Patents by Inventor Viktoriya Taranov
Viktoriya Taranov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9311199Abstract: Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted.Type: GrantFiled: September 17, 2014Date of Patent: April 12, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Daniel Blood, Alexander Hopmann, Siddharth Rajendra Shah, Viktoriya Taranov, Tarkan Sevilmis, Nikita Voronkov
-
Publication number: 20160041953Abstract: Rules, such as condition-action rules, are configured at different levels of a hierarchy. For example, a top level site administrator may configure rules, lower level administrators may configure rules and end users may configure rules. Rules created at a higher hierarchical level are automatically inherited by lower hierarchical levels in the same branch of the hierarchy. The source of the inherited rule is indicated with its display such that the hierarchical level of creation can readily be determined. The inherited rule(s) may be toggled on/off at the lower hierarchical levels but edits to inherited rule(s) are restricted. Instead, a copy of any inherited rule may be made to create a local copy of the rule that is editable. Rules may be ordered and when a lower hierarchical level inherits the rules, the ordering is preserved. While the ordering of any rules remains constant when inherited at the lower levels, the lower level may toggle on/off the execution of each rule within the ordering.Type: ApplicationFiled: October 8, 2015Publication date: February 11, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Pedro Dantas DeRose, Puneet Narula, Viktoriya Taranov
-
Publication number: 20150379145Abstract: A set of user interfaces is provided to an administrator of a website. The user interfaces enable the administrator to configure search functionality of the website to present different types of search results differently. For instance, the administrator can use the user interfaces to configure the search functionality to present different properties for search results belonging to different result types.Type: ApplicationFiled: September 3, 2015Publication date: December 31, 2015Applicant: Microsoft Technology Licensing, LLCInventors: Charles Keller Smith, Jonathan Thomas Campbell, Zhenguang Chen, Arun Keller Krishnamoorthy, Boxin Li, Charles Reeves Little, Viktoriya Taranov, Brian William Timm, Andrew Joseph Violino
-
Publication number: 20150347244Abstract: Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted.Type: ApplicationFiled: August 7, 2015Publication date: December 3, 2015Applicant: Microsoft Technology Licensing, LLCInventors: Daniel Blood, Alexander Hopmann, Siddharth Rajendra Shah, Viktoriya Taranov, Tarkan Sevilmis, Nikita Voronkov
-
Patent number: 9189563Abstract: Rules, such as condition-action rules, are configured at different levels of a hierarchy. For example, a top level site administrator may configure rules, lower level administrators may configure rules and end users may configure rules. Rules created at a higher hierarchical level are automatically inherited by lower hierarchical levels in the same branch of the hierarchy. The source of the inherited rule is indicated with its display such that the hierarchical level of creation can readily be determined. The inherited rule(s) may be toggled on/off at the lower hierarchical levels but edits to inherited rule(s) are restricted. Instead, a copy of any inherited rule may be made to create a local copy of the rule that is editable. Rules may be ordered and when a lower hierarchical level inherits the rules, the ordering is preserved. While the ordering of any rules remains constant when inherited at the lower levels, the lower level may toggle on/off the execution of each rule within the ordering.Type: GrantFiled: November 2, 2011Date of Patent: November 17, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Pedro Dantas DeRose, Puneet Narula, Viktoriya Taranov
-
Patent number: 9177022Abstract: A query pipeline for an enterprise search system is configurable by a user of the system. A user may create rules for custom query transformation and parallel query generation, federation of queries, mixing of results and application of display layouts to the received search results. A user interface (UI) assists a user in configuring the search pipeline. For example, a user may enter condition action rules for queries that affect how a query is transformed, how parallel queries are generated, how queries are federated, how search results are ranked and displayed, how rules are ordered and the like.Type: GrantFiled: November 2, 2011Date of Patent: November 3, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Viktoriya Taranov, Pedro Dantas DeRose, Victor Poznanski, Yauhen Shnitko, Puneet Narula, Dmitriy Meyerzon
-
Patent number: 9135358Abstract: A set of user interfaces is provided to an administrator of a website. The user interfaces enable the administrator to configure search functionality of the website to present different types of search results differently. For instance, the administrator can use the user interfaces to configure the search functionality to present different properties for search results belonging to different result types.Type: GrantFiled: June 30, 2011Date of Patent: September 15, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Jonathan Thomas Campbell, Zhenguang Chen, Arun Krishnamoorthy, Boxin Li, Charles Reeves Little, II, Charles Keller Smith, Viktoriya Taranov, Brian William Timm, Andrew Joseph Violino
