Patents by Inventor Yogesh Bansal
Yogesh Bansal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130198141Abstract: Techniques to leverage replication to provide rolling point in time backup are described. Some embodiments are directed to techniques to provide rolling point in time backup with simplified restoration through distributed transactional re-creation. In one embodiment, for example, a technique may comprise creating a plurality of availability copies of a primary set of data; designating at least one of the plurality of availability copies as a backup copy; creating a log file that indicates changes to the primary set of data; updating the plurality of availability copies from the log file in near real time, without updating the backup copy; and restoring at least one of: the primary set of data and an availability copy using the backup copy and content resubmitted from a content contributor when an error occurs in at least one of: the primary set of data and an availability copy. Other embodiments are described and claimed.Type: ApplicationFiled: March 21, 2012Publication date: August 1, 2013Applicant: MICROSOFT CORPORATIONInventors: Shuab Khan, Peter Byrne, Yogesh Bansal, Gregory Thiel, Ross Smith, IV
-
Publication number: 20130191465Abstract: Systems, methods, and software are provided for facilitating a message service. A multi-role system is identified based on where an active message database associated with a user identity resides. Service communications generated by a messaging client associated with the user identity are directed from an entry system to the multi-role system for handling in the multi-role system by a messaging server and a content server to provide the message service.Type: ApplicationFiled: January 24, 2012Publication date: July 25, 2013Applicant: Microsoft CorporationInventors: Naresh Sundaram, Greg Thiel, Robin Thomas, Harvey Rook, Yogesh Bansal
-
Publication number: 20120331336Abstract: High availability architecture that employs a mid-tier proxy server to route client communications to active data store instances in response to failover and switchover. The proxy server includes an active manager client that interfaces to an active manager in each of the backend servers. State information and configuration information are maintained separately and according to semantics consistent with needs of corresponding data, the configuration information changing less frequently and more available, the state information changing more frequently and less available. The active manager indicates to the proxy server which of the data storage instances is the currently the active instance. In the event that the currently active instance is inactive, the proxy server selects a different backend server that currently hosts the active data store instance. Client communications are then routed to the different backend server with minimal or no interruption to the client.Type: ApplicationFiled: September 7, 2012Publication date: December 27, 2012Applicant: MICROSOFT CORPORATIONInventors: Gregory Thiel, Alexander R. Wetmore, Ayla Kol, Rebecca Benfield, James Kleewein, Naresh Sundaram, Yogesh Bansal, Mark Wistrom, Manoharan Kuppusamy
-
Patent number: 8275907Abstract: High availability architecture that employs a mid-tier proxy server to route client communications to active data store instances in response to failover and switchover. The proxy server includes an active manager client that interfaces to an active manager in each of the backend servers. State information and configuration information are maintained separately and according to semantics consistent with needs of corresponding data, the configuration information changing less frequently and more available, the state information changing more frequently and less available. The active manager indicates to the proxy server which of the data storage instances is the currently the active instance. In the event that the currently active instance is inactive, the proxy server selects a different backend server that currently hosts the active data store instance. Client communications are then routed to the different backend server with minimal or no interruption to the client.Type: GrantFiled: June 26, 2008Date of Patent: September 25, 2012Assignee: Microsoft CorporationInventors: Gregory Thiel, Alexander R. Wetmore, Ayla Kol, Rebecca Benfield, James Kleewein, Naresh Sundaram, Yogesh Bansal, Mark Wistrom, Manoharan Kuppusamy
-
Patent number: 7953221Abstract: In one embodiment, the present disclosure provides a method capable of processing a variety of different operations. A method according to one embodiment may include loading configuration data from a shared memory unit into a hardware configuration register, the hardware configuration register located within circuitry included within a hardware accelerator unit. The method may also include issuing a command set from a microengine to the hardware accelerator unit having the circuitry. The method may additionally include receiving the command set at the circuitry from the microengine, the command set configured to allow for the processing of a variety of different operations. The method may further include processing an appropriate operation based upon the configuration data loaded into the hardware configuration register. Of course, many alternatives, variations and modifications are possible without departing from this embodiment.Type: GrantFiled: December 28, 2006Date of Patent: May 31, 2011Assignee: Intel CorporationInventors: Wajdi Feghali, Stephanie Hirnak, Makaram Raghunandan, Yogesh Bansal, Kirk Yap, Gilbert M. Wolrich
-
Patent number: 7802090Abstract: A method which includes receiving a request to perform encapsulating security payload (ESP) processing for data exchanged between a node and an other node over a secure network connection established via an Internet Protocol security (IPsec) security association. Information associated with the IPsec security association is obtained based on the request. The information indicates a prepend data unit size for an initialization vector, a generated data unit size for the initialization vector and an append data unit size for the initialization vector. A composition of each initialization vector included with encrypted data exchanged between the node and the other node based, at least in part, on the prepend, generated and append data unit size for the initialization vector is then determined.Type: GrantFiled: July 31, 2006Date of Patent: September 21, 2010Assignee: Intel CorporationInventor: Yogesh Bansal
-
Patent number: 7797612Abstract: The present disclosure provides a method for generating RAID syndromes. In one embodiment the method may include loading a first data byte of a first disk block and a first data byte of a second disk block from a storage device to an arithmetic logic unit. The method may further include XORing the first data byte of the first disk block and the first data byte of the second disk block to generate a first result and storing the first result in a results buffer. The method may also include iteratively repeating, loading intermediate data bytes corresponding to the first disk block and intermediate data bytes corresponding to the second disk block from the storage device to the arithmetic logic unit. The method may additionally include XORing the intermediate data bytes corresponding to the first disk block and the intermediate data bytes corresponding to the second disk block to generate intermediate results and generating a RAID syndrome based on, at least in part, the intermediate results.Type: GrantFiled: December 29, 2006Date of Patent: September 14, 2010Assignee: Intel CorporationInventors: Vinodh Gopal, Yogesh Bansal, Gilbert M. Wolrich, Wajdi Feghali, Kirk Yap
-
Publication number: 20100199085Abstract: A method which includes receiving a request to perform encapsulating security payload (ESP) processing for data exchanged between a node and an other node over a secure network connection established via an Internet Protocol security (IPsec) security association. Information associated with the IPsec security association is obtained based on the request. The information indicates a prepend data unit size for an initialization vector, a generated data unit size for the initialization vector and an append data unit size for the initialization vector. A composition of each initialization vector included with encrypted data exchanged between the node and the other node based, at least in part, on the prepend, generated and append data unit size for the initialization vector is then determined.Type: ApplicationFiled: July 31, 2006Publication date: August 5, 2010Inventor: Yogesh Bansal
-
Publication number: 20100161737Abstract: Techniques to manage email personal archives are described. A computer-implemented system may comprise a primary mailbox component, associated with a user, and operative to receive and send email. The computer-implemented system may further comprise an alternate mailbox component separate from the primary mailbox component and associated with the user and the primary mailbox, operative to store email. The computer-implemented system may also include a mail client operative on a client computer to access and display contents of the primary and alternate mailboxes substantially simultaneously. Other embodiments are described and claimed.Type: ApplicationFiled: December 23, 2008Publication date: June 24, 2010Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Yogesh Bansal, Karim M. Batthish, Harvey Rook, Lauren B. Lavoie
-
Publication number: 20090327519Abstract: High availability architecture that employs a mid-tier proxy server to route client communications to active data store instances in response to failover and switchover. The proxy server includes an active manager client that interfaces to an active manager in each of the backend servers. State information and configuration information are maintained separately and according to semantics consistent with needs of corresponding data, the configuration information changing less frequently and more available, the state information changing more frequently and less available. The active manager indicates to the proxy server which of the data storage instances is the currently the active instance. In the event that the currently active instance is inactive, the proxy server selects a different backend server that currently hosts the active data store instance. Client communications are then routed to the different backend server with minimal or no interruption to the client.Type: ApplicationFiled: June 26, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Gregory Thiel, Alexander R. Wetmore, Ayla Kol, Rebecca Benfield, James Kleewein, Naresh Sundaram, Yogesh Bansal, Mark Wistrom, Manoharan Kuppusamy
-
Publication number: 20080159528Abstract: In one embodiment, the present disclosure provides a method capable of processing a variety of different operations. A method according to one embodiment may include loading configuration data from a shared memory unit into a hardware configuration register, the hardware configuration register located within circuitry included within a hardware accelerator unit. The method may also include issuing a command set from a microengine to the hardware accelerator unit having the circuitry. The method may additionally include receiving the command set at the circuitry from the microengine, the command set configured to allow for the processing of a variety of different operations. The method may further include processing an appropriate operation based upon the configuration data loaded into the hardware configuration register. Of course, many alternatives, variations and modifications are possible without departing from this embodiment.Type: ApplicationFiled: December 28, 2006Publication date: July 3, 2008Applicant: INTEL CORPORATIONInventors: Wajdi Feghali, Stephanie Hirnak, Makaram Raghunandan, Yogesh Bansal, Kirk Yap, Gilbert M. Wolrich
-
Publication number: 20080162806Abstract: The present disclosure provides a method for generating RAID syndromes. In one embodiment the method may include loading a first data byte of a first disk block and a first data byte of a second disk block from a storage device to an arithmetic logic unit. The method may further include XORing the first data byte of the first disk block and the first data byte of the second disk block to generate a first result and storing the first result in a results buffer. The method may also include iteratively repeating, loading intermediate data bytes corresponding to the first disk block and intermediate data bytes corresponding to the second disk block from the storage device to the arithmetic logic unit. The method may additionally include XORing the intermediate data bytes corresponding to the first disk block and the intermediate data bytes corresponding to the second disk block to generate intermediate results and generating a RAID syndrome based on, at least in part, the intermediate results.Type: ApplicationFiled: December 29, 2006Publication date: July 3, 2008Applicant: INTEL CORPORATIONInventors: Vinodh Gopal, Yogesh Bansal, Gilbert M. Wolrich, Wajdi Feghali, Kirk Yap
-
Publication number: 20080040757Abstract: A method that includes streaming video content at a given bit-rate from a computing platform through a wireless access point and to a digital media adaptor that decodes the video content for display. A communication channel used to stream the video content to the digital media adaptor is monitored and information associated with the communication channel as at least a portion of the video content is streamed from the computing platform to the digital media adaptor is collected. Available bandwidth for the communication channel is determined based on the collected information. An adjustment to the given bit-rate that another portion of the video content is streamed from the computing platform is made based on the available bandwidth.Type: ApplicationFiled: July 31, 2006Publication date: February 14, 2008Inventors: David Romano, Xiancheng Yuan, Bapi Vinnakota, Liang-Min Wang, Yogesh Bansal