Patents by Inventor Dmitri Bronnikov
Dmitri Bronnikov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240176793Abstract: Systems and methods of fetching ideal data sets based on usage patterns are disclosed. The systems and methods include receiving a state specification of a graphical user interface, the state specification corresponding to a database query composed to retrieve, from a cloud-based data warehouse, a first data set associated with a workbook; identifying, for the workbook, a previous usage pattern representing a set of interactions with the workbook on a client computing device; determining, based on the identified previous usage pattern, a set of database queries that is anticipated to be executed by the client computing device, wherein the set of database queries corresponds to a second data set; and fetching, from the cloud-based data warehouse, a one or more execution results that include the first data set and the second data set.Type: ApplicationFiled: February 3, 2023Publication date: May 30, 2024Inventor: DMITRI BRONNIKOV
-
Publication number: 20230153301Abstract: Evaluating stored query results including generating a database query using a state specification of a graphical user interface, wherein the database query is composed to retrieve a current query result from a cloud-based data warehouse; searching a cache local to the query execution engine for the current query result, wherein the cache comprises a first previous query result from the cloud-based data warehouse; determining, based on the searching, that the current query result may be generated using the first previous query result from the cache; and creating the current query result using at least a portion of the first previous query result from the cache.Type: ApplicationFiled: November 18, 2021Publication date: May 18, 2023Inventors: JASON D. FRANTZ, DMITRI BRONNIKOV
-
Publication number: 20230153295Abstract: Prefetching query results using expanded queries including generating a database query using a state specification of a graphical user interface, wherein the database query is composed to retrieve initial results from a cloud-based data warehouse; determining that the database query is expandable; modifying the database query to retrieve expanded results from the cloud-based data warehouse, wherein the expanded results include the initial results; and fetching, from the cloud-based data warehouse, the expanded results using the modified database query.Type: ApplicationFiled: November 18, 2021Publication date: May 18, 2023Inventors: Jason D. FRANTZ, Dmitri BRONNIKOV
-
Patent number: 10567009Abstract: Dynamic erasure coding for computing and data storage systems. A method embodiment commences upon accessing a set of fault tolerance policy attributes associated with the computing and data storage system. The topology of the system is analyzed to form mappings between the computing nodes of the system and the availability domains of the system. Based on the fault tolerance policy attributes, the topology, and the generated mapping, a plurality of feasible erasure coding configurations are generated. The feasible erasure coding configurations are scored. One or more high-scoring feasible erasure coding configurations are selected and deployed to the computing and data storage system. The method is repeated when there is a change in the fault tolerance policy attributes or in the topology. Depending on the topology and/or the nature of a change in the topology, more than one erasure coding configurations can be deployed onto the computing and data storage system.Type: GrantFiled: December 6, 2017Date of Patent: February 18, 2020Assignee: Nutanix, Inc.Inventors: Minghui Yang, Timothy Sujay Isaacs, Ajaykrishna Raghavan, Dmitri Bronnikov, Jaya Singhvi, Peihong Huang, Varun Kumar Arora
-
Publication number: 20200019343Abstract: A method and apparatus for a durable low latency system architecture. The method includes providing an apparatus that includes a battery backup electrically coupled to a motherboard, and to a non-volatile storage device (either through additional circuitry to through the motherboard itself). The process leverages the battery backup to allow for durably maintaining write requests in volatile memory while the system is operating on standard input power. When the system switches to battery power the write requests maintained in the volatile memory are persisted in a non-volatile storage device using the battery power. Thus, the write requests are durably maintained in a RAM where they are only copied to a persistent storage location that is not the write request target location when there is a failure of the power input to the system.Type: ApplicationFiled: July 13, 2018Publication date: January 16, 2020Applicant: Nutanix, Inc.Inventor: Dmitri BRONNIKOV
-
Patent number: 10474656Abstract: Systems and methods for key-value pair management. A method embodiment commences upon receiving data records comprising key-value pairs. The key-value pairs are stored in two locations, (1) in an in-memory data structure in a first storage tier, and (2) in a log file in a second storage tier. At some moment in time, an event causes a flush of the in-memory data structure. The flush operations comprise renaming the log file to refer to it as a uniquely identifiable data file in the second storage tier, and populating an index file in the second storage tier. Requests for a value corresponding to a key is satisfied by using the index file to access the uniquely identifiable data file by byte or word offset to a location in the data file so as to retrieve the value of the corresponding key.Type: GrantFiled: February 21, 2017Date of Patent: November 12, 2019Assignee: NUTANIX, INC.Inventor: Dmitri Bronnikov
-
Publication number: 20190332473Abstract: Dynamic erasure coding for computing and data storage systems. A method embodiment commences upon accessing a set of fault tolerance policy attributes associated with the computing and data storage system. The topology of the system is analyzed to form mappings between the computing nodes of the system and the availability domains of the system. Based on the fault tolerance policy attributes, the topology, and the generated mapping, a plurality of feasible erasure coding configurations are generated. The feasible erasure coding configurations are scored. One or more high-scoring feasible erasure coding configurations are selected and deployed to the computing and data storage system. The method is repeated when there is a change in the fault tolerance policy attributes or in the topology. Depending on the topology and/or the nature of a change in the topology, more than one erasure coding configurations can be deployed onto the computing and data storage system.Type: ApplicationFiled: December 6, 2017Publication date: October 31, 2019Applicant: Nutanix, Inc.Inventors: Minghui YANG, Timothy Sujay ISAACS, Ajaykrishna RAGHAVAN, Dmitri BRONNIKOV, Jaya SINGHVI, Peihong HUANG, Varun Kumar ARORA
-