-
Publication number: 20150039931Abstract: Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted.Type: ApplicationFiled: September 17, 2014Publication date: February 5, 2015Applicant: Microsoft CorporationInventors: Daniel Blood, Alexander Hopmann, Siddharth Rajendra Shah, Viktoriya Taranov, Tarkan Sevilmis, Nikita Voronkov
-
Patent number: 8938638Abstract: A secondary location of a network acts as a recovery network for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the primary location actively services user load and performs backups that include full backups, incremental backups and transaction logs that are automatically replicated to the secondary location. Information is stored (e.g. time, retry count) that may be used to assist in determining when the backups are restored correctly at the secondary location. The backups are restored and the transaction logs are replayed at the secondary location to reflect changes (content and administrative) that are made to the primary location. After failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.Type: GrantFiled: June 6, 2011Date of Patent: January 20, 2015Assignee: Microsoft CorporationInventors: Viktoriya Taranov, Alexander Hopmann, Antonio Marcos Da Silva, Jr., Nikita Voronkov, Kai Yiu Luk, Ramanathan Somasundaram, Artsiom Kokhan, Siddharth Rajendra Shah, Daniel Blood, Bhavesh Doshi
-
Patent number: 8850261Abstract: Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted.Type: GrantFiled: June 1, 2011Date of Patent: September 30, 2014Assignee: Microsoft CorporationInventors: Daniel Blood, Alexander Hopmann, Siddharth Rajendra Shah, Viktoriya Taranov, Tarkan Sevilmis, Nikita Voronkov
-
Publication number: 20130110860Abstract: A query pipeline for an enterprise search system is configurable by a user of the system. A user may create rules for custom query transformation and parallel query generation, federation of queries, mixing of results and application of display layouts to the received search results. A user interface (UI) assists a user in configuring the search pipeline. For example, a user may enter condition action rules for queries that affect how a query is transformed, how parallel queries are generated, how queries are federated, how search results are ranked and displayed, how rules are ordered and the like.Type: ApplicationFiled: November 2, 2011Publication date: May 2, 2013Applicant: MICROSOFT CORPORATIONInventors: Viktoriya Taranov, Pedro Dantas DeRose, Victor Poznanski, Yauhen Shnitko, Puneet Narula, Dmitriy Meyerzon
-
Publication number: 20130110795Abstract: Rules, such as condition-action rules, are configured at different levels of a hierarchy. For example, a top level site administrator may configure rules, lower level administrators may configure rules and end users may configure rules. Rules created at a higher hierarchical level are automatically inherited by lower hierarchical levels in the same branch of the hierarchy. The source of the inherited rule is indicated with its display such that the hierarchical level of creation can readily be determined The inherited rule(s) may be toggled on/off at the lower hierarchical levels but edits to inherited rule(s) are restricted. Instead, a copy of any inherited rule may be made to create a local copy of the rule that is editable. Rules may be ordered and when a lower hierarchical level inherits the rules, the ordering is preserved. While the ordering of any rules remains constant when inherited at the lower levels, the lower level may toggle on/off the execution of each rule within the ordering.Type: ApplicationFiled: November 2, 2011Publication date: May 2, 2013Applicant: MICROSOFT CORPORATIONInventors: Pedro Dantas DeRose, Puneet Narula, Viktoriya Taranov
-
Publication number: 20130110813Abstract: Systems and method for routing search query results in a networked computing environment. An initial search query is reformulated into at least one sub-query in accordance with one or more configurable rules. The sub-query is sent to at least one information system or source, and any potential hits associated with the same are optionally combined and then rendered for viewing.Type: ApplicationFiled: November 2, 2011Publication date: May 2, 2013Applicant: MICROSOFT CORPORATIONInventors: Fredrik Holm, Puneet Narula, Victor Poznanski, Viktoriya Taranov
-
Publication number: 20120311377Abstract: Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted.Type: ApplicationFiled: June 1, 2011Publication date: December 6, 2012Applicant: MICROSOFT CORPORATIONInventors: Daniel Blood, Alexander Hopmann, Siddharth Rajendra Shah, Viktoriya Taranov, Tarkan Sevilmis, Nikita Voronkov
-
