Patents by Inventor Narasimhan Sundararajan
Narasimhan Sundararajan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230195539Abstract: An illustrative method includes providing, by an orchestrator implemented on top of a plurality of clusters, a client-facing interface; receiving, by the orchestrator by way of the client-facing interface, a request to deploy a containerized application; selecting, by the orchestrator and based on the request, a cluster from the plurality of clusters; and deploying, by the orchestrator, the containerized application to the selected cluster.Type: ApplicationFiled: September 19, 2022Publication date: June 22, 2023Inventors: Luis Pablo Pabón, Taher Vohra, Lakshmi Narasimhan Sundararajan, Kshithij Iyer
-
Publication number: 20230136839Abstract: In some embodiments, storage path routing in a container system includes: determining, within the container system, a storage operation directed to a storage resource; determining one or more conditions associated with a plurality of network paths to the storage resource, where the plurality of network paths includes a first network path through a storage area network and a second network path through a container system communication network; and routing, based on the one or more conditions, the storage operation to the storage resource using the first network path.Type: ApplicationFiled: October 29, 2021Publication date: May 4, 2023Inventors: Lakshmi Narasimhan Sundararajan, Luis Pablo Pabón, Vinod Jayaraman, Venkatanarasimhan Ramakrishnan
-
Publication number: 20230134266Abstract: In some embodiments, storage operation routing in a container system may include receiving, by a container storage system executing on a node within a container system, a storage operation configured to be performed with respect to a storage resource; determining whether the storage resource is locally accessible at the node; and routing the storage operation based on the determining of whether the storage resource is locally accessible at the node. For example, the routing may be performed such that when the storage resource is not locally accessible at the node, the routing is by way of both a kernel space and a user space of the node, and when the storage resource is locally accessible at the node, the routing is contained within the kernel space of the node. Corresponding methods and systems are also disclosed.Type: ApplicationFiled: June 29, 2022Publication date: May 4, 2023Inventors: Lakshmi Narasimhan Sundararajan, Prabir Paul, Nikhil Subhash Bhupale
-
Publication number: 20230080046Abstract: An illustrative distributed storage system detects a request to resize an online volume that provides persistent storage for a containerized application running in a container system, wherein the online volume is backed by a virtual block device created in device namespace using a device mapper virtualization of data blocks of one or more storage devices. The distributed storage system performs, in response to the request, a resize process to resize the online volume. The resizing of the online volume includes resizing the virtual block device. In some examples, a file system implemented on the virtual block device is also resized while the online volume is online. The storage system may manage inflight IOs over the virtual block device and the online volume such that the resize process is performed without error.Type: ApplicationFiled: November 17, 2022Publication date: March 16, 2023Inventors: Prabir Paul, Lakshmi Narasimhan Sundararajan, Nikhil Subhash Bhupale, Vinod Jayaraman, Goutham Rao
-
Publication number: 20220335009Abstract: An illustrative storage system provides distributed storage for use by containerized applications running in a container system. In some implementations, this includes converting data blocks of storage resources to distributed persistent storage such as thin-provisioned volumes for use by the containerized applications. In some implementations, the conversion includes using a device mapper to virtualize the data blocks of the storage resources to create a virtual storage pool backing datastore in which the thin-provisioned volumes are created.Type: ApplicationFiled: June 29, 2022Publication date: October 20, 2022Inventors: Prabir Paul, Lakshmi Narasimhan Sundararajan, Nikhil Subhash Bhupale, Vinod Jayaraman, Goutham Rao
-
Publication number: 20140351614Abstract: A method of operation of a data storage system includes: providing a standby power source; detecting activity on a communication channel with an upstream re-driver powered with the standby power source; generating a signal-detect output from the upstream re-driver based on the activity; determining a link status with a power control unit based on the signal-detect output, the power control unit powered with the standby power source; and generating a power output from a power supply unit based on the link status, the power supply unit controlled by the power control unit.Type: ApplicationFiled: August 8, 2014Publication date: November 27, 2014Inventors: Jenhao Ho, Lakshmi Narasimhan Sundararajan, Andrew Chi-Te Huang, Cherng-Ren Sue
-
Patent number: 8806230Abstract: A method of operation of a data storage system includes: providing a standby power source; detecting activity on a communication channel with an upstream re-driver powered with the standby power source; generating a signal-detect output from the upstream re-driver based on the activity; determining a link status with a power control unit based on the signal-detect output, the power control unit powered with the standby power source; and generating a power output from a power supply unit based on the link status, the power supply unit controlled by the power control unit.Type: GrantFiled: December 18, 2009Date of Patent: August 12, 2014Assignee: Promise Technology, Inc.Inventors: Jenhao Ho, Lakshmi Narasimhan Sundararajan, Andrew Chi-Te Huang, Cherng-Ren Sue
