Patents by Inventor Adwait Sathye

Adwait Sathye has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10846292
    Abstract: A method of event based object ranking is described. An object query is computed based upon a user action. The results of the query are ranked based on one or more events associated with objects in the results to create ranked results. The ranked results are provided to the user in response to the query.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: November 24, 2020
    Assignee: VMware, Inc.
    Inventors: Imran Q. Sayed, Adwait Sathye
  • Publication number: 20140280083
    Abstract: A method of event based object ranking is described. An object query is computed based upon a user action. The results of the query are ranked based on one or more events associated with objects in the results to create ranked results. The ranked results are provided to the user in response to the query.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: VMware,Inc.
    Inventors: Imran Q. Sayed, Adwait Sathye
  • Patent number: 8140348
    Abstract: Disclosed is a technique for flow control. It is detected that a work request is being transferred to an in-memory structure. A maximum limit is compared with a number of work requests stored in the in-memory structure. If the number of work requests stored in the in-memory structure equals the maximum limit, a notification is sent that indicates that additional work requests are not to be sent.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ramani Mathrubutham, Adwait Sathye, Chendong Zou
  • Patent number: 7650606
    Abstract: Disclosed is a technique for system recovery. Information identifying one or more work requests is retrieved, along with an order of the work requests, for a business process. If the business process is non-transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request, and the recovery stub for each work request is placed into the in-memory structure based on the order.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: January 19, 2010
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Ramani Mathrubutham, Adwait Sathye, Chendong Zou
  • Patent number: 7366801
    Abstract: Disclosed is a technique for buffering work requests. It is determined that a work request is about to be placed into an in-memory structure. When the in-memory structure is not capable of storing the work request, a work request ordering identifier for the work request is stored into an overflow structure. When the in-memory structure is capable of storing the work request, a recovery stub is generated for the work request ordering identifier, and the recovery stub is stored into the in-memory structure.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: April 29, 2008
    Assignee: International Business Machines Corporation
    Inventors: Ramani Mathrubutham, Adwait Sathye, Chendong Zou
  • Publication number: 20050172054
    Abstract: Disclosed is a technique for buffering work requests. It is determined that a work request is about to be placed into an in-memory structure. When the in-memory structure is not capable of storing the work request, a work request ordering identifier for the work request is stored into an overflow structure. When the in-memory structure is capable of storing the work request, a recovery stub is generated for the work request ordering identifier, and the recovery stub is stored into the in-memory structure.
    Type: Application
    Filed: January 30, 2004
    Publication date: August 4, 2005
    Inventors: Ramani Mathrubutham, Adwait Sathye, Chendong Zou
  • Publication number: 20050172288
    Abstract: Disclosed is a technique for system recovery. Information identifying one or more work requests is retrieved, along with an order of the work requests, for a business process. If the business process is non-transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request, and the recovery stub for each work request is placed into the in-memory structure based on the order. Also disclosed is a technique for system recovery in which, if the business process is transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request that indicates that rollback is to be performed, and the recovery stub is placed for each work request into the in-memory structure based on the order.
    Type: Application
    Filed: January 30, 2004
    Publication date: August 4, 2005
    Inventors: Pratima Ahuja, Ramani Mathrubutham, Adwait Sathye, Chendong Zou
  • Publication number: 20050171789
    Abstract: Disclosed is a technique for flow control. It is detected that a work request is being transferred to an in-memory structure. A maximum limit is compared with a number of work requests stored in the in-memory structure. If the number of work requests stored in the in-memory structure equals the maximum limit, a notification is sent that indicates that additional work requests are not to be sent.
    Type: Application
    Filed: January 30, 2004
    Publication date: August 4, 2005
    Inventors: Ramani Mathrubutham, Adwait Sathye, Chendong Zou
  • Publication number: 20050114867
    Abstract: The present invention provides a method, apparatus, and computer instructions for activating application programs and adapters. In an exemplary embodiment, a reactivation program is provided that includes a queue manager (QM) that operates to monitor for predetermined trigger events (e.g., time out for messages in an application queue) and, when such events occur, to generate a trigger message. The trigger message includes process information associated with the crashed application which is used by a trigger monitor application to issue an appropriate command to the application. In a preferred embodiment, the trigger message is placed in an initiation queue, read out by a trigger monitor, and a restart command message, according to the predetermined parameters, sent to the application. More than one process definition can be used by the initiation queue.
    Type: Application
    Filed: November 26, 2003
    Publication date: May 26, 2005
    Inventors: Weixin Xu, Pratima Ahuja, Adwait Sathye, Chengdong Zou
  • Publication number: 20050102500
    Abstract: A system for integrating applications in different enterprises separated by firewalls comprises: an input for receiving high level business data from a source application; an encryption engine for encrypting the business data to produce encrypted business data; a queue manager for receiving the encrypted business data and for storing the business data for delivery to a target application; and an output for transmitting the encrypted business data to the target application; wherein the system and the target application are separated by at least one firewall.
    Type: Application
    Filed: November 12, 2003
    Publication date: May 12, 2005
    Inventors: Manoj Khangaonkar, Adwait Sathye