Patents by Inventor Arshish Cyrus Kapadia
Arshish Cyrus Kapadia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9971827Abstract: Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields.Type: GrantFiled: November 21, 2014Date of Patent: May 15, 2018Assignee: Microsoft Technology Licensing, LLCInventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia, Wei-Lun Lo
-
Patent number: 9880897Abstract: When a software component is starting, such as but not limited to a task or a subtask, the component pushes its identification (ID) onto a stack. The component executes its other instructions. If the component completes its instructions so that it can terminate normally, it pops the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, it will not be able to pop the stack so its ID will remain in the stack. Another software process can read the IDs in the stack to identify which components have failed and can automatically take a specified action, such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.Type: GrantFiled: August 7, 2015Date of Patent: January 30, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
-
Publication number: 20160034337Abstract: When a software component is starting, such as but not limited to a task or a subtask, the component pushes its identification (ID) onto a stack. The component executes its other instructions. If the component completes its instructions so that it can terminate normally, it pops the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, it will not be able to pop the stack so its ID will remain in the stack. Another software process can read the IDs in the stack to identify which components have failed and can automatically take a specified action, such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.Type: ApplicationFiled: August 7, 2015Publication date: February 4, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
-
Patent number: 9104561Abstract: When a software component is starting (305), such as but not limited to a task or a subtask, the component pushes (310) its identification (ID) onto a stack. The component then executes (315) its other instructions. If the component completes its instructions so that it can terminate normally (320), then it pops (325) the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, then it will not be able to pop the stack so its ID will remain in the stack. Another software process can then read the IDs in the stack to identify (330) which components have failed and can automatically take a specified action (335), such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.Type: GrantFiled: September 13, 2012Date of Patent: August 11, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
-
Publication number: 20150081732Abstract: Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields.Type: ApplicationFiled: November 21, 2014Publication date: March 19, 2015Inventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia, Wei-Lun Lo
-
Patent number: 8898181Abstract: Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields.Type: GrantFiled: June 22, 2010Date of Patent: November 25, 2014Assignee: Microsoft CorporationInventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia, Wei-Lun Lo
-
Patent number: 8849848Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.Type: GrantFiled: June 7, 2011Date of Patent: September 30, 2014Assignee: Microsoft CorporationInventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
-
Publication number: 20140075248Abstract: When a software component is starting (305), such as but not limited to a task or a subtask, the component pushes (310) its identification (ID) onto a stack. The component then executes (315) its other instructions. If the component completes its instructions so that it can terminate normally (320), then it pops (325) the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, then it will not be able to pop the stack so its ID will remain in the stack. Another software process can then read the IDs in the stack to identify (330) which components have failed and can automatically take a specified action (335), such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.Type: ApplicationFiled: September 13, 2012Publication date: March 13, 2014Applicant: Microsoft CorporationInventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
-
Patent number: 8533220Abstract: A line of business data integration (“LOBI”) stack is provided that is configured to store an abstract representation of a mechanism utilized by a line of business (“LOB”) system to return requested LOB data in batches. When a request is received from a client for the LOB data, the LOBI stack utilizes the abstract representation to retrieve the requested LOB data from the LOB system in batches. In this manner, the batching mechanism utilized by the LOB system is abstracted from the client.Type: GrantFiled: April 2, 2009Date of Patent: September 10, 2013Assignee: Microsoft CorporationInventors: Karthik Kalyanaraman, Arshish Cyrus Kapadia, Tarkan Sevilmis, Nazeeruddin Mohammed
-
Patent number: 8494888Abstract: Concepts and technologies for offline modification of business data are disclosed. A client device caches a cached version of business data. A business connectivity services (“BCS”) application executing on the client device reviews modifications made to the cached version of the business data and generates one or more operations corresponding to the modifications. The BCS application maintains a queue of operations. The BCS application reviews the operations in the queue and combines or removes operations that can be combined or removed without affecting the dependencies between related operations. The client device accesses a business data server that hosts the business data, and transmits the operations to the business data server in the determined order.Type: GrantFiled: June 21, 2010Date of Patent: July 23, 2013Assignee: Microsoft CorporationInventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia
-
