmitry M. Potapov, Dmitri Bronnikov
  • Patent number: 7930707
    Abstract: Systems, methods, media, and other embodiments associated with optimizing code motion with delayed exception handling are described. One exemplary system embodiment includes a data store to store information about a relocated instruction, a relocation logic to relocate instructions, and a run-time logic to detect exceptions raised by executed instructions. The run-time logic may selectively delay handling exceptions based on whether an executed instruction is a relocated instruction.
    Type: Grant
    Filed: May 10, 2006
    Date of Patent: April 19, 2011
    Assignee: Oracle International Corp.
    Inventor: Dmitri Bronnikov
  • Patent number: 7860842
    Abstract: A vulnerability analysis tool is provided for identifying SQL injection threats. The tool is able to take advantage of the fact that the code for many database applications is located in modules stored within a database. The tool constructs a data flow graph based on all, or a specified subset, of the application code within the database. The tool identifies, within the data flow graph, the nodes that represent values used to construct SQL commands. Paths to those nodes are analyzed to determine whether any SQL injection threats exist.
    Type: Grant
    Filed: March 16, 2005
    Date of Patent: December 28, 2010
    Assignee: Oracle International Corporation
    Inventors: Dmitri Bronnikov, Charles Wetherell
  • Patent number: 7752177
    Abstract: A vulnerability analysis tool is provided for identifying SQL injection threats. The tool is able to take advantage of the fact that the code for many database applications is located in modules stored within a database. The tool constructs a data flow graph based on all, or a specified subset, of the application code within the database. The tool identifies, within the data flow graph, the nodes that represent values used to construct SQL commands. Paths to those nodes are analyzed to determine whether any SQL injection threats exist.
    Type: Grant
    Filed: March 16, 2005
    Date of Patent: July 6, 2010
    Assignee: Oracle International Corporation
    Inventors: Dmitri Bronnikov, Charles Wetherell
  • Publication number: 20070266375
    Abstract: Systems, methods, media, and other embodiments associated with optimizing code motion with delayed exception handling are described. One exemplary system embodiment includes a data store to store information about a relocated instruction, a relocation logic to relocate instructions, and a run-time logic to detect exceptions raised by executed instructions. The run-time logic may selectively delay handling exceptions based on whether an executed instruction is a relocated instruction.
    Type: Application
    Filed: May 10, 2006
    Publication date: November 15, 2007
    Applicant: Oracle International Corporation
    Inventor: Dmitri Bronnikov
  • Publication number: 20060212941
    Abstract: A vulnerability analysis tool is provided for identifying SQL injection threats. The tool is able to take advantage of the fact that the code for many database applications is located in modules stored within a database. The tool constructs a data flow graph based on all, or a specified subset, of the application code within the database. The tool identifies, within the data flow graph, the nodes that represent values used to construct SQL commands. Paths to those nodes are analyzed to determine whether any SQL injection threats exist.
    Type: Application
    Filed: March 16, 2005
    Publication date: September 21, 2006
    Inventors: Dmitri Bronnikov, Charles Wetherell