Patents by Inventor Ganeshan RAMACHANDRAN
Ganeshan RAMACHANDRAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11983165Abstract: Embodiments of the present disclosure provide techniques for deduplicating files during internal stage replication using a directory table of the replicated internal stage that is modified as a cache for storing and retrieving original file-level metadata for the replicated files. An initial list of candidate files for loading from the internal stage to a table of the target deployment is prepared based on the files listed in the internal stage, and refined using a directory table lookup. If there is any inconsistency between the files registered in the directory table and the files listed in the internal stage, the target deployment will inspect the user-defined file-level metadata to obtain original file-level metadata for each file that is present in the internal stage but not in the directory table. This information may be used during deduplication to ensure that no duplicate files are loaded.Type: GrantFiled: March 29, 2023Date of Patent: May 14, 2024Assignee: Snowflake Inc.Inventors: Abdullah Al Mahmood, Chong Han, Ganeshan Ramachandran Iyer, Jiaxing Liang, Nithin Mahesh, Yanrui Zhang
-
Publication number: 20240143548Abstract: Techniques for continuous ingestion of files using custom file formats are described. A custom file format may include formats not natively supported by a data system. Unstructured files (e.g., images) may also be considered custom file formats. A custom file format may be set using a user defined table function and scanner options.Type: ApplicationFiled: October 27, 2022Publication date: May 2, 2024Inventors: Tyler Arthur Akidau, Thierry Cruanes, Benoit Dageville, Ganeshan Ramachandran Iyer, Subramanian Muralidhar
-
Patent number: 11949650Abstract: A system and method for improving network performance of DNS queries. The system includes a terminal which receives DNS queries from a customer premise equipment (CPE), and supplies matching DNS records in response to the queries. The terminal monitors all traffic from the CPE and generates a preload list containing domains and a time schedule at which name resolution should be requested for the domains. A DNS preload client in the CPE receives the preload list from the terminal, and submits preload DNS queries for name resolution of domains contained in the preload list at times specified in the time schedule. Preload records supplied in response to the preload DNS queries are stored by the CPE and used to resolve DNS queries from applications installed on the CPE.Type: GrantFiled: November 15, 2019Date of Patent: April 2, 2024Assignee: Hughes Network Systems, LLCInventors: Ganeshan Ramachandran, Robert Torres, George Choquette
-
Publication number: 20240086381Abstract: Disclosed are techniques for deduplicating files to be ingested by a database. A bloom filter may be built for each of a first set of files to be ingested into a data exchange to generate a set of bloom filters, wherein each of the set of bloom filters is built with a number of hash functions that is based on a desired false positive rate. The set of bloom filters may be stored in the metadata storage of the data exchange. In response to receiving a set of candidate files to be ingested, identifying using the set of bloom filters, candidate files from the set of candidate files that are duplicative of a file in the first set of files and pruning from the set of candidate files, each candidate file identified as being duplicative of a file in the first set of files using the set of bloom filters.Type: ApplicationFiled: November 17, 2023Publication date: March 14, 2024Inventors: Ganeshan Ramachandran Iyer, Raghav Ramachandran, Subramanian Muralidhar
-
Patent number: 11922328Abstract: Systems and methods for generating a machine-learning (ML) model for extracting information from one or more electronic documents, where the ML model can be used as a data object, which can be part of a database command or as part of a document information extraction process that is continuously running (e.g., document information extraction pipeline).Type: GrantFiled: September 22, 2023Date of Patent: March 5, 2024Assignee: Snowflake Inc.Inventors: Michal Gdak, Ganeshan Ramachandran Iyer, Tomasz Malisz, Mikolaj Niedbala, Pawel Pollak, Saurin Shah, Jan Tomasz Topinski, Daria Wieteska
-
Patent number: 11921700Abstract: Techniques for creating and using error tables to track errors associated with a base table are described. A command to perform an operation on a base table stored in a network-based data system can be received and executed, causing at least one error. At least one error record corresponding to the at least one error can be inputted into an error table, which is nested with the base table. Contextual information can be added to the at least one error record.Type: GrantFiled: May 18, 2023Date of Patent: March 5, 2024Assignee: Snowflake Inc.Inventors: Abdullah Al Mahmood, Tyler Jones, Xin Huang, Ganeshan Ramachandran Iyer, Jiaxing Liang, Daniel Mills, Subramanian Muralidhar, Daniel E. Sotolongo
-
Patent number: 11853274Abstract: Disclosed are techniques for deduplicating files to be ingested by a database. A bloom filter may be built for each of a first set of files to be ingested into a data exchange to generate a set of bloom filters, wherein the data exchange includes a metadata storage where metadata including a list of files ingested is stored. The set of bloom filters may be stored in the metadata storage of the data exchange. In response to receiving a set of candidate files to be ingested into the data exchange, the set of bloom filters may be used to identify from within the set of candidate files, each candidate file that is duplicative of a file in the first set of files.Type: GrantFiled: October 21, 2022Date of Patent: December 26, 2023Assignee: Snowflake Inc.Inventors: Ganeshan Ramachandran Iyer, Raghav Ramachandran, Subramanian Muralidhar
-
Publication number: 20230401180Abstract: Techniques for schema mismatch detection and evolution are described. When data is being uploaded into a source table, schema of the data to be uploaded can be compared with the schema for the source table. If a schema mismatch is detected, the schema of the source table can be modified, and the upload can be continued without data loss.Type: ApplicationFiled: June 30, 2023Publication date: December 14, 2023Inventors: Istvan Cseri, Benoit Dageville, Ganeshan Ramachandran Iyer, Yucan Liu, Jiaqi Yan
-
Publication number: 20230376391Abstract: Described herein are techniques for improving disaster recovery, in particular disaster recovery pertaining to data transfer requests. The data transfer request can be received by each of multiple deployments; however, only a primary deployment can process the request. The data transferred by the primary deployment may be replicated in the secondary deployments. In response to a failover event, one of the secondary deployments can be designated as the new primary development and continue the data transfer based on the data transfer request and the replication information received from the old primary deployment prior to the failover.Type: ApplicationFiled: January 24, 2023Publication date: November 23, 2023Inventors: Abdullah Al Mahmood, Ruta Dhaneshwar, Xin Huang, Ganeshan Ramachandran Iyer, Jiaxing Liang, Nithin Mahesh, Raghav Ramachandran, Purav B. Saraiya, Yanyi Zhang
-
Publication number: 20230315700Abstract: Embodiments of the present disclosure provide techniques for deduplicating files to be ingested by a database. A bloom filter may be built for each of a first set of files to be ingested into a data exchange to generate a set of bloom filters, wherein the data exchange includes a metadata storage where metadata including a list of files ingested is stored. The set of bloom filters may be stored in the metadata storage of the data exchange. In response to receiving a set of candidate files to be ingested into the data exchange, the set of bloom filters may be used to identify from within the set of candidate files, each candidate file that is duplicative of a file in the first set of files.Type: ApplicationFiled: October 21, 2022Publication date: October 5, 2023Inventors: Ganeshan Ramachandran Iyer, Raghav Ramachandran, Subramanian Muralidhar
-
Patent number: 11748318Abstract: Techniques for schema mismatch detection and evolution are described. When data is being uploaded into a source table, schema of the data to be uploaded can be compared with the schema for the source table. If a schema mismatch is detected, the schema of the source table can be modified, and the upload can be continued without data loss.Type: GrantFiled: January 31, 2023Date of Patent: September 5, 2023Assignee: Snowflake Inc.Inventors: Istvan Cseri, Benoit Dageville, Ganeshan Ramachandran Iyer, Yucan Liu, Jiaqi Yan
-
Patent number: 11743192Abstract: A terrestrial terminal enables communications, over a network connection, between a local host of one or more connected local hosts and a remote host. The terrestrial terminal is configured to perform operations comprising: receiving, from the remote host, a network packet for the local host; obtaining, from the network packet, an included TCP segment; determining, from the TCP segment, a receive window size advertised by the remote host; computing, using one or more characteristics of the network connection, a target receive window size; comparing the target receive window size with the advertised receive window size; and in response to determining that the target receive window size is different from the advertised receive window size: modifying the TCP segment by replacing the advertised receive window size with the target receive window size, and forwarding the network packet with the modified TCP segment to the local host.Type: GrantFiled: May 17, 2021Date of Patent: August 29, 2023Assignee: Hughes Network Systems, LLCInventors: Ganeshan Ramachandran, Robert James Torres, George Choquette
-
Publication number: 20230252039Abstract: Techniques for configuring event tables include retrieving, by at least one hardware processor of a computing node, log data at a first process of the computing node. The log data is associated with a function executing at a second process of the computing node. The log data is revised using a table stage to generate revised log data. The table stage is configured as a dedicated storage location of the first process. The revising includes a data enrichment process based on metadata associated with execution of the function at the second process. The revised log data is ingested into an event table.Type: ApplicationFiled: April 18, 2023Publication date: August 10, 2023Inventors: Benoit Dageville, Ganeshan Ramachandran Iyer, Unmesh Jagtap, Subramanian Muralidhar
-
Publication number: 20230147989Abstract: Techniques for configuring managed event tables include generating at a first process of an execution node, log data associated with execution of user-defined function (UDF) code. The log data is provided from the first process to a second process of the execution node. The first process is configured as a sub-process of the second process. The log data is formatted using the second process of the execution node, to generate formatted log data. The formatting is based on a configuration of a managed event table that is external to the execution node. The formatted log data is communicated from the second process of the execution node into a managed event table maintained at a computing node that is external to the execution node.Type: ApplicationFiled: September 23, 2022Publication date: May 11, 2023Inventors: Benoit Dageville, Ganeshan Ramachandran Iyer, Unmesh Jagtap, Subramanian Muralidhar
-
Patent number: 11645298Abstract: Techniques for configuring managed event tables include generating at a first process of an execution node, log data associated with execution of user-defined function (UDF) code. The log data is provided from the first process to a second process of the execution node. The first process is configured as a sub-process of the second process. The log data is formatted using the second process of the execution node, to generate formatted log data. The formatting is based on a configuration of a managed event table that is external to the execution node. The formatted log data is communicated from the second process of the execution node into a managed event table maintained at a computing node that is external to the execution node.Type: GrantFiled: September 23, 2022Date of Patent: May 9, 2023Assignee: Snowflake Inc.Inventors: Benoit Dageville, Ganeshan Ramachandran Iyer, Unmesh Jagtap, Subramanian Muralidhar
-
Patent number: 11625367Abstract: Techniques for schema mismatch detection and evolution are described. When data is being uploaded into a source table, schema of the data to be uploaded can be compared with the schema for the source table. If a schema mismatch is detected, the schema of the source table can be modified, and the upload can be continued without data loss.Type: GrantFiled: September 22, 2022Date of Patent: April 11, 2023Assignee: Snowflake Inc.Inventors: Istvan Cseri, Benoit Dageville, Ganeshan Ramachandran Iyer, Yucan Liu, Jiaqi Yan
-
Publication number: 20230084682Abstract: The logging techniques described herein can enable using logging tools without having to use different methods for sandbox implementations and push out the log data to storage without problems. The log data is treated as sensitive data and is protected according to the defined security policies. Further, the results may be compressed and encrypted.Type: ApplicationFiled: September 29, 2022Publication date: March 16, 2023Inventors: Thierry Cruanes, Ganeshan Ramachandran Iyer, Isaac Kunen
-
Patent number: 11586515Abstract: Described herein are techniques for improving disaster recovery, in particular disaster recovery pertaining to data transfer requests. The data transfer request can be received by each of multiple deployments; however, only a primary deployment can process the request. The data transferred by the primary deployment may be replicated in the secondary deployments. In response to a failover event, one of the secondary deployments can be designated as the new primary development and continue the data transfer based on the data transfer request and the replication information received from the old primary deployment prior to the failover.Type: GrantFiled: May 18, 2022Date of Patent: February 21, 2023Assignee: Snowflake Inc.Inventors: Abdullah Al Mahmood, Ruta Dhaneshwar, Xin Huang, Ganeshan Ramachandran Iyer, Jiaxing Liang, Nithin Mahesh, Raghav Ramachandran, Purav B. Saraiya, Yanyi Zhang
-
Patent number: 11494352Abstract: Embodiments of the present disclosure provide techniques for deduplicating files to be ingested by a database. A bloom filter may be built for each of a first set of files that are ingested into the database. The set of bloom filters may be stored in a metadata storage associated with the database along with file loading metadata of the first set of files. In response to receiving a set of candidate files to be ingested into the database, one or more candidate files that are duplicative of a file in the first set of files are removed from the set of candidate files, based on file loading metadata of each the first set of files and the set of candidate files to generate a reduced set of candidate files. From the reduced set of candidate files, candidate files that are not duplicative are identified and set for ingestion while candidate files that are potentially duplicative are also identified and set for further scanning.Type: GrantFiled: March 30, 2022Date of Patent: November 8, 2022Assignee: Snowflake Inc.Inventors: Ganeshan Ramachandran Iyer, Raghav Ramachandran, Subramanian Muralidhar
-
Publication number: 20220350880Abstract: The logging techniques described herein can enable using logging tools without having to use different methods for sandbox implementations and push out the log data to storage without problems. The log data is treated as sensitive data and is protected according to the defined security policies. Further, the results may be compressed and encrypted.Type: ApplicationFiled: May 21, 2021Publication date: November 3, 2022Inventors: Thierry Cruanes, Ganeshan Ramachandran Iyer, Isaac Kunen