-
Patent number: 8185589Abstract: The present invention extends to methods, systems, data structures, and computer program products for organizing electronic mail messages into conversations. Electronic mail conversation items store attribute values representing attributes of corresponding electronic mail conversations and included electronic mail messages. Attributes of an electronic mail conversation can be changed by changing stored attribute values. Receiving an electronic mail message can cause an existing electronic mail conversation to be updated or a new electronic mail conversation to be created. When it is indicated that an operation is to be performed on an electronic mail conversation, a corresponding related operation can be performed on all electronic mail messages included in the electronic mail conversation. Attribute values of an electronic mail conversation can be presented along with portions of included electronic mail messages at a user-interface.Type: GrantFiled: October 26, 2004Date of Patent: May 22, 2012Assignee: Microsoft CorporationInventors: Narasimhan Sundararajan, Jason C. Mayans
-
Patent number: 8150926Abstract: The present invention extends to methods, systems, data structures, and computer program products for organizing electronic mail messages into conversations. Electronic mail conversation items store attribute values representing attributes of corresponding electronic mail conversations and included electronic mail messages. Attributes of an electronic mail conversation can be changed by changing stored attribute values. Receiving an electronic mail message can cause an existing electronic mail conversation to be updated or a new electronic mail conversation to be created. When it is indicated that an operation is to be performed on an electronic mail conversation, a corresponding related operation can be performed on all electronic mail messages included in the electronic mail conversation. Attribute values of an electronic mail conversation can be presented along with portions of included electronic mail messages at a user-interface.Type: GrantFiled: September 9, 2004Date of Patent: April 3, 2012Assignee: Microsoft CorporationInventors: Narasimhan Sundararajan, Jason C. Mayans
-
Publication number: 20110154072Abstract: A method of operation of a data storage system includes: providing a standby power source; detecting activity on a communication channel with an upstream re-driver powered with the standby power source; generating a signal-detect output from the upstream re-driver based on the activity; determining a link status with a power control unit based on the signal-detect output, the power control unit powered with the standby power source; and generating a power output from a power supply unit based on the link status, the power supply unit controlled by the power control unit.Type: ApplicationFiled: December 18, 2009Publication date: June 23, 2011Applicant: PROMISE TECHNOLOGY, INC.Inventors: Jenhao Ho, Lakshmi Narasimhan Sundararajan, Andrew Chi-Te Huang, Cherng-Ren Sue
-
Patent number: 7962636Abstract: Example embodiments provide for a system configured to provide constrained delegation and connection pooling for a back-end server by providing a variable identity pipe between it and a front-end server. A client will authenticate to the front-end process using credentials that are typically non-delegable by default, e.g., a token, certificate, or the like. The front-end is configured to extract client identity information and use this information to request changing an identity associated with the variable identity pipe. In addition, requests for actions on resources received from the client can be transformed into remote procedural calls and used by the back-end server to process the requests. A response is then sent back over the variable identity pipe to the client via the front-end server. The variable identity pipe is left open to allow other requests from other clients to be sent over the variable identity pipe in a similar manner.Type: GrantFiled: August 24, 2010Date of Patent: June 14, 2011Assignee: Microsoft CorporationInventors: Iulian Catalin Stafie, Narasimhan Sundararajan
-
Patent number: 7921165Abstract: A processor 104 executes computer-executable instructions to receive messages 302; store 304 the received messages in a foreground memory 108; process 306 the stored messages in the foreground memory 108; send 306 the processed messages; move 308 the sent messages to a background memory 110; evaluate 310, 312 the messages in the background memory with respect to a parameter; and delete 314 selected messages in the background memory as a function of the evaluating. Alternatively, a message queue may be used to track lost messages.Type: GrantFiled: November 30, 2005Date of Patent: April 5, 2011Assignee: Microsoft CorporationInventors: Malcolm E. Pearson, Narasimhan Sundararajan, Greg Thiel
-
Patent number: 7917499Abstract: An index update component updates an index of a database in response to a query to the database referencing the index. An index control record tracks the last time the index was referenced and state of the index compared to the state of the database. An index deletion component deletes indexes in the database that have not been referenced for a period of time.Type: GrantFiled: June 30, 2006Date of Patent: March 29, 2011Assignee: Microsoft CorporationInventors: James Charles Kleewein, F. Soner Terek, Narasimhan Sundararajan
