Patents by Inventor Venkataraman Kamalaksha
Venkataraman Kamalaksha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210342301Abstract: Examples described herein relate to a computing system, a method and a non-transitory machine-readable medium for handling a request directed to a file in first filesystem having a filesystem instance being a content addressable storage objects. The computing system may also include a general-purpose second filesystem including its backing store within the filesystem instance of the first filesystem. Moreover, the computing system includes a first filesystem server to receive the request for an operation directed to the file in the first filesystem from an application. The first filesystem server may redirect the request to the second filesystem if the operation is a metadata operation; else redirect the request to the first filesystem.Type: ApplicationFiled: March 18, 2021Publication date: November 4, 2021Inventors: Venkataraman Kamalaksha, Suparna Bhattacharya, Ashutosh Kumar
-
Patent number: 10642789Abstract: In one example, a request for storage of an extended attribute (EA) of a file system object is received. A storage location for the EA is determined from a plurality of storage locations, based on one or more characteristics of the EA, the plurality of storage locations including an inode, a first storage file accessible by a first B+ tree, and a second storage file accessible by a second B+ tree. The EA is accordingly stored in the determined storage location.Type: GrantFiled: January 15, 2015Date of Patent: May 5, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Padmagandha Panigrahy, Abhay Sachan, Chaitanya Narra, Amarish Shapur Venkateshappa, Venkataraman Kamalaksha, Anil Kumar Boogarapu, Rajagopal Chellam
-
Patent number: 10521405Abstract: In one example, a system is described in which a storage device, communicatively coupled to a processor, includes a file system management module. This file system management module may create a hierarchical organization directory that is a device and an operating system independent under a root directory in a namespace of a file system. Further, the file system management module may create a user directory under the hierarchical organization directory. Furthermore, the file system management module may create policy and configuration data for the user directory. In addition, the file system management module may store the policy and configuration data created for the user directory in the hierarchical organization directory.Type: GrantFiled: April 24, 2015Date of Patent: December 31, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Venkataraman Kamalaksha, Shruti Doval, Rajat Verma
-
Patent number: 10489354Abstract: Example embodiments relate to storage systems for containers. An example storage system may include a set of servers associated with a global namespace for containers, a plurality of storage domains connected under the global namespace, and a processor to identify a storage tree for a container image of a container, where the storage tree is mapped to a storage domain storing the container image, and to clone the container to a second container, where the second container image is stored in a second storage domain.Type: GrantFiled: July 29, 2016Date of Patent: November 26, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Nigel Edwards, Chris I Dalton, Venkataraman Kamalaksha, Kishore Kumar M
-
Patent number: 10387405Abstract: In one example, a system is described in which a storage device, communicatively coupled to a processor, includes an inconsistency detection and reconstruction tool. The inconsistency detection and reconstruction tool may create a database including metadata associated with hierarchical organization directories and policy and configuration data files in a file system. Further, the inconsistency detection and reconstruction tool may perform consistency check of one or more of the hierarchical organization directories, the policy and configuration data files and the metadata to detect inconsistencies. Furthermore, the inconsistency detection and reconstruction tool may reconstruct one or more of the hierarchical organization directories, the policy and configuration data files and the metadata based on the outcome of the consistency check.Type: GrantFiled: April 24, 2015Date of Patent: August 20, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Shruti Doval, Venkataraman Kamalaksha, Rohit Balakrishna, Rajat Verma
-
Publication number: 20190087419Abstract: Some examples relate to updating of metadata of objects in a file system. In an example, in response to an invocation by an application to update metadata related to a plurality of objects of a file system, an API may initialize a new metadata deduplication database based on an active metadata deduplication database that includes the metadata related to the plurality of objects and a deduplication key linked with the metadata. API may add new metadata to the new metadata deduplication database. API may associate a new deduplication key with the new metadata in the new metadata deduplication database. API may initialize a new translation database. API may add the new deduplication key to the new translation database. API may associate the respective object IDs of the plurality of objects with the new deduplication key in the new translation database.Type: ApplicationFiled: September 21, 2017Publication date: March 21, 2019Inventors: Venkataraman Kamalaksha, Manoj Thankappan Varadamma, Anand Satish Phatak, Gaurav Gupta
-
Publication number: 20180276268Abstract: In one example, a system is described in which a storage device, communicatively coupled to a processor, includes an inconsistency detection and reconstruction tool. The inconsistency detection and reconstruction tool may create a database including metadata associated with hierarchical organization directories and policy and configuration data files in a file system. Further, the inconsistency detection and reconstruction tool may perform consistency check of one or more of the hierarchical organization directories, the policy and configuration data files and the metadata to detect inconsistencies. Furthermore, the inconsistency detection and reconstruction tool may reconstruct one or more of the hierarchical organization directories, the policy and configuration data files and the metadata based on the outcome of the consistency check.Type: ApplicationFiled: April 24, 2015Publication date: September 27, 2018Inventors: Shruti Doval, Venkataraman Kamalaksha, Rohit Balakrishna, Rajat Verma
-
Publication number: 20180032258Abstract: Example embodiments relate to storage systems for containers. An example storage system may include a set of servers associated with a global namespace for containers, a plurality of storage domains connected under the global namespace, and a processor to identify a storage tree for a container image of a container, where the storage tree is mapped to a storage domain storing the container image, and to clone the container to a second container, where the second container image is stored in a second storage domain.Type: ApplicationFiled: July 29, 2016Publication date: February 1, 2018Inventors: Nigel EDWARDS, Chris I. DALTON, Venkataraman KAMALAKSHA, Kishore Kumar M
-
Publication number: 20170316032Abstract: In one example, a system is described in which a storage device, communicatively coupled to a processor, includes a file system management module. This file system management module may create a hierarchical organization directory that is a device and an operating system independent under a root directory in a namespace of a file system. Further, the file system management module may create a user directory under the hierarchical organization directory. Furthermore, the tile system management module may create policy and configuration data for the user directory. In addition, the file system management module may store the policy and configuration data created for the user directory in the hierarchical organization directory.Type: ApplicationFiled: April 24, 2015Publication date: November 2, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Venkataraman Kamalaksha, Shruti Doval, Rajat Verma
-
Publication number: 20170316024Abstract: In one example, a request for storage of an extended attribute (EA) of a file system object is received. A storage location for the EA is determined from a plurality of storage locations, based on one or more characteristics of the EA, the plurality of storage locations including an inode, a first storage file accessible by a first B+ tree, and a second storage file accessible by a second B+ tree. The EA is accordingly stored in the determined storage location.Type: ApplicationFiled: January 15, 2015Publication date: November 2, 2017Inventors: Padmagandha Panigrahy, Abhay Sachan, Chaitanya Narra, Amarish S V, Venkataraman Kamalaksha, Anil Kumar Boogarapu, Rajagopal Chellam
-
Patent number: 8566467Abstract: Embodiments of the present invention relate a data processing method comprising executing a first application on a first processor of a multiprocessor system and implementing, on the first processor, a first protocol stack supporting a first communication channel, bearing first communication data, associated with the first application; and executing a second application on a second processor of the multiprocessor system and implementing, on the second processor, a second protocol stack supporting a second communication channel, bearing second communication data, associated with the second application.Type: GrantFiled: July 17, 2008Date of Patent: October 22, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Chaitra Maraliga Ramaiah, Venkataraman Kamalaksha
-
Patent number: 8286244Abstract: A method of controlling protection of a computing device or computer network. The method comprises directing incoming data packets to the computing device or computer network via a rate limiting system that is adapted to parse the data packets, providing the computing device or computer network with at least one threshold parameter for identifying a data flood condition, the threshold parameter being a function of one or more available computing resources of the computing device or computer network; the computing device or computer network responding to incoming data packets received via the rate limiting system that cause the at least one threshold parameter to be breached by generating event data; generating feedback data based on the event data; transmitting the feedback data to the rate limiting system; and the rate limiting system modifying its behavour according to the feedback data.Type: GrantFiled: January 14, 2008Date of Patent: October 9, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Maruthi Ram Namburu, Mahesh Mylarappa, Venkataraman Kamalaksha
-
Patent number: 7962553Abstract: A method for distributing low-priority maintenance tasks in a computer system employing a plurality of central processing units. In an illustrative embodiment, an activity flag is assigned to each of the plurality of central processing units. After a network packet is received, it is processed in one of the plurality of central processing units and the maintenance tasks are assigned to a central processing unit based on the status of its activity flag.Type: GrantFiled: July 19, 2007Date of Patent: June 14, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventor: Venkataraman Kamalaksha
-
Patent number: 7698001Abstract: A method for improving performance of networking applications which receive network data from a computer network and which are executable on any one of a plurality of data processing means. The proposed method comprises the steps of establishing a data transfer connection between a first data processing means of the plurality of data processing means and the computer network; sending data on the data transfer connection by means of a given networking application of a plurality of networking applications, the given networking application running on a second data processing means of the plurality of data processing means; determining a quality measure of the data transfer connection from the sent data; and moving the given networking application to the first data processing means if the quality measure meets a predefined criterion.Type: GrantFiled: October 13, 2006Date of Patent: April 13, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Venkataraman Kamalaksha, Ganesh Handige Shankar
-
Publication number: 20090031063Abstract: Embodiments of the present invention relate a data processing method comprising executing a first application on a first processor of a multiprocessor system and implementing, on the first processor, a first protocol stack supporting a first communication channel, bearing first communication data, associated with the first application; and executing a second application on a second processor of the multiprocessor system and implementing, on the second processor, a second protocol stack supporting a second communication channel, bearing second communication data, associated with the second application.Type: ApplicationFiled: July 17, 2008Publication date: January 29, 2009Applicant: Hewlett-Packard Development Company, L.P.Inventors: Chaitra Maraliga Ramaiah, Venkataraman Kamalaksha
-
Publication number: 20080178279Abstract: A method of controlling protection of a computing device or computer network. The method comprises directing incoming data packets to the computing device or computer network via a rate limiting system that is adapted to parse the data packets, providing the computing device or computer network with at least one threshold parameter for identifying a data flood condition, the threshold parameter being a function of one or more available computing resources of the computing device or computer network; the computing device or computer network responding to incoming data packets received via the rate limiting system that cause the at least one threshold parameter to be breached by generating event data; generating feedback data based on the event data; transmitting the feedback data to the rate limiting system; and the rate limiting system modifying its behaviour according to the feedback data.Type: ApplicationFiled: January 14, 2008Publication date: July 24, 2008Inventors: Maruthi Ram Namburu, Mahesh Mylarappa, Venkataraman Kamalaksha