Patent number: 8341651Abstract: Methods and computer-readable media are provided herein for integrating enterprise search systems with proprietary back-end content store access control APIs. A declarative metadata model is utilized to create and store data defining a custom API exposed by a back-end content store for retrieving access rights for documents stored therein. A normalized API for obtaining access rights for a document is also exposed. When a call is made to the normalized API, the stored data is utilized to transform the call to the normalized API into a call to the custom API.Type: GrantFiled: January 10, 2007Date of Patent: December 25, 2012Assignee: Microsoft CorporationInventors: Arshish Cyrus Kapadia, Jonah Sarbin Burke
-
Publication number: 20110314085Abstract: Concepts and technologies for offline modification of business data are disclosed. A client device caches a cached version of business data. A business connectivity services (“BCS”) application executing on the client device reviews modifications made to the cached version of the business data and generates one or more operations corresponding to the modifications. The BCS application maintains a queue of operations. The BCS application reviews the operations in the queue and combines or removes operations that can be combined or removed without affecting the dependencies between related operations. The client device accesses a business data server that hosts the business data, and transmits the operations to the business data server in the determined order.Type: ApplicationFiled: June 21, 2010Publication date: December 22, 2011Applicant: Microsoft CorporationInventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia
-
Publication number: 20110314047Abstract: Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields.Type: ApplicationFiled: June 22, 2010Publication date: December 22, 2011Applicant: MICROSOFT CORPORATIONInventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia, Wei-Lun Lo
-
Publication number: 20110238696Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.Type: ApplicationFiled: June 7, 2011Publication date: September 29, 2011Applicant: MICROSOFT CORPORATIONInventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
-
Patent number: 7979458Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.Type: GrantFiled: January 16, 2007Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
-
Publication number: 20100257194Abstract: A line of business data integration (“LOBI”) stack is provided that is configured to store an abstract representation of a mechanism utilized by a line of business (“LOB”) system to return requested LOB data in batches. When a request is received from a client for the LOB data, the LOBI stack utilizes the abstract representation to retrieve the requested LOB data from the LOB system in batches. In this manner, the batching mechanism utilized by the LOB system is abstracted from the client.Type: ApplicationFiled: April 2, 2009Publication date: October 7, 2010Applicant: Microsoft CorporationInventors: Karthik Kalyanaraman, Arshish Cyrus Kapadia, Tarkan Sevilmis, Nazeeruddin Mohammed
-
Patent number: 7505973Abstract: Methods and computer-readable media provide for efficient paging of search results in accordance with the access rights of a user. According to various implementations, a request for a search query results in a calculated number of search results being retrieved and analyzed for user access rights. As documents having user access rights are located, session state information corresponding to the number of located documents having user access rights and to the number of analyzed documents required to locate the number of documents having user access rights is maintained. This information is used to dynamically alter the number of subsequent documents that are retrieved in order to fill a page of results. This minimizes redundant determinations of user access rights and minimizes the number of documents required to be retrieved and analyzed in order to fulfill a search query request.Type: GrantFiled: January 16, 2007Date of Patent: March 17, 2009Assignee: Microsoft CorporationInventors: Arshish Cyrus Kapadia, Mark Zellner
-
Publication number: 20080172390Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
-
Publication number: 20080168037Abstract: Methods and computer-readable media are provided herein for integrating enterprise search systems with proprietary back-end content store access control APIs. A declarative metadata model is utilized to create and store data defining a custom API exposed by a back-end content store for retrieving access rights for documents stored therein. A normalized API for obtaining access rights for a document is also exposed. When a call is made to the normalized API, the stored data is utilized to transform the call to the normalized API into a call to the custom API.Type: ApplicationFiled: January 10, 2007Publication date: July 10, 2008Applicant: Microsoft CorporationInventors: Arshish Cyrus Kapadia, Jonah Sarbin Burke
-
Patent number: 7039602Abstract: A default selection to be presented to a user at configuration time is determined at the time a selection list is presented to the user. A desired function, such as profit maximization or price minimization, is applied against each of the available selections. The selection which thus meets the function's criteria is designated as the default selection, and presented to the user as such. The user may, of course, select any item on the list, but accepting the default selection will tend to maximize desirability of the final product in accordance with the criteria defined by the manufacturer. In accordance with an aspect of the invention, the criteria to be used in choosing default selections may itself be defined at run-time, so that different default selections will be presented to, for example, different users.Type: GrantFiled: June 14, 1999Date of Patent: May 2, 2006Assignee: i2 Technologies US, Inc.Inventors: Arshish Cyrus Kapadia, Joseph Loyd Self