-
Publication number: 20100318604Abstract: Example embodiments provide for a system configured to provide constrained delegation and connection pooling for a back-end server by providing a variable identity pipe between it and a front-end server. A client will authenticate to the front-end process using credentials that are typically non-delegable by default, e.g., a token, certificate, or the like. The front-end is configured to extract client identity information and use this information to request changing an identity associated with the variable identity pipe. In addition, requests for actions on resources received from the client can be transformed into remote procedural calls and used by the back-end server to process the requests. A response is then sent back over the variable identity pipe to the client via the front-end server. The variable identity pipe is left open to allow other requests from other clients to be sent over the variable identity pipe in a similar manner.Type: ApplicationFiled: August 24, 2010Publication date: December 16, 2010Applicant: Microsoft CorporationInventors: Iulian Catalin Stafie, Narasimhan Sundararajan
-
Patent number: 7805527Abstract: Example embodiments provide for a system configured to provide constrained delegation and connection pooling for a back-end server by providing a variable identity pipe between it and a front-end server. A client will authenticate to the front-end process using credentials that are typically non-delegable by default, e.g., a token, certificate, or the like. The front-end is configured to extract client identity information and use this information to request changing an identity associated with the variable identity pipe. In addition, requests for actions on resources received from the client can be transformed into remote procedural calls and used by the back-end server to process the requests. A response is then sent back over the variable identity pipe to the client via the front-end server. The variable identity pipe is left open to allow other requests from other clients to be sent over the variable identity pipe in a similar manner.Type: GrantFiled: June 29, 2005Date of Patent: September 28, 2010Assignee: Microsoft CorporationInventors: Iulian Catalin Stafie, Narasimhan Sundararajan
-
Patent number: 7734618Abstract: A request logging component formulates an index that could have been utilized by a query to a database, if the index had existed. The request logging component stores the formulated query as an unsatisfied request. The index creation component creates the index of the database from the unsatisfied request.Type: GrantFiled: June 30, 2006Date of Patent: June 8, 2010Assignee: Microsoft CorporationInventors: James Charles Kleewein, F. Soner Terek, Narasimhan Sundararajan
-
Patent number: 7721093Abstract: Methods and systems are provided for using an existing email transfer protocol, such as SMTP, to exchange digital objects in an authenticated manner. The provided methods and systems solve the bootstrapping problem of computer identities for P2P communication by authenticating the exchange of public information. If the electronic mail protocols are strong, in that sending an email message to a given address results in the message reaching that address with a high degree of confidence, then the exchange of public information performed in accordance with embodiments of the invention is confidently authenticated.Type: GrantFiled: April 2, 2004Date of Patent: May 18, 2010Assignee: Microsoft CorporationInventor: Narasimhan Sundararajan
-
Publication number: 20080005092Abstract: A request logging component formulates an index that could have been utilized by a query to a database, if the index had existed. The request logging component stores the formulated query as an unsatisfied request. The index creation component creates the index of the database from the unsatisfied request.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: MICROSOFT CORPORATIONInventors: James Charles Kleewein, F. Soner Terek, Narasimhan Sundararajan
-
Publication number: 20080005097Abstract: An index update component updates an index of a database in response to a query to the database referencing the index. An index control record tracks the last time the index was referenced and state of the index compared to the state of the database. An index deletion component deletes indexes in the database that have not been referenced for a period of time.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: MICROSOFT CORPORATIONInventors: James Charles Kleewein, F. Soner Terek, Narasimhan Sundararajan
-
Publication number: 20070124484Abstract: A processor 104 executes computer-executable instructions to receive messages 302; store 304 the received messages in a foreground memory 108; process 306 the stored messages in the foreground memory 108; send 306 the processed messages; move 308 the sent messages to a background memory 110; evaluate 310, 312 the messages in the background memory with respect to a parameter; and delete 314 selected messages in the background memory as a function of the evaluating. Alternatively, a message queue may be used to track lost messages.Type: ApplicationFiled: November 30, 2005Publication date: May 31, 2007Applicant: Microsoft CorporationInventors: Malcolm Pearson, Narasimhan Sundararajan, Greg Thiel