Publication number: 20120311376Abstract: A secondary location of a network acts as a recovery network for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the primary location actively services user load and performs backups that include full backups, incremental backups and transaction logs that are automatically replicated to the secondary location. Information is stored (e.g. time, retry count) that may be used to assist in determining when the backups are restored correctly at the secondary location. The backups are restored and the transaction logs are replayed at the secondary location to reflect changes (content and administrative) that are made to the primary location. After failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.Type: ApplicationFiled: June 6, 2011Publication date: December 6, 2012Applicant: MICROSOFT CORPORATIONInventors: Viktoriya Taranov, Alexander Hopmann, Antonio Marcos Da Silva, JR., Nikita Voronkov, Kai Yiu Luk, Ramanathan Somasundaram, Artsiom Kokhan, Siddharth Rajendra Shah, Daniel Blood, Bhavesh Doshi
-
Publication number: 20120310912Abstract: Content that is stored at a secondary location for a service is crawled before it is placed in operation to assist in maintaining an up to date search index. The content that is crawled at the secondary location includes content that is obtained from the primary location of the service. When a crawler at the secondary location attempts to access content that is stored at the primary location, the crawler is directed to access the corresponding copy of the content that is stored at the secondary location instead of accessing the content at the primary location. The content may be crawled at the secondary location at different times, such as when the information is updated, according to a schedule, and the like.Type: ApplicationFiled: June 6, 2011Publication date: December 6, 2012Applicant: MICROSOFT CORPORATIONInventors: Siddharth Rajendra Shah, Arunachalam Thirupathi, Viktoriya Taranov, Daniel Blood
-
Publication number: 20120310887Abstract: A secondary location is configured as a recovery service for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the secondary location is automatically updated to reflect a current state of the primary location that is actively servicing user load. Content changes to the primary location are automatically reflected to the secondary location. System changes applied to the primary location are automatically applied to the secondary location. For example, removing/adding machines, updating machine/role assignments, removing adding/database are automatically applied to the secondary location such that the secondary location substantially mirrors the primary location. After a failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.Type: ApplicationFiled: June 6, 2011Publication date: December 6, 2012Applicant: MICROSOFT CORPORATIONInventors: Viktoriya Taranov, Daniel Blood, Alexander Hopmann, Siddharth Rajendra Shah, Tarkan Sevilmis, Nikita Voronkov, Ramanathan Somasundaram, Artsiom Kokhan, Bhavesh Doshi
-
Publication number: 20120311375Abstract: During an outage at a primary location for an online service that is temporary in duration (e.g. a “temporary outage”), requests are temporarily switched from the primary location to a secondary location for the online service. The temporary outage may be caused by many different reasons (e.g. power outage, planned maintenance, and the like). The secondary location may be configured as read only during the temporary outage such that users are still able to access their data during the temporary without causing changes to be made to the data. The requests to the primary location of the online service are automatically redirected to be handled by the secondary location. When the temporary outage ends, the requests are automatically switched back to the primary location.Type: ApplicationFiled: June 1, 2011Publication date: December 6, 2012Applicant: MICROSOFT CORPORATIONInventors: Siddharth Rajendra Shah, Jeffrey McDowell, Viktoriya Taranov, Daniel Blood
-
Publication number: 20120254118Abstract: A history of locations of tenant data is maintained. The tenant data comprises data that is currently being used by the tenant and the corresponding backup data. When a tenant's data is changed from one location to another, a location and a time is stored within the history that may be accessed to determine a location of the tenant's data at a specified time. Different operations trigger a storing of a location/time within the history. Generally, an operation that changes a location of the tenant's data triggers the storing of the location within the history (e.g. upgrade of farm, move of tenant, adding a tenant, load balancing of the data, and the like). When tenant data is needed for an operation (e.g. restore), the history may be accessed to determine the location of the data.Type: ApplicationFiled: March 31, 2011Publication date: October 4, 2012Applicant: MICROSOFT CORPORATIONInventors: Siddharth Rajendra Shah, Antonio Marco Da Silva, JR., Nikita Voronkov, Viktoriya Taranov, Daniel Blood
-
Publication number: 20120102024Abstract: A set of user interfaces is provided to an administrator of a website. The user interfaces enable the administrator to configure search functionality of the website to present different types of search results differently. For instance, the administrator can use the user interfaces to configure the search functionality to present different properties for search results belonging to different result types.Type: ApplicationFiled: June 30, 2011Publication date: April 26, 2012Applicant: MICROSOFT CORPORATIONInventors: Jonathan Thomas Campbell, Zhenguang Chen, Arun Krishnamoorthy, Boxin Li, Charles Reeves Little, II, Charles Keller Smith, Viktoriya Taranov, Brian William Timm, Andrew Joseph Violino