Patent number: 9672106Abstract: A method for implementing erasure coding, including identifying a plurality of storage units, determining a number of storage unit failures to be tolerated, organizing data within the plurality of storage units as a matrix of rows and columns for computing one or more parity data, configuring the matrix to include one or more additional rows having preset values, computing the one or more parity data from the matrix that corresponds to the number of storage unit failures to be tolerated, wherein the one or more parity data comprises a row parity, a first diagonal parity, and a second diagonal parity, wherein the one or more additional rows having the preset values are used to compute the first diagonal parity and the second diagonal parity; and wherein the first diagonal parity comprises a different slope from the second diagonal parity.Type: GrantFiled: December 30, 2014Date of Patent: June 6, 2017Assignee: NUTANIX, INC.Inventors: Dmitri Bronnikov, Binny Sher Gill
-
Publication number: 20160188407Abstract: Disclosed is an improved approach to implement erasure coding, which can address multiple storage unit failures in an efficient manner. The approach can effectively address multiple failures of storage units by implementing diagonal parity sets.Type: ApplicationFiled: December 30, 2014Publication date: June 30, 2016Applicant: NUTANIX, INC.Inventors: Dmitri BRONNIKOV, Binny Sher GILL
-
Patent number: 8793240Abstract: After receipt of an instruction (e.g. a database statement), one or more computers specialize an interpreter with the received instruction as constant, to obtain a specialized interpreter that is stored in memory and/or disk. The specialized interpreter is then invoked to execute the received instruction. Depending on the embodiment, the interpreter being specialized may additionally be received and used in binary form without specialization. Specifically, in some embodiments, an identical interpreter is received in two forms: in a binary language specific to the one or more computers and also in a language that is acceptable to a specializer, such as a source language or an intermediate language. The interpreter in the binary language is invoked by default unless a predetermined condition for specialization is met. When the predetermined condition is met, the interpreter in the specializer-acceptable language is specialized by the specializer, and then the specialized interpreter is invoked.Type: GrantFiled: August 26, 2011Date of Patent: July 29, 2014Assignee: Oracle International CorporationInventors: Dmitry M. Potapov, Dmitri Bronnikov
-
Publication number: 20130054649Abstract: After receipt of an instruction (e.g. a database statement), one or more computers specialize an interpreter with the received instruction as constant, to obtain a specialized interpreter that is stored in memory and/or disk. The specialized interpreter is then invoked to execute the received instruction. Depending on the embodiment, the interpreter being specialized may additionally be received and used in binary form without specialization. Specifically, in some embodiments, an identical interpreter is received in two forms: in a binary language specific to the one or more computers and also in a language that is acceptable to a specializer, such as a source language or an intermediate language. The interpreter in the binary language is invoked by default unless a predetermined condition for specialization is met. When the predetermined condition is met, the interpreter in the specializer-acceptable language is specialized by the specializer, and then the specialized interpreter is invoked.Type: ApplicationFiled: August 26, 2011Publication date: February 28, 2013Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Dmitry M. Potapov, Dmitri Bronnikov
-
Patent number: 7930707Abstract: Systems, methods, media, and other embodiments associated with optimizing code motion with delayed exception handling are described. One exemplary system embodiment includes a data store to store information about a relocated instruction, a relocation logic to relocate instructions, and a run-time logic to detect exceptions raised by executed instructions. The run-time logic may selectively delay handling exceptions based on whether an executed instruction is a relocated instruction.Type: GrantFiled: May 10, 2006Date of Patent: April 19, 2011Assignee: Oracle International Corp.Inventor: Dmitri Bronnikov
-
Patent number: 7860842Abstract: A vulnerability analysis tool is provided for identifying SQL injection threats. The tool is able to take advantage of the fact that the code for many database applications is located in modules stored within a database. The tool constructs a data flow graph based on all, or a specified subset, of the application code within the database. The tool identifies, within the data flow graph, the nodes that represent values used to construct SQL commands. Paths to those nodes are analyzed to determine whether any SQL injection threats exist.Type: GrantFiled: March 16, 2005Date of Patent: December 28, 2010Assignee: Oracle International CorporationInventors: Dmitri Bronnikov, Charles Wetherell
-
Patent number: 7752177Abstract: A vulnerability analysis tool is provided for identifying SQL injection threats. The tool is able to take advantage of the fact that the code for many database applications is located in modules stored within a database. The tool constructs a data flow graph based on all, or a specified subset, of the application code within the database. The tool identifies, within the data flow graph, the nodes that represent values used to construct SQL commands. Paths to those nodes are analyzed to determine whether any SQL injection threats exist.Type: GrantFiled: March 16, 2005Date of Patent: July 6, 2010Assignee: Oracle International CorporationInventors: Dmitri Bronnikov, Charles Wetherell
-
Publication number: 20070266375Abstract: Systems, methods, media, and other embodiments associated with optimizing code motion with delayed exception handling are described. One exemplary system embodiment includes a data store to store information about a relocated instruction, a relocation logic to relocate instructions, and a run-time logic to detect exceptions raised by executed instructions. The run-time logic may selectively delay handling exceptions based on whether an executed instruction is a relocated instruction.Type: ApplicationFiled: May 10, 2006Publication date: November 15, 2007Applicant: Oracle International CorporationInventor: Dmitri Bronnikov
-
Publication number: 20060212941Abstract: A vulnerability analysis tool is provided for identifying SQL injection threats. The tool is able to take advantage of the fact that the code for many database applications is located in modules stored within a database. The tool constructs a data flow graph based on all, or a specified subset, of the application code within the database. The tool identifies, within the data flow graph, the nodes that represent values used to construct SQL commands. Paths to those nodes are analyzed to determine whether any SQL injection threats exist.Type: ApplicationFiled: March 16, 2005Publication date: September 21, 2006Inventors: Dmitri Bronnikov, Charles